Академический Документы
Профессиональный Документы
Культура Документы
1 Simple Search
2 Getting Started
3 Adding Paper
4 Adding Toner
5 Entering Text
6 Operating Instructions
7 Remarks
8 Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in this manual before using the machine.
Documentation for This Machine
1
TABLE OF CONTENTS
Documentation for This Machine.......................................................................................................................1
Manuals for This Machine.................................................................................................................................6
Manuals List.........................................................................................................................................................8
What You Can Do with This Machine...............................................................................................................9
Using This Machine as a Copier...................................................................................................................9
Using This Machine as a Printer....................................................................................................................9
Paperless Fax Transmission.........................................................................................................................10
Fax Transmission and Reception Over the Internet...................................................................................11
Using the Scanner in a Network Environment...........................................................................................12
Administrating the Machine (Security Functions)......................................................................................12
Monitoring the Machine Via Computer.....................................................................................................13
Notice................................................................................................................................................................14
Important......................................................................................................................................................14
How to Read This Manual...............................................................................................................................15
Symbols........................................................................................................................................................15
Name of Major Item....................................................................................................................................15
Note..............................................................................................................................................................16
Safety Information............................................................................................................................................17
Safety During Operation.............................................................................................................................17
Safety Precautions to be Followed.............................................................................................................17
Safety Labels of This Machine.........................................................................................................................22
Positions of WARNING and CAUTION labels.........................................................................................22
Power Switch Symbols.................................................................................................................................22
ENERGY STAR Program..................................................................................................................................23
Energy Saving Functions..................................................................................................................................24
Laws and Regulations......................................................................................................................................26
Legal Prohibition..........................................................................................................................................26
Laser Safety..................................................................................................................................................26
Notes to users in the United States of America..........................................................................................26
1. Simple Search
Searching by what you want to do.................................................................................................................29
I want to save my paper document!...........................................................................................................29
I want to convert documents to electronic formats easily!........................................................................30
2
I want to register destinations!....................................................................................................................30
I want to operate the machine more effectively!.......................................................................................31
Searching by Keyword....................................................................................................................................33
Paper.............................................................................................................................................................33
Register/Change/Delete............................................................................................................................33
Settings..........................................................................................................................................................34
Forwarding...................................................................................................................................................34
Install.............................................................................................................................................................34
2. Getting Started
Guide to Components......................................................................................................................................37
Other Items.......................................................................................................................................................40
External Items...............................................................................................................................................40
Internal Items................................................................................................................................................40
Control Panel....................................................................................................................................................42
Display Panel....................................................................................................................................................46
Reading the Display and Using Keys.........................................................................................................46
Changing the Display Language................................................................................................................47
When the Authentication Screen is Displayed...............................................................................................48
User Code Authentication (Using the Control Panel)................................................................................48
User Code Authentication (Using a Printer Driver)....................................................................................49
Login (Using the Control Panel)..................................................................................................................49
Logout (Using the Control Panel)................................................................................................................49
Login (Using a Printer Driver)......................................................................................................................50
Login (Using Web Image Monitor)............................................................................................................50
Logout (Using Web Image Monitor)..........................................................................................................50
Changing Modes.............................................................................................................................................52
System Reset.................................................................................................................................................52
Turning On/Off the Power..............................................................................................................................54
Turning On the Main Power........................................................................................................................54
Turning On the Power..................................................................................................................................55
Turning Off the Power..................................................................................................................................55
Turning Off the Main Power........................................................................................................................56
Saving Energy..............................................................................................................................................56
3
3. Adding Paper
Loading Paper..................................................................................................................................................59
Loading Paper into the Paper Trays...........................................................................................................59
Orientation-Fixed Paper or Two-Sided Paper...........................................................................................61
Changing the Paper Size.................................................................................................................................64
Changing the Paper Size in the Paper Tray (Tray 1)................................................................................64
Changing the Paper Size in the Optional Paper Tray Unit (Tray 2 and Tray 3)....................................67
Selecting the Paper Size with User Tools...................................................................................................69
Recommended Paper Sizes and Types..........................................................................................................71
Envelopes..........................................................................................................................................................74
Unusable Paper................................................................................................................................................76
Paper Storage..................................................................................................................................................77
4. Adding Toner
Adding Toner....................................................................................................................................................79
Replacing Toner...........................................................................................................................................80
Sending Faxes or Scanned Documents When Toner Has Run Out.........................................................81
Used Toner...................................................................................................................................................82
5. Entering Text
Entering Text.....................................................................................................................................................83
Available Characters...................................................................................................................................83
Keys...............................................................................................................................................................83
How to Enter Text.........................................................................................................................................84
6. Operating Instructions
Installing Operating Instructions......................................................................................................................93
PDF Manuals................................................................................................................................................93
How to Use the Operating Instructions...........................................................................................................95
Opening from the Icon................................................................................................................................95
Opening from the [Start] Menu..................................................................................................................95
Opening from the CD-ROM.......................................................................................................................96
7. Remarks
Dos and Don'ts.................................................................................................................................................97
Where to Put Your Machine............................................................................................................................99
Machine Environment..................................................................................................................................99
4
Power Connection.....................................................................................................................................101
Maintaining Your Machine...........................................................................................................................103
Cleaning the Exposure Glass...................................................................................................................103
Cleaning the ADF......................................................................................................................................103
Cleaning the Power Cable Plug...............................................................................................................104
Counter...........................................................................................................................................................105
Displaying the Total Counter....................................................................................................................105
8. Appendix
Software and Utilities Included on the CD-ROM........................................................................................107
Viewing the Contents of the CD-ROM.....................................................................................................107
Printer Drivers for This Machine................................................................................................................107
TWAIN Driver............................................................................................................................................109
LAN-Fax Driver..........................................................................................................................................109
DeskTopBinder Lite....................................................................................................................................110
SmartDeviceMonitor for Admin...............................................................................................................110
DeskTopBinder-SmartDeviceMonitor for Client......................................................................................112
Specifications for the Main Unit...................................................................................................................113
Specifications for Auto Document Feeder...................................................................................................117
Specifications for Paper Tray Unit (Tray 2 and Tray 3)..............................................................................118
Specifications for Wireless LAN Board........................................................................................................119
Trademarks.....................................................................................................................................................120
INDEX...........................................................................................................................................................123
5
Manuals for This Machine
Read this manual carefully before you use this machine.
Refer to the manuals that are relevant to what you want to do with the machine.
6
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
7
Manuals List
Printed Manuals HTML Manuals PDF Manuals
Manual Name
Provided Provided Provided
8
What You Can Do with This Machine
This section introduces the features of this machine.
BRA002S
9
BRA003S
BRA004S
• To send a fax, print from the Windows application you are working with, select LAN-Fax as the printer,
and then specify the destination.
• You can also check the sent image data.
• For details about the machine's settings, see “Network Settings Required to Use the Printer/LAN-Fax”,
Network and System Settings Guide .
10
• For details about how to use the function, see “Fax via Computer”, Facsimile Reference .
You can send and receive faxes over your LAN and the Internet.
BRA043S
Internet Fax
This machine converts scanned document images to e-mail format, and transmits and receives this
data over the Internet.
• To send a document, specify an e-mail address instead of dialing the destination telephone
number (Internet Fax Transmission).
• This machine can receive e-mail messages via Internet Fax or from computers (Internet Fax
Reception).
• Internet Fax compatible machines and computers that have e-mail addresses can receive e-mail
messages via Internet Fax.
IP-Fax
The IP-Fax function sends or receives documents between two facsimiles directly via a TCP/IP network.
• To send a document, specify an IP address or host name instead of a fax number (IP-Fax
Transmission).
• This machine can receive documents sent via Internet Fax (IP-Fax Reception).
• Using a VoIP gateway, this machine can send to G3 facsimiles connected to the public switched
telephone network (PSTN).
• For details about settings, see “Network Settings Required to Use Internet Fax”, Network and System
Settings Guide .
• For details about how to transmit and receive documents over the Internet, see “Transmission” and
“Reception”, Facsimile Reference .
11
Using the Scanner in a Network Environment
BRA044S
• You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See
“Sending Scan Files by E-mail”, Scanner Reference .
• You can send scan files directly to folders (Sending scan files by Scan to Folder). See “Sending Scan
Files to Folder”, Scanner Reference .
• You can use this machine as a delivery scanner for the ScanRouter delivery application (Network
delivery scanner). You can save scan files in the delivery server or send them to a folder in a computer
on the same network. For details about the machine's settings, see “Network Settings Required to Use
the Network Delivery Scanner”, Network and System Settings Guide . For details about how to
use the function, see “Delivering Scan Files”, Scanner Reference .
• Client computers can use this machine as a network TWAIN scanner.
• You can scan originals in full color using the scanner function.
• You can use Web Services on Devices (WSD) to send scan files to a client computer.
• You can save scan files on a removable memory device such as a USB memory stick or an SD card.
12
BRA005S
• You can control the use of the machine, as well as prevent machine settings from being changed
without authorization.
• By setting passwords, you can prevent unauthorized access via the network.
You can change the machine's settings and monitor its status from a connected computer.
BRA006S
• Web Image Monitor lets you configure and operate the machine using a Web browser on a computer.
You can also install SmartDeviceMonitor for Admin on a computer to configure and operate the
machine.
• Using Web Image Monitor, you can register information in the address book, specify the machine's
settings, and check the machine's status with ease.
• Using Web Image Monitor, you can check and specify the initial settings (system settings, printer
features, network settings, and security settings/certificate management), control print jobs, and
display the print job journal.
• You can also use SmartDeviceMonitor for Admin to register information in the address book.
13
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
14
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
15
Note
16
Safety Information
When using this machine, the following safety precautions should always be followed.
Indicates a potentially hazardous situation which, if instructions are not followed, could result in death
or serious injury.
Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or
moderate injury or damage to property.
This section explains safety precautions that should always be followed when using this machine.
• Keep the machine away from flammable liquids, gases, and aerosols. A fire or an electric shock
might occur.
• Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur.
• Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur.
• Make sure the room where you are using the machine is well ventilated and spacious. Good
ventilation is especially important when the machine is used heavily.
17
Handling power cords and power plugs
This section explains safety precautions about handling power cords and power plugs.
• Connect this machine only to a power source that matches the specifications shown in
“Specifications for the Main Unit” in this manual and do not use an extension cord.
• Use of this machine with extension cords and power sources other than those that match the
specifications shown constitutes an electric shock and fire hazard.
• Power cords that are damaged, broken, modified, trapped under heavy objects, pulled hard, or
bent severely are electric shock and fire hazards.
• Disconnect the power plug (by pulling the plug, not the cable) if the power cable or plug becomes
frayed or otherwise damaged.
• If the power cord is damaged (exposure of the core, disconnection, etc.), contact your service
representative to change a new one. Operating the machine with a damaged power cord may
cause an electric shock or fire.
• It is dangerous to handle the plug with wet hands. Doing this may result in receiving an electric
shock.
• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.
• When you disconnect the power plug from the wall outlet, always pull the plug (not the cable).
• To disconnect the power cord, pull it out by plug. Do not drag the cord itself. Doing so may result
in damage to the cord, leading to fire or electric shock.
• For safety reason, unplug the power cord from the wall outlet if the machine will not be used for
an extended period of time such as holidays.
18
• Turn off the power and disconnect the power plug (by pulling the plug, not the cable) if any of the
following occurs:
• You spill something into the machine.
• You suspect that your machine needs service or repair.
• The external housing of your machine has been damaged.
• Protect the machine from dampness or wet weather, such as rain and snow.
• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.
• If you have to move the machine when the optional paper tray unit is attached, do not push on the
main unit's top section. Doing so can cause the optional paper tray unit to detach, possibly resulting
in injury.
• If two paper tray units (options) are installed, do not pull out more than one tray at a time when
you are changing or replenishing paper or resolving paper jams. Pressing down forcefully on the
machine’s upper surfaces can result in malfunctions and/or user injury.
• Contact your service representative if you need to lift the machine (such as when relocating it to
another floor). Do not attempt to lift the machine without the assistance of your service
representative. The machine will be damaged if it topples or is dropped, resulting in malfunction
and risk of injury to users. The machine's various handling areas are for service engineer use only.
Do not touch these areas.
• Do not allow paper clips, staples, or other small metallic objects to fall inside the machine.
• Do not look into the lamp. It can damage your eyes.
• For environmental reasons, do not dispose of the machine or expended supply waste at household
waste collection points. Disposal can take place at an authorized dealer.
19
Handling the machine's interior
This section explains safety precautions about handling the machine's interior.
• To avoid hazardous electric shock or laser radiation exposure, do not remove any covers or
screws other than those specified in this manual.
• The fusing section of this machine might be very hot. Caution should be taken when removing misfed
paper.
• The inside of the machine could be very hot. Do not touch the parts with a label indicating the “hot
surface”. Otherwise, an injury might occur.
• When loading paper, take care not to trap or injure your fingers.
• During operation, rollers for transporting the paper and originals revolve. A safety device has
been installed so that the machine can be operated safely. But take care not to touch the machine
during operation. An injury might occur.
• Fire and breakdown can result from heavy accumulation of dust inside this machine. Consult your
service representative for details about and charges for cleaning the machine's interior.
• Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open
flame. Dispose of used toner containers in accordance with local regulations.
• Do not incinerate spilled toner or used toner. Toner dust might ignite when exposed to an open
flame.
• Do not store toner, used toner, or toner containers in a place with an open flame. The toner might
ignite and cause burns or a fire.
20
• Disposal can take place at our authorized dealer.
• Keep the polythene materials (bags, gloves, etc.) supplied with this machine away from babies
and small children at all times. Suffocation can result if polythene materials are brought into contact
with the mouth or nose.
• To avoid fire or machine failure, do not use aluminum foil, carbon paper, or similar conductive
paper.
• Do not open toner containers forcefully. Toner can spill, dirtying your clothes or hands, and possibly
resulting in accidental ingestion.
• Keep toner (used or unused) and toner containers out of reach of children.
• If toner or used toner is inhaled, gargle with plenty of water and move into a fresh air environment.
Consult a doctor if necessary.
• If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult
a doctor if necessary.
• If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor
if necessary.
• Avoid getting toner on your clothes or skin when removing a paper jam or replacing toner. If your
skin comes into contact with toner, wash the affected area thoroughly with soap and water.
• If toner gets on your clothing, wash with cold water. Hot water will set the toner into the fabric and
may make removing the stain impossible.
21
Safety Labels of This Machine
This section explains the machine's safety information labels.
This machine has labels for WARNING and CAUTION at the positions shown below. For safety,
please follow the instructions and handle the machine as indicated.
BRA007S
The meanings of the symbols for the switches on this machine are as follows:
• :POWER ON.
• :STANDBY.
22
Energy Saving Functions
To reduce its power consumption, this machine has the following functions:
Low Power Mode
• If this machine remains idle for a specified period, it automatically reduces its electrical
consumption.
• The default period the machine waits before entering Low Power Mode is 1 minute. This default
time can be changed.
Off Mode (on machines with only copier function)
• If this machine remains idle for a specified period, it automatically turns off its power.
• The default delay time the machine waits before entering Off Mode is 1 minute. This default time
can be changed.
Sleep Mode (on machines with facsimile, printer, or scanner functions)
• If this machine is already in Low Power Mode and remains idle for a specified period, it
automatically enters Sleep Mode to further reduce its electrical consumption.
• The default delay time the machine waits before entering Sleep Mode is 1 minute. This default
time can be changed.
• The machine can print jobs from computers and receive faxes while in Sleep Mode.
24
Machines with only copier Machines with facsimile, printer,
function or scanner functions
• For details about how to change the default interval, see “Timer Settings”, Network and System
Settings Guide .
25
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
Laser Safety
CDRH Regulations
This equipment complies with requirements of 21 CFR Subchapter J for class 1 laser products. This
equipment contains a GaAlAs laser diode, 6.2-milliwatt, 760 - 800 nanometer wavelength for each
emitter. This equipment does not emit hazardous light, since the beam is totally enclosed during all customer
modes of operation and maintenance.
Caution:
Use of controls or adjustments or performance of procedures other than those specified in this manual might
result in hazardous radiation exposure.
FCC Rules
Declaration of Conformity
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired
operation.
Responsible party: Ricoh Americas Corporation
Address: 5 Dedrick Place, West Caldwell, NJ 07006
Telephone number: 973-882-2000
26
Product Name: Multi Function Peripheral
Model Number:
• 917/LD117/MP 171/Aficio MP 171
• 917F/LD117F/MP 171F/Aficio MP 171F
• 917SPF/LD117SPF/MP 171SPF/Aficio MP 171SPF
Note:
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no guarantee that interference will not occur
in a particular installation. If this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user is encouraged to
try to correct the interference by one more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult the dealer or an experienced radio /TV technician for help.
Caution:
Changes or modifications not expressly approved by the party responsible for compliance could void
the user's authority to operate the equipment.
27
28
1. Simple Search
You can search for a procedure either by keyword or by what you want to do.
1
Searching by what you want to do
You can search for a procedure by what you want to do.
You can find explanations of the functions and procedures that you can use to save your paper document
easily.
BRL059S
29
1. Simple Search
You can find explanations of the functions and procedures that you can use convert documents to electronic
formats easily.
BQX138S
You can find explanations of the functions and procedures that you can use to register destinations easily.
30
Searching by what you want to do
BRL060S
You can find explanations of the functions and procedures that you can use to operate the machine more
effectively.
31
1. Simple Search
BQX139S
32
Searching by Keyword
Searching by Keyword
You can search for a procedure by keyword.
1
Paper
Register/Change/Delete
33
1. Simple Search
I want to copy the contents of the machine's address book to the LAN-Fax address book.
See “Using the Machine's Address Book as the LAN-Fax Destination List”, Facsimile Reference
.
1
Settings
Forwarding
Install
I want to install the printer driver so I can use the SmartDeviceMonitor for Client port.
See “Using the SmartDeviceMonitor for Client Port”, Printer Reference .
I want to install the printer driver so I can use the Standard TCP/IP port.
See “Using the Standard TCP/IP Port”, Printer Reference .
34
Searching by Keyword
I want to install the printer driver so I can use a Windows Network Printer.
See “Using as a Windows Network Printer”, Printer Reference .
I want to install the printer driver so I can use the machine by USB.
See “Installing the Printer Driver Using USB”, Printer Reference . 1
35
1. Simple Search
36
2. Getting Started
This chapter describes how to start using this machine.
Guide to Components
This section introduces the names and functions of the components. 2
• Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If
the machine overheats, a fault might occur.
BRA045S
1. ADF
If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. See “External
items”.
This document feeder can be used for two-sided originals.
2. Exposure glass
Place originals here face down.
3. Internal tray guide
Open out and raise the end fence to support large paper.
37
2. Getting Started
4. Ventilation holes
Prevent overheating.
5. Main power switch
If the machine does not operate after turning on the operation switch, check if the main power switch is turned
on. If it is off, turn it on. See “Turning On/Off the Power”.
6. Main power indicator
2 Lights when the main power switch is turned on, and goes off when the switch is turned off.
7. Operation switch
Press to turn the power on (the operation switch indicator lights up). To turn the power off, press again (the
operation switch indicator goes off). See “Turning On/Off the Power”.
8. Control panel
See “Control Panel”.
9. Internal tray
Copied/printed paper and fax messages are delivered here.
10. Front cover
Open to access the inside of the machine.
11. Paper tray
Load paper here.
12. Paper tray unit (Tray 2 and Tray 3)
See “External items”.
BRA009S
1. Right cover
Open this cover to remove jammed paper fed from the paper tray.
2. Bypass tray
Use to copy or print onto OHP transparencies, adhesive labels, translucent paper, envelopes, and custom size
paper.
3. Lower right covers
Open these covers to remove jammed paper fed from the paper tray unit (Tray 2 and Tray 3).
38
Guide to Components
39
2. Getting Started
Other Items
This section introduces the names and functions of the other main items.
External Items
2 This section provides explanations about external items.
BRA046S
1. Handset
Used as a receiver when a fax unit is installed.
2. Paper tray unit (Tray 2 and Tray 3)
Each paper tray holds up to 500 sheets of paper. Up to two units.
3. Media slot
With this media slot, you can save scan files on a removable memory device.
Internal Items
This section describes the items that can be installed in the machine.
• Printer/Scanner unit
Allows you to use the printer and scanner functions.
• Hard Disk Drive Option
Allows you to use functions such as Collate and sample print in printer mode.
Allows you to send scan files by E-mail or by Scan to Folder in scanner mode.
Allows you to use the Internet fax, and IP-Fax functions in facsimile mode.
40
Other Items
• DataOverWriteSecurity Unit
Allows you to erase data that is stored on the hard disk.
• HDD Encryption Unit
Allows you to encrypt data that is stored on the hard disk.
• VM card
With this card, you can install embedded software architecture applications. 2
• IEEE 1284 Interface Board
Allows you to connect to an IEEE 1284 cable.
• Wireless LAN board
Allows you to install a wireless LAN interface.
• Gigabit Ethernet (1000BASE-T)
Allows you to communicate over 1000BASE-T.
• Only one of the following items can be installed on the machine at any one time: IEEE 1284 Interface
Board, Wireless LAN board.
41
2. Getting Started
Control Panel
This section introduces the names and functions of the components on the control panel.
• Do not turn off the main power switch while the operation switch indicator is lit or blinking. Doing so
2 may damage the hard disk.
This illustration shows the control panel of the machine that has fax and printer/scanner installed.
BRA048S
42
Control Panel
43
2. Getting Started
44
Control Panel
45
2. Getting Started
Display Panel
The display panel shows machine status, error messages, and function menus.
• Don't apply strong impact or force to the screen. Or it may be damaged. Maximum force allowable
2 is approx. 30N (approx. 3 kgf). (N = Newton, kgf = Kilogram force. 1 kgf = 9.8N.)
When you select or specify an item on the display panel, it is highlighted like .
• The display panels shown in this manual's illustrations are taken from a machine that has fax and
printer/scanner installed.
This section explains reading the display panel and using the keys.
BRA050S
1. Selection keys
Correspond to items at the bottom line on the display.
Example: initial copy display
• When the instruction “press [Reduce]” appears in this manual, press the left selection key.
• When the instruction “press [Enlarge]” appears in this manual, press the center selection key.
• When the instruction “press [Zoom]” appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.
3. [OK] key
Press to set a selected item or an entered numeric value.
46
Display Panel
4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ], [ ], [ ],or [ ] appears in this manual, press the scroll key of the same direction.
You can change the language used on the display. English is set as default. 2
1. Press the [User Tools/Counter] key.
BRA052S
3. Select the language using [ ] or [ ], and then press the [OK] key.
47
2. Getting Started
• Ask the user administrator for the login user name, login password, and user code. For details about
2 user authentication, contact your administrator.
• User code to enter on User Code Authentication is the numerical value registered in the address book
as “login user name”.
If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication
is active, the authentication screen appears on the display. The machine only becomes operable after
entering your own login user name and login password. If User Code Authentication is active, you cannot
use the machine until you enter the user code.
If you can use the machine, you can say that you are logged in. When you go out of the operable state,
you can say that you are logged out. After logging in the machine, be sure to log out of it to prevent
unauthorized usage.
• If authentication fails, the "Authentication failed." message appears. Check that the login user name
and login password are correct.
This section explains the procedure for logging in to the machine using the control panel while User Code
Authentication is active.
If User Code Authentication is active, a screen prompting you to enter a user code appears.
1. Enter a user code (up to eight digits), and then press the [OK] key.
48
When the Authentication Screen is Displayed
This section explains the procedure for logging in to the machine using a printer driver while User Code
Authentication is active.
If User Code Authentication is active, specify the user code in the printer properties of the printer driver.
For details, see the printer driver Help.
2
• When logged in through User Code Authentication, you do not have to log out.
This section explains the procedure for logging in to the machine when Basic Authentication, Windows
Authentication, LDAP Authentication, or Integration Server Authentication is set.
1. Enter the login user name and then press the [OK] key.
2. Enter the login password and then press the [OK] key.
When the user is authenticated, the screen for the function you are using appears.
• If authentication fails, the "Authentication failed." message appears. Check that the login user name
and login password are correct.
This section explains the procedure for logging out the machine when Basic Authentication, Windows
Authentication, LDAP Authentication, or Integration Server Authentication is set.
• To prevent use of the machine by unauthorized persons, always log out when you have finished using
the machine.
49
2. Getting Started
2
3. Press [Yes].
This section explains the procedure for logging in to the machine using a printer driver.
If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication
is active, make encryption settings in the printer properties of the printer driver, and then specify a login
user name and password. For details, see the printer driver Help.
• When logged in using a printer driver, you do not have to log out.
This section explains the procedure for logging in to the machine via Web Image Monitor.
1. Click [Login].
2. Enter a login user name and password, and then click [Login].
• For user code authentication, enter a user code in [User Name], and then click [OK].
This section explains the procedure for logging out the machine via Web Image Monitor.
50
When the Authentication Screen is Displayed
51
2. Getting Started
Changing Modes
This section explains how to change modes.
The following illustration shows screens that appear when the fax and printer/scanner unit are installed.
BRA054S
System Reset
52
Changing Modes
To change the length of time that the machine waits before restoring its settings to their default values, use
the System Auto Reset Timer setting. See “System Settings”, Network and System Settings Guide .
53
2. Getting Started
• This machine automatically enters Energy Saver mode or turns itself off if you do not use it for a while.
To specify the time that the machine waits before it enters Energy Saver mode and/or turns itself off,
configure the Energy Saver Timer and/or Auto Off Timer setting, respectively. See “System Settings”,
Network and System Settings Guide .
• Do not turn off the main power switch immediately after turning it on. Doing so may result in damage
to the memory, leading to malfunctions.
1. Make sure the power cord is firmly plugged into the wall outlet.
2. Turn on the main power switch.
The main power indicator goes on.
BRA056S
54
Turning On/Off the Power
• After you switch the main power on, a screen may appear to indicate that the machine is initializing.
Do not switch the power off during this process. Initialization takes about three minutes.
BRA057S
• If the power does not come on when the operation switch is pressed, check the main power switch is
on. If it is off, turn it on.
55
2. Getting Started
2
BRA057S
• Even if you press the operation switch, the operation switch indicator does not go out, but blinks during
communication with external equipment.
• Do not turn off the main power switch when the operation switch indicator is lit or blinking. Doing so
may result in damage to the memory.
• Make sure to turn off the main power switch before pulling out the power plug. Not doing so may
result in damage to the memory.
• When the main power switch is turned off while using the fax function, waiting fax and print jobs may
be cancelled, and incoming fax documents not received. If you have to turn off this switch for some
reason, make sure 100% is shown as available memory on the screen before turning off the main
power switch or unplugging the power cord. Fax files in memory are deleted twelve hours after you
turn off the main power switch or unplug the power cord.
• For details, see “Turning Off the Main Power / In the Event of Power Failure”, Troubleshooting
.
Saving Energy
56
Turning On/Off the Power
57
2. Getting Started
58
3. Adding Paper
This chapter describes recommended paper sizes and types, and how to load paper into the paper tray.
Loading Paper
This section describes how to load paper into the paper tray.
• When loading paper, take care not to trap or injure your fingers. 3
• If two paper tray units (options) are installed, do not pull out more than one tray at a time when
you are changing or replenishing paper or resolving paper jams. Pressing down forcefully on the
machine’s upper surfaces can result in malfunctions and/or user injury.
This section describes how to load paper into the paper trays.
• Various sizes of paper can be loaded in the paper trays by adjusting the positions of side fences and
end fence.
• Check the paper edges are aligned with the right side.
• Do not stack paper over the limit mark.
59
3. Adding Paper
3
BRA017S
BRA018S
BRA019S
60
Loading Paper
This section describes loading paper that has a specified orientation and printing side (such as letterhead
paper).
Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or
copied paper) might not print correctly, depending on how the originals and paper are placed. Set 3
[Letterhead Setting] to [On] under [Copier Features], and then place the original and paper as shown
below. For details about Letterhead Setting, see “Copier Features”, Copy Reference . For details about
printing with the printer function, see “Printer Features”, Printer Reference .
Original Orientation
• Copier *2
• Scanner
*1 *1
*1 When making copies using the duplex function in this orientation by setting [Always Specify] for
[Orientation] with [Copier Features] in User Tools, specify for the original orientation.
*2 When making copies using the duplex function in this orientation, and loaded paper orientation is ,
place originals as shown below.
Under [Copier Features], if [Orientation] is set to [Always Specify], load paper in orientation.
61
3. Adding Paper
Paper Orientation
BRA020S
62
Loading Paper
BRA021S
• In [Tray Paper Settings] under [System Settings], specify [Letterhead] for “Paper Type” of the paper
tray you want to use. This setting is only available when the printer/scanner and fax units are installed.
See “Tray Paper Settings”, Network and System Settings Guide .
63
3. Adding Paper
• Be sure to select the paper size with User Tools. If you do not, misfeeds might occur. For details, see
“Selecting the Paper Size with User Tools”.
3 • Fan the paper before loading.
• Straighten curled or warped paper before loading.
• For details about paper sizes and types, see “Recommended Paper Sizes and Types”.
This section describes how to change the paper size in the paper tray (Tray 1).
• If a paper tray is pushed vigorously when putting it back into place, the position of the tray's side
fences may slip out of place.
• Do not stack paper over the limit mark.
• Check the paper edges are aligned with the right side.
1. Check that paper in the paper tray is not being used, and then pull the tray carefully out
until it stops.
BRA017S
64
Changing the Paper Size
3. While pinching the release levers, pull the end fence off from the tray.
3
BRA022S
4. While pressing down the release levers, slide the side fences until they are aligned with the
paper size you want to load.
Make sure there are no gaps between the paper and side fences.
BRA024S
5. While pinching the release levers, set the end fence to the paper size you want to load.
Make sure there are no gaps between the paper and end fence.
BRA025S
To load A4 size paper, place the end fence in the corner pocket on the left.
65
3. Adding Paper
3 BRA023S
BRA018S
BRA019S
• When setting small quantities of paper, be careful not to squeeze in the side fence too much. Paper
might not feed in properly if the side fences are too tight against the paper's edges.
66
Changing the Paper Size
Changing the Paper Size in the Optional Paper Tray Unit (Tray 2 and Tray 3)
This section describes how to change the paper size in the optional paper tray unit (Tray 2 and Tray 3).
• If a paper tray is pushed vigorously when putting it back into place, the position of the tray's side
fences may slip out of place.
• Do not stack paper over the limit mark.
• Check the paper edges are aligned with the right side.
3
1. Check that paper in the paper tray is not being used, and then pull the tray carefully out
until it stops.
BRA026S
BRA027S
4. While pinching the release levers, slide the end fence until it is aligned with the paper size
you want to load.
Make sure there are no gaps between the paper and end fence.
67
3. Adding Paper
3 BRA028S
To load 81/4×14 or 81/2×14 size paper, pull the end fence out of the tray and place it in the
corner pocket on the left.
BRA042S
5. Press the metal plate down until it clicks, and then square the paper and load it print side
up.
Do not stack paper over the limit mark.
BRA029S
• When setting small quantities of paper, be careful not to squeeze in the side fence too much. Paper
might not feed in properly if the side fence is too tight against the paper's edge.
68
Changing the Paper Size
This section describes how to select a paper size with User Tools.
BRA052S
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Tray Paper Settings] using [ ] or [ ], and then press the [OK] key.
4. Select “Paper Size” for the paper tray of which paper size will be changed using [ ] or
[ ], and then press the [OK] key.
5. Select the paper size using the scroll keys, and then press the [OK] key.
69
3. Adding Paper
70
Recommended Paper Sizes and Types
• If you use damp or curled paper, a staple clogging or paper jam may occur.
Paper tray (Tray 1)
Paper type and weight Metric version Inch version Paper capacity
Paper type and weight Metric version Inch version Paper capacity
Bypass tray
Paper type and weight Metric version Inch version Paper capacity
71
3. Adding Paper
Paper type and weight Metric version Inch version Paper capacity
*1 Press the [ ] key, select [Custom Size], and then enter the paper size using the number keys.
*2 Press the [ ] key, and then select the paper size.
3 • Certain types of paper produce noise when delivered. This noise does not indicate a problem and
print quality is unaffected. (Glossy paper and OHP transparencies can produce noise when
delivered.)
• When using translucent paper or label paper, make sure to select the appropriate paper type. For
details about Paper Type: Bypass Tray, see “System Settings”, Network and System Settings Guide
.
• When loading paper in the paper tray and the optional paper tray unit, place the print side face up.
• When loading paper in the bypass tray, place the print side face down.
• When you use the bypass tray, it is recommended to set the paper direction to .
• Do not use paper designed for inkjet printers, as these may stick to the fusing unit and cause a misfeed.
• When loading thick paper (91 - 157 g/m2, 25 - 42 lb.), or adhesive labels, make sure the top of
the stack is no higher than the upper limit of the bypass tray. Paper capacity varies depending on the
thickness and condition of the paper.
• When using thick paper (91 - 157 g/m2, 25 - 42 lb.), select [Thick Paper] as the paper type for the
bypass tray. For details, see “Copying from the Bypass Tray”, Copy Reference .
• When copying onto adhesive labels, in bypass settings, select [Thick Paper] for the special paper
setting.
• When loading OHP transparencies, select [OHP (Transparency)] as the paper type for the bypass
tray. For details, see “Copying from the Bypass Tray”, Copy Reference .
• When you load OHP transparencies, check the front and back of the sheets, and place them correctly,
or a misfeed might occur. Use A4 or 81/2 × 11 size transparencies, and specify their size. For
details, see Copy Reference and Printer Reference .
• When you use OHP transparencies, fan them for each use.
• We recommend you load OHP transparencies and sheets of label paper and translucent paper one
by one. This prevents them becoming jammed inside the machine.
• Also, be sure to remove printed OHP transparencies and sheets of translucent paper one by one as
they are delivered. This prevents them sticking together.
• We recommend that you use a 4000ANSI lumen or brighter overhead projector to project OHP
transparencies.
72
Recommended Paper Sizes and Types
73
3. Adding Paper
Envelopes
This section describes loading envelopes.
• This machine can print only on the envelopes listed below. Note that even the envelopes listed here
can still become jammed if their flaps are too long or unusually shaped.
BAV026S
Supported
BAV027S
Supported
BAV028S
• To print on envelopes, load them on the bypass tray and be sure to specify the appropriate paper
type. See “Copying from the Bypass Tray”, Copy Reference and “Setting Paper on the Bypass
Tray”, Printer Reference .
• Specifications for envelopes are as follows:
74
Envelopes
Recommended weight and 80 g/m2, 114 × 229 mm 24 lb., 41/8 × 91/2 (Com10)
size (C5/6)
80 g/m2, 114 × 162 mm (C6)
95 g/m2, 162 × 229 mm (C5)
• Before loading envelopes, flatten their leading edges (the edge going into the printer) by running a
pencil or ruler across them. 3
• Some kinds of envelope might cause misfeeds, wrinkles or print poorly.
• Print quality on envelopes may be uneven if parts of an envelope have differing thicknesses. Print one
or two envelopes to check print quality.
• In a hot and humid environment, the envelope might be output creased or improper printing quality.
75
3. Adding Paper
Unusable Paper
This section describes paper unusable on this machine.
• To avoid fire or machine failure, do not use aluminum foil, carbon paper, or similar conductive
paper.
3 • To prevent faults, do not use any of the following kinds of treated paper:
• Paper for inkjet printers
• Thermal fax paper
• Art paper
• Aluminum foil
• Carbon paper
• Conductive paper
• Paper with perforated lines
• Hemmed-edge paper
• Tab stock
• Certain types of OHP transparencies for color printing cannot be used. For details about types that
can be used, contact your sales or service representative.
• Faults can occur if you copy or print onto sides that are already printed. Take care to copy or print
onto unprinted sides only.
76
Paper Storage
Paper Storage
This section describes how to store paper.
• When storing paper, the following precautions should always be followed:
• Do not store paper where it will be exposed to direct sunlight.
• Avoid storing paper in humid areas (humidity: 70% or less).
• Store on a flat surface.
• Do not store paper vertically.
3
• Under high temperature and humidity conditions, or low temperature and humidity conditions, store
paper in plastic bags.
77
3. Adding Paper
78
4. Adding Toner
This chapter explains how to replenish toner when it runs out.
Adding Toner
This section describes how to add and store toner.
• Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open
flame. Dispose of used toner containers in accordance with local regulations.
4
• Keep toner (used or unused) and toner containers out of reach of children.
• If toner or used toner is inhaled, gargle with plenty of water and move into a fresh air environment.
Consult a doctor if necessary.
• If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult
a doctor if necessary.
• If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor
if necessary.
• Avoid getting toner on your clothes or skin when removing a paper jam or replacing toner. If your
skin comes into contact with toner, wash the affected area thoroughly with soap and water.
• If toner gets on your clothing, wash with cold water. Hot water will set the toner into the fabric and
may make removing the stain impossible.
• Do not open toner containers forcefully. Toner can spill, dirtying your clothes or hands, and possibly
resulting in accidental ingestion.
79
4. Adding Toner
Replacing Toner
80
Adding Toner
BRA030S
When the machine has run out of toner, the indicator on the display lights. Note that even if there is no
toner left, you can still send faxes or scanned documents.
• If number of communications executed after the toner has run out and not listed in the automatically
output Journal exceeds 100, communication is not possible.
81
4. Adding Toner
Used Toner
82
5. Entering Text
This chapter describes how to enter characters.
Entering Text
This section explains how to enter text.
When you enter a character, it appears at the position of the cursor. If there is a character already at the
cursor position, the entered character appears before that.
Available Characters
Keys
BRA059S
83
5. Entering Text
You can enter characters using the [Quick Dial 01] to [Quick Dial 09] keys. To enter a letter, press the key
repeatedly until the required letter appears.
The language selected using the control panel determines which characters can be entered. There are four
types of keyboard. For each type, you can enter the characters used in the following languages:
Type D Russian
• Depending on the machine type or function you are using, some characters may not be available.
84
Entering Text
Entering letters
1. Press the [Shift] key to switch between lowercase, uppercase, User Text, and Cyrillic
characters.
2. Press the appropriate Quick Dial key repeatedly until the letter that you require appears.
5
3. To enter additional letters, repeat step 2.
If the next letter you want to enter is assigned to the same Quick Dial key, move the cursor by pressing
[ ], and then press the Quick Dial key. The cursor moves to the right and the next letter appears on
the display.
Keyboard Type A
BRA032S
Keyboard Type B
Press one of the following Quick Dial keys to display a basic letter, and then press the [Quick Dial
16] key to select one of its variations.
85
5. Entering Text
BRA033S
Keyboard Type C
This keyboard type allows you to enter Polish, Hungarian, and Czech letters. Press one of the following
Quick Dial keys to display a basic letter, and then press the [Quick Dial 16] key to select one of its
variations.
86
Entering Text
BRA034S
Keyboard Type D
This keyboard type allows you to enter Russian letters. Press the [Shift] key to enter Cyrillic character
mode. To enter a letter, press the corresponding Quick Dial key indicated in the table below. Press
the key repeatedly until the required letter is displayed.
87
5. Entering Text
5 BRA035S
Entering symbols
88
Entering Text
Keyboard Type A
BRA036S
Keyboard Type B
BRA037S
89
5. Entering Text
Keyboard Type C
5
BRA038S
Keyboard Type D
BRA039S
90
Entering Text
Entering numbers
BRA060S
This will delete the character at the cursor position. You can delete a character at the right end of a
line even if the cursor is placed to the right of the character.
91
5. Entering Text
2. Select the text you want to add using [ ] or [ ], and then press the [OK] key.
3. To modify the selected text, press the Quick Dial keys to enter letters, and then press the
[OK] key.
5
92
6. Operating Instructions
This chapter describes the Operating Instructions of this machine.
• The “Manuals for Administrators” CD-ROM that includes Security Reference is for administrators of
the machine.
• The system requirements for installing the manuals are as follows:
• Operating system: Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008
• Minimum display resolution: 800 × 600 pixels
• Recommended browser: Microsoft Internet Explorer 4.01 SP2 or later
• Non-recommended browsers can display the simplified manual only. 6
• HTML manuals can also be viewed on a Macintosh.
• Hyperlinks might not work and referenced sections might not appear unless all the HTML manuals
have been installed. To display referenced sections, be sure to install all the HTML manuals.
• If you cannot install a manual, copy the “MANUAL_HTML” folder to your computer's hard drive, and
then run “Setup.exe”.
• To delete an installed manual, on the [Start] menu, click [Programs], then [Product Name], and then
uninstall the data.
• If you are installing the manuals on a Macintosh, open the “Manuals.htm” file on the CD-ROM.
PDF Manuals
93
6. Operating Instructions
File path
The PDF manuals are in the following folder on the CD-ROM:
MANUAL_PDF\ENGLISH
• To view the PDF manuals, you need to have Adobe Acrobat Reader/Adobe Reader installed on your
computer.
94
How to Use the Operating Instructions
This section explains how to open a manual from the [Start] menu.
1. On the [Start] menu, point to [Programs] (Windows XP: [All Programs]), then [Product
Name], and then click the manual you want to view.
The browser opens, and then the manual appears.
• Depending on the settings made during installation, menu folder names may differ.
95
6. Operating Instructions
This section explains how to open a manual from the supplied CD-ROMs.
96
7. Remarks
This chapter describes how to maintain and operate the machine.
• Keep the machine away from flammable liquids, gases, and aerosols. A fire or an electric shock
might occur.
• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.
• Do not turn the power off while the operation switch indicator is lit or blinking. Doing so may damage
the memory.
• Before unplugging the power cord or turning off the main power switch, make sure remaining memory 7
space is at 100%, as shown on the screen. See “Turning On/Off the Power”.
• Do not touch areas on or around the fusing unit. These areas get hot.
• After scanning originals continuously, the exposure glass may become warm - this is not a malfunction.
• The area around the ventilation holes might feel warm. This is caused by exhaust air and is not a
malfunction.
• When the machine is not in use and in stand-by mode, you may hear a small noise inside. This is
caused by the image stabilization process and is not a malfunction.
• When you use this machine for a long time in a confined space without good ventilation, you may
detect an odd smell. To keep the workplace comfortable, we recommend that you keep it well
ventilated.
• If the machine is moved from a cold to a warm place, condensation may form inside it. After moving
the machine, do not use it for at least an hour. The machine requires this time to adapt to its new
environment.
• The machine will malfunction if its internal temperature becomes too high. Be sure not to block the
intake and exhaust vents.
• Do not turn off the power while the machine is in operation. See “Turning On/Off the Power”.
• Do not open the covers of the machine when it is in operation. If you do, misfeeds might occur.
• Do not move or tilt the machine when the power is on.
97
7. Remarks
• Do not allow small objects such as paperclips to fall into or become stuck inside the machine.
• Do not knock the machine while it is operating (for instance, do not use the machine's surfaces to
knock stacks of paper into square).
• Depending on the ambient temperature and humidity, steam may come from the exhaust vent behind
the control panel during printing. This is water vapor from the paper, not a sign of malfunction.
• The machine might not produce good copy images if condensation forms inside as a result of rapid
temperature change.
• Be sure to make a note of the registered machine settings in case they are lost due to accident or
malfunction.
• The supplier shall not be liable for any loss or damage resulting from a failure of the machine, loss of
settings, or use of the machine.
98
Where to Put Your Machine
Machine Environment
Moving
This section describes precautions when moving the machine.
• Contact your service representative if you need to lift the machine (such as when relocating it to
another floor). Do not attempt to lift the machine without the assistance of your service
representative. The machine will be damaged if it topples or is dropped, resulting in malfunction
and risk of injury to users. The machine's various handling areas are for service engineer use only.
Do not touch these areas.
7
• Before moving the machine, be sure to disconnect all external connections, especially the power
cord from the wall outlet. Damaged power cords are a fire and electric shock hazard.
• If you have to move the machine when the optional paper tray unit is attached, do not push on the
main unit's top section. Doing so can cause the optional paper tray unit to detach, possibly resulting
in injury.
• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.
99
7. Remarks
• Unplug the power cord from the wall outlet. When you pull out the plug from the socket, grip
the plug to avoid damaging the cord, thereby reducing the risk of fire or electric shock.
• Close all covers and trays, including the front cover and bypass tray.
• Keep the machine level and carry it carefully, taking care not to jolt or tip it. Rough handling
may cause a malfunction or damage the memory, resulting in loss of stored files.
• Do not take off the holding stand.
• Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur.
• Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur.
7 • Make sure the room where you are using the machine is well ventilated and spacious. Good
ventilation is especially important when the machine is used heavily.
Environments to avoid
This section describes precautions about environments to avoid.
• Locations exposed to direct sunlight or other sources of strong light (more than 1,500 lux).
• Locations directly exposed to cool air from an air conditioner or heated air from a heater. (Sudden
temperature changes can cause condensation to form inside the machine.)
• Locations close to machines generating ammonia, such as a diazo copy machine.
• Places where the machine will be subject to frequent strong vibration.
• Dusty areas.
100
Where to Put Your Machine
BJB012S
Power Connection
• Connect this machine only to a power source that matches the specifications shown in
“Specifications for the Main Unit” in this manual and do not use an extension cord.
• Use of this machine with extension cords and power sources other than those that match the
specifications shown constitutes an electric shock and fire hazard.
• Power cords that are damaged, broken, modified, trapped under heavy objects, pulled hard, or
bent severely are electric shock and fire hazards.
101
7. Remarks
• If the power cord is damaged (exposure of the core, disconnection, etc.), contact your service
representative to change a new one. Operating the machine with a damaged power cord may
cause an electric shock or fire.
• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.
• When you disconnect the power plug from the wall outlet, always pull the plug (not the cable).
• To disconnect the power cord, pull it out by plug. Do not drag the cord itself. Doing so may result
in damage to the cord, leading to fire or electric shock.
102
Maintaining Your Machine
• Do not use chemical cleaners or organic solvents, such as thinner or benzene. If such substances get
inside the machine or melt plastic parts, a failure might occur.
• Do not clean parts other than those explicitly specified in this manual. Other parts should only be
cleaned by your service representative.
How to maintain
Cleaning the machine: Wipe the machine with a soft, dry cloth. If this does not remove the dirt, wipe
the machine with a damp and tightly wrung cloth. If a damp cloth still does not remove the dirt, try
using a mild detergent. Wipe the machine with a dry cloth to remove the moisture, after using a damp
cloth.
This section describes how to clean the exposure glass and the scanning glass.
7
1. Wipe the exposure glass and the scanning glass.
BJA048S
1. Scanning glass
2. Exposure glass
103
7. Remarks
BRA041S
1. Sheet
2. Guiding plate
• Be sure to disconnect the plug from the wall outlet and clean the prongs and the area around the
7 prongs at least once a year. Allowing dust to build up on the plug constitutes a fire hazard.
104
Counter
Counter
This section explains the counter.
You can display the total counter value used for all functions.
BRA052S
105
7. Remarks
106
8. Appendix
This chapter describes the provided software and utilities CD-ROMs, and specifications.
• Some documentation about using the machine is included on the CD-ROM in PDF format. For details
about using Adobe Acrobat Reader/Adobe Reader, see Adobe Acrobat Reader/Adobe Reader
online Help.
• You can install the PCL printer drivers (PCL 5e and PCL 6) from the CD-ROM provided with this machine
or download them from the supplier's Web site. If your operating system is Windows XP x64/Vista
x64, or Windows Server 2003/2003 R2/2008 x64, you must download the printer drivers from
the supplier's Web site. Select this machine and the operating system you are using, and then
download them.
107
8. Appendix
Printing requires installation of a printer driver for your operating system. The following drivers are included
on the CD-ROM labeled “Printer Drivers and Utilities”.
Mac OS *6 No No Yes
Mac OS X *7 No No Yes
8 Microsoft Windows Server 2003 Web Edition/Microsoft Windows Server 2003 Datacenter Edition/Microsoft
Windows Server 2003 R2 Standard Edition/Microsoft Windows Server 2003 R2 Enterprise Edition/Microsoft
Windows Server 2003 R2 Datacenter Edition
*5 Microsoft Windows Server 2008 Standard/Microsoft Windows Server 2008 Enterprise/Microsoft Windows
Server 2008 Datacenter
*6 Versions 8.6 to 9.2 of the Mac OS (Mac OS X Classic mode is supported.)
*7 Mac OS X 10.1 or later (Native mode)
PCL printer drivers
Two kinds of PCL printer driver (PCL 5e and PCL 6) are included. These drivers allow your computer
to communicate with this machine via a printer language.
• Some applications may require installation of the PCL 5e printer driver. In this case, you can install
PCL 5e without having to install PCL 6.
• For details, see “Preparing the Machine”, Printer Reference .
108
Software and Utilities Included on the CD-ROM
TWAIN Driver
This section describes the file path and system requirements of the TWAIN driver.
This driver is required to scan an original using a scanner. To use the machine as a network TWAIN scanner,
this driver must be installed.
File path
The driver is included in the following folder on the CD-ROM labeled “Scanner Driver and Utilities”
provided with this machine:
\DRIVERS\TWAIN
System requirements
• Hardware
PC/AT-compatible machines that support the following operating system properly
• Operating system
Windows 2000/XP/Vista
Windows Server 2003/2003 R2/2008
• Display resolution
800 × 600 pixels, 256 colors or higher
LAN-Fax Driver
8
This section describes the file path and system requirements of the LAN-Fax driver.
• You can install the LAN-Fax driver from the CD-ROM provided with this machine or download it from
the supplier's Web site. If your operating system is Windows XP x64/Vista x64, or Windows Server
2003/2003 R2/2008 x64, you must download the LAN-Fax driver from the supplier's Web site.
Select this machine and the operating system you are using, and then download it.
This driver is required to use LAN-Fax functions.
File path
The driver is included in the following folders on the CD-ROM labeled “Printer Drivers and Utilities”:
\DRIVERS\LAN-FAX\XP_VISTA
System requirements
• Hardware
PC/AT-compatible
• Operating systems
Windows 2000/XP/Vista
109
8. Appendix
DeskTopBinder Lite
This section describes the file path and system requirements of DeskTopBinder Lite.
DeskTopBinder is to be installed on the client computers for integration and management of various kinds
of files such as scan files, files created with applications, and existing scan files. This software allows you
to use various functions for stored scan files such as viewing stored files. Also, with the ScanRouter delivery
software, you can view the files stored in in-trays of the delivery server, or use other functions for stored
files.
For details about the software installed with DeskTopBinder Lite, see “Scanning Originals with the Network
TWAIN Scanner”, Scanner Reference .
File path
The software is included in the following folder on the CD-ROM labeled “Scanner Driver and
Utilities” provided with this machine:
\UTILITY\DESKV2
8 System requirements
• Hardware
PC/AT-compatible machines that support the operating system properly
• Operating system
• When installing all functions of DeskTopBinder:
Windows 2000 Professional SP1 or later/2000 Server SP1 or later/2000 Advanced
Server SP1 or later/XP Professional/XP Home Edition
• When installing only SmartDeviceMonitor for Client:
Windows 2000 Professional SP1 or later/2000 Server SP1 or later/XP Professional/XP
Home Edition
This section describes the file path and available functions of SmartDeviceMonitor for Admin.
110
Software and Utilities Included on the CD-ROM
SmartDeviceMonitor for Admin is an application that uses TCP/IP and IPX/SPX to monitor network printers.
It can monitor multiple network printers using IP address. We recommend that network administrators use
this application.
File path
SmartDeviceMonitor for Admin is stored in the following folder in the CD-ROM labeled “Printer Drivers
and Utilities”:
\NETWORK\DEVMON\ADMIN\DISK1
Available functions
SmartDeviceMonitor for Admin has the functions to check the followings:
• Printer supplies such as paper or toner
• Results of print jobs executed from the computer
• For details, see Network and System Settings Guide , and SmartDeviceMonitor for Admin Help.
111
8. Appendix
This section describes the file path and system requirements of DeskTopBinder-SmartDeviceMonitor for
Client.
DeskTopBinder-SmartDeviceMonitor for Client allows you to manage and print various data such as files
created with an application, images scanned with a scanner, and existing images as one document.
File path
DeskTopBinder-SmartDeviceMonitor for Client is stored in the following folder on the CD-ROM
labeled “Printer Drivers and Utilities”:
\NETWORK\DEVMON\CLIENT\DISK1
Operating environment of the printer driver
• Applicable computer
Machines which properly work with the applicable OS below. PC/AT compatible machine.
• Applicable OS
Windows 2000/XP/Vista
Windows Server 2003/2003 R2/2008
• See “Scanning Originals with the Network TWAIN Scanner”, Scanner Reference or Help of
DeskTopBinder-SmartDeviceMonitor for Client.
8 • SmartDeviceMonitor for Client is also included in DeskTopBinder and DeskTopBinder Lite. See Help
of DeskTopBinder-SmartDeviceMonitor for Client.
112
Specifications for the Main Unit
113
8. Appendix
200% 155%
141% 129%
• Full size
114
Specifications for the Main Unit
100% 100%
• Reduction
93% 93%
71% 78%
50% 65%
• The complete system consists of the main unit with full items installed.
Dimensions (W × D × H up to exposure glass):
485 × 450 × 371 mm, 19.1 × 17.8 × 14.7 inches
Space for main unit (W × D):
595 × 450 mm, 23.5 × 17.8 inches (including the bypass tray)
115
8. Appendix
Noise emission:
• Sound power level:
• Sound power level and sound pressure level are actual values measured in accordance
with ISO 7779.
• Sound power level and sound pressure level are measured from the position of the
bystander.
• The complete system consists of the main unit with full items installed.
Weight:
29 kg (64.0 lb.) or less
8
• p.101 "Power Connection"
116
Specifications for Auto Document Feeder
117
8. Appendix
118
Specifications for Wireless LAN Board
8
• SmartDeviceMonitor and Web Image Monitor are supported.
119
8. Appendix
Trademarks
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Macintosh® and Mac OS® are registered trademarks of Apple Inc.
Microsoft®, Windows®, Windows Server®, and Windows Vista® are registered trademarks of Microsoft
Corporation in the United States and/or other countries.
Novell and NetWare are registered trademarks of Novell, Inc.
PCL® is a registered trademark of Hewlett-Packard Company.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
8 Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Enterprise
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
• The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
120
Trademarks
121
8. Appendix
122
INDEX
A Contents of the CD-ROM...................................107
Control panel.....................................38, 42, 48, 49
Access to the machine........................................101
Copier................................................................9, 52
Add Toner indicator..............................................43
Copy key................................................................43
Adding toner..........................................................79
Counter................................................................105
Address book.........................................................13
Counter key............................................................43
ADF.................................................15, 37, 103, 117
Adhesive labels.....................................................71 D
Alert indicator........................................................43 Darker key..............................................................44
Authentication screen............................................48 Data In indicator....................................................44
Auto document feeder.........................15, 103, 117 DataOverWriteSecurity Unit................................41
Auto Off..................................................................56 Deleting characters...............................................91
Available characters.............................................83 DeskTopBinder Lite..............................................110
B DeskTopBinder-SmartDeviceMonitor for Client......
.....................................................................107, 112
Bypass tray......................................................38, 71 Display language..................................................47
C Display panel..................................................43, 46
Displaying the total counter................................ 105
CAUTION..............................................................17
Dos and Don'ts......................................................97
CAUTION labels...................................................22
Duplex......................................................................9
CD-ROM..........................................93, 95, 96, 107
Duplex key.............................................................44
Changing modes...................................................52
Changing the display language..........................47 E
Changing the paper size......................................64 E-mail transmission................................................11
Changing the paper size in the optional paper tray Energy Saver.........................................................56
unit (Tray 2 and Tray 3)........................................67
Energy saving functions..................................23, 24
Changing the paper size in the paper tray (Tray 1)
................................................................................64 ENERGY STAR Program.......................................23
Check Destination key...........................................42 Enlarge.....................................................................9
Cleaning..............................................................103 Enter key.................................................................45
Cleaning the ADF................................................103 Entering letters.......................................................85
Cleaning the exposure glass..............................103 Entering numbers...................................................91
Cleaning the power cable plug.........................104 Entering symbols....................................................88
Clear key.........................................................45, 84 Entering text.....................................................83, 84
Clear Modes key...................................................43 Envelopes...........................................................9, 74
Clear/Stop key...............................................45, 84 Environments to avoid.........................................100
Clearance areas.................................................101 Environments where the machine can be used........
................................................................................17
Color scan..............................................................12
Escape key......................................................44, 46
Color Scan key......................................................42
Ethernet...................................................................10
Combine...................................................................9
Exposure glass..............................................37, 103
Combine key.......................................................... 44
External items.........................................................40
Combine/Series key.............................................44
Communicating indicator......................................42 F
Components...........................................................37 F1 key.....................................................................43
Computer...............................................................13 F2 key.....................................................................43
123
F3 key.....................................................................43 J
Facsimile..........................................................10, 52
Job Information key...............................................42
Facsimile key.......................................................... 42
Fax reception over the Internet.............................11 K
Fax transmission over the Internet........................11 Keys........................................................................83
FCC Rules...............................................................26
L
Forwarding............................................................34
Front cover.............................................................38 Label paper (adhesive labels)..............................71
G LAN-Fax........................................................10, 109
LAN-Fax driver....................................................109
Gigabit Ethernet (1000BASE-T)..........................41 Laser safety............................................................26
H Laws........................................................................26
Legal Prohibition....................................................26
Handling power cords..........................................18
Letterhead paper...................................................61
Handling power plugs..........................................18
Lighter key..............................................................44
Handling the machine's interior............................20
Load Paper indicator.............................................43
Handling the machine's supplies..........................20
Loading paper.......................................................59
Handling the main machine..................................18
Loading paper into the paper trays.....................59
Handset..................................................................40
Local connection......................................................9
Hard Disk Drive Option........................................40
Locating the machine..........................................100
HDD Encryption Unit.............................................41
Locked Print..............................................................9
Hold Print..................................................................9
Login.................................................................49, 50
How to enter text...................................................84
Logout..............................................................49, 50
How to use the operating instructions..................95
Low power mode...................................................24
HTML manuals............................................8, 93, 95
Lower right cover...................................................38
I
M
IEEE 1284 Interface Board..................................41
Machine environment...........................................99
Important................................................................14
Main power.....................................................54, 56
Indicators................................................................43
Main power indicator.....................................38, 43
Install......................................................................34
Main power switch.........................................38, 54
Installation..............................................................99
Main unit..............................................................113
Installing operating instructions............................93
Maintaining your machine.................................103
Internal items..........................................................40
Major item..............................................................15
Internal tray............................................................38
Manuals....................................................93, 95, 96
Internal tray guide.................................................37
Manuals for this machine........................................6
Internet Fax and E-Mail Transmission..................11
Manuals list..............................................................8
Internet Fax Reception and Mail to Print.............11
Media slot..............................................................40
IP-Fax......................................................................11
Memory Trans. key................................................42
IP-Fax Reception....................................................11
Movement..............................................................99
IP-Fax Transmission...............................................11
Moving...................................................................99
Items.................................................................15, 40
N
Name of major item..............................................15
124
Network connection................................................9 Printed manuals........................................................8
Network delivery scanner....................................12 Printer.................................................................9, 52
Note..........................................................16, 26, 27 Printer driver............................................49, 50, 107
Notes to users in the state of California...............27 Printer Drivers and Utilities........107, 109, 110, 112
Notes to users in the United States of America....... Printer key...............................................................43
................................................................................26 Printer/Scanner unit..............................................40
Notice..................................................................... 14 Printing a PDF file directly.......................................9
Number keys...................................................43, 84
Q
Numbers.................................................................91
Quick Dial keys...............................................44, 84
O
R
Off mode................................................................24
OHP transparencies..........................................9, 71 Reading the display panel....................................46
OK key.............................................................45, 46 Receive File indicator............................................42
On Hook Dial key.................................................42 Recommended paper sizes and types.................71
Online key.............................................................. 44 Redial key..............................................................44
Opening manuals from the [Start] menu.............95 Reduce......................................................................9
Opening manuals from the CD-ROM..................96 Register/Change/Delete.....................................33
Opening manuals from the icon...........................95 Regulations.............................................................26
Operating instructions...........................................95 Removable memory device..................................12
Operation switch......................................38, 45, 54 Replacing toner.....................................................80
Optimum environmental conditions...................100 Required space...................................................101
Orientation-fixed paper........................................61 Resolution key........................................................44
Original key...........................................................44 Right cover.............................................................38
Other items.............................................................40 S
P Safety information.................................................17
Paper................................................................33, 59 Safety information labels......................................22
Paper sizes.......................................................64, 71 Safety precautions to be followed.......................17
Paper storage........................................................77 Sample Print.............................................................9
Paper tray..................................................38, 64, 71 Saving paper...........................................................9
Paper tray unit...........................38, 40, 67, 71, 118 Scanner..................................................................52
Paper types............................................................71 Scanner Driver and Utilities..............107, 109, 110
Paperless fax transmission....................................10 Scanner key...........................................................43
Password................................................................12 Scroll keys.................................................43, 47, 84
Pause key...............................................................44 SD card..................................................................12
Pause/Redial key..................................................44 Search Destination key.........................................42
PCL........................................................................107 Searching by Keyword.........................................33
PDF manuals......................................................8, 93 Searching by what you want to do......................29
Power...............................................................54, 55 Security functions...................................................12
Power cable plug................................................104 Selecting the paper size with User Tools.............69
Power connection................................................ 101 Selection keys..................................................43, 46
Power supply.........................................................54 Sending faxes when toner has run out................81
Power switch symbols...........................................22 Sending scan files by e-mail.................................12
125
Sending scan files by Scan to Folder...................12 User Text................................................................91
Sending scanned documents when toner has run User Tools..............................................................69
out...........................................................................81 User Tools key.......................................................43
Series key...............................................................44 User Tools/Counter key.......................................43
Settings...................................................................34 Using the keys........................................................46
Shift key..................................................................83 Using the Print Job function.....................................9
Sleep mode............................................................24 Using the Scanner in a Network Environment.........
SmartDeviceMonitor for Admin..........13, 107, 110 ................................................................................12
SmartDeviceMonitor for Client..................110, 112 Utilities included on the CD-ROM.....................107
Software included on the CD-ROM..................107 V
Sort key..................................................................44
Space key..............................................................83 Ventilation holes....................................................38
Specifications............................113, 117, 118, 119 Viewing the contents of the CD-ROM...............107
Start key.................................................................45 VM card.................................................................41
Stop key...........................................................45, 84 W
Stored Print...............................................................9
WARNING............................................................17
Storing paper.........................................................77
WARNING labels.................................................22
Symbols...........................................................15, 88
Web Image Monitor.......................................13, 50
Symbols key...........................................................84
Web Services on Devices.....................................12
System Reset..........................................................52
Where to put your machine..................................99
T Wireless LAN................................................10, 119
Text...................................................................83, 84 Wireless LAN board.....................................41, 119
Toner.......................................................................79 WSD.......................................................................12
Total counter........................................................105
Trademarks..........................................................120
Translucent paper..................................................71
Tray 1........................................................38, 64, 71
Tray 2.........................................38, 40, 67, 71, 118
Tray 3.........................................38, 40, 67, 71, 118
Turning off the main power...................................56
Turning off the power......................................54, 55
Turning on the main power...................................54
Turning on the power......................................54, 55
TWAIN...................................................................12
TWAIN driver......................................................109
Two-sided paper...................................................61
U
Unusable paper.....................................................76
USB memory stick..................................................12
Used toner..............................................................82
User Code Authentication..............................48, 49
User Function keys.................................................43
126
MEMO
127
MEMO
1 Placing Originals
2 Copying
3 Copier Features
4 Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................3
Notice..................................................................................................................................................................5
Important.........................................................................................................................................................5
How to Read This Manual.................................................................................................................................6
Symbols...........................................................................................................................................................6
Name of Major Item......................................................................................................................................6
Note................................................................................................................................................................6
Laws and Regulations.........................................................................................................................................7
Legal Prohibition.............................................................................................................................................7
Display.................................................................................................................................................................8
Reading the Display and Using Keys...........................................................................................................8
1. Placing Originals
Originals...........................................................................................................................................................11
Sizes and Weights of Recommended Originals.......................................................................................11
Sizes Selectable as Regular Size Originals...............................................................................................12
Missing Image Area....................................................................................................................................13
Placing Originals..............................................................................................................................................15
Original Orientation....................................................................................................................................15
Placing Originals on the Exposure Glass...................................................................................................15
Placing Originals in the ADF.......................................................................................................................16
Specifying Original Size When a Paper Tray is Selected........................................................................17
Specifying Original Size When the Bypass Tray is Selected...................................................................20
2. Copying
Basic Procedure................................................................................................................................................25
Copying from the Bypass Tray........................................................................................................................27
Copying onto Regular Size Paper..............................................................................................................29
Copying onto Custom Size Paper..............................................................................................................30
Copying onto OHP Transparencies...........................................................................................................31
Copying onto Thick Paper...........................................................................................................................32
Copying onto Envelopes.............................................................................................................................33
Reducing or Enlarging Originals.....................................................................................................................38
Preset Reduce/Enlarge...............................................................................................................................38
Zoom.............................................................................................................................................................40
1
Duplex Copying...............................................................................................................................................43
Combined Copying.........................................................................................................................................47
One-Sided Combine...................................................................................................................................47
Two-Sided Combine....................................................................................................................................51
Series Copies....................................................................................................................................................54
Finishing............................................................................................................................................................56
Sort................................................................................................................................................................56
Adjusting Copy Image Density........................................................................................................................58
Selecting the Original Type.............................................................................................................................59
Selecting Copy Paper......................................................................................................................................60
3. Copier Features
Accessing User Tools.......................................................................................................................................61
Changing Default Settings...........................................................................................................................61
Quitting User Tools......................................................................................................................................62
User Tools Menu..............................................................................................................................................63
4. Appendix
Function Compatibility.....................................................................................................................................67
Trademarks.......................................................................................................................................................69
INDEX.............................................................................................................................................................71
2
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
4
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
5
How to Read This Manual
• For proper use of this product, be sure to read About This Machine first.
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
Note
6
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
7
Display
This section explains how to read the display and how to use the selection keys on the initial copy display.
• The copy display is set as the default screen when the machine is turned on.
Initial copy display
BRH201S
BRH202S
1. Selection keys
Correspond to items at the bottom line on the display.
Example:
• When the instruction “press [Reduce]” appears in this manual, press the left selection key.
• When the instruction “press [Enlarge]” appears in this manual, press the center selection key.
• When the instruction “press [Zoom]” appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.
8
3. [OK] key
Press to set a selected item or entered numeric value.
4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ], [ ], [ ], or [ ] appears in this manual, press the scroll key of the same direction.
9
10
1. Placing Originals
This chapter describes the types of originals you can set and how to place originals.
1
Originals
This section describes the types of originals that can be placed, and missing image area.
The following describes recommended paper sizes and non-recommended originals for the ADF:
Metric version
Exposure glass Up to A4 -
Inch version
11
1. Placing Originals
• Originals other than those specified on “Sizes and Weights of Recommended Originals”
• Stapled or clipped originals
• Perforated or torn originals
1 • Curled, folded, or creased originals
• Pasted originals
• Originals with any kind of coating, such as thermal fax paper, art paper, aluminum foil, carbon paper,
or conductive paper
• Originals with perforated lines
• Originals with indexes, tags, or other projecting parts
• Sticky originals such as translucent paper
• Thin or highly flexible originals
• Thick originals such as postcards
• Bound originals such as books
• Transparent originals such as OHP transparencies or translucent paper
• Originals that are still wet with ink or correction fluid
• The original might become dirty if it is written with a pencil or a similar tool.
12
Originals
Exposure glass
BRH010S
ADF
BRH011S
• When you copy custom size originals, make sure you specify the size of the originals. If not, the image
may not be copied properly. For details about custom size originals, see “Custom sizes”.
• For 2-sided originals that can be placed in the ADF, the horizontal size is 160-356 mm (6.3-14
inches).
Even if you place originals in the ADF or on the exposure glass correctly, margin of a few millimeters on
all four sides of the original might not be copied.
13
1. Placing Originals
BAT019S
14
Placing Originals
Placing Originals
This section describes the procedure for placing originals on the exposure glass and in the ADF.
Take care to place originals after any correction fluid and ink has completely dried. Not taking this 1
precaution could cause marks on the exposure glass that will be copied onto paper.
• For original sizes you can place on the exposure glass and in the ADF, see “Originals”.
• p.11 "Originals"
Original Orientation
BRH009S
1. ADF
2. Exposure glass
• Originals should be aligned to the rear left corner when placing them on the exposure glass. However,
some copy functions, such as Duplex, Combine, and Series Copies may produce different results
depending on the orientation of the originals. For details, see the explanations of each function.
• Do not lift the exposure glass cover or ADF forcefully. Otherwise, it will be damaged, or the cover of
the ADF might open.
15
1. Placing Originals
BRH019S
1. Positioning mark
3. Lower the exposure glass cover or ADF.
BRH020S
16
Placing Originals
Be sure not to place originals or other objects on the top cover. Doing so may cause a malfunction.
BRH021S
1. Limit mark
2. Document guide
• Originals that are 160 mm (6.3 inches) or less along the feed direction, such as A5 or 51/2 ×
81/2 , may jam inside the ADF when you make duplex copies.
• Thin originals (64 g/m2, 17 lb. or less) that are 356 mm (14 inches) or more along the feed direction,
such as 81/2 × 14 or 8 × 13 , may jam inside the ADF when you make duplex copies.
• Straighten curls in the originals before placing them on the ADF.
• To prevent multiple sheets from being fed at once, fan the original before placing it on the ADF.
• Set the original squarely.
You can select either regular or custom for the size of the original when a paper tray is selected.
Regular sizes
When placing regular size originals on the exposure glass or in the ADF, specify the size of the originals
from the regular sizes shown on the display.
If you do not specify the original size, the machine will make copies on the paper size in the tray selected.
When copy paper size and original size differ, you need to specify the original size as follows:
17
1. Placing Originals
1
2. Press the [ ] key.
3. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.
4. Select the original size using the scroll keys, and then press the [OK] key.
• To cancel the size you have set, press the [Clear Modes] key.
Custom sizes
When placing a custom size original on the exposure glass or in the ADF, specify the size of the original
using the number keys.
18
Placing Originals
• Exposure glass: vertical 139-216 mm (5.5-8.5 inches), horizontal 160-356 mm (6.3-14 inches)
4. Enter the horizontal size of the original (Horiz.) with the number keys, and then press the
[OK] key.
BRH022S
1. Vertical size
2. Horizontal size
19
1. Placing Originals
5. Enter the vertical size of the original (Vert.) with the number keys, and then press the [OK]
key.
• To change the value you entered, press the [Clear/Stop] key, and then enter a new value.
• To cancel the size you have set, press the [Clear Modes] key.
You can select either regular or custom for the size of the original when the bypass tray is selected.
Regular sizes
When placing regular size originals on the exposure glass or in the ADF, specify the size of the originals
from the regular sizes shown on the display.
If you do not specify the original size, the machine will make copies on the paper size in the tray selected.
When copy paper size and original size differ, you need to specify the original size as follows:
20
Placing Originals
3. Select [Original Size] using [ ] or [ ], and then press the [OK] key.
1
4. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.
5. Select the original size using the scroll keys, and then press the [OK] key.
• To cancel the size you have set, press the [Clear Modes] key.
Custom sizes
When placing a custom size original on the exposure glass or in the ADF, specify the size of the original
using the number keys.
21
1. Placing Originals
1
2. Press the [ ] key.
3. Select [Original Size] using [ ] or [ ], and then press the [OK] key.
4. Select [Custom Size] using [ ] or [ ], and then press the [OK] key.
5. Enter the horizontal size of the original (Horiz.) with the number keys, and then press the
[OK] key.
6. Enter the vertical size of the original (Vert.) with the number keys, and then press the [OK]
key.
22
Placing Originals
1
• To change the value you entered, press the [Clear/Stop] key, and then enter a new value.
• To cancel the size you have set, press the [Clear Modes] key.
23
1. Placing Originals
24
2. Copying
This chapter describes the basic procedure for making copies.
Basic Procedure
This section describes the basic procedure for making copies. 2
• When User Code Authentication is set, enter your user code (up to eight digits) with the number keys
so that the machine accepts copy jobs. For details about User Code Authentication, see “System
Settings”, Network and System Settings Guide.
• When Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server
Authentication is set, enter your login user name and password so that the machine accepts copy
jobs. Ask the administrator for the login user name and password. For details, see “When the
Authentication Screen is Displayed”, About This Machine.
• To copy onto paper other than plain paper, specify the paper type under Tray Paper Settings in User
Tools. For details, see “System Settings”, Network and System Settings Guide.
25
2. Copying
BRH203S
• Always log off when you have finished using the machine to prevent unauthorized users from using
the machine.
• To stop the machine during a multi-copy run, press the [Clear/Stop] key.
• To cancel all copy functions and return the machine to the default condition, press the [Clear Modes]
key.
• To clear entered values, press the [Clear/Stop] key.
• To switch between pages or selectable functions, press the scroll keys.
26
Copying from the Bypass Tray
2
• The Duplex function cannot be performed on paper fed from the bypass tray. If [1 Sided 2 Sided]
is selected, cancel the setting.
• Paper that has a vertical length of 90 - 216 mm (3.55 – 8.50 inches) and a horizontal length of 139
- 600 mm (5.48 - 23.62 inches) can be copied from the bypass tray. However, when paper larger
than 356 mm (14.02 inches) in size is used, the paper may become wrinkled, may not be fed into
the machine, or may cause paper jams.
• When copying onto OHP transparencies, paper of 59.9 g/m2 (about 16 lb.) or less, or paper of
above 90g/m2 (about 24 lb.), you need to specify the type and size of paper under Tray Paper
Settings in User Tools. For details about Tray Paper Settings, see “System Settings”, Network and
System Settings Guide.
• The maximum number of sheets you can load at the same time depends on paper type. Load only as
much paper as can be held between the paper guides on the bypass tray.
BRH023S
27
2. Copying
BRH024S
1. Release lever
3. Align the paper guides to the paper size, and then insert the paper face down.
If the guides are not flush against the paper, images might be skewed or paper misfeeds might occur.
BRH025S
1. Horizontal size
2. Vertical size
3. Extender
4. Paper guides
4. Push down the release lever.
BRH026S
28
Copying from the Bypass Tray
1. Release lever
The bypass tray is selected on the display.
2
5. Select the size and type of the paper.
6. Press the [OK] key.
7. Place the originals, and then press the [Start] key.
8. When the copy job is finished, press the [Clear Modes] key to clear the settings.
9. Close the bypass tray.
• If the bypass tray is not selected on the display in step 4, select using [ ] or [ ], and then press
the [ ] key.
• Certain types of paper might not be detected properly when placed on the bypass tray. If this happens,
remove the paper and place it on the bypass tray again.
• Load only as much paper as can be held between the guides on the bypass tray. Overloading the
bypass tray can result in misfeeds and skewed images.
• To support A4 , 81/2 × 11 or larger paper sizes, pull out the extender.
• To prevent multiple sheets from being fed at once, fan paper before placing it on the tray.
• When the Sort function is selected, press the [ ] key after all originals have been scanned.
• When the Panel Key Sound is turned off, it will not sound if you insert paper into the bypass tray. For
details about Panel Key Sound, see “System Settings”, Network and System Settings Guide.
• Depending on the environment where the machine is being used, you might at times hear a rustling
noise from paper moving through the machine. This noise does not indicate a malfunction.
• The following paper sizes can be selected as the regular sizes:
• A4 , A5 , B5 JIS , 81/2 × 14 , 81/2 × 13 , 81/4 × 14 , 81/4 × 13 , 8 × 13 ,
8 /2 × 11 , 71/4 × 101/2 , 51/2 × 81/2
1 , 16K , C6 Envelope , C5 Envelope , DL
Envelope , 41/8 × 91/2 , 37/8 × 71/2
Makes copies onto regular size paper from the bypass tray.
29
2. Copying
3. Select [Paper Size] using [ ] or [ ], and then press the [OK] key.
2 4. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.
5. Select the paper size using the scroll keys, and then press the [OK] key.
Makes copies onto custom size paper from the bypass tray.
30
Copying from the Bypass Tray
4. Select [Custom Size] using [ ] or [ ], and then press the [OK] key.
5. Enter the horizontal size of the paper (Horiz.) with the number keys, and then press the [OK] 2
key.
6. Enter the vertical size of the paper (Vert.) with the number keys, and then press the [OK]
key.
• To change the value you entered, press the [Clear/Stop] key, and then enter a new value.
When copying onto OHP transparencies, select the type and size of paper.
31
2. Copying
3. Select [Paper Type] using [ ] or [ ], and then press the [OK] key.
2 4. Select [OHP (Transparency)] using [ ] or [ ], and then press the [OK] key.
When copying onto thick paper, select the type and size of paper.
4. Select [Thick Paper] using [ ] or [ ], and then press the [OK] key.
32
Copying from the Bypass Tray
When copying onto envelopes, specify the paper type and paper size.
BRH013S
BRH014S
33
2. Copying
Printable area
The following areas of envelopes can be printed on:
BRH015S
1. Feeding direction
2. Printable area
3. 10 mm (0.4 inches)
4. 10 mm (0.4 inches)
5. 10 mm (0.4 inches)
Orientation of Originals and Envelopes
Originals and envelopes must be placed in the same orientation.
To minimize waste and time, check that originals and envelopes are loaded in the same orientation.
BRH016S
34
Copying from the Bypass Tray
1. Insert the envelopes with the side you want to copy face down.
BRH027S
1. Release lever
2. Press the [ ] key.
3. Select [Paper Size] using [ ] or [ ], and then press the [OK] key.
4. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.
5. Select the envelope size using [ ] or [ ], and then press the [OK] key.
35
2. Copying
7. Select [Paper Type] using [ ] or [ ], and then press the [OK] key.
2 8. Select [Thick Paper] using [ ] or [ ], and then press the [OK] key.
• Load only as many envelopes on the bypass tray as can be stacked up to 10.5 mm (0.4 inches) high.
Check the envelopes are not damp. Load only as many envelopes as can be held between the paper
guides on the bypass tray.
• When copying on a small-sized envelope, align the flap to the paper guide on the left.
BRH028S
36
Copying from the Bypass Tray
37
2. Copying
Preset Reduce/Enlarge
2 This function allows you to reduce or enlarge images by selecting a preset ratio.
BAS030S
Base Point
The base point of Reduce/Enlarge differs depending on how the original is scanned. When the
original is placed on the exposure glass, the upper left corner will be the base point. When it is placed
in the ADF, the bottom left corner will be the base point.
The figure below is the resulting copy images that differ depending on how the original is scanned.
BAT031S
38
Reducing or Enlarging Originals
1. Press [R/E].
• You can select one of five preset ratios (two enlargement ratios, three reduction ratios).
• Following shows the relation between the original and paper sizes at respective scaling factors.
• Metric version
200% (Area ratio 4 times): A6 A4
141% (Area ratio 2 times): A5 A4
93%: -
71% (Area ratio 1/2 times): A4 A5
50% (Area ratio 1/4 times): A4 A6
• Inch version
155% (Area ratio 2 times): 51/2 × 81/2 81/2 × 14
129%: 51/2 × 81/2 81/2 × 11
93%: -
78%: 81/2 × 14 81/2 × 11
65%: 81/2 × 11 51/2 × 81/2
• You can select a ratio regardless of the size of an original or copy paper. With some ratios, parts of
the image might not be copied or margins will appear on copies.
• You can change reproduction ratios shown on the initial display under Reproduction Ratio in User
Tools. For details about Reproduction Ratio, see “User Tools Menu”.
39
2. Copying
Zoom
BAS032S
1. Press [R/E].
2. Press [Reduce] or [Enlarge], and then select a preset ratio which is close to the desired ratio.
3. Press [Zoom].
40
Reducing or Enlarging Originals
Pressing [ ] or [ ] changes the ratio in increments of 1%. Pressing and holding down the relevant key 2
changes the ratio in increments of 10%.
The "Programmed" message appears.
5. Place the original, and then press the [Start] key.
1. Press [R/E].
2. Press [Zoom].
3. Enter the desired ratio with the number keys, and then press the [OK] key.
41
2. Copying
• To change the value you entered in step 3, press the [Clear/Stop] key, and then enter a new value.
42
Duplex Copying
Duplex Copying
This section describes how to make duplex copies.
Copies two 1-sided pages or one 2-sided page onto a 2-sided page.
BAS034S
2 Sided 2 Sided
Copies one 2-sided page on one 2-sided page.
BAS035S
43
2. Copying
BAT036S
BRH204S
44
Duplex Copying
3. Select the original orientation using [ ] or [ ], and then press the [OK] key.
4. Select the duplex orientation using [ ] or [ ], and then press the [OK] key. 2
• When placing an original on the exposure glass, start with the first page to be copied. When placing
originals in the ADF, set so that the first page is on the top.
• When placing originals on the exposure glass, press the [ ] key after all the originals have been
scanned.
• To display the screens in steps 3 and 4, select [Always Specify] for [Orientation] with Copier Features
in User Tools. If [Do not Specify] is selected, proceed to step 5. For details about Orientation, see
“User Tools Menu”.
• You can change the margins of duplex copies under Duplex Margin in User Tools. If you set a binding
margin that is too wide, parts of the image may not be copied. For details about Duplex Margin, see
“User Tools Menu”.
• You can use the following copy paper with this function:
• A4 , B5 JIS , 81/2 × 14 , 81/2 × 13 , 81/2 × 11 , 81/4 × 14 , 81/4 × 13 , 16K
• You cannot use the following copy paper with this function:
• Paper smaller than B5 JIS or 81/2 × 11
• Paper thicker than 90 g/m2 (24 lb.)
• Paper thinner than 64 g/m2 (17 lb.)
• Translucent paper
• Label paper (adhesive labels)
• OHP transparencies
• Thick paper
• Envelopes
45
2. Copying
• When an odd number of originals are placed in the ADF, the back of the last page of copied paper
is blank.
• During copying, the image is shifted to allow for the binding margin.
• By default, a binding margin is made on the back side.
46
Combined Copying
Combined Copying
This section describes how to make combined copies.
• When placing originals on the exposure glass, start with the first page to be copied. When placing
originals in the ADF, set the first page on top. 2
• When placing originals on the exposure glass, press the [ ] key after all the originals have been
scanned.
• In this mode, the machine selects the reproduction ratio automatically. This reproduction ratio depends
on copy paper sizes and the number of originals.
• The reproduction ratios selectable by the machine are 50-200%.
• If the calculated ratio is under the minimum ratio, it is automatically adjusted to within available range.
However, with some ratios, parts of the image might not be copied.
• You cannot use custom size paper.
• If the orientation of originals is different from that of the copy paper, the machine will automatically
rotate the image by 90° to make copies properly.
• If the number of originals placed is less than the number specified for combining, the last page segment
is left blank as shown.
BAS149S
One-Sided Combine
47
2. Copying
2
BAS038S
BAS039S
BAS041S
48
Combined Copying
2
BAS042S
BLF013S
Landscape ( ) originals
BLF014S
BAT046S
BAT047S
49
2. Copying
BRH205S
3. Select the original orientation using [ ] or [ ], and then press the [OK] key.
• You cannot apply this function to sheets of 357 mm (14 inches) or longer that are fed from the bypass
tray.
• To cancel the One-Sided Combine function in step 1, press the [Combine/Series] key again. Make
sure the indicator goes off.
50
Combined Copying
• To display the screen in step 3, select [Always Specify] for [Orientation] with Copier Features in User
Tools. If [Do not Specify] is selected, proceed to step 4. For details about Orientation, see “User Tools
Menu”.
2
Two-Sided Combine
BAS047S
BAT048S
1. Front
2. Back
51
2. Copying
BAS050S
BAT051S
1. Front
2. Back
BRH205S
52
Combined Copying
2. Select the combine mode using [ ] or [ ], and then press the [OK] key.
3. Select the original orientation using [ ] or [ ], and then press the [OK] key. 2
4. Select the duplex orientation using [ ] or [ ], and then press the [OK] key.
• To cancel the Two-Sided Combine function in step 1, press the [Combine/Series] key again. Make
sure the indicator goes off.
• If you set a binding margin that is too wide, parts of the image may not be copied.
• When making copies using the Combine function, a binding margin is added to copies after the
images are combined.
• To display the screens in steps 3 and 4, select [Always Specify] for [Orientation] with Copier Features
in User Tools. If [Do not Specify] is selected, proceed to step 5. For details about Orientation, see
“User Tools Menu”.
53
2. Copying
Series Copies
Separately copies the front and back of a 2-sided original onto two sheets.
2 Sided 1 Sided
You can make 1-sided copies from 2-sided originals.
BAS104S
BRH205S
3. Select the original orientation using [ ] or [ ], and then press the [OK] key.
54
Series Copies
55
2. Copying
Finishing
You can sort your copies.
Sort
2 The machine assembles copies as sets in sequential order.
BAS053S
BRH206S
• When placing an original on the exposure glass, start with the first page to be copied. When placing
originals in the ADF, set so the first page is on the top.
• When placing originals on the exposure glass, press the [ ] key after all the originals have been
scanned.
• To cancel the Sort function in step 1, press the [Sort] key again. Make sure the indicator goes off.
• The number of copies that can be placed on the internal tray is as follows. When the number of copies
exceeds capacity, remove copies from the tray. (paper weight: 80 g/m2, 20 lb.)
• Internal tray
250 sheets
56
Finishing
• This function can only be used when the Sort function is selected.
3. Enter the number of copy sets with the number keys, and then press [Resume].
• The number of sets you can enter in step 3 differs depending on when the [Clear/Stop] key is pressed.
57
2. Copying
BRH207S
BRH017S
58
Selecting the Original Type
BRH208S
59
2. Copying
60
3. Copier Features
This chapter describes user tools in the Copier Features menu.
3
• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished. For details about how to end User Tools, see “Quitting User Tools”.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off, or [Clear Modes] key is pressed.
BRH209S
2. Select the menu using [ ] or [ ], and then press the [OK] key.
To change the Copier Features, select [Copier Features].
3. Select the item using [ ] or [ ], and then press the [OK] key.
4. Change settings by following instructions on the display, and then press the [OK] key.
61
3. Copier Features
BRH209S
62
User Tools Menu
63
3. Copier Features
• Special Mode 5
normal text originals (reproducing the background)
The default setting for “Original Type 1 (Text)” is Text Mode 1.
The default setting for “Original Type 2 (Photo)” is Photo Mode 1.
Duplex Mode Priority
You can select the type of Duplex function effective when the machine is turned on, reset, or modes
are cleared.
The default setting is 1 Sided 1 Sided.
3 Orientation
You can select the original orientation when using the Combine/Series, or Duplex function.
The default setting is Do not Specify.
Max. Number of Sets
The maximum copy quantity can be set between 1 and 99 using the number keys.
The default setting is 99 sheets.
Original Count Display
You can set to display the count of originals and copying pages on the display when “On” is selected.
The default setting is Off.
Reproduction Ratio
You can select which reduce, enlarge, or input ratio is shown on the display with priority when
“Reduce” or “Enlarge” is selected.
Reduce or Enlarge ratios for setting are as follows:
The default setting for "Ratio 1" is 50% (Metric version) / 65% (Inch version).
The default setting for "Ratio 2" is 71% (Metric version) / 78% (Inch version).
The default setting for "Ratio 3" is 93% (Metric version) / 93% (Inch version).
The default setting for "Ratio 4" is 141% (Metric version) / 129% (Inch version).
The default setting for "Ratio 5" is 200% (Metric version) / 155% (Inch version).
You can set a ratio other than the above.
1. Select [Reproduction Ratio] using [ ] or [ ], and then press the [OK] key.
2. Select the ratio you want change using [ ] or [ ], and then press the [OK] key.
3. Select [User R/E Ratio] using [ ] or [ ], and then press the [OK] key.
4. Enter a ratio using the number keys from "50-200", and then press the [OK] key.
The "Programmed" message appears.
Preset R/E Priority
You can set the ratio with priority when [R/E] is pressed.
64
User Tools Menu
65
3. Copier Features
66
4. Appendix
This chapter describes the copy machine's specifications and the function compatibility.
Function Compatibility
The combination chart given below shows which modes can be used together.
Blank: These modes can be used together.
: These modes cannot be used together. The second mode selected will be the mode you are working
in.
The following shows the combinations of functions:
4
BRH018S
*1 A function incompatibility message appears if you load a sheet that exceeds 357 mm (14 inches) with the two-
sided original function. Copying is not possible until one of the functions is disabled.
67
4. Appendix
*2 A function incompatibility message appears if you load a sheet that exceeds 357 mm (14 inches). Copying is
not possible until one of the functions is disabled.
*3 The mode selected second changes the reduce/enlarge ratio.
*4 A function incompatibility message appears if you select two conflicting functions. Copying is not possible until
one of the functions is disabled.
68
Trademarks
Trademarks
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and /or other countries.
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
69
4. Appendix
70
INDEX
A I
Accessing User Tools............................................61 Image density........................................................58
ADF..............................................................6, 11, 16 Image position of combine...................................47
Adjusting copy image density..............................58 Initial display............................................................8
Auto document feeder.............................................6 L
Auto Tray Switching..............................................63
Legal Prohibition......................................................7
B Letterhead Setting..................................................65
Base point of Reduce/Enlarge.............................38 M
Basic procedure....................................................25
Bypass tray......................................................20, 27 Manuals for this machine........................................3
Max. Number of Sets............................................64
C
Menu Protect.......................................................... 65
Changing default settings.....................................61 Missing image area..............................................13
Changing the number of sets................................57 N
Combined Copying...............................................47
Copying.................................................................25 Name of Major Item...............................................6
Copying from the bypass tray..............................27 Non-compatible originals.....................................11
Copying onto envelopes......................................33 Note..........................................................................6
Copying onto OHP transparencies......................31 Notice.......................................................................5
Copying onto thick paper.....................................32 O
Custom size originals......................................18, 21
OHP transparencies..............................................31
Custom size paper.................................................30
One-Sided Combine.............................................47
D Orientation.............................................................64
Display...................................................................... 8 Original Count Display.........................................64
Display panel...........................................................8 Original orientation...............................................15
Duplex copying.....................................................43 Original size..........................................................11
Duplex Margin......................................................65 Original type..........................................................59
Duplex Mode Priority............................................64 Original Type Setting............................................63
Original weight...................................................... 11
E Originals................................................................11
Enlarging originals................................................38 P
Entering a ratio using the number keys................41
Envelopes...............................................................33 Paper tray...............................................................17
Exposure glass................................................11, 15 Photo.......................................................................59
Placing custom size originals.........................18, 21
F Placing originals..............................................11, 15
Finishing.................................................................56 Placing originals in the ADF..................................16
Function compatibility...........................................67 Placing originals on the exposure glass..............15
H Placing regular size originals.........................17, 20
Preset R/E Priority..................................................64
Horizontal size..........................................18, 21, 30 Preset Reduce/Enlarge.........................................38
How to read this manual.........................................6
71
Q
Quitting User Tools................................................62
R
Reading the display and using keys.......................8
Recommended originals.......................................11
Reducing originals.................................................38
Regular size originals.....................................17, 20
Regular size paper................................................29
Reproduction Ratio................................................64
S
Selectable original size......................................... 12
Selecting a preset ratio.........................................38
Selecting a ratio using the scroll keys..................40
Selecting copy paper.....................................60, 61
Series Copies.........................................................54
Sort.........................................................................56
Specifying original sizes................................. 17, 20
Symbols....................................................................6
T
Text.........................................................................59
Thick paper............................................................32
Trademarks............................................................69
Two-Sided Combine.............................................51
U
User Tools Menu...................................................63
V
Vertical size...............................................18, 21, 30
Z
Zoom......................................................................40
72 EN USA D069-6801
Copyright © 2008
Operating Instructions Copy Reference
1 2 3 4 5 6 7 8
Copier
Tips
Facsimile
Paper Size
Scanner
Paper Size
You can check the paper size
Printer
using the scale on the exposure glass.
How to make a Copy... (1. Placing Originals) Advanced features (2. Copying)
Reduce/Enlarge
A Press the {Clear Modes} key.
• Zoom: you can change the reproduction ratio in increments
B Place the originals. 19 18 17 16 15 14 13 12 11 10 9 of 1%.
• Exposure Glass
(Face down)
Series Copies
• Orientation: [Top to Top] / [Top to Bottom]
• Series: copies the front and back of a 2-sided original on 2
sheets.
• ADF (Face up)
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Note................................................................................................................................................................8
Laws and Regulations.........................................................................................................................................9
Legal Prohibition.............................................................................................................................................9
Model-Specific Information.............................................................................................................................10
1. Preparing the Machine
Confirming the Connection Method...............................................................................................................11
Network Connection...................................................................................................................................11
Local Connection.........................................................................................................................................13
Installing the Printer Driver...............................................................................................................................14
Quick Install..................................................................................................................................................14
Using the SmartDeviceMonitor for Client Port...........................................................................................15
Using the Standard TCP/IP Port.................................................................................................................20
Using the LPR Port.........................................................................................................................................21
Using the WSD port.....................................................................................................................................23
Using as a Windows Network Printer............................................................................................................25
Using as a NetWare Print Server/Remote Printer.........................................................................................27
Form Feed.....................................................................................................................................................28
Banner Page.................................................................................................................................................29
Printing after Resetting the Printer................................................................................................................29
Installing the Printer Driver Using USB............................................................................................................30
Windows 2000/XP, Windows Server 2003/2003 R2 - USB..............................................................30
Windows Vista, Windows Server 2008 - USB.........................................................................................31
Printing with Parallel Connection....................................................................................................................33
Making Option Settings for the Printer...........................................................................................................35
Conditions for Bidirectional Communication.............................................................................................35
If Bidirectional Communication Is Disabled...............................................................................................36
Installing Font Manager...................................................................................................................................37
Using Adobe PageMaker Version 6.0, 6.5, or 7.0......................................................................................38
1
2. Printing Documents
Displaying the Printer Driver Settings Screen.................................................................................................39
Making printer default settings - the printer properties.............................................................................39
Making printer default settings - printing preferences..............................................................................39
Making printer settings from an application..............................................................................................40
Setting Paper on the Bypass Tray...................................................................................................................41
Setting the Paper Size Using the Control Panel.........................................................................................43
Setting Custom Size Paper Using the Control Panel.................................................................................45
Setting Thick Paper or OHP Transparencies Using the Control Panel.....................................................47
Setting Envelopes Using the Control Panel................................................................................................49
Printing on Orientation-Fixed or Two-Sided Paper.......................................................................................55
Frequently Used Print Methods.......................................................................................................................57
Standard Printing.........................................................................................................................................57
Printing on both sides of sheets...................................................................................................................58
Combining Multiple Pages into Single Page.............................................................................................60
Using One Click Presets..............................................................................................................................63
Advanced Printing............................................................................................................................................65
Menu Names and Brief Overview of Each Function................................................................................65
Collate .........................................................................................................................................................65
If Error Occurs with the Specified Paper Size and Type...............................................................................67
Printing from a Selected Tray......................................................................................................................67
Canceling a Print Job...................................................................................................................................68
Spool Printing...................................................................................................................................................70
Registering Classification Codes.....................................................................................................................71
Configuring Classification Codes...............................................................................................................72
Specifying the Classification Code for a Print Job....................................................................................72
3. Printing Stored Documents
Display .............................................................................................................................................................75
Reading the Display and Using Keys.........................................................................................................75
Using the Print Job Function.............................................................................................................................77
Print Job screen............................................................................................................................................77
Printing from the Print Job Screen....................................................................................................................80
Sample Print..................................................................................................................................................80
2
Locked Print..................................................................................................................................................83
Hold Print......................................................................................................................................................87
Stored Print...................................................................................................................................................90
Printing from the User ID Screen.....................................................................................................................94
Printing the Selected Print Job.....................................................................................................................94
Printing All Print Jobs....................................................................................................................................95
Canceling a Print Job.......................................................................................................................................97
Canceling a Print Job Using the Control Panel..........................................................................................97
Windows - Canceling a Print Job from the computer...............................................................................97
Mac OS - Canceling a Print Job from the computer.................................................................................98
Checking the Error Log....................................................................................................................................99
4. Printing from DeskTopBinder Lite
Printing a PDF File Directly............................................................................................................................101
Printing Method.........................................................................................................................................101
Using DeskTopBinder Lite.........................................................................................................................101
PDF Direct Print Properties........................................................................................................................103
Using Commands......................................................................................................................................104
5. Printer Features
Accessing User Tools.....................................................................................................................................105
Changing Default Settings........................................................................................................................105
Quitting User Tools....................................................................................................................................105
Menu Protect..............................................................................................................................................106
List/Test Print..................................................................................................................................................107
Printing the Configuration Page...............................................................................................................107
Maintenance..................................................................................................................................................110
System.............................................................................................................................................................111
Host Interface.................................................................................................................................................115
PCL Menu.......................................................................................................................................................116
PS Menu.........................................................................................................................................................118
PDF Menu.......................................................................................................................................................120
6. Appendix
Using the Virtual Printer.................................................................................................................................121
Adding a Virtual Printer.............................................................................................................................121
3
Changing a Virtual Printer Configuration................................................................................................122
Confirming a Virtual Printer Configuration..............................................................................................122
Deleting a Virtual Printer...........................................................................................................................123
Printing Using a Virtual Printer..................................................................................................................123
Specifications.................................................................................................................................................125
Trademarks.....................................................................................................................................................127
INDEX...........................................................................................................................................................129
4
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
6
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
7
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
Note
8
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.
9
Model-Specific Information
In this manual, model-specific information is indicated by the following marks:
• Check the label on the right side of the machine to identify the model.
BRP008S
• Dimensions in this manual are given in two units of measure: metric and inch. If your machine is the
220 to 240 V model, refer to the metric units. If your printer is the 120 V model, refer to the inch units.
10
1. Preparing the Machine
This chapter describes how to connect this machine to your computer, and install the printer driver.
1
Confirming the Connection Method
This machine supports network and local connection.
Before installing the printer driver, check how the machine is connected. Follow the driver installation
procedure that is appropriate to the connection method.
Network Connection
BMG021S
11
1. Preparing the Machine
• See the explanation about how to install the printer driver for each type of port.
• For details about SmartDeviceMonitor for Client port, see "Installing the Printer Driver".
• For details about Standard TCP/IP port, see "Installing the Printer Driver".
• For details about LPR port, see "Installing the Printer Driver".
• For details about WSD port, see "Installing the Printer Driver".
12
Confirming the Connection Method
BMG020S
Local Connection
• See the explanation about how to install the printer driver for each method of connections.
• For details about USB connections, see "Installing the Printer Driver Using USB".
• For details about parallel connections, see "Printing with Parallel Connection".
13
1. Preparing the Machine
Quick Install
Users of Windows 2000/XP/Vista, and Windows Server 2003/2003 R2/2008 can install this software
easily using the supplied CD-ROM.
Using Quick Install, the PCL printer driver, DeskTopBinder - SmartDeviceMonitor for Client are installed
under network environment, and the TCP/IP port will be set.
• To install the printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an Administrator.
• If you connect using USB, see "Installing the Printer Driver Using USB" and install the printer driver.
14
Installing the Printer Driver
The PCL6 printer driver is installed in the language specified by your operating system.
8. Click [Finish].
A message about restarting the computer appears. Restart the computer to complete installation.
9. Click [Exit] in the first dialog box of the installer, and then take out the CD-ROM. 1
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. If this happens, launch "Setup.exe" on
the CD-ROM root directory.
• Select the machine whose IP address is displayed in [Connect To] to install SmartDeviceMonitor for
Client when using TCP/IP.
• Quick Install is not available unless bidirectional communication between the machine and computer
is enabled via parallel connection. For details about bidirectional communication between the
machine and computer, see "Making Option Settings for the Printer".
• To install SmartDeviceMonitor for Client under Windows 2000/XP/Vista, and Windows Server
2003/2003 R2/2008, you must have an account that has Manage Printers permission. Log on as
an Administrator.
• Install SmartDeviceMonitor for Client before installing the printer driver when using the
SmartDeviceMonitor for Client port.
15
1. Preparing the Machine
6. The software license agreement appears in the [License Agreement] dialog box. After
reading through its contents, click [Yes].
7. Click [Full install] or [Custom install].
1 [Full install] installs all required applications: DeskTopBinder Lite and SmartDeviceMonitor for
Client.
[Custom install] installs selected applications.
8. Follow the instructions on the display and then click [Next >] to proceed to the next step.
9. After the installation is completed, select one of the options to restart the computer either
now or later, and click [Complete].
Restart the computer to complete installation.
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. If this happens, launch "Setup.exe" on
the CD-ROM root directory.
16
Installing the Printer Driver
• Setting a user code allows a SmartDeviceMonitor for Admin user to display and check statistics about
the number of sheets which each user prints. For details, see SmartDeviceMonitor for Admin Help.
• Auto Run may not work with certain operating system settings. If this happens, launch "Setup.exe" on
the CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.
17
1. Preparing the Machine
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
18
Installing the Printer Driver
• Setting a user code allows a SmartDeviceMonitor for Admin user to display and check the number
of sheets each user prints. For details, see SmartDeviceMonitor for Admin Help.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.
1
Windows 2000:
19
1. Preparing the Machine
• If no settings on the [Recovery/Parallel Printing] tab are available, follow the procedure below.
1. Click [Cancel] to close the [Port Configuration:] dialog box.
2. Start SmartDeviceMonitor for Client, and then right-click the SmartDeviceMonitor for Client icon
1 on the task tray.
3. Point to [Properties], and then click [Extended Features Settings].
4. Select the [Set Recovery/Parallel Printing for each port] check box.
5. Click [OK] to close the [Extended Features Settings] dialog box.
• For details about these settings, see SmartDeviceMonitor for Client Help or "Using
SmartDeviceMonitor for Client", Network and System Settings Guide.
This describes how to install the PCL printer driver using the TCP/IP port.
• To install this printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
Administrators or Power Users group member.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the SmartDeviceMonitor for
Client port.
20
Installing the Printer Driver
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.
This describes how to install the PCL printer driver using the LPR port.
21
1. Preparing the Machine
• To install this printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
1 Administrators or Power Users group member.
• In an IPv6 environment, you cannot use the LPR Port. Use the SmartDeviceMonitor for Client port.
22
Installing the Printer Driver
17. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.
1
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.
• The WSD port can be used under Windows Vista or Windows Server 2008.
• To install under Windows Vista or Windows Server 2008, you must have an account that has Manage
Printers permission. Log on as an Administrator.
• You can connect to the printer only if both the printer and computer are on the same network segment,
or "Network discovery" is enabled. For details, see Windows Help.
23
1. Preparing the Machine
8. Click [Browse...], and then specify a location for the printer driver.
If the CD-ROM drive letter is D, the printer driver's source files are stored in "D:\DRIVERS\PCL5E
\XP_VISTA\(Language)\DISK1" or "D:\DRIVERS\PCL6\XP_VISTA\MUI\DISK1".
1 The PCL6 printer driver is installed in the language specified by your operating system.
9. Click [Next].
If the [Windows can't verify the publisher of this driver software] message appears, click [Install this
driver software anyway].
10. Click [Close].
If installation is successful, the icon of the printer connected to the "WSD" port is added to the [Printers]
window.
• The port name that follows "WSD" uses random character strings. It cannot be changed freely.
• To stop the installation, click [Cancel] before the installation is complete. When re-installing the WSD
Port, right-click the printer's icon in the [Network] window, and then click [Uninstall].
24
Using as a Windows Network Printer
• To install the printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
Administrators or Power Users group member.
• If you print with a print server connected to the printer using the SmartDeviceMonitor port, Recovery
Printing and Parallel Printing cannot be used from the client.
• If you print under Windows XP/Vista or Windows Server 2003/2003 R2/2008 print server,
notification functions of SmartDeviceMonitor may not be used with the client.
• You can install the printer driver from the CD-ROM provided with this printer or download it from the
supplier's Web site.
• If your operating system is Windows XP Pro x64, Windows Server 2003/2003 R2/2008 x64, you
must download the printer driver from the manufacturer's Web site. Select this printer and the operating
system you are using, and then download it.
25
1. Preparing the Machine
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run.
• If you still want to install the printer driver, use [Add Printer]. See “Messages Displayed When Installing
the Printer Driver” Trouble Shooting.
26
Using as a NetWare Print Server/Remote Printer
27
1. Preparing the Machine
• To stop installation of the selected software, click [Cancel] before installation is complete.
• The protocol is set to inactive as default. Enable it using SmartDeviceMonitor or Telnet.
Form Feed
Do not use NetWare to configure form feed. Form feed is controlled by the printer driver on Windows. If
NetWare form feed is configured, the printer may not print properly.
Follow the procedure below to disable form feed according to the operating system used:
• Under Windows 2000/XP/Vista, or Windows Server 2003/2003 R2/2008, clear the [Form feed]
check box on the [NetWare Settings] tab in the printer properties dialog box.
28
Using as a NetWare Print Server/Remote Printer
Banner Page
Printer to print server connection requires 30 - 40 seconds to resume after the printer is reset. During this
period, jobs may be accepted (depending on NetWare specifications) but not printed.
To print after resetting the printer as the remote printer, check on the print server that the remote printer is
disconnected, or wait for two minutes before trying to print.
29
1. Preparing the Machine
• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, and plug and play is enabled, the icon of the printer
connected to the "USB" port is added to the [Printers] window.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.
30
Installing the Printer Driver Using USB
The PCL6 printer driver is installed in the language specified by your operating system.
8. Check the printer driver location, and then click [OK].
9. Click [Next >].
10. Click [Finish]. 1
If the printer driver has already been installed, and plug and play is enabled, the icon of the printer
connected to the "USB001" port is added to the [Printers] window.
• To disable Auto Run, press the left Shift key when inserting the CD-ROM into the drive and keep it
pressed until the computer finishes reading from the CD-ROM.
• The number after "USB" varies depending on the number of printers connected.
• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, and plug and play is enabled, the icon of the printer
connected to the "USB" port is added to the [Printers] window.
The printer drivers can be installed from the CD-ROM provided with this printer.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.
31
1. Preparing the Machine
• PCL 6
D:\DRIVERS\PCL6\XP_VISTA\MUI\DISK1
• PostScript 3
1 D:\DRIVERS\PS\XP_VISTA\(Language)\DISK1
The PCL6 printer driver is installed in the language specified by your operating system.
7. Check the printer driver location, and then click [Next >].
8. Click [Continue].
9. Click [Finish].
If the installation is successful, the icon of the printer connected to the "USB001" port is added to the
[Printers and Faxes] window.
• To disable Auto Run, press the left Shift key when inserting the CD-ROM into the drive and keep it
pressed until the computer finishes reading from the CD-ROM.
• The number after "USB" varies depending on the number of printers connected.
32
Printing with Parallel Connection
33
1. Preparing the Machine
13. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.
1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.
34
Making Option Settings for the Printer
Bidirectional communication allows information about paper size and feed direction settings to be
automatically sent to the printer. You can check printer status from your computer.
• Bidirectional communication is supported by Windows 2000/XP/Vista, Windows Server
2003/2003 R2/2008.
• If you use the PCL printer driver and bidirectional communication is enabled under Windows 2000,
the [Change Accessories] tab is unavailable.
To support bidirectional communication, the following conditions must be met:
When connected with parallel cables
• The computer must support bidirectional communication.
• The machine must support bidirectional communication.
• The interface cable must support bidirectional communication.
• The machine must be connected to the computer using the standard parallel cables and parallel
connectors.
• Under Windows 2000, [Enable bidirectional support] must be selected, and [Enable printer
pooling] must not be selected on the [Ports] tab with the PCL printer driver.
When connected with the network
• The machine must support bidirectional communication.
• Under Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008, [Enable
bidirectional support] must be selected, and [Enable printer pooling] must not be selected on
the [Ports] tab with the PCL printer driver.
• In addition to the above, one of the following conditions must also be met:
• The SmartDeviceMonitor for Client port and the TCP/IP protocol must be used.
• IPP port name must include the IP address when using the IPP protocol.
When connected with USB
• The printer must be connected to the computer's USB port using the USB interface cable (for
Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008).
• The computer must support bidirectional communication.
35
1. Preparing the Machine
• The PCL6 printer driver supports bidirectional communication. You can update the printer status
automatically.
1 • The PCL5e printer driver supports bidirectional communication. You can update the printer status
manually.
• Install SmartDeviceMonitor for Client from the supplied CD-ROM.
• Under Windows 2000/XP/Vista, and Windows Server 2003/2003 R2/2008, Manage Printers
permission is required to change the printer properties in the [Printers] folder. Log on as an
Administrators or Power Users group member.
36
Installing Font Manager
37
1. Preparing the Machine
• If the driver is not set correctly after copying the ".ppd" file, printing may not be performed properly.
• When using PageMaker, the optional features that can be selected by the printer driver will not be
active. The following procedure describes how to activate the optional printer features.
1. On the [File] menu, click [Print].
The [Print Document] dialog box appears.
2. Make the necessary settings in the [Features] box.
38
2. Printing Documents
This chapter explains how to print documents using the printer driver. It also describes the procedure for
configuring duplex printing, combine printing and other printing functions.
• To change the printer's default settings (including settings for options), log on using an account that
has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for individual users. Settings made in the [Printer
Properties] dialog box are applied to all users.
• The settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.
• The settings in the "Printing Settings" (Document Properties) dialog box that can be modified and
retained differ depending on the printer driver, printer icon, and the users registered for each printer
icon.
39
2. Printing Documents
• The settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.
• Procedures for opening the [Printing Preferences] dialog box vary depending on the application. For
details, see the manuals provided with the application.
• Any settings you make using this procedure apply to the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as the defaults when printing from the application.
• For details, see the printer driver Help.
40
Setting Paper on the Bypass Tray
• Paper sizes that can be loaded onto the bypass tray are 90-216 mm (3.55-8.50 in.) vertical, and 2
139-600 mm (5.48-23.62 in.) horizontal.
• When paper larger than 600 mm (23.62 in.) in length is used, the paper may become wrinkled, may
not be fed into the machine, or may cause paper jams.
• If you want to use the bypass tray, be sure to specify the paper size and paper type.
• The following functions are disabled when printing from the bypass tray:
• Duplex printing
• Auto Tray Select
• Auto Tray Switching
• Certain types of OHP transparencies for color printing cannot be used. For details about types that
can be used, contact your sales or service representative.
BRH023S
41
2. Printing Documents
2. Unlock the paper guide by pushing up the paper guide release lever.
BRH024S
1. Release lever
3. Gently insert paper face down into the bypass tray until the beeper sounds, and then adjust
the paper guides to the paper size.
If the paper size of the paper guide and the paper do not match, skewing and misfeeds might occur.
Do not stack paper over the limit mark, otherwise a skewed image or misfeeds might occur.
Open out the extender to support paper sizes larger than A4 , 81/2 " 11 " .
Fan the paper to get air between the sheets to avoid a multi-sheet feed.
BRH025S
1. Horizontal size
2. Vertical size
3. Extender
4. Paper guides
42
Setting Paper on the Bypass Tray
4. Lock the paper guide by pushing down the paper guide release lever.
BRH026S
1. Release lever
5. Set the paper size using the printer driver or the control panel.
• When loading thick paper, thin paper, or OHP transparencies, set paper size and paper type.
• The number of sheets that can be loaded in the bypass tray depends on the paper type.
• When loading letterhead paper, see "Loading Paper", About This Machine.
• Depending on the environment where the machine is being used, you might at times hear a rustling
noise from paper moving through the machine. This noise does not indicate a malfunction.
• When the Panel Key Sound is turned off, it will not sound if you insert paper into the bypass tray. For
details about Panel Key Sound, see "System Settings", Network and System Settings Guide.
• For details about setting printer drivers, see the printer driver Help.
Follow the procedure below to set the machine using the control panel when loading standard size paper
onto the bypass tray.
• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• Under [Printer Features], [System], if you set [Bypass Tray Priority] to [Driver/Command], paper size
settings made on the printer driver must match those made on the control panel. If they do not match,
an error message appears and printing stops if [Printer Features], [System], [Auto Continue] is not set.
For details about [Printer Features] settings, see "Printer Features"
43
2. Printing Documents
BRP005S
2. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.
3. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.
4. Press the [ ] or [ ] key to select [Printer Bypass Paper Size], and then press the [OK] key.
5. Press the [ ], [ ], [ ], or [ ] key to select the paper size you want to use, and then press
the [OK]] key.
44
Setting Paper on the Bypass Tray
• When loading thick paper, thin paper, or OHP transparencies, set paper size and paper type.
• [Auto Detect] is the default setting for [Printer Bypass Paper Size].
• For details about setting printer drivers, see the printer driver Help.
Follow the procedure below to set the machine using the control panel when loading custom size paper
onto the bypass tray.
• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• If you select [Machine Settings] from [Bypass Tray Priority] in [System] of [Printer Features] (see "Printer
Features"), the settings made using the control panel have priority over the printer driver settings.
• If the printer driver is not used, select [Machine Settings] from [Bypass Tray Priority] in [System] of
[Printer Features] (see "Printer Features"). Set paper size using the control panel.
BRP005S
2. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.
45
2. Printing Documents
3. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.
2 4. Press the [ ] or [ ] key to select [Printer Bypass Paper Size], and then press the [OK] key.
5. Press the [ ], [ ], [ ], or [ ] key to select the [Custom Size], and then press the [OK] key.
6. Enter the horizontal size of the paper using the number keys, and press [OK] key.
7. Enter the vertical size of the paper using the number keys, and press [OK] key.
46
Setting Paper on the Bypass Tray
• When loading thick paper, thin paper, or OHP transparencies, set paper size and paper type.
• [Auto Detect] is the default setting for [Printer Bypass Paper Size].
• For details about setting printer drivers, see the printer driver Help.
Follow the procedure below to set the machine using the control panel when loading thick paper, thin
paper, or OHP transparencies onto the bypass tray.
• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• If you select [Machine Settings] from [Bypass Tray Priority] in [System] of [Printer Features] (see "Printer
Features"), the settings made using the control panel have priority over the printer driver settings.
• If the printer driver is not used, select [Machine Settings] from [Bypass Tray Priority] in [System] of
[Printer Features] (see "Printer Features"). Set the paper size using the control panel.
• When printing onto OHP transparencies, paper thinner than 66.0 g/m2, or paper of 101 g/m2 or
above, you need to specify the type and size of paper with Tray Paper Settings in User Tools Menu.
For details about Tray Paper Settings, see "System Settings", Network and System Settings Guide.
• Do not use color OHP transparencies that have easily melted coatings.
• When printing onto OHP transparencies, use A4 , or 81/2" 11" , size sheets, and specify its size.
47
2. Printing Documents
BRP005S
2. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.
3. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.
4. Press the [ ] or [ ] key to select [Paper Type:Bypass Tray], and then press the [OK] key.
5. Press the [ ] or [ ] key to select the proper items, according to the paper type you want to
set.
48
Setting Paper on the Bypass Tray
Follow the procedure below to set the machine using the control panel when loading envelopes onto the
bypass tray.
• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• If you select [Machine Settings] from [Bypass Tray Priority] in [System] of [Printer Features] (see "Printer
Features"), the settings made using the control panel have priority over the printer driver settings.
• If the printer driver is not used, select [Machine Settings] from [Bypass Tray Priority] in [System] of
[Printer Features] (see "Printer Features"). Set paper size using the control panel.
• Misfeeds might also occur when using envelopes (1) - (3) depending on the length and shape of the
flaps.
49
2. Printing Documents
Supported
2 BAV026S
Supported
BAV027S
Supported
BAV028S
• You can load up to 10 envelopes (72 - 90g/m2) in the bypass tray at the same time, without
compressing them. Check the envelopes are not damp, and the top of the stack is not higher than the
limit mark on the side guide.
• When loading envelopes, be sure to unfold the flaps and position them opposite to the paper feed
direction.
• Load type (4) (162 114 mm / C6) (6.38 4.49 in. / C6) envelopes flap down, flap fold against
the side guide.
BRP009S
• Depending on the envelope type, specify an appropriate print image rotation using the printer driver.
For a type (1) - (4) envelope, rotate by specify 180 degrees.
50
Setting Paper on the Bypass Tray
1. Open the bypass tray, and then insert the envelopes with the side you want to print face
down until the beeper sounds.
BRP010S
BRP005S
3. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.
51
2. Printing Documents
4. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.
2 5. Press the [ ] or [ ] key to select [Printer Bypass Paper Size], and then press the [OK] key.
6. Press the [ ], [ ], [ ], or [ ] key to select the [Custom Size], and then press the [OK] key.
7. Press the [ ] or [ ] key to enter the horizontal value, and then press the [OK] key.
8. Press the [ ] or [ ] key to enter the vertical value, and then press the [OK] key.
52
Setting Paper on the Bypass Tray
9. Press the [ ] or [ ] key to select [Paper Type:Bypass Tray], and then press the [OK] key.
10. Press the [ ] or [ ] key to select [Thick Paper], and then press the [OK] key.
11. Press the [User Tools/Counter] key to return to the initial screen.
• When entering the horizontal size for envelopes, including the opened-out flap in the measurement.
BAT029S
1. Vertical size
2. Horizontal size
53
2. Printing Documents
54
Printing on Orientation-Fixed or Two-Sided Paper
Paper Orientation Letterhead Setting Letterhead Setting Letterhead Setting Letterhead Setting
[On(Always)] [Off] [On(Always)] [Off]
1-sided print
2-sided print
1-sided print
2-sided print
• To print on letterhead paper when [Letterhead Setting] is set to [Auto], you must specify [Letterhead]
as the paper type in the PCL printer driver's settings.
• If you change from 1-sided to 2-sided (duplex) printing during a copy job, all pages printed after the
change will be 2-sided. If you want to print the remaining sets as 1-sided, specify a paper tray that
is not available for duplex printing.
• For details about how to make 2-sided prints, see "Printing on both sides of sheets".
55
2. Printing Documents
56
Frequently Used Print Methods
Standard Printing
Use the following procedure to print documents using the normal printing function with the printer driver.
• Before printing, make sure that the settings for the installed options and loaded paper are correctly
configured.
For the PCL 6 printer driver:
1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. Click the [One Click Presets] tab, if it is not already selected.
3. In the [Job type:] list, select [Normal Print].
If you want to print multiple copies, specify a number of sets in the [Copies:] box.
4. In the [Document Size:] list, select the size of the original to be printed.
5. In the [Orientation:] list, select [Portrait] or [Landscape] as the orientation of the
original.
6. In the [Input Tray] list, select the paper tray that contains the paper you want to print
onto.
If you select [Auto Tray Select] in the [Input Tray] list, the source tray is automatically selected
according to the paper size and type specified.
7. In the [Paper type:] list, select the type of paper that is loaded in the paper tray.
8. To save current setting in the One Click Preset List, click [Register Current Settings...].
Enter a name and comment that describe the setting, and then click [OK].
The newly registered icon appears in the [One Click Preset List:] area.
57
2. Printing Documents
1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
2 The [Printing Preferences] dialog box appears.
2. In the [Job type:] list, select [Normal Print].
If you want to print multiple copies, specify a number of sets in the [Copies:] box.
3. In the [Orientation:] list, select [Portrait] or [Landscape] as the orientation of the
original.
4. Click the [Paper] tab.
5. In the [Document Size:] list, select the size of the original to be printed.
6. In the [Input Tray:] list, select the paper tray that contains the paper you want to print
onto.
If you select [Auto Tray Select] in the [Input Tray:] list, the source tray is automatically selected
according to the paper size and type specified.
7. In the [Type:] list, select the type of paper that is loaded in the paper tray.
8. Click [OK] to close the printer preferences dialog box.
9. Print the document using the print function in the document's native application.
• The types of paper loaded in the paper trays are indicated on the printer's display. This allows you
to see which tray the selected paper type is loaded in. However, the paper type setting available in
the printing preference dialog box might be different from the type indicated on the printer's display.
• If the paper tray loaded with the specified paper size and type is not available, a warning message
appears on the machine's control panel. If this happens, follow the instructions in the message to
specify a paper tray and perform force printing. Alternatively, press the job reset button to cancel
printing. For details, see "If Error Occurs with the specified Paper Size and Type".
• p.67 "If Error Occurs with the Specified Paper Size and Type"
This section explains how to print on both sides of each page using the printer driver.
58
Frequently Used Print Methods
• Duplex printing is not possible if the paper types listed below are specified. If you want to perform
duplex printing, select a paper type other than those listed below:
• Paper loaded in the bypass tray
• Thick Paper, OHP (Transparency), Label Paper
• Custom Size paper 2
For the PCL 6 printer driver:
1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. To use an existing One Click Presets, click the [One Click Presets] tab, and then click the
icon in the [One Click Preset List:] box.
If you do not wish to modify a custom setting that is already registered in the printer driver, change
settings such as paper size and source tray as required, and then proceed to step 8.
3. Click the [Detailed Settings] tab.
4. In the [Menu:] box, click the [Edit] icon.
5. In the [2 sided:] list, select [Open to Left] or [Open to Top].
6. Change any other print settings if necessary.
7. To save current setting in the One Click Preset List, click [Register Current Settings...].
Enter a name and comment that describe the setting, and then click [OK].
The newly registered icon appears in the [One Click Preset List:] area.
8. Click [OK] to close the printer preferences dialog box.
9. Print the document using the print function in the document's native application.
For the PCL 5e printer driver:
1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. Click the [Setup] tab, if it is not already selected.
3. In the [Duplex:] list, [Open to Left] or [Open to Top].
4. Change any other print settings if necessary.
5. Click [OK] to close the printer preferences dialog box.
6. Print the document using the print function in the document's native application.
• If the document contains pages with different original sizes, page breaks may occur.
59
2. Printing Documents
BMF006S
• Open to Top
BMF008S
This section explains how to print multiple pages onto a single sheet. The combine printing function allows
you to economize on paper by printing multiple sheets at reduced size onto a single sheet.
• The combine printing function is not available on a custom size paper. To use the combine printing
function, specify a standard size paper.
For the PCL 6 printer driver:
1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
60
Frequently Used Print Methods
2. To use an existing One Click Presets, click the [One Click Presets] tab, and then click the
icon in the [One Click Preset List:] box.
If you do not wish to modify a custom setting that is already registered in the printer driver, change
settings such as paper size and source tray as required, and then proceed to step 8.
3. Click the [Detailed Settings] tab.
4. In the [Menu:] box, click the [Edit] icon. 2
5. In the [Layout:] list, select the combination pattern from the list.
6. Change any other print settings if necessary.
7. To save current setting in the One Click Preset List, click [Register Current Settings...].
Enter a name and comment that describe the setting, and then click [OK].
The newly registered icon appears in the [One Click Preset List:] area.
8. Click [OK] to close the printer preferences dialog box.
9. Print the document using the print function in the document's native application.
For the PCL 5e printer driver:
1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. Click the [Setup] tab, if it is not already selected.
3. In the [Layout:] list, select the combination pattern from the list.
4. Change any other print settings if necessary.
5. Click [OK] to close the printer preferences dialog box.
6. Print the document using the print function in the document's native application.
• If the document contains pages with different original sizes, page breaks may occur.
• If the application you are using also has a combine function, disable it. If the application's combine
function is also enabled when the driver's combine function enabled, incorrect printing is likely.
• For details about combining pages with different orientations and other advanced functions, see the
printer driver Help.
61
2. Printing Documents
BMF018S
BMF023S
BMF024S
BMF019S
62
Frequently Used Print Methods
2
BMF020S
BMF021S
BMF022S
This section explains how to register and use one click presets.
Each function explained in this chapter is preconfigured and registered under [One Click Presets List:] on
the [One Click Presets] tab.
You can apply the relevant setting simply by clicking on the one click preset name. This helps to avoid
incorrect settings and misprints.
One click presets can be added, modified, and deleted as required. They can also be shared for use by
different users. By using registered one click presets, users without in-depth knowledge of the printer driver
can utilize advanced printing functions easily.
For details about registering, modifying, and deleting one click presets, see the printer driver Help.
63
2. Printing Documents
64
Advanced Printing
Advanced Printing
This chapter explains the printer's advanced printing functions.
Other than the functions that can be configured in the [One Click Presets] tab, various print functions can
be setup from each [Menu:] icon in the [Detailed Settings] tab. The settings for each function described in
this section can be changed by using the following menus.
2
• For details about printing methods, see the printer driver Help.
The following is an overview of the settings that are available on the [Finishing] menu.
[Finishing] menu
You can enable/disable the collate function.
• Collate
When printing multiple sets of documents such as handouts for meetings, you can have prints
delivered in batches of ordered sets. For details about collate function, see "Collate".
Collate
When printing multiple documents such as handouts for meetings, you can separate sets into order. This
function is known as "Collate". Collate stores data transmitted from a computer to the machine memory or
hard disk drive.
65
2. Printing Documents
BAC016S
2
• Set Collate when using the PCL printer driver.
66
If Error Occurs with the Specified Paper Size and Type
• If form feed is selected for a tray with the following settings, you can change the tray by canceling
the settings:
• Duplex print
• If Auto Continue is selected, form feed paper is printed after a set interval. See "System".
• p.111 "System"
If the printer does not have a tray for the selected paper size or paper type, or if the selected paper loaded
in the printer has run out, a caution message appears. If this message appears, do the following procedure.
67
2. Printing Documents
3. Select the tray for form feed using the [ ] or [ ] key from those that appear on the display
panel, and then press the [OK] key.
2
• If a tray with a smaller paper size is selected, the print job may be cut short, or other problems may
occur.
Follow this procedure for canceling the print job if the message prompting form feed appears.
1. Press [JobReset].
2. Press [Current].
68
If Error Occurs with the Specified Paper Size and Type
• If the printer is shared by multiple computers, be careful not to accidentally cancel someone else's
print job.
• Under Windows, If the printer is connected to the computer using a parallel cable, sent print jobs may
be canceled if the [Job Reset] key is pressed while "Waiting for print data..." is displayed on the control
panel. After the interval set in [I/O Timeout] in [Host Interface] has passed, the next print job can be
sent. A print job sent from a different client computer will not be canceled in this case. 2
• You cannot stop printing data that has already been processed. For this reason, printing may continue
for a few pages after you press the [Job Reset] key.
69
2. Printing Documents
Spool Printing
Spool Printing allows print jobs transferred from a computer to be temporarily stored, and then prints them
after they are transferred. This shortens printing time as it maximizes printer efficiency.
2 • During Spool Printing, the hard disk is accessed and the Data In indicator blinks. Turning off the
computer or machine during Spool Printing can damage the hard disk. Also, if the computer or machine
is turned off during Spool Printing, spooled jobs will be deleted. Therefore, do not turn the power of
the computer or machine off during Spool Printing.
• If data is sent to the machine using other protocols besides "diprint", "lpr", "ipp", "ftp", "sftp", "smb",
and "wsd (printer)", Spool Printing cannot be performed.
Setting Spool Printing
Spool Printing can be set using telnet or Web Image Monitor.
• Using Web Image Monitor
For details, see Network and System Settings Guide or Help for more information.
• Using telnet
Type in "spoolsw spool on" to set Spool Printing.
For details, see Network and System Settings Guide for more information about telnet.
Viewing/Deleting spool jobs in Web Image Monitor
Start Web Image Monitor and enter the machine's IP address in the address bar. This displays the top
page.
For details, see Network and System Settings Guide.
70
Registering Classification Codes
BJF013S
71
2. Printing Documents
2 Use Web Image Monitor to specify whether or not to apply classification code requirement to print jobs.
When printing in an environment where classification codes are required, a classification code must be
specified for each print job.
• The PostScript 3 printer driver does not support the classification codes and it cannot be used to print
under environment which the classification codes are required.
1. Open the printer properties dialog box after creating a document in an application.
2. Click the [Detailed Settings] tab.
3. In the [Menu:] box, click the [Job Setup] icon.
72
Registering Classification Codes
4. Enter the classification code in the [Classification code:] box, and then click [OK].
This code identifies the user. The classification code can contain up to 32 alphanumeric (a-z, A-Z,
0-9, "-") characters.
5. Make any other necessary print settings, and then click [OK].
6. A confirmation message appears. Read it, and then click [OK].
7. Execute the print command.
2
8. The print job is sent to the printer.
1. Open the printer properties dialog box after creating a document in an application.
2. Click the [Valid Access] tab.
3. Enter the classification code in the [Classification Code:] box.
This code identifies the user. The classification code can contain up to 32 alphanumeric (a-z, A-Z,
0-9, "-") characters.
4. Make any other necessary print settings, and then click [OK].
5. A confirmation message appears. Read it, and then click [OK].
6. Execute the print command.
7. The print job is sent to the printer.
73
2. Printing Documents
74
3. Printing Stored Documents
This chapter explains how to print documents stored in the machine.
Display
This section describes configuration using the display when the printer function is selected.
BRP002S
This section explains how to read the display and using the selection key for the initial display.
75
3. Printing Stored Documents
3
BRP001S
1. Scroll keys
Press to move the cursor to each direction one by one.
When [ ] [ ] [ ] or [ ] appears in this manual, press the scroll key of the same direction.
2. [OK] key
Press to set a selected item or entered numeric value.
3. [Escape] key
Press to cancel an operation or return to the previous display.
4. Selection keys
Correspond to items at the bottom line on the display.
Example: initial printer display
• When the instruction "press [JobReset]" appears in this manual, press the left selection key.
• When the instruction "press [Prt.Jobs]" appears in this manual, press the center selection key.
• When the instruction "press [Menu]" appears in this manual, press the right selection key.
76
Using the Print Job Function
• To use this function, the optional hard disk must be installed on the printer.
3
Print Job screen
When the printer is turned on, the following screen appears if an optional hard disk is installed in the printer.
If you press [Prt.Jobs] on the initial screen, a screen prompting to select the type of print job appears.
After selecting a type, you can select print files in the list by pressing:
• [Job List]
Displays the Job List screen.
• [User ID]
Displays the User ID screen.
If you select Sample Print, Locked Print, and Hold Print, the print files saved in the printer are deleted after
printing is completed. If you select Stored Print, the files remain in the printer even after printing is finished.
77
3. Printing Stored Documents
BRP003S
• When you press [Change] to change or clear a password, you must first enter the existing password.
If the password you entered is incorrect, you cannot change or clear any current passwords.
• You can use [Change] to set or clear passwords only when Stored Print files are stored in the printer.
78
Using the Print Job Function
User ID Screen
BRP004S
79
3. Printing Stored Documents
Sample Print
Use this function to print only the first set of a multiple-set print job. After you have checked the result,
remaining sets can be printed or canceled using the printer's control panel. This can reduce misprints due
3 to mistakes in content or settings.
• If a Sample Print file has not been stored properly, check the error log on the control panel.
• Even after you turn off the printer, stored documents in the printer remain. However, the [Auto Delete
Temporary Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. By
default, Sample Print jobs are automatically collated by the printer driver. If a collate option is selected
from the application's Print dialog box, more prints than intended may be produced.
• If the first set of the Sample Print files is not as you expected and you do not want to print remaining
sets, delete the Sample Print file using the display panel. If you print the remaining sets of the Sample
Print file, the job in the printer is deleted automatically.
• Sample Print files printed or deleted using Web Image Monitor, after you select [Sample Print] using
the control panel will appear on the display panel. However, an error message will appear if you try
to print or delete those Sample Print files.
• If stored files have similar and long file names, recognizing the file you want to print on the display
panel may be difficult. Print the file you want to print either by checking the user ID or the time the file
is sent, or by changing the file name to something that can be recognized easily.
• For details about the error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Temporary Jobs] or [Auto Delete Stored Jobs], see "System".
80
Printing from the Print Job Screen
• p.111 "System"
• Applications with their own drivers, such as PageMaker, do not support this function.
3
1. From an application, select a command to print.
The Print dialog box appears.
2. Select the printer you want to use in the [Name] list, and then click [Properties].
The printer properties dialog box appears.
3. In the [Job Type:] list, click [Sample Print].
4. Click [Details...], and then enter a user ID in the [User ID:] box.
This is used to identify the user. The user ID can be entered using up to eight alphanumeric (a-z, A-Z,
0-9) characters.
5. Execute a command to print.
Make sure to set more than two copies.
The Sample Print job is sent to the printer, and the first set is printed.
6. On the printer's control panel, press [Prt.Jobs].
7. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].
81
3. Printing Stored Documents
8. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
Enter the new number of sets using the scroll keys. You can enter up to 999 sets.
Press the [Escape] key to correct any entry mistakes.
3 9. Enter the number of copies to print, and then press [Print].
• If the set quantity is changed when [User ID] is pressed in step 7, the changed quantity is applied to
all selected files.
• When printing is completed, the stored file will be deleted.
• To stop printing after printing has started, press [JobReset]. The file will be deleted.
• For details about [User ID], see "Printing from the User ID Screen".
1. Press [Prt.Jobs].
82
Printing from the Print Job Screen
2. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].
Locked Print
Use this function to maintain privacy when printing confidential documents on the printer over a shared
network. Usually, it is possible to print data using the display panel once it is stored in this printer. When
using Locked Print, it is not possible to print unless a password is entered on the printer's display panel.
Your confidential documents will be safe from being viewed by other people.
• If a Locked Print file has not been stored properly, check the error log on the control panel.
83
3. Printing Stored Documents
• Even after you turn off the printer, stored documents remain. However, the [Auto Delete Temporary
Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. Locked
Print jobs are automatically collated by the printer driver as default. If a collate option is selected in
the application print dialog box, more sets than intended may be printed.
• After the Locked Print file is printed, the job is automatically deleted.
• Locked Print files printed or deleted using Web Image Monitor, after you select [Locked Print] using
the control panel will appear on the display panel. However, an error message will appear if you try
• Applications with their own drivers, such as PageMaker, do not support this function.
84
Printing from the Print Job Screen
4. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].
85
3. Printing Stored Documents
1. Press [Prt.Jobs].
3 2. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].
86
Printing from the Print Job Screen
Hold Print
Use this function to temporarily hold a file in the printer, and print it from the computer or the printer's control
panel later.
• If a Hold Print file has not been stored properly, check the error log on the control panel.
• Even after you turn off the printer, stored documents in the printer remain. However, the [Auto Delete
Temporary Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. By
default, Hold Print jobs are automatically collated by the printer driver. If a collate option is selected
from the application's Print dialog box, more prints than intended may be produced.
• Hold Print files printed or deleted using Web Image Monitor, after you select [Hold Print] using the
control panel will appear on the display panel. However, an error message will appear if you try to
print or delete those Hold Print files.
• If stored files have similar and long file names, recognizing the file you want to print on the display
panel may be difficult. Print the file you want to print either by checking the user ID or the time the file
is sent, or by changing the file name to something that can be recognized easily. If you enter the
document name on the printer driver's [Details...], that name appears on the display panel.
• It is possible, but not required, to set a file name or a password to a Hold Print file.
• For details about error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Temporary Jobs] or [Auto Delete Stored Jobs], see "System".
87
3. Printing Stored Documents
• Applications with their own drivers, such as PageMaker, do not support this function.
3 For details about configuring the printer drivers, see the relevant Help files.
2. Click [Details...], and then enter a User ID in the [User ID:] box.
You can also set a file name. The file name you set will be displayed on the printer's Job List screen.
3. Start printing from the application's Print dialog box.
The Hold Print job is sent to the printer and stored.
4. On the printer's control panel, press [Prt.Jobs].
5. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].
88
Printing from the Print Job Screen
7. Press [Print].
The Hold Print file is printed.
Press [Cancel] to cancel printing.
1. Press [Prt.Jobs].
2. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].
89
3. Printing Stored Documents
4. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].
Stored Print
Use this function to store a file in the printer, and then print it from the computer or the printer's control panel
later.
3 Jobs are not deleted after they are printed, so the same job need not be resent in order to print multiple
copies.
• If a Stored Print file has not been stored properly, check the error log on the control panel.
• Even after you turn off the printer, stored documents in the printer remain. However, the [Auto Delete
Temporary Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. By
default, Stored Print jobs are automatically collated by the printer driver. If a collate option is selected
from the application's Print dialog box, more prints than intended may be produced.
• Stored Print files printed or deleted using Web Image Monitor, after you select [Stored Print] using
the control panel will appear on the display panel. However, an error message will appear if you try
to print or delete those Stored Print files.
• If stored files have similar and long file names, recognizing the file you want to print on the display
panel may be difficult. Print the file you want to print either by checking the user ID or the time the file
is sent, or by changing the file name to something that can be recognized easily.
• If you enter the document name on the printer driver's [Details...], that name appears on the display
panel.
• For details about the error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Temporary Jobs] or [Auto Delete Stored Jobs], see "System".
90
Printing from the Print Job Screen
• p.111 "System"
• Applications with their own drivers, such as PageMaker, do not support this function.
3
1. Configure the Stored Print in the printer driver's properties.
You can select two ways for Stored Print:
• [Stored Print]
Stores the file in the printer and print it later using the control panel.
• [Store and Print]
Prints the file at once and also stores the file in the printer.
For details about configuring the printer drivers, see the relevant Help files.
2. Click [Details...], and then enter a User ID in the [User ID:] box.
You can also set a password. The same password must be entered when printing or deleting.
You can also set a file name. The file name you set will be displayed on the printer's Job List screen.
3. Start printing from the application's Print dialog box.
The Stored Print job is sent to the printer.
4. On the printer's control panel, press [Prt.Jobs].
5. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
91
3. Printing Stored Documents
6. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
• When multiple files are selected without setting a quantity, one set less than the minimum number of
all settings is applied. If the least number of settings is one set, all selected files will be printed at one
set.
• If the number of set quantity is changed when [User ID] is pressed in step 5, the changed quantity is
applied to all selected files.
• To stop printing after printing has started, press [JobReset]. A Stored Print file is not deleted even if
[JobReset] is pressed.
• The Stored Print file that sent to the printer is not deleted unless you delete a file or select [Auto Delete
Stored Jobs].
• You can set or delete a password after sending files to the printer. Select the file and press [Change]
in the Print Job List screen. To set a password, enter the new password. To delete the password, leave
the password box blank on entering or confirming the new password, and press the [OK] key.
• For details about the error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Stored Jobs], see "System".
92
Printing from the Print Job Screen
1. Press [Prt.Jobs].
2. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
3
93
3. Printing Stored Documents
A list of user IDs whose files are stored in the printer appears.
3. Select the user ID whose file you want to print using the or key, and then press [Job List].
94
Printing from the User ID Screen
• If you print a Sample, Locked, or Hold Print file, the print file saved in the printer is deleted after printing
is completed.
2. Select a type of print jobs you want to print using the or key, and then press [User ID].
A list of user IDs whose files are stored in the printer appears.
3. Select the user ID whose file you want to print using the or key, and then press [PrintAll].
• If you print a Sample, Locked, or Hold Print file, the print file saved in the printer is deleted after printing
is completed.
• You cannot select a print job that is not stored under the selected user ID.
• When printing multiple Sample Print files without specifying the number of sets on the confirmation
screen, one set less than the least number of set specified on the computer is applied for every selected
95
3. Printing Stored Documents
document. If the number of sets specified on the computer is "1", one set each is printed for every
document.
• When printing multiple Stored Print files without specifying the number of sets on the confirmation
screen, the least number of set specified on the computer is applied for every selected document.
• If you select [Locked Print Jobs], enter the correct password. If there are multiple passwords, the printer
prints only files that correspond to the entered password.
• If you select Stored Print files, and some of these require a password, the printer prints files that
correspond to the entered password and files that do not require a password.
96
Canceling a Print Job
1. Press [JobReset]. 3
A confirmation message appears.
2. Press [Current].
You can cancel a print job from the computer if transferring print jobs is not completed.
97
3. Printing Stored Documents
• If the printer is shared by multiple computers, be careful not to accidentally cancel someone else's
print job.
• If the printer is connected to the computer using a parallel cable, sent print jobs may be canceled if
[JobReset] is pressed while "Waiting for print data..." is displayed on the control panel. After the
interval set in [I/O Timeout] in Printer Features has passed, the next print job can be sent. A print job
sent from a different client computer will not be canceled in this case.
• You cannot stop printing data that has already been processed. For this reason, printing may continue
3 for a few pages after you press [JobReset].
• A print job containing a large volume of data may take considerable time to stop.
• If the printer is shared by multiple computers, be careful not to accidentally cancel someone else's
print job.
• If the printer is connected to the computer using a parallel cable, sent print jobs may be canceled if
[JobReset] is pressed while "Waiting for print data..." is displayed on the control panel. After the
interval set in [I/O Timeout] in Printer Features has passed, the next print job can be sent. A print job
sent from a different client computer will not be canceled in this case.
• You cannot stop printing data that has already been processed. For this reason, printing may continue
for a few pages after you press [JobReset].
• A print job containing a large volume of data may take considerable time to stop.
98
Checking the Error Log
• The most recent 30 errors are stored in the error log. If a new error is added when there are 30 errors
already stored, the oldest error is deleted. However, if the oldest error belongs to one of the following
types of print jobs, it is not deleted. Instead, it will be stored separately in error logs for each job type,
up to a maximum of 30 for each log. You can check any of these print jobs for error log information. 3
• If the main power switch is turned off, the error log is deleted.
1. Press [Menu].
2. Press the [ ] or [ ] key to select [Error Log], and then press the [OK] key.
3. Select a type of print jobs using [ ] or [ ] key, and then press the [OK] key.
4. Press the [ ] or [ ] key to select the error log you want to check.
• Press the [Escape] key until the initial screen appears after checking the log.
99
3. Printing Stored Documents
• To print files that appear in the error log, resend them after stored files have been printed or deleted.
100
4. Printing from DeskTopBinder Lite
This chapter explains how to install DeskTopBinder Lite, and using the PDF Direct Print function.
• This function is possible only when the optional PostScript 3 unit is installed.
• This function is possible for genuine Adobe PDF files only.
• Version 1.3, 1.4, 1.5, and 1.6 PDF files are compatible.
4
• PDF files created using PDF version 1.5 Crypt Filter functions or more than eight DeviceN Color Space
components cannot be printed.
• PDF files created using PDF version 1.6 watermark note functions, or extended optional contents
cannot be printed.
• PDF version 1.7 (Acrobat 8.0) files created without any functions that are exclusive to PDF version
1.7 can be printed.
• Paper size errors may occur when printing on custom size paper.
Printing Method
There are the two methods of printing the PDF files directly, either using the DeskTopBinder Lite, or entering
commands.
101
4. Printing from DeskTopBinder Lite
4 1. On the [Start] menu, point to [All Programs], [DeskTopBinder], and then click [Extended
Features Wizard].
The [Extended Features Wizard] dialog box appears.
2. Click [Start], and then click [Next>] repeatedly until the [Printing Function2] dialog box
appears.
3. In the [Printing Function2] dialog box, click [Add...].
The [PDF Direct Print Properties] dialog box appears.
4. Click [Specify...], and then enter the IP address or host name of the printer.
5. Click [OK].
The [PDF Direct Print Properties] dialog box closes.
6. Click [Next>] repeatedly until [Finish] appears.
7. Click [Finish].
Function Palette
The Function palette contains buttons for functions that are already configured through DeskTopBinder
Lite enhancement. Using these buttons, you can print Windows files, preview printouts, convert images,
and register scanners for documents without having to open DeskTopBinder Lite. You can also use these
functions simply by dragging a target file to the button corresponding to the required function and dropping
it there.
1. On the [Start] menu, point to [All Programs], [DeskTopBinder], and then click [Function
Palette].
An icon for the Function palette is added to the task tray displayed at the bottom right of the screen.
2. Right-click the new icon that has been added to the task tray, and then click [Properties...].
The [Properties] dialog box appears.
102
Printing a PDF File Directly
3. Click the [Contents] tab, select the [PDF Direct Print] check box at the center, and then click
[OK].
The [Properties] screen closes and the [PDF Direct Print] icon is added to the palette.
1. Drag the PDF file you want to print to the PDF Direct Printing icon on the Function Palette and
drop it there.
The [Output File List - PDF Direct Print] dialog box appears.
2. Highlight the PDF file you want to print, and then click [OK].
The PDF file is printed.
4
1 9
2
3 10
11
12
4
5 13
14
6 15
7
8
BRP007S
1. Setting name:
Displays the plug-in configuration name (up to 63 single byte characters)
2. Change Icon...
Changes the icon displayed on the tool bar.
3. Printer:
Displays printer's IP address or hostname.
4. Duplex
Prints on both sides of sheets.
5. Layout
Prints multiple pages on a single sheet.
103
4. Printing from DeskTopBinder Lite
4 11. Collate
Sorts printed sheets.
12. Range:
Specify which paper to print.
13. Printout paper size:
Specify the paper size you want copies to be printed onto.
14. Color/Black and White: (not supported for this printer)
Specify color or black-and-white printing.
15. Resolution:
Specify a print resolution.
Using Commands
You can print PDF files directly, using commands such as "ftp", "sftp", and "lpr".
For details about the printing commands, see “Printing Commands”. Network and System Settings Guide.
104
5. Printer Features
This chapter describes user tools in the Printer Features menu. For details on how to access Printer Features,
see "Accessing User Tools".
• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off, or the [Energy Saver] or [Clear Modes] key is pressed. 5
Changing Default Settings
BRP005S
105
5. Printer Features
BRP005S
5
Menu Protect
Using Menu Protect, you can prevent unauthenticated users from changing the user tools. Menu Protect
can be specified for each of the following user tools menus.
• Copier Features
• Fax Features
• Printer Features
• Scanner Features
For details, consult your administrator.
106
List/Test Print
List/Test Print
This section describes the user tools in the List / Test Print menu under Printer Features.
Multiple Lists
You can print the configuration page and error log.
Config. Page
You can print the machine's current configuration values.
Error Log
You can print error logs listing all errors that occurred during printing. The most recent 30 errors are
stored in the error log. If a new error is added when there are 30 errors already stored, the oldest
error is deleted. However, if the oldest error belongs to one of the following types of print jobs, it is
not deleted. Instead, it will be stored separately in error logs for each job type, up to a maximum of
30 for each log. You can check any of these print jobs for error log information.
• Sample Print
5
• Locked Print
• Hold Print
• Stored Print
The records of Auto Job Cancel and jobs canceled manually from the control panel can be printed.
Menu List
You can print a Menu List showing the machine's function menus.
PCL Config./Font Page
You can print the current configuration and installed PCL font list.
PS Config./Font Page
You can print the current configuration and installed PostScript font list.
This menu can be selected only when the optional PostScript 3 unit is installed.
PDF Config./Font Page
You can print the current configuration and installed PDF font list.
This menu can be selected only when the optional PostScript 3 unit is installed.
Hex Dump
You can print in the Hex Dump mode.
107
5. Printer Features
108
List/Test Print
• Consumption Status
Displays the status of consumable.
Paper Input
Displays settings made under Tray Paper Settings menu.
Maintenance
Displays settings made under the Maintenance menu.
System
Displays settings made under the System menu.
PCL Menu
Displays settings made under PCL Menu.
PS Menu
Displays settings made under PS Menu.
PDF Menu 5
Displays settings made under PDF Menu.
Host Interface
Displays settings made under the Host Interface menu.
When DHCP is active on the network, the actual IPv4 address, subnet mask and gateway address
appear in parentheses on the configuration page.
Interface Information
Displays the interface information.
109
5. Printer Features
Maintenance
This section describes the user tools in the Maintenance menu under Printer Features.
Menu Protect
You can select whether or not to protect menu. When you enable this setting, specify protection level.
The default setting is Level 2.
List/Test Print Lock
You can lock the [List/Test Print] menu.
The default setting is [Off].
Delete All Temporary Jobs
You can delete all print jobs temporarily stored in the machine.
Delete All Stored Jobs
5 You can delete all print jobs stored in the machine.
110
System
System
This section describes the user tools in the System menu under Printer Features.
Print Error Report
Select this to have an error report printed when a printer or memory error occurs.
The default setting is [Off].
Auto Continue
You can select this to enable Auto Continue. When it is On, printing continues after a system error
occurs.
The default setting is [Off].
Memory Overflow
Select this to have a memory overflow error report printed.
The default setting is [Do not print]. 5
Rotate by 180 Degrees
Specify whether to rotate the print image 180 degrees relative to the paper orientation.
The default setting is [Off].
Auto Delete Temporary Jobs
You can select to automatically delete print jobs temporarily stored in the machine.
The default setting is [Off].
If you select [On], you can set up to 200 hours for auto file deleting.
Auto Delete Stored Jobs
You can select to automatically delete print jobs stored in the machine.
The default setting is [On], “3” day(s).
If you select [On], you can set up to 180 days for auto file deleting.
Print Compressed Data
Specify whether to uncompress and extract compressed job data before printing it.
The supported compression format is GZIP.
The default setting is [Off].
Memory Usage
You can select the amount of memory used in Font Priority or Frame Priority, according to paper size
or resolution.
Duplex
You can select to have print on both sides of each page.
The default setting is [Off].
111
5. Printer Features
Copies
You can specify the number of print sets. This setting is disabled if the number of pages to print has
been specified with the printer driver or another command.
The number of copies can be specified from 1 to 999 by increments of one.
The default setting is “1” copies.
Blank Page Print
You can select whether or not to print blank pages.
The default setting is [On].
Pages that match one of the following conditions are identified as blank.
• There are no images.
• There are images but they are outside the printable area.
• There are only blank characters.
5 Edge Smoothing
Set this to enable Edge Smoothing.
The default setting is [On].
If Toner Saving is set to On, Edge
Smoothing is ignored even if it is set to On.
Toner Saving
Set this to enable Toner Saving.
The default setting is [Off].
Printer Language
Specify the printer language.
The default setting is [Auto].
Sub Paper Size
You can enable the Auto Substitute Paper Size (A4, LT) feature.
The default setting is [Auto].
Page Size
You can select the default paper size.
• The paper size you can select is as follows:
A4, A5 , B5 JIS, C5 Env, C6 Env, DL Env, 81/2 14, 81/2 13, 81/2 11, 81/4 13, 8 13, 71/4
101/2, 51/2 81/2, 41/8 9 1/2, 3 7/8 71/2, 16K, Custom Size
112
System
113
5. Printer Features
When set to [On], [Auto Tray Switching] is enabled and the [Auto Tray Switching] setting configured
in the printer driver is overridden.
The default setting is [Off].
114
Host Interface
Host Interface
This section describes the user tools in the Host Interface menu under Printer Features.
I/O Buffer
You can set the size of the I/O Buffer. Normally it is not necessary to change this setting.
The default setting is [128 KB].
I/O Timeout
You can set how many seconds the machine should wait before ending a print job. If data from another
port usually arrives in the middle of a print job, you should increase this timeout period.
The default setting is [15 seconds].
115
5. Printer Features
PCL Menu
This section describes the user tools in the PCL Menu under Printer Features.
Orientation
You can set the page orientation.
The default setting is [Portrait].
Form Lines
You can set the number of lines per page.
The number of lines can be specified from 5 to 128 by increments of one.
116
PCL Menu
117
5. Printer Features
PS Menu
This section describes the user tools in the PS Menu under Printer Features.
This menu appears only when the optional PostScript 3 unit is installed.
Job Timeout
You can specify how long the printer waits (in seconds) before canceling the current job when the job
is interrupted while being processed.
The default setting is [Use Driver/Command].
If you select [Use Machine Settings], enter a value between 0 and 999.
The default setting is “0”.
When set to "0", the current job will not be canceled when interrupted.
Wait Timeout
5 You can specify how long the printer waits (in seconds) before it cancels receiving the job when the
printer cannot detect the end of the job.
The default setting is [Use Driver/Command].
If you select Use Machine Settings, enter a value between 0 and 999.
The default setting is “300”.
When set to "0", the print job will not be canceled when the end of the job cannot be detected.
Data Format
You can select a data format.
The default setting is [TBCP].
This setting is not effective when operating the machine with a parallel or EtherTalk connection.
When operating the machine with a parallel connection, and also if the binary data is sent from the
printer driver, the print job is canceled.
When operating the machine with an Ethernet connection, the print job is canceled under the following
conditions:
• The printer driver data format is TBCP, and the data format selected on the display panel is Binary
Data.
• The printer driver data format is binary, and the data format selected on the display panel is
TBCP.
Resolution
You can set the print resolution in dots per inch.
The default setting is [600dpi].
Orientation Auto Detect
You can select whether or not to automatically detect print orientation.
118
PS Menu
119
5. Printer Features
PDF Menu
This section describes the user tools in the PDF Menu under Printer Features.
Change PDF Password
Set the password for the PDF file executing PDF Direct Print.
• Current Password
• New Password
• Confirm New Password
A password can be set using Web Image Monitor, but in this case the password information is sent
through the network. If security is a priority, set the password using this menu from the Control Panel.
PDF Group Password
Set the group password already specified with DeskTopBinder.
5 • Current Password
• New Password
• Confirm Password
A password can be set using Web Image Monitor, but in this case the password information is sent
through the network. If security is a priority, set the password using this menu from the Control Panel.
Reverse Order Print
When set to [On], printing starts from the last page of document.
The default setting is [Off].
Resolution
Set the print resolution in dots per inch.
The default setting is [600dpi].
Orientation Auto Detect
Select whether or not to automatically detect print orientation.
The default setting is [On].
120
6. Appendix
• Adding a virtual printer requires Administrators privilege. Log on using an account that has
Administrators privilege. 6
• The following Virtual Printer protocols are available: "TCP/IP (Unspecified, Normal)", "TCP/IP
(DIPRINT)", "TCP/IP (RHPP)", "AppleTalk", and "NetWare".
• If you select [AppleTalk] or [NetWare] in the [Protocol] list, you cannot specify a virtual printer name.
• You can specify a virtual printer name using up to 47 characters.
• You can add up to 50 virtual printers. After 51 virtual printers have been added, [Add] will no longer
be displayed.
121
6. Appendix
• You must have Administrators privilege to change the configuration of a virtual printer. Log on using
an account that has Administrators privilege.
6 5. Click [OK].
• For details about virtual printer configuration, see Web Image Monitor Help.
• [Details] is not displayed if you log on to Web Image Monitor as an administrator. To confirm a virtual
printer configuration, click [Change].
• If the virtual printers function is disabled, the list of available virtual printers is not displayed. For details
about enabling the virtual printers function, see Web Image Monitor Help.
122
Using the Virtual Printer
• You must have Administrators privilege to delete a virtual printer. Log on using an account that has
Administrators privilege.
To print directly from a specified virtual printer, assign the virtual printer in the print command. Before
printing for the first time, specify the virtual printer you want to use.
123
6. Appendix
rcp
c:> rcp [-b] \path\file name [\path name\file name...] printer's host name:
["Virtual Printer Name"]
ftp
ftp> put \path\ file name [Virtual Printer Name]
124
Specifications
Specifications
This section contains the machine's electrical and hardware specifications, including information about its
options.
Component Specifications
Interface Standard:
• Ethernet interface (100 BASE-TX/10 BASE-T)
• USB 2.0 Type A/B
Optional:
• Giga Ethernet interface (1000BASE-T/100BASE-TX/
10BASE-T) 6
• IEEE 1284 parallel interface
• IEEE 802.11a/b/g wireless LAN interface
Memory 640 MB
125
6. Appendix
Component Specifications
• Devices corresponding to USB 2.0 Standard
• When using Mac OS, use only the standard USB Interface. The optional USB interface board is not
supported.
• When using Mac OS, the USB interface is supported only under Mac OS 9 or later.
• When using the USB Interface (Standard) with Mac OS 10.3.3 or later, USB2.0 is supported.
126
Trademarks
Trademarks
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, PageMaker, PostScript, and Reader are either registered trademarks
or trademarks or trademarks of Adobe Systems Incorporated in the United States and/or countries.
Apple, AppleTalk, EtherTalk, Macintosh, Mac OS, and Mac OS X are registered trademarks of Apple
Inc., registered in the U.S. and other countries.
IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States
or other countries.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Monotype is a registered trademark of Monotype Imaging, Inc.
Netware, IPX, IPX/SPX are either registered trademarks or trademarks of Novell, Inc.
PCL® is a registered trademark of Hewlett-Packard Company.
UNIX is a registered trademark of The Open Group.
Other product names used herein are for identification purposes only and might be trademarks of their 6
respective companies. We disclaim any and all right to those marks.
The proper names of the Windows operating systems are as follows:
*The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
*The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
*The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
*The product names of Windows Server 2003 are as follows:
127
6. Appendix
128
INDEX
A Delete all stored jobs..........................................110
Delete all temporary jobs...................................110
About This Machine.................................................5
DeskTopBinder Lite..............................................101
Accessing user tools............................................105 Enhancements.................................................................102
Advanced printing.................................................65 Function palette...............................................................102
Append CR to LF.................................................117 Install................................................................................101
Auto continue.......................................................111 Display...................................................................75
Auto delete stored jobs.......................................111 Downloading the printer driver............................14
Auto delete temporary jobs................................111 Duplex..................................................................111
B E
Banner page..........................................................29 Edge smoothing................................................... 112
Bidirectional communication..........................35, 36 Edge to edge print..............................................113
Blank page print..................................................112 Envelopes...............................................................49
Both sides of sheets...............................................58 Error log.........................................................99, 107
Bypass tray.............................................................41 Escape key.............................................................76
envelopes...........................................................................49 Ext. A4 width.......................................................117
OHP transparencies..........................................................47
Extend auto tray switching..................................113
setting custom size paper..................................................45
Setting the paper size........................................................43 F
thick paper..........................................................................47
Facsimile Reference.................................................5
thin paper...........................................................................47
Finishing menu.......................................................65
Bypass tray priority.............................................113
Font Manager........................................................37
C Font number.........................................................116
Cancel....................................................................97 Font pitch..............................................................116
Mac OS..............................................................................98 Font source..........................................................116
Windows............................................................................97 Form feed.........................................................28, 67
Change PDF password.......................................120 Form lines.............................................................116
Changing default settings...................................105 Frequently used print methods..............................57
Changing the port setting.....................................19 H
Classification code................................................71
Classification code, configuring...........................72 Hex dump............................................................107
Classification code, for a print job.......................72 Hold print.........................................................87, 94
Collate....................................................................65 Host interface.......................................................115
Combining multiple pages into single page........60 How to read this manual.........................................8
Config. page.......................................................107 I
Confirming the connection method......................11 I/O buffer............................................................115
Copies..................................................................112 I/O timeout..........................................................115
Copy Reference.......................................................5 Important..................................................................7
Courier font..........................................................117 Installing the printer driver....................................14
D IPP...........................................................................17
Data format..........................................................118 J
Default printer lang.............................................113 Job timeout...........................................................118
129
Jobreset..................................................................75 PCL..........................................................................14
L PCL config./ font page.......................................107
PCL menu.............................................................116
Laws and regulations...............................................9 PDF config./font page........................................107
Legal prohibition......................................................9 PDF direct print...........................................101, 103
Letterhead..............................................................55 PDF Direct Print
Letterhead setting................................................113 PDF direct print properties..............................................103
List / test print......................................................107 using commands.............................................................104
List / test print lock..............................................110 PDF group password..........................................120
Local connection....................................................13 PDF menu.............................................................120
Locked print............................................................94 Point size..............................................................116
LPR port...................................................................21 PostScript 3............................................................14
M PostScript 3 Supplement.........................................5
Print compressed data........................................111
Maintenance.......................................................110 Print error report..................................................111
Making option settings..........................................35 Print job function....................................................77
Making printer default settings.............................39 Print job screen......................................................77
Making printer settings..........................................40 Printer driver.......................................14, 25, 27, 72
Memory overflow................................................111 Printer driver setting screen...................................39
Memory usage....................................................111 Printer language..................................................112
Menu......................................................................75 Printer Reference......................................................5
Menu list...............................................................107 Printing the configuration page..........................107
Menu protect..............................................106, 110 Prt.jobs....................................................................75
Model-specific information...................................10 PS config./font page..........................................107
Multiple lists.........................................................107 PS menu...............................................................118
N Q
NetWare................................................................27 Quick install...........................................................14
Network and System Settings Guide.....................5 Quitting user tools...............................................105
Network connection..............................................11
Network printer...............................................12, 25 R
Note..........................................................................8 RAM disk..............................................................113
Notice.......................................................................7 Reading the display and using keys....................75
O Remote printer........................................................27
Resetting the printer...............................................29
OK key...................................................................76 Resolution...........................................117, 118, 120
Operational status or messages...........................75 Reverse order print..............................................120
Orientation...........................................................116 Rotate by 180 degrees......................................111
Orientation auto detect..............................118, 120
Other manuals.........................................................5 S
P Sample print...........................................................94
Scanner Reference..................................................5
Page size..............................................................112 Scroll keys..............................................................76
PageMaker............................................................38 Security Reference...................................................5
Parallel connection................................................33
130
Selection keys........................................................76 WSD port...............................................................23
SmartDeviceMonitor for Client.............................15
SmartDeviceMonitor for Client port.....................15
Specifications......................................................125
Spool printing........................................................70
Standard printing...................................................57
Standard TCP/IP port...........................................20
Stored print............................................................94
Sub paper size....................................................112
Symbol set............................................................117
Symbols....................................................................8
System..................................................................111
T
TCP/IP....................................................................16
Toner saving........................................................112
Trademarks..........................................................127
Tray switching......................................................113
Trouble Shooting.....................................................5
Types of combined printing..................................61
Types of duplex printing.......................................60
U
USB connection.....................................................30
User ID....................................................................94
Using one click presets..........................................63
V
Virtual printer.......................................................121
Adding.............................................................................121
Changing.........................................................................122
Confirming.......................................................................122
Deleting............................................................................ 123
Printing.............................................................................123
W
Wait timeout........................................................118
Web Image Monitor.............................................72
Windows 2000.....................................................30
Windows printing port..........................................11
Windows Server 2003.........................................30
Windows Server 2003 R2...................................30
Windows Server 2008.........................................31
Windows Vista.......................................................31
Windows XP...........................................................30
131
MEMO
D468-6701
USA
EN
Quick Reference Fax Guide
1. Receive File indicator 10. Indicators 19. {Start} key 25. Data In indicator
To select an item on the display… 2. Communicating indicator 11. Display panel 20. {#} key (enter key) 26. Quick Dial keys
3. {Memory Trans.} key 12. Selection keys 21. Number keys 27. {Resolution} key
• Use {U} or {T} to scroll the display. 4. {On Hook Dial} key 13. Scroll keys 22. {OK} key 28. {Pause/Redial} key
• Press the {OK} key to set the currently 5. {Facsimile} key 14. {User Tools/Counter} key Press to set a selected item or an 29. User Function keys
selected item and to proceed to the next Press to switch to the facsimile mode. 15. {Clear/Stop} key entered numeric value. You can assign frequently-used
display. 6. {Search Destination} key 16. {Clear Modes} key 23. {Escape} key functions to these keys. How to cancel a transmission... (1. Transmission)
7. {Check Destination} key Press to clear the current settings. Press to cancel operation or return to
8. {Job Information} key 17. Main power indicator the previous display. Memory + Immediate
9. Function keys 18. Operation switch 24. {Lighter} key, {Darker} key Before the original is scanned = before pressing the {Start} key:
How to send a fax... (1. Transmission)
A Press the {Clear Modes} key.
A Specify a transmission mode by pressing the
{Memory Trans.} key: While the original is being scanned = after pressing the {Start} key:
• Memory Transmission, or A Press the {Clear/Stop} key.
• Immediate Transmission 5 This button needs to be selected as first step Memory
B Place the original. While the original is being transmitted:
A Press the {Clear/Stop} key.
• Exposure glass 1 2 3 4 6 7 8 9 10 11 12 13 14 15 16 17 B Select the file you want to cancel, and then press [Stop TX].
(face down)
C Press [Delete].
D Press the {Escape} key.
1 Transmission
2 Other Transmission Features
3 Reception
4 Confirming Communication Information
5 Fax via Computer
6 Fax Features
7 Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................7
Notice..................................................................................................................................................................9
Important.........................................................................................................................................................9
How to Read This Manual...............................................................................................................................10
Symbols........................................................................................................................................................10
Names of Major Functions..........................................................................................................................10
Notes............................................................................................................................................................10
Laws and Regulations......................................................................................................................................11
Legal Prohibition..........................................................................................................................................11
Important Safety Instructions.......................................................................................................................11
Notes to users in the United States of America..........................................................................................12
Notes to users in Canada...........................................................................................................................13
Reading the Display.........................................................................................................................................14
Reading the Display Panel and Using Keys...............................................................................................14
1. Transmission
Transmission Modes.........................................................................................................................................17
Selecting Type of Transmission...................................................................................................................18
Memory Transmission..................................................................................................................................19
Immediate Transmission...............................................................................................................................24
IP-Fax Functions................................................................................................................................................27
Terminology..................................................................................................................................................29
Notes on Using IP-Fax.................................................................................................................................29
Functions Not Available for IP-Fax Transmission......................................................................................30
Internet Fax Functions.......................................................................................................................................31
Notes on Using Internet Fax........................................................................................................................32
Functions Not Available for Internet Fax Transmission.............................................................................33
Functions Not Available for Internet Fax Reception..................................................................................34
E-mail Subject...............................................................................................................................................34
T.37 Full Mode.............................................................................................................................................34
Placing Originals..............................................................................................................................................36
Acceptable Original Sizes..........................................................................................................................37
Paper Size and Scanned Area...................................................................................................................38
Detecting Blank Sheet..................................................................................................................................39
1
Scan Settings....................................................................................................................................................41
Original Type...............................................................................................................................................41
Resolution.....................................................................................................................................................42
Image Density (Contrast).............................................................................................................................43
Mixing Scan Settings for a Multiple Page Original..................................................................................44
Specifying a Destination..................................................................................................................................46
Sending over a Fax Line..............................................................................................................................46
Sending by IP-Fax........................................................................................................................................49
Sending to an E-mail Address.....................................................................................................................53
Using the Quick Dial Keys...........................................................................................................................58
Checking the Specified Destination............................................................................................................60
Redial............................................................................................................................................................62
Preventing Transmission to the Wrong Destination...................................................................................63
Programming Destinations in the Address Book............................................................................................66
Registering a Fax Destination......................................................................................................................66
Changing a Fax Destination.......................................................................................................................68
Deleting a Fax Destination..........................................................................................................................71
Programming Destinations from Check Destination Screen.....................................................................72
Programming Destinations from Redial Screen.........................................................................................73
Searching for a Destination in the Address Book..........................................................................................75
Search by Name..........................................................................................................................................75
Search by Destination List............................................................................................................................77
Search by Registration Number.................................................................................................................79
Search by Fax Number...............................................................................................................................80
Search by E-mail Address...........................................................................................................................82
Search by IP-Fax Destination......................................................................................................................84
Search by LDAP Server...............................................................................................................................86
On Hook Dial...................................................................................................................................................90
Manual Dial......................................................................................................................................................92
Canceling a Transmission................................................................................................................................93
Before the Original Is Scanned..................................................................................................................93
While the Original Is Being Scanned.........................................................................................................93
While the Original Is Being Transmitted....................................................................................................94
2
Before the Transmission Is Started..............................................................................................................95
Checking the Storage Result (Memory Storage Report)...............................................................................97
Setting Transmission Function Defaults (Home Position)...............................................................................98
2. Other Transmission Features
Sending at a Specific Time (Send Later)........................................................................................................99
Sender Settings..............................................................................................................................................101
E-mail Options...............................................................................................................................................104
Entering the Subject...................................................................................................................................104
Requesting a Reception Notice................................................................................................................105
Fax Header Print............................................................................................................................................108
Label Insertion................................................................................................................................................110
Setting SUB Codes for Transmission............................................................................................................112
Setting a Password....................................................................................................................................114
Setting SEP Codes for Reception..................................................................................................................116
Entering a Password..................................................................................................................................118
SEP Code RX Reserve Report...................................................................................................................118
SEP Code RX Result Report.......................................................................................................................118
Two-Sided Transmission (Double-Sided Transmission)..............................................................................120
3. Reception
Types of Reception........................................................................................................................................123
Immediate Reception.................................................................................................................................123
Memory Reception....................................................................................................................................124
Substitute Reception..................................................................................................................................124
Reception Modes...........................................................................................................................................128
Auto Switch................................................................................................................................................128
Manual Reception.....................................................................................................................................128
Auto Reception..........................................................................................................................................129
Switching the Reception Mode................................................................................................................129
Receiving E-mail.............................................................................................................................................131
Receiving Internet Fax Documents...........................................................................................................132
Mail to Print................................................................................................................................................135
Reception Functions.......................................................................................................................................137
Forwarding Received Documents............................................................................................................137
3
SMTP Reception Using Internet Fax.........................................................................................................138
JBIG Reception..........................................................................................................................................141
Auto Fax Reception Power-Up.................................................................................................................141
Printing Options.............................................................................................................................................143
Print Completion Beep..............................................................................................................................143
Checkered Mark.......................................................................................................................................143
Center Mark...............................................................................................................................................143
Reception Time..........................................................................................................................................144
Two-Sided Printing....................................................................................................................................144
Combine Two Originals............................................................................................................................146
Page Separation and Length Reduction .................................................................................................146
TSI Print (Transmitting Subscriber Identification Print).............................................................................147
If There Is No Paper of the Correct Size..................................................................................................148
4. Confirming Communication Information
Printing a List of Files in Memory (Print TX Standby File List)......................................................................151
Printing a File from Memory..........................................................................................................................153
Checking the Transmission Result (TX File Status)........................................................................................155
Confirming on Display..............................................................................................................................155
Confirming by Report................................................................................................................................156
Confirming by E-mail.................................................................................................................................157
Confirming by Report and E-mail.............................................................................................................158
Communication Result Report (Memory Transmission)..........................................................................158
Immediate TX Result Report (Immediate Transmission)...........................................................................159
Communication Failure Report.................................................................................................................159
Checking the Reception Result (RX File Status)............................................................................................161
Confirming on Display..............................................................................................................................161
Confirming by Report................................................................................................................................162
Printing the Journal.........................................................................................................................................163
Journal........................................................................................................................................................164
Transmitting Journal by E-mail..................................................................................................................166
Printing a File Received with Memory Lock.................................................................................................168
5. Fax via Computer
Sending Fax Documents from Computers....................................................................................................171
4
Before Use.................................................................................................................................................172
Using the Software....................................................................................................................................172
Installing Individual Applications.............................................................................................................174
Setting LAN-Fax Driver Properties...........................................................................................................175
Basic Transmission.....................................................................................................................................176
Specifying Options....................................................................................................................................180
Checking Transmission Using LAN-Fax Driver........................................................................................183
Confirming Transmission Results by E-mail..............................................................................................183
LAN-Fax Result Report..............................................................................................................................184
Printing and Saving...................................................................................................................................185
Editing Address Book................................................................................................................................185
Editing Fax Cover Sheets..........................................................................................................................187
Managing Facsimile Functions Using SmartDeviceMonitor for Admin................................................189
Using the Machine's Address Book as the LAN-Fax Destination List....................................................189
LAN-Fax Operation Messages................................................................................................................191
Viewing Fax Information Using a Web Browser.........................................................................................192
Viewing, Printing, and Deleting Received Fax Documents Using Web Image Monitor.....................192
Programming Destination Information from Web Browser....................................................................194
6. Fax Features
Accessing User Tools.....................................................................................................................................197
Changing Default Settings........................................................................................................................197
Quitting User Tools....................................................................................................................................198
General Settings/Adjust...............................................................................................................................199
Reception Settings..........................................................................................................................................201
E-mail Settings................................................................................................................................................203
IP-Fax Settings................................................................................................................................................205
Administrator Tools........................................................................................................................................208
Memory File Transfer.....................................................................................................................................212
Reception File Setting....................................................................................................................................214
Specifying Automatic Deletion of Incoming Faxes when an Error Occurs...........................................215
Reception Report e-mail............................................................................................................................216
Registering Fax Information..........................................................................................................................217
Registering Fax Information......................................................................................................................218
5
Deleting Fax Information...........................................................................................................................220
Forwarding.....................................................................................................................................................222
Programming an End Receiver.................................................................................................................223
Quitting the Forwarding Function.............................................................................................................224
Forwarding Mark......................................................................................................................................225
Parameter Settings.........................................................................................................................................226
User Parameter List....................................................................................................................................226
Changing the User Parameters................................................................................................................234
Printing the Parameter Settings List...........................................................................................................235
Home Position................................................................................................................................................237
Home Position Parameter List....................................................................................................................237
Changing the Home Position....................................................................................................................238
Program Special Sender...............................................................................................................................241
Authorized Reception................................................................................................................................242
Forwarding.................................................................................................................................................243
Memory Lock.............................................................................................................................................243
2 Sided Print...............................................................................................................................................244
Programming/Changing Special Senders..............................................................................................244
Programming Initial Set Up of a Special Sender....................................................................................249
Deleting a Special Sender........................................................................................................................250
Printing Special Sender List.......................................................................................................................251
7. Appendix
Optional Equipment.......................................................................................................................................253
Handset......................................................................................................................................................253
Specifications.................................................................................................................................................254
Specifications Required for the Internet Fax Destination Machines......................................................256
Maximum Values...........................................................................................................................................258
Trademarks.....................................................................................................................................................260
INDEX...........................................................................................................................................................263
6
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
8
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
9
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
This section tells you the names of this machine's major functions.
• Internet Fax (by specifying an e-mail address) Internet Fax
• Internet Fax (by specifying an IP address) IP-Fax
Notes
10
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
When using your telephone equipment, basic safety precautions should always be followed to reduce the
risk of fire, electric shock and injury to persons, including the following:
• Do not use this product near water, for example, near a bath tub, wash bowl, kitchen sink or laundry
tub, in a wet basement or near a swimming pool.
• Avoid using a telephone during an electrical storm. There may be a remote risk of electric shock from
lightning.
• Do not use a telephone in the vicinity of a gas leak to report the leak.
• Use only the power cord and batteries indicated in this manual. Do not dispose of batteries in a fire.
They may explode. Check with local codes for possible special disposal instructions.
Save these instructions.
11
Conserver ces instructions.
FCC Requirements
1. This equipment complies with Part 68 of the FCC rules and requirements adopted by the ACTA. On
the cover of this equipment is a label that contains, among other information, a product identifier in
the format US:AAAEQ##TXXXXX. If requested, this number must be provided to the telephone
company.
2. This equipment uses the RJ11C USOC jack.
3. A plug and jack used to connect this equipment to the premises wiring and telephone network must
comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant
telephone cord and modular plug is provided with this product. It is designed to be connected to a
compatible modular jack that is also compliant. See installation instructions for detail.
4. The REN is used to determine the number of devices that may be connected to a telephone line.
Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming
call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the
number of devices that may be connected to a line, as determined by the total RENs, contact the local
telephone company. The REN for this product is part of the product identifier that has the format
US:AAAEQ##TXXXXX. The digits represented by ## are the REN without a decimal point (e.g., 03
is a REN of 0.3).
5. If this equipment causes harm to the telephone network, the telephone company will notify you in
advance that temporary discontinuance of service may be required. But if advance notice is not
practical, the telephone company will notify the customer as soon as possible. Also, you will be
advised of your right to file a complaint with the FCC if you believe it is necessary.
6. The telephone company may make changes in its facilities, equipment, operations or procedures that
could affect the operation of the equipment. If this happens the telephone company will provide
advance notice in order for you to make necessary modifications to maintain uninterrupted service.
7. If trouble is experienced with this equipment, for repair or warranty information, please contact Ricoh
Americas Corporation Customer Support Department at 1-800-FASTFIX. If this device is causing
problems with your telephone network, the telephone company may request that you disconnect the
equipment until the problem is resolved.
8. In the event of operation problems (document jam, copy jam, communication error indication), see
the manual provided with this machine for instruction on resolving the problem.
9. Connection to party line service is subject to state tariffs. Contact the state public utility commission,
public service commission or corporation commission for information.
12
10. If your home has specially wired alarm equipment connected to the telephone line, ensure the
installation of this equipment does not disable your alarm equipment. If you have questions about
what will disable alarm equipment, consult your telephone company or a qualified installer.
WHEN PROGRAMMING EMERGENCY NUMBERS AND/OR MAKING TEST CALLS TO
EMERGENCY NUMBERS:
1. Remain on the line and briefly explain to the dispatcher the reason for the call before hanging
up.
2. Perform such activities in the off-peak hours, such as early morning hours or late evenings.
Notice about the Telephone Consumer Protection Act (Valid in USA only)
The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or
other electronic device, including FAX machines, to send any message unless such message clearly contains
in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date
and time it is sent and an identification of the business or other entity, or other individual sending the message
and the telephone number of the sending machine or such business, other entity, or individual. (The
telephone number provided may not be a 900 number or any other number for which charges exceed
local or long-distance transmission charges.)
In order to program this information into your FAX machine, you should complete the following steps: Follow
the FAX HEADER programming procedure in the Programming chapter of the operating instructions to enter
the business identification and telephone number of the terminal or business. This information is transmitted
with your document by the FAX HEADER feature. In addition to the information, be sure to program the
date and time into your machine.
13
Reading the Display
This section explains how to use the keys on the control panel and screen items.
The display guides you through operations, shows messages, machine status, and destinations registered
in the destination lists.
If you press the [Clear Modes] key during operation, the standby screen appears.
Press the [OK] key to complete the settings.
Press the [Escape] key to return to the previous screen.
• This machine automatically returns to standby mode if you do not use the machine for a certain period
of time. You can select the period using the Facsimile Auto Reset Timer in System Settings.
• The Fax Features menu includes a user parameter setting (switch 17, bit 3) that enables you to
configure the machine to return to standby mode whenever it finishes scanning an original, see
“Parameter Settings”.
• To return to the standby screen manually, do one of the following:
• If you have placed the original in the Auto Document Feeder (ADF) and have not pressed the
[Start] key, remove the original.
• If you have not placed an original, press the [Clear Modes] key.
• If you are in User Tools mode, press the [User Tools/Counter] key.
BRJ023S
1. Selection keys
Correspond to items at the bottom line on the display.
14
Example: The standby display
• When the instruction “Press [ ]” appears in this manual, press the left selection key.
• When the instruction “Press [Tone]” appears in this manual, press the middle selection key.
• When the instruction “Press [TX Mode]” appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.
3. [OK] key
Press this to set numeric values, make settings, or select an entered item.
4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ], [ ], [ ], or [ ] appears in this manual, press the scroll key of the same direction.
BAM005S
15
• p.203 "E-mail Settings"
• p.205 "IP-Fax Settings"
16
1. Transmission
This section explains basic transmission operations such as specifying a transmission mode or a destination.
1
Transmission Modes
There are two types of transmission: Memory Transmission and Immediate Transmission.
• It is recommended that you call the receivers and confirm with them when sending important
documents.
Memory Transmission
Transmission starts automatically after the original is stored in memory. This is convenient when you
are in a hurry and want to take the document away with you. You can also send the same original to
several destinations. For details about a broadcast and Parallel Memory Transmission, see “Parallel
Memory Transmission” and “Broadcast sequence”.
BBB013S
Immediate Transmission
Immediately dials the destination number, and while scanning the original, sends to it. It is very
convenient when you want to send an original quickly or when you want to check the destination you
are sending to. When using this type of transmission, the original is not stored in memory. You can
only specify one destination.
BBB014S
Normally the machine is in the Memory Transmission mode. To switch the mode to Immediate Transmission,
press the [Memory Trans.] key.
17
1. Transmission
BRJ024S
Check the indicator on the operation panel to see which mode is currently active.
If it is not lit, Immediate Transmission mode is set.
• You can set the machine to enter Memory Transmission mode or Immediate Transmission mode right
after the power is turned on or whenever the [Clear Modes] key is pressed. See “Setting Transmission
Function Defaults (Home Position)”.
You can select the transmission type: standard fax, IP-Fax, or Internet Fax.
• To select IP-Fax destinations or Internet Fax destinations, the Hard Disk Drive Option and printer/
scanner functions must be installed. The display differs depending on whether or not the Hard Disk
Drive Option and printer/scanner functions are installed.
When sending over a fax line
Press [ ] to display in the destination display column.
18
Transmission Modes
1
When sending by IP-Fax
To send by IP-Fax, specify the protocol. After you specify the protocol, appears in the destination
display column.
If you are using a gatekeeper server, select H.323.
If you are using a SIP server, select SIP.
• For details about IP-Fax or Internet Fax transmission, see “IP-Fax Functions” and “Internet Fax
Functions”.
Memory Transmission
Memory Transmission mode has standard fax, Internet Fax, and IP-Fax.
• If there is a power failure (the main power switch is turned off) or the machine is unplugged for about
twelve hours, all the documents stored in memory are deleted. As soon as the main power switch is
turned on, the Power Failure Report is printed to help you check the list of deleted files. Simply turning
off the power by pressing the Operation switch does not delete stored documents. See “Turning Off
the Main Power / In the Event of Power Failure”, Troubleshooting.
• If memory is full (0% appears on the top right corner of the display), Memory Transmission is disabled.
Use Immediate Transmission instead.
19
1. Transmission
BRJ024S
If you make a mistake, press the [Clear/Stop] key, and then enter the correct number.
5. When sending the same original to several destinations (broadcasting), press [Add Dest]
to specify the destinations.
You do not have to press [Add Dest] when adding a destination using the destination list.
6. Specify the next destination.
20
Transmission Modes
A fax number, e-mail address and IP-Fax destination can be specified simultaneously.
7. Press the [Start] key.
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”. 1
• If the combined total number of programmed destinations exceeds the maximum value, only
Immediate Transmission is possible.
• For the maximum values of the following items, see “Maximum Values”.
• Number of documents you can store in memory for Memory Transmission
• Number of pages you can store in memory (using A4 Standard <ITU-T 1 Chart>)
• Number of destinations you can specify per file
• Number of destinations you can specify for all files (including files in memory)
21
1. Transmission
1
7. Press the [ ] key.
The machine dials the destination and starts transmission.
• Standard Memory Transmission is used instead of Parallel Memory Transmission in the following
cases:
• When the line is busy and could not be connected to
• With Send Later
• When you store an original for Memory Transmission while another communication is in progress
• When two or more destinations are specified
• When an original is placed on the exposure glass, and then sent
• You can turn this function on or off with the User Parameter (switch 07, bit 2) in the Fax Features menu,
see “Parameter Settings”.
• Standard Memory Transmission may be used instead of Parallel Memory Transmission if there is not
enough free memory left.
• If you use this function, the Memory Storage Report will not be printed.
• If the [Clear/Stop] key is pressed, the original jams or memory runs out, Parallel Memory Transmission
will stop. The Communication Result Report is printed and files are deleted.
• When using Parallel Memory Transmission, only the page number is printed on the header of the fax,
the total number of originals is not automatically printed.
22
Transmission Modes
Automatic Redial
If a fax document could not be sent because the line was busy or an error occurred during transmission,
redial is attempted at five-minute intervals up to five times.
If redialing fails after four redials, the machine cancels the transmission and prints a Communication Result 1
Report or Communication Failure Report.
• If there are a large number of files stored in memory, documents might not be sent in the order they
were scanned.
Dual Access
The machine can scan other documents into memory even while sending a fax document from memory,
receiving a document into memory, or automatically printing a report.
Since the machine starts sending the second document immediately after the current transmission ends, the
line is used efficiently.
• During Immediate Transmission or when in User Tools mode, the machine cannot scan an original.
Broadcasting sequence
Use the broadcasting function to send the same original to multiple destinations simultaneously.
To specify multiple destinations, specify the first destination, and then specify the next destination by pressing
[Add Dest].
If you dial several destinations for the same document (broadcasting), the documents are sent in the order
in which they were dialed. If the fax document could not be transmitted, the machine redials that destination
after the last destination specified for broadcasting. For example, if you specify four destinations, A through
D, for broadcasting, and if the lines to destinations A and C are busy, the machine dials the destinations
in the following order: A, B, C, D, A, and C.
To check the transmission progress, print the TX file list. See “Printing a List of Files in Memory (Print TX
Standby File List)”.
If you specify a second transmission while broadcasting to several destinations, faxes are transmitted
alternately to each remaining destination in the current and second broadcast.
For example, if you specify a broadcast to destinations A and B, and then specify a broadcast to destinations
C and D while transmission to destination A is in progress, the machine sends the faxes in the following
order: A, C, B, and then D.
If the previous file and the next file are both on standby, these are also sent in the same order.
23
1. Transmission
• To avoid accidentally specifying multiple destinations, you can disable broadcasting. You cannot
specify group destinations if you disable broadcasting. You can specify only one address at a time.
1 For details about how to disable broadcasting, contact your service representative.
• The Fax Features menu includes a user parameter setting (switch 17, bit 2) that enables you to
configure the machine to force the user to press [Add Dest] whenever s/he specifies a destination
using a destination key. This prevents users accidentally sending documents to the wrong destination.
See “Parameter Settings”.
• When this happens, only the scanned pages are sent. If you want to delete the scanned pages and
cancel transmission in this case, contact your service representative.
• For this function to work, the other machine must have ECM.
• This function is not available with Internet Fax.
Immediate Transmission
Immediate Transmission is possible with standard fax transmission and IP-Fax transmission.
• Internet Fax is performed using only Memory Transmission, which automatically starts transmission
after storing documents in memory.
24
Transmission Modes
• If you specify an Internet Fax destination after selecting Immediate Transmission, the mode
switches to Memory Transmission.
• If you try to select Immediate Transmission after specifying an Internet Fax destination, the "Dest.
and functions that could not be specified on immediate transmission is already selected."
message appears. When this happens, press [Exit].
1
• Group cannot be used for Immediate Transmission. You cannot send the same document to multiple
destinations (broadcasting).
• If you specify a second destination or a group after selecting Immediate Transmission, the mode
switches to Memory Transmission.
• If you try to select Immediate Transmission after specifying multiple destinations or a group, the
"Dest. and functions that could not be specified on immediate transmission is already selected."
message appears. When this happens, press [Exit].
BRJ024S
If it is lit, Memory Transmission mode is selected. Press the [Memory Trans.] key.
2. Place the original into the ADF.
3. Select the scan settings you require.
For details about the scan settings, see “Scan Settings”.
4. Using the number keys or a Quick Dial key, specify a destination.
If you make a mistake, press the [Clear/Stop] key, and then enter the correct number.
5. Press the [Start] key.
The machine dials a destination.
25
1. Transmission
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• Documents are not stored in memory.
1
• p.41 "Scan Settings"
• p.58 "Using the Quick Dial Keys"
26
IP-Fax Functions
IP-Fax Functions
The IP-Fax function sends or receives documents between two facsimiles directly via a TCP/IP network.
This function has the following advantages and is suitable for communication within the same LAN: 1
• Reducing communication costs
• Communicating between IP-Faxes at higher speed than by standard fax
IP-Fax uses SIP and H.323 as the network protocol.
Specify an IP address or host name instead of a fax number for sending. When using a gatekeeper, specify
an alias telephone number. When using a SIP server, you can send by specifying SIP user name. Specify
addresses of the gatekeeper or SIP server (proxy server, registrar server, redirect server) as appropriate
under H.323 Settings, SIP Settings, or Gateway Settings in the Fax Features menu.
You can also transmit to a G3 facsimile connected to the public switched telephone network (PSTN) via a
gateway (T.38-compliant).
You can receive IP-Faxes in the same manner as standard faxes. For details about reception, see “Types
of Reception”.
27
1. Transmission
BBB015S
• To use IP-Fax functions, the Hard Disk Drive Option and printer/scanner functions must be installed.
• To use IP-Fax functions, this machine must be connected to a LAN and its IP-Fax settings correctly
specified under IP-Fax Settings in Fax Features. For details about these settings, see “IP-Fax Settings”.
• Before using this function, configure the network in the System Settings menu. For details about the
required settings, see “Connecting the Machine”, Network and System Settings Guide.
28
IP-Fax Functions
• SIP allows you to transmit and receive documents over an IPv6 network.
• For details about H.323 Settings, SIP Settings, or Gateway Settings, see “IP-Fax Settings”.
• This function supports both IPv4 and IPv6 addresses.
1
• p.123 "Types of Reception"
• p.205 "IP-Fax Settings"
Terminology
29
1. Transmission
This section tells you which functions are not available for IP-Fax transmission.
You can use the following functions with standard fax transmission, but not IP-Fax transmission:
• On Hook Dial
• Manual Dial
30
Internet Fax Functions
BHP003S
• To use Internet Fax functions, the Hard Disk Drive Option and printer/scanner functions must be
installed.
• To use Internet Fax functions, this machine must be connected to a LAN and set up correctly under
“System Settings”. For details about the required settings, see “Connecting the Machine”, Network
and System Settings Guide.
• To send Internet Fax documents, in the Fax Features menu, under E-mail Settings, set [Internet Fax
Settings] to [On]. However, documents can still be forwarded or delivered to Internet Fax destinations
even if [Off] is selected. See “E-mail Settings”.
• To receive Internet Fax documents, in the System Settings menu, under File Transfer, set Fax E-mail
Account to [Receive]. See “System Settings”, Network and System Settings Guide.
• The Internet Fax function supported by this machine is compliant with ITU-T Recommendation T.37.
31
1. Transmission
• You can receive e-mail messages with an attached TIFF-F image from computers.
• Though Internet Fax documents are normally sent via an SMTP server, you can also send Internet Fax
documents directly to their destinations without going through an SMTP server. To do this, set whether
1 or not to bypass the SMTP server from [TX Mode]. For details about using this function, see “Bypassing
the SMTP server”.
• When sending Internet Fax documents, you can specify “Attach Subject” and “Return Receipt” in [TX
Mode]. For details about setting these options, see “E-mail Options”.
• You can limit the size of transmitted e-mail messages in “Maximum E-mail Size” of “Fax Features”.
For details about the setting, see “E-mail Settings”.
• See “Received images” for how e-mail is actually received by the computer.
• For details about how to confirm the transmission result, see “Checking the Transmission Result (TX
File Status)”.
• If you send Internet Fax documents specifying a user code, and the e-mail address is set as the routing
destination of the specified user code, a Communication Result Report is sent after the transmission is
completed. This makes it possible to verify the result of a transmission.
• The CC function is disabled.
• This function supports both IPv4 and IPv6 addresses.
32
Internet Fax Functions
• The level of security for Internet communications is low. It is recommended that you use the telephone
network for confidential communications.
• Voice communication is not supported over a LAN.
• Internet Fax delivery might be delayed due to network congestion. Use Internet Fax transmission that
bypasses the SMTP server, a public telephone line fax, or IP-Fax whenever communication time is a
1
concern. For details about the SMTP server-bypass function, see “Bypassing the SMTP server”.
• If there is a power failure (the main power switch is turned off) or the machine is unplugged for about
twelve hours, all the documents stored in memory are deleted. As soon as the main power switch is
turned on, the Power Failure Report is printed to help you check the list of deleted files. Simply turning
off the power by pressing the operation switch does not delete stored documents. See “Turning Off
the Main Power / In the Event of Power Failure”, Troubleshooting.
• You may not be able to send large files as e-mail, depending on e-mail environment conditions.
• When available memory is low, you may not be able to send Internet Fax documents.
• Because the machine sends documents as e-mail messages with an attached TIFF-F image, viewer
applications are required in order to view documents when they are received on a computer.
• With a large volume of document, it may take some time before transmission starts. This is due to the
time the machine requires to convert the data in memory.
• POP before SMTP is available in IPv4 environments only.
• For details about the T.37 full mode, see “T.37 Full Mode”.
This section tells you which functions are not available for Internet Fax transmission.
The following functions are supported with standard fax transmission, but not with Internet Faxing.
• Immediate Transmission
• Transmission by SUB Code
• On Hook Dial
• Manual Dial
• JBIG Transmission
• ECM (Error Correction Mode)
• Memory File Transfer
33
1. Transmission
This section tells you which functions are not available for Internet Fax reception.
1 The following functions are available for standard fax reception, but not for Internet Faxing:
• Memory Lock Reception
• SEP Code reception
• Authorized Reception
E-mail Subject
If you do not enter a subject when sending e-mail, a subject will be auto generated. This section explains
how to specify the content of auto-generated subjects.
Subjects differ depending on Stamp Sender Name settings. For details about using the Stamp Sender Name
function, see “Sender Settings”.
When Stamp Sender Name is set to on:
From Sender Name(Fax Message NO.xxxx)
When Stamp Sender Name is set to off:
• If Own Fax Number and Own Name are programmed:
From “Own Fax Number”(“Own Name”)(Fax Message NO.xxxx)
• If only Own Fax Number is programmed:
From “Own Fax Number”(Fax Message NO.xxxx)
• If only Own Name is programmed:
From “Own Name”(Fax Message NO.xxxx)
• If neither Own Fax Number nor Own Name are programmed:
Fax Message NO.xxxx
This machine is T.37 full mode compatible. T.37 full mode is an international standard for Internet Fax
transmission. (ITU-T Recommendation, RFC2532)
34
Internet Fax Functions
When an Internet Fax communication is made between T.37 full mode compatible machines, the receiver
side sends the return receipt (dispatched) in response to the reception notice request attached to the sent
e-mail. This return receipt includes the receiver's reception capability information (compression type, paper
size, and resolution). When the receiver is programmed in the Address Book as the full mode destination,
the sender side automatically registers the received information in the Address Book. This allows you to 1
send a subsequent Internet Fax document to that receiver based on this information.
Returning a Return Receipt
When e-mail is received, if the sender requests reception notice, the receiver sends a return receipt
that includes the receiving machine's capability (compression type, paper size, and resolution).
Registering the Received Reception Confirmation Contents
When the sender receives the return receipt that includes the receiver's reception capability, the sender
checks that the final recipient address sent is programmed in the Address Book. If it is programmed
as a full mode destination, the sender automatically registers the receiver's reception capability. The
registered reception capability is updated each time the sender receives new reception capability
information. The sender can send documents to the receiver based on this information.
If the receiver is programmed as the simple mode machine or not programmed in the Address Book,
the receiver's reception capability cannot be registered.
If you know the receiver's reception capability, you can set it manually.
Requesting a Reception Notice
When the receiver's machine supports T.37 full mode and is programmed as a full mode machine in
the Address Book, the machine requests the reception notice from the receiver. Then, the machine will
receive the return receipt (sent) that includes the receiver's reception capability.
• For details about requesting reception notice from this machine, see “Requesting a Reception Notice”.
• Use Web Image Monitor to manually program a receiver's reception capability information. For
details about programming receiver's information, see “Programming Destination Information from
Web Browser”.
• If you use Internet Fax transmission, you can send documents to multiple destinations at once.
However, if you specify full mode destinations, since each destination may have a different reception
capability, transmission is done one by one in the specified transmission order.
35
1. Transmission
Placing Originals
Place the original either on the exposure glass or in the ADF.
1 For details about how to place originals, see the following:
• Placing originals on the exposure glass
See “Placing Originals on the Exposure Glass” in “Placing Originals”, Copy Reference.
• Placing originals in the ADF
See “Placing Originals in the ADF” in “Placing Originals”, Copy Reference.
BKQ004S
BKQ005S
• Originals that are clipped or creased cannot be scanned using the ADF. For details about originals
that are not recommended for the ADF, see “Originals”, Copy Reference.
36
Placing Originals
This section describes the size and thickness limitations that apply to originals placed on the exposure glass
or the ADF.
37
1. Transmission
Maximum
Where original is
Acceptable original size number of Paper thickness
set
sheets
ADF, two-sided A5 to A4 (up to 356 mm long) 50 sheets 64-105 g/m2 (17-28 lb)
original 81/2 × 51/2 to 81/2 × 14 (80 g/m2,
20 lb)
This section explains the size of the area the machine can scan and detect.
• There may be a difference in the size of the image when it is printed at the destination.
• Even if an original is correctly placed on the exposure glass or in the ADF, a margin of 3 mm (0.1
inch) around each edge of the original may not be sent.
• If the receiver uses paper of a smaller width than the original, the image is reduced to fit that paper.
• Originals placed face down on the exposure glass are scanned at A4 (81/2 × 11). To scan originals
at 81/2 × 14, change the paper size setting with User Parameters (switch 32, bit 1) in the Fax Features
menu. See “Parameter Settings”.
• If you place an original larger than A4, 81/2 × 14 on the exposure glass, only an A4, 81/2 × 14
area is scanned.
• Maximum scan area
The following shows the maximum scan area:
38
Placing Originals
BRJ017S
BRJ018S
• During Immediate Transmission, the length of the scanning range can decrease to less than 1200 mm
(47 inches), depending on the resolution of the image and the configuration of the receiving machine.
Upon completion of the first page scanning, an alarm sounds if the page is nearly blank.
• The blank sheet-detecting function works only when an original is scanned using the ADF.
39
1. Transmission
• The blank sheet-detecting function is ineffective for second and subsequent pages.
This function notifies you if an original is placed wrong side down on the scanner. When this happens, a
message appears for a few seconds. The message differs depending on the number of pages to be scanned
• When some pages are left unscanned in Parallel Memory Transmission or Memory Transmission:
40
Scan Settings
Scan Settings
You can configure the scan settings according to the original you are scanning.
You may want to send many different types of fax documents. Some of these may be difficult to reproduce 1
at the receiver's end. However, the machine has three settings that you can adjust to help you transmit the
document with the best possible image quality.
Original Type:
Text, Photo
Resolution:
Standard, Detail, Fine
Image Density (Contrast):
Manual Image Density (five levels)
Original Type
BRJ025S
• If you select Photo, the transmission will take longer than when Text is selected.
41
1. Transmission
• If you send a fax document with Photo and the background of the received image is dirty, reduce the
density setting and resend the fax. For details about setting the image density, see “Image Density
(Contrast)”.
1 • You can set the original type that is selected right after the machine is turned on or whenever the [Clear
Modes] key is pressed. See “Setting Transmission Function Defaults (Home Position)”.
JBIG Transmission
If you use JBIG (Joint Bi-level Image experts Group) compression, you can send originals scanned using
Photo faster than with other compression methods.
Resolution
Specify the resolution according to the size of the text on the original.
Images and text are scanned into the machine by converting them to a sequence of dots. The density of
the dots determines the quality of the image and how long it takes to transmit. Therefore, images scanned
at high resolution have high quality but transmission takes longer. Conversely, low resolution scanning
results in lower quality but the original is sent more quickly. Select the setting that matches your needs based
upon this trade off between speed and image clarity.
Standard (8 × 3.85 lines/mm, 200 × 100 dpi)
Select for originals containing normal size characters.
Detail (8 × 7.7 lines/mm, 200 × 200 dpi)
Select for originals containing small characters or when you require greater clarity. This resolution is
twice as fine as Standard.
Fine (8 × 15.4 lines/mm)
Select for originals with fine details or when you require the best possible image clarity. This resolution
is four times finer than Standard.
42
Scan Settings
BRJ026S
• If the other party's machine does not support the resolution at which you are sending, this machine
automatically switches to a resolution that is supported. You can check the resolution at which you
actually sent by printing the Journal. For details about printing the Journal, see “Printing the Journal”.
• The machine supports reception at both Standard and Detail resolution.
• You can set the resolution type that is selected right after the machine is turned on or whenever the
[Clear Modes] key is pressed. See “Setting Transmission Function Defaults (Home Position)”.
• When using Internet Fax transmission, documents are sent at “Detail” resolution, even if you have
specified “Fine”. To send a document at “Fine”, configure the Full Mode when registering the
destinations in the Address Book. See “T.37 Full Mode”.
43
1. Transmission
1. Press the [Lighter] or [Darker] key to change the density from five density levels.
BRJ027S
BRH017S
• You can set the image density that is selected right after the machine is turned on or whenever the
[Clear Modes] key is pressed. See “Setting Transmission Function Defaults (Home Position)”.
When sending an original of several pages, you can select a different scan setting for each page.
It is recommended that originals be placed on the exposure glass when mixing scan settings for a multiple
page original.
• If you are using the ADF, do not change the “Resolution” setting while originals are being scanned.
When placing originals on the exposure glass
1. Check which pages you want to scan with different settings.
44
Scan Settings
2. Remove the previous page and place the next page that you checked on the exposure glass.
3. Make the scan settings.
You have about 60 seconds (10 seconds for Immediate Transmission) to make the scan settings.
The time remaining is shown on the display. 1
Adjust the settings for each page before you press the [Start] key.
When placing originals in the ADF
1. Check which pages you want to scan with different settings.
2. Make the scan settings before the page you want to change the settings for starts being scanned.
Depending on what time the scan settings are adjusted, the settings may not be reflected in the
resulting operation.
45
1. Transmission
Specifying a Destination
This section explains how to specify a destination.
1 Fax numbers, IP-Fax destinations, and e-mail addresses can be specified.
• The display shows the percentage of free memory space for storing originals. Since fax numbers, IP-
Fax destinations, and e-mail addresses are programmed in separate memory, dialing fax numbers
using the number keys does not change the percentage on the display.
1. Press [ ] to display .
If you make a mistake, press the [Clear/Stop] key, and then enter again.
When adding a destination, pressing [ ] switches the destination type between and .
3. Press the [Start] key.
The machine starts to scan the original and stores it in memory. When scanning ends, the
Communicating indicator lights and transmission starts.
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• You can insert pauses and tones in a fax number. For details, see “Entering a pause” or “Entering a
tone”.
• For the maximum number of digits for a destination, see “Maximum Values”.
46
Specifying a Destination
Entering a pause
This section explains how to enter a pause.
Press the [Pause/Redial] key when dialing or storing a number to insert a pause of about two seconds.
BRJ028S
• If you press the [Pause/Redial] key at the first digit, the Redial screen appears.
• A pause is shown as a “-” on the display.
• You can also program numbers including pauses in the destination list.
Entering a tone
This function allows a machine connected to a pulse dialing line to send tonal signals (for example if you
want to use a special service on a tone dialing line).
When you press [Tone], the machine dials the number using tonal signals.
This section explains how to use the tone function with On Hook Dial as an example.
47
1. Transmission
BRJ029S
3. Press [Tone].
4. Enter the number you want to tone dial using the number keys.
• Certain services may be unavailable even when using the Tone function.
• A tone is shown as a “T” on the display and the next numbers are dialed using tonal signals.
48
Specifying a Destination
Sending by IP-Fax
• To use IP-Fax functions, the Hard Disk Drive Option and printer/scanner functions must be installed.
• To send an IP-Fax document, in the Fax Features menu, configure the IP-Fax Settings as follows. For
details about IP-Fax Settings, see “IP-Fax Settings”.
• If you are using a gatekeeper server, set [Enable H.323] to [On] and configure the gatekeeper
settings under [H.323 Settings].
• If you are using a SIP server, set [Enable SIP] to [On] and configure the SIP server settings under
[SIP Settings].
2. Select [Select Line] using [ ] or [ ], and then press the [OK] key.
3. Select [H.323] or [SIP] using [ ] or [ ], and then press the [OK] key.
49
1. Transmission
5. Press [Manual].
1
6. Enter the IP-Fax destination, and then press the [OK] key.
If you enter an incorrect character, press the [Clear/Stop] key. Then, re-enter the characters correctly.
To change the IP-Fax destination after pressing the [OK] key, press [EditDest], re-enter an IP-Fax
destination, and then press the [OK] key.
50
Specifying a Destination
• Depending on the security settings, [Manual] might not appear and you might not be able to enter
the IP-Fax destination.
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”. 1
• For a list of gateways (T.38-compliant), gatekeepers, or SIP servers that are certified as operable with
this machine, contact your local retail or service representative.
• Methods of entering a destination vary depending on the network settings made by the administrator.
Ask the machine administrator for details. For details about entering the IP-Fax destination, see “When
using a gatekeeper server or SIP server”.
• For details about text entry, see “Entering Text”, About This Machine.
• The Fax Features menu includes a user parameter setting (switch 17, bit 2) that enables you to
configure the machine to force the user to press [Add Dest] whenever s/he specifies a destination
using a destination key. This prevents users accidentally sending documents to the wrong destination.
See “Parameter Settings”.
• You can program one of the User Function keys with operations for Select Line. User Function keys
allow you to omit steps 1, 2, and 4. For details about the User Function keys, see “General Settings/
Adjust”.
• For the maximum number of digits for a destination, see “Maximum Values”.
51
1. Transmission
• To send to a G3 fax via a gateway connected to a public telephone line, you must specify the receiver's
machine telephone number. For example, if the receiver's fax number is “0312345678”, specify
“5678”. To send from an IP-Fax to G3 fax without using gatekeeper or SIP server, you must register
the gateway also.
• An alias telephone number is a number that is registered in the gatekeeper, and is available only in
the network to which the gatekeeper is connected.
• Pay attention to the number of telephone number digits set in the gateway/IP address conversion
table to avoid transmission error.
• SIP allows you to transmit and receive documents via an IPv6 network. This machine does not support
H.323 over IPv6.
• Although the machine can have multiple IP addresses in an IPv6 environment, only one address can
receive IP-Faxes.
• To send via IPv6, you must specify, for the receiver's IPv6 address and host name, the manually
configured address for the receiver's fax.
• For reception when not using SIP server in an IPv6 environment, you must specify this machine's IPv6
address manually. This is not necessary if you are using SIP server.
52
Specifying a Destination
• To send by IPv4 when using SIP server in a mixed IPv4/IPv6 environment, enter “v4:” at the beginning
of the IP-Fax destination. Likewise, to send by IPv6 when using SIP server in a mixed IPv4/IPv6
environment, enter “v6:” at the beginning of the IP-Fax destination.
• “SIP call setup” is performed either by IPv4 or IPv6, depending on the configuration of your
environment.
1
• To use Internet Fax functions, the Hard Disk Drive Option and printer/scanner functions must be
installed.
• To send Internet Fax, you must specify the sender.
• The sender must be registered in the Address Book in advance. Register his/her e-mail address and
register as [Sender Only] or [Dest. & Sender] using “Address Book Management” in “System
Settings”. For details about these settings, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.
• Internet Fax is performed using Memory Transmission, which automatically starts transmission after
storing documents in memory.
• If you specify an Internet Fax destination after selecting Immediate Transmission, the mode
switches to Memory Transmission.
53
1. Transmission
• If you try to select Immediate Transmission after specifying an Internet Fax destination, the "Dest.
and functions that could not be specified on immediate transmission is already selected."
message appears. When this happens, press [Exit].
1 1. Press [ ] to display .
2. Press [Manual].
3. Enter the e-mail address destination, and then press the [OK] key.
If you enter an incorrect character, press the [Clear/Stop] key. Then, re-enter the characters correctly.
To change the e-mail address after pressing the [OK] key, press [EditDest], re-enter an e-mail address,
and then press the [OK] key.
54
Specifying a Destination
1
To add another destination, repeat steps 4 and 5.
Pressing [ ] switches the destination type between and .
6. Specify the sender.
For details, see “Sender Settings”.
7. Press the [Start] key.
The machine starts to scan the original and stores it in memory. When scanning ends, the
Communicating indicator lights and transmission starts.
• Depending on the security settings, [Manual] might not appear and you might not be able to enter
the e-mail address.
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• For details about text entry, see “Entering Text”, About This Machine.
• For details about canceling a transmission, see “Canceling a Transmission”.
• The Fax Features menu includes a user parameter setting (switch 17, bit 2) that enables you to
configure the machine to force the user to press [Add Dest] whenever s/he specifies a destination
using a destination key. This prevents users accidentally sending documents to the wrong destination.
See “Parameter Settings”.
• For the maximum number of digits that can be included in a destination, see “Maximum Values”.
• When the sender is specified, the transmission result etc. is sent to the sender's e-mail address.
• If “Auto Specify Sender Name” is set to “On”, the sender is automatically specified and you can omit
the procedure for specifying a sender. If “On” is selected, either the administrator's or this machine's
e-mail address appears in the “From” field. For details about Auto Specify Sender Name, see “System
Settings”, Network and System Settings Guide.
• If “Auto Specify Sender Name” is set to “Off” in “System Settings” and no e-mail address is registered
for the sender you specified, Internet Fax documents cannot be sent.
55
1. Transmission
56
Specifying a Destination
For example, if the other party's e-mail address is “abc@defcompany.com” and the host name is
“HOST”:
abc@HOST.defcompany.com
By specifying the other party's IP address 1
Specify a destination's e-mail address by changing the domain part of the e-mail address to the other
party's IP address.
xxxx@[the other party's IP address]
For example, if the other party's e-mail address is “abc@defcompany.com” and the IP address is
“192.168.1.10”:
abc@[192.168.1.10]
2. Select [Send via SMTP Server] using [ ] or [ ], and then press the [OK] key.
3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
57
1. Transmission
• If you use [Manual] to specify the destinations directly, you can also specify whether or not to use
SMTP server for each destination.
1 • If you use the destination list to select the destinations, the SMTP server setting specified in the Address
Book is enabled. For details about making the SMTP server settings in the Address Book, see
“Registering Addresses and Users for Facsimile/Scanner Functions”, Network and System Settings
Guide.
• You can program one of the User Function keys with operations for this function. Using the User
Function keys allow you to omit steps 1, 2, and 4. For details about the User Function keys, see
“General Settings/Adjust”.
• To send Internet Fax documents from a computer, use the LAN-Fax Driver to specify whether or not
to bypass the SMTP server. When sending with the [Use device address] check box selected, the
SMTP server setting specified on this machine is enabled.
You can specify a destination simply by pressing the Quick Dial key to which the destination's number is
registered.
When a Quick Dial key is pressed, the destination it is registered to appears on the screen.
Pressing [ ] switches the destination list between fax number/IP-Fax destination and e-mail
address .
• In the destination list, program an individual fax number, IP-Fax destination, e-mail address and/or
groups of destinations. For details about programming destinations, see “Registering Addresses and
Users for Facsimile/Scanner Functions”, Network and System Settings Guide.
58
Specifying a Destination
2. Press the Quick Dial key in which the destination's number is programmed.
BRJ030S
If you make a mistake, press the [Clear/Stop] key and try again.
To select more destinations, repeat steps 1 and 2.
When you add destinations, if you switch the destination type between and , press [Add Dest],
and then repeat steps 1 and 2.
3. Press the [Start] key.
• To check the contents of Quick Dial keys, print the destination list using Address Book:Print List under
System Settings. For details about the printing method, see “System Settings”, Network and System
Settings Guide.
• You do not have to press [Add Dest] when adding the same type of destination as you specified in
step 1 using the Quick Dial keys.
• In the destination list, program an individual fax number, IP-Fax destination, e-mail address, and/or
groups of destinations. For details about programming destinations, see “Registering Addresses and
Users for Facsimile/Scanner Functions”, Network and System Settings Guide.
59
1. Transmission
• Group destination can be used only for Memory Transmission; it cannot be used for Immediate
Transmission.
• If you specify a group after selecting Immediate Transmission, the mode switches to Memory
1 Transmission.
• If you try to select Immediate Transmission after specifying a group, the "Dest. and functions that
could not be specified on immediate transmission is already selected." message appears. When
this happens, press [Exit].
• The total number of destinations programmed in multiple groups should not exceed the maximum
number of destinations you can specify for one file, see “Maximum Values”.
If you make a mistake, press the [Clear/Stop] key and try again.
To select more destinations, repeat steps 1 and 2.
When you add destinations, if you switch the destination type between and , press [Add Dest],
and then repeat steps 1 and 2.
3. Press the [Start] key.
• To view which destinations are registered in a group, print the group list using the Address Book:Print
List function under System Settings. For details about the printing method, see “System Settings”,
Network and System Settings Guide.
• A confirmation message appears if the destination group includes an address that is incompatible
with the specified destination type. Press [Select] to specify destinations where the numbers or
addresses of the specified destination type are registered. Press [Cancel] to change the destination.
• To cancel any destination(s) among the group, press [ View] and display the desired destination
using [ ] or [ ], and then press the [Clear/Stop] key.
60
Specifying a Destination
If you specified a destination from the destination list, you can display names, fax numbers, e-mail
addresses, or IP-Fax destinations. If a group is specified as the destination, you can display the fax numbers,
e-mail addresses, or IP-Fax destinations of the group.
BRJ031S
3. If you specified more than one destination, display them one by one using [ ] or [ ].
• If you specified a group using the Quick Dial keys, , the group icon appears to the left of the
destination name by pressing the [Check Destination] key.
• When you specify a destination using the number keys, [Program] appears on the screen by pressing
the [Check Destination] key. Press [Program] to register a selected destination in the destination list.
For details about registering a destination, see “Programming Destinations from Check Destination
Screen”.
61
1. Transmission
Redial
The machine stores the latest destinations specified for each transmission method.
1 This function saves time when you are sending to the same destination repeatedly, as you do not have to
enter the destination again.
1. Place the original, and then select the scan settings you require.
2. Press the [Pause/Redial] key.
BRJ028S
3. Select the destination you want to redial to using [ ] or [ ], and then press the [OK] key.
62
Specifying a Destination
• You can specify Internet Fax destination using the Redial function. Select this function before pressing
[Manual].
• When you press [Program], you can register a selected destination in the destination list. For details
about registering a destination, see “Programming Destinations from Redial Screen”.
• For the maximum number of redials the machine can store, see “Maximum Values”.
If you want to prevent documents being sent to the wrong destination, you can configure the machine to
prompt users twice for the destination, or to display the entered destination prior to transmission.
• When using this function, you must press [Manual] on the standby display to enter the fax number.
1. Press [Manual].
63
1. Transmission
2. Enter the fax number using the number keys, and then press the [OK] key.
1
If you make a mistake, press the [Clear/Stop] key, and then enter the number again.
3. Enter the fax number again, and then press the [OK] key.
Transmission starts.
After transmission, the standby display appears.
• If the "Entered destination is not correct." message appears, press [Exit] and check the fax number
again, and then repeat the procedure from step 1.
• If you want to specify the number of times that the fax number must be dialed, contact your service
representative. Step 3 must be repeated as many times as is set here (1 to 15).
• You cannot edit the first fax number that is entered.
64
Specifying a Destination
• Manual Dial
If you make a mistake, press the [Clear/Stop] key, and then enter the number again.
2. Press the [Start] key.
To change the destination, press the [Escape] key, and then specify the destination again.
3. Press the [Start] key again.
Transmission starts.
After transmission, the standby display appears.
65
1. Transmission
• You can also register Address Book fax numbers, e-mail addresses, IP-Fax destinations, and folder
destinations to groups.
• In the facsimile initial display, if you change the contents of the Address Book, the "Settings have been
updated. The selected dest./functions have been cancelled." message appears. Press [Exit] to bring
back the facsimile initial display.
• You can register destinations in the Address Book using Web Image Monitor or SmartDeviceMonitor
for Admin. For details about installation or operation of them, see “Monitoring and Configuring the
Printer”, Network and System Settings Guide, or, for information about the Address Book, see the
relevant Help topics.
This section explains how to register a name and fax number to the Address Book.
BRJ032S
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
66
Programming Destinations in the Address Book
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
1
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
To specify a destination using a Quick Dial key, press a registration number from 001 to 016.
7. Enter the name and then press the [OK] key.
8. Press [Details].
67
1. Transmission
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
1
10. Enter the fax number using the number keys.
11. Press [Option], and then specify the following functions for each destination, as necessary:
• SUB Code: register a SUB Code to use SUB Code Transmission.
• SEP Code: register a SEP Code to use SEP Code Reception.
• Label Insertion: if you enable this function, when the faxes you send are printed at the receiver's
end, the receiver's name is also printed.
After changing the settings, press [Exit], and then press the [OK] key.
12. Press [End].
• For details about the procedure in step 11, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.
This section explains how to change a name and fax number registered in the Address Book.
68
Programming Destinations in the Address Book
BRJ032S
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
69
1. Transmission
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
To specify a destination using a Quick Dial key, press a registration number from 001 to 016.
7. Enter the new name, and then press the [OK] key.
8. Press [Details].
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
10. Enter the new fax number using the number keys.
11. Press [Option], and then change the settings of “SUB Code”, “SEP Code”, and “Label
Insertion”, as necessary.
After changing the settings, press [Exit], and then press the [OK] key.
70
Programming Destinations in the Address Book
1
13. Press the [OK] key.
• For details about the procedure in step 11, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.
This section explains how to delete destination information from the Address Book.
BRJ032S
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
71
1. Transmission
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
1
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
To specify a destination using a Quick Dial key, press a registration number from 001 to 016.
7. Press [Yes].
This section explains how to register a directly entered fax number, e-mail address, or IP-Fax destination
to the Address Book using the Check Destination screen.
72
Programming Destinations in the Address Book
If [Program] appears on the screen, it is possible to register a destination displayed on the check destination
screen to the Address Book.
1. On the check destination screen, select the destination you want to register to the Address
Book. 1
• Depending on the security settings, [Program] might not appear and you might not be able to register
the destination.
This section explains how to register a directly entered fax number, e-mail address, or IP-Fax destination
to the Address Book using the Redial screen.
If [Program] appears on the screen, it is possible to register a destination displayed on the Redial screen
to the Address Book.
1. On the Redial screen, select the destination you want to register to the Address Book.
73
1. Transmission
2. Press [Program].
For details about registering destinations, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.
• Depending on the security settings, [Program] might not appear and you might not be able to register
the destination.
• p.62 "Redial"
74
Searching for a Destination in the Address Book
• The search returns destinations whose first characters match the entered characters.
• A warning message appears if the search returns more than the maximum number of destinations you
can search for at a time. Press [Exit] and change the destination name to view fewer destinations.
• For the maximum number of destinations you can search at a time, see “Maximum Values”.
Search by Name
This section explains how to search for a destination registered in the Address Book by name.
• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.
75
1. Transmission
BRJ033S
3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.
4. Select [Search by Name] using [ ] or [ ], and then press the [OK] key.
5. Enter the destination name you want to search for, and then press the [OK] key.
Depending on the type of characters to enter, press the [Shift] key to switch the mode.
If you enter the wrong destination name, before pressing the [OK] key, press the [Clear/Stop] key,
and then enter the correct destination name.
6. Check the characters you have entered are correct, and then press the [OK] key.
76
Searching for a Destination in the Address Book
7. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).
1
Multiple destinations can be selected.
Press [ ] to deselect a destination.
8. Press the [OK] key.
• If no destination matches the specified text, the "Specified destination is not programmed." message
appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
• For details about text entry, see “Entering Text”, About This Machine.
This section explains how to search for a destination registered in the Address Book using the destination
list.
• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.
77
1. Transmission
BRJ033S
3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.
4. Select [Display List] using [ ] or [ ], and then press the [OK] key.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
78
Searching for a Destination in the Address Book
This section explains how to search for a destination by specifying a registration number registered in the
Address Book.
1
• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.
BRJ033S
3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.
4. Select [Search by Registration No.] using [ ] or [ ], and then press the [OK] key.
79
1. Transmission
5. Enter the three-digit registration number using the number keys, and then press the [OK]
key.
If you enter the wrong registration number, before pressing the [OK] key, press the [Clear/Stop] key,
and then enter the correct registration number.
When the search is finished, the result appears.
6. Press the [OK] key.
• If no destination matches the specified registration number, the "Specified destination is not
programmed." message appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
• You can program one of the User Function keys with operations for this function. Using the User
Function keys allow you to omit steps 2 through 4, and 6. For details about the User Function keys,
see “General Settings/Adjust”.
This section explains how to search for a destination registered in the Address Book by fax number.
• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.
80
Searching for a Destination in the Address Book
1. Press [ ] to display .
1
2. Press the [Search Destination] key.
BRJ033S
3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.
4. Select [Search Fax Destination] using [ ] or [ ], and then press the [OK] key.
If [Search Fax Destination] does not appear, press the [Escape] key to return to step 1, and then switch
the destination type to .
5. Enter the number you want to search for, and then press the [OK] key.
If you enter the wrong number, before pressing the [OK] key, press the [Clear/Stop] key, and then
enter the correct number.
81
1. Transmission
6. Check the fax numbers you have entered are correct, and then press the [OK] key.
1
When the search is finished, the results appear.
7. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).
• If no destination matches the specified fax number, the "Specified destination is not programmed."
message appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
This section explains how to search for a destination registered in the Address Book by e-mail address.
• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.
1. Press [ ] to display .
82
Searching for a Destination in the Address Book
BRJ033S
3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.
4. Select [Search by E-mail Address] using [ ] or [ ], and then press the [OK] key.
If [Search by E-mail Address] does not appear, press the [Escape] key to return to step 1, and then
switch the destination type to .
5. Enter the e-mail address you want to search for, and then press the [OK] key.
If you enter the wrong e-mail address, before pressing the [OK] key, press the [Clear/Stop] key, and
then enter the correct e-mail address.
6. Check the characters you have entered are correct, and then press the [OK] key.
83
1. Transmission
• If no destination matches the specified text, the "Specified destination is not programmed." message
appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
This section explains how to search for a destination registered in the Address Book by IP-Fax destination.
• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.
1. Press [ ] to display .
84
Searching for a Destination in the Address Book
BRJ033S
3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.
4. Select [Search Fax Destination] using [ ] or [ ], and then press the [OK] key.
If [Search Fax Destination] does not appear, press the [Escape] key to return to step 1, and then switch
the destination type to .
5. Press [IP].
85
1. Transmission
If you enter the wrong destination, before pressing the [OK] key, press the [Clear/Stop] key, and
then enter the correct destination.
7. Check the characters you have entered are correct, and then press the [OK] key.
• If no destination matches the specified text, the "Specified destination is not programmed." message
appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
This section explains how to search for a destination registered in the Address Book using the LDAP server.
• This function is not available if [LDAP Search] is set to [Off] under Administrator Tools, in the System
Settings menu.
86
Searching for a Destination in the Address Book
BRJ033S
2. Select [Search LDAP] using [ ] or [ ], and then press the [OK] key.
3. Select [Select Server] using [ ] or [ ], and then press the [OK] key.
4. If more than one server is programmed, select the server you want to search using [ ] or
[ ], and then press the [OK] key.
87
1. Transmission
6. Select a search condition using [ ] or [ ], and then press the [OK] key.
1
Conditions (Name, E-mail Address, Fax Destination, Company Name, and Department Name) are
those programmed in the LDAP server.
7. Enter a partial string, and then press the [OK] key.
Depending on the type of characters you need to enter, press the [Shift] key to switch between modes.
To search for an IP-Fax destination, press [IP] on the Fax Destination screen.
8. Select the search criteria using the scroll keys, and then press the [OK] key.
88
Searching for a Destination in the Address Book
• Although one user can program multiple e-mail addresses, only one address can be retrieved by the
search. The address retrieved by the search depends on the searching method supported by the LDAP
server. However, the address programmed first is normally retrieved.
• You can add one additional search condition for LDAP servers by specifying the Search Options
under Prog/Chnge/Del LDAP Server under System Settings. See “System Settings”, Network and
System Settings Guide.
• The string you enter in the [Name] condition field in step 6 is read as the first or last name, depending
on the administrator's setting. For example, to search for the name “John Smith”, ask the system
administrator whether you should enter “John” or “Smith”.
• For details about text entry, see “Entering Text”, About This Machine.
89
1. Transmission
On Hook Dial
The On Hook Dial function allows you to dial while listening to the tone from the internal speaker.
1 You can send a fax checking the connection.
1. Place the original, and then select the scan settings you require.
2. Press the [On Hook Dial] key.
BRJ029S
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• This function is unavailable in some countries.
90
On Hook Dial
• Press [ ] or [ ] to adjust the volume of the on-hook sound in eight increments. At the maximum volume
level, changes to . Similarly, at the minimum level, changes to . The volume can also be
preprogrammed in the Fax Features menu.
• If you have the optional handset or an external telephone on the fax machine, you can speak with
the other party when you hear a voice. If you hear a voice before pressing the [Start] key, pick up the
1
optional handset or the handset of the external telephone and tell the receiver you want to send a fax
document (ask them to switch to facsimile mode).
• The Fax Features menu contains the On Hook Release Time setting, which allows you to specify the
time after which On Hook mode is deactivated. See “General Settings/Adjust”.
91
1. Transmission
Manual Dial
Pick up the optional handset or the handset of the external telephone and dial. If you hear a voice at the
1 other end, continue conversation as normal.
1. Place the original, and then select the scan settings you require.
2. Pick up the handset.
You will hear a dial tone.
3. Dial.
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• When the operation switch is off, even if the main power switch is on, you cannot operate this machine
using only the optional handset or the handset of the external telephone. You must first press the
operation switch to turn on the machine.
92
Canceling a Transmission
Canceling a Transmission
This section explains how to cancel a fax transmission.
1
• Remember that the Communicating indicator turns off almost immediately when an Internet Fax is
being sent.
Use this procedure to cancel a transmission before pressing the [Start] key.
BRJ034S
• When originals are placed into the ADF, you can cancel transmission simply by removing them.
Use this procedure to cancel a transmission while the originals are being scanned after the [Start] key has
been pressed.
93
1. Transmission
BRJ035S
• Scanning may be completed while you are performing the cancel operation.
This section explains how to cancel a transmission while the Communicating indicator is lit.
BRJ035S
2. Select the file you want to cancel using [ ] or [ ], and then press [Stop TX].
94
Canceling a Transmission
3. Press [Delete].
1
To cancel stopping transmission, press [No].
4. Press the [Escape] key.
The standby display appears.
• If you cancel a document while it is being sent, the transmission is halted as soon as you finish the
cancellation procedure. However, some pages of the document may already have been sent and
received at the other end.
• If the transmission finishes while you are carrying out this procedure, it will not be canceled.
• If multiple destinations were specified, only one destination number appears.
BRJ036S
95
1. Transmission
2. Select [Check/Stop TX File] using [ ] or [ ], and then press the [OK] key.
1
3. Select the file you want to cancel using [ ] or [ ], and then press [Stop TX].
4. Press [Delete].
• If you cancel a transmission while the file is being sent, some pages of your file may have already
been sent and is received at the other end.
• If the transmission finishes while you are carrying out this procedure, transmission cannot be canceled.
• If multiple destinations were specified, only the number of the destinations that have not received the
document you sent is shown.
• If multiple destinations were specified, only one destination number appears.
96
Checking the Storage Result (Memory Storage Report)
• If you use Parallel Memory Transmission, the Memory Storage Report is not printed.
• You can turn this report on and off with the User Parameter (switch 03, bit 2) in the Fax Features menu.
• Even if the machine is set up not to print this report, it is still printed if an original could not be stored.
• You can select whether to include part of the original image on the report with the User Parameter
(switch 04, bit 7) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
97
1. Transmission
98
2. Other Transmission Features
This section explains functions you can apply using the [TX Mode] setting, such as Sending at a Specific
Time (Send Later) and Label Insertion. TX Mode allows you to use various functions with transmissions.
• If the machine is switched off for about twelve hours, all fax documents stored in memory are lost. If
documents are lost for this reason, a Power Failure Report is automatically printed when the operation
switch is turned on. Use this report to check the list of lost documents. For details, see “Turning Off the
Main Power / In the Event of Power Failure”, Troubleshooting.
• This function is unavailable with Immediate Transmission. If you specify Immediate Transmission for
this function, the "Dest. and functions that could not be specified on immediate transmission is already
selected." message appears. When this happens, press [Exit], and then switch to Memory
Transmission.
1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].
3. Select [Send Later] using [ ] or [ ], and then press the [OK] key.
4. Select [Send at Specified Time] using [ ] or [ ], and then press the [OK] key.
99
2. Other Transmission Features
To cancel the setting, select [Off], and then press the [OK] key. The display returns to that of step 3.
5. Enter the time using the number keys and press [AM/PM] to switch between AM and PM.
Then press the [OK] key.
2
When entering numbers smaller than 10, add a zero at the beginning.
If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then try again.
To cancel Send Later, press the [Escape] key. The display returns to that of step 3.
6. Press the [Escape] key.
The standby display appears.
To check the settings, press [TX Mode].
7. Specify a destination, and then press the [Start] key.
100
Sender Settings
Sender Settings
Select a user that you want to specify as a sender.
If the sender's e-mail address is registered in the destination list, the sender can receive transmission results
by e-mail.
Also, if you enable the Stamp Sender Name, the registered sender's name (user name) appears on the
receiver's sheet, lists, and report.
2
• To receive transmission results by e-mail, the Hard Disk Drive Option and printer/scanner functions
must be installed.
• You must first register the senders in the destination list using “Address Book Management” under
“System Settings” to specify their e-mail addresses, and then specify “Register as” for [Sender Only]
or [Dest. & Sender]. If you want senders to receive e-mail notification of transmission results, you must
specify [Dest. & Sender]. For details about these settings, see “Registering Addresses and Users for
Facsimile/Scanner Functions”, Network and System Settings Guide.
• If user authentication is set, the user logged in is set as sender. The transmission result is sent to the
logged-in user's e-mail address.
1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].
3. Select [Sender Settings] using [ ] or [ ], and then press the [OK] key.
4. Select a sender.
If a destination protection code is set, the entry screen appears. Enter the protection code for
destination using the number keys, and then press the [OK] key.
101
2. Other Transmission Features
5. Confirm the selected sender, and then press the [OK] key.
2 6. To print the sender's name on the receiver's sheet, select [Stamp] using [ ] or [ ], and then
press the [OK] key.
If you enable this function, the sender's name (user name) appears on the receiver's sheet, lists, and
report.
If the sender's e-mail address is registered, you can specify whether or not to send the transmission
result by e-mail to the sender. If you enable this function, the transmission result is sent to the registered
e-mail address.
The display returns to that of step 3.
8. Press the [Escape] key.
The standby display appears.
To check the settings, press [TX Mode].
9. Specify the destination, and then press the [Start] key.
• You can confirm transmission results by using both the E-mail TX Result function, which sends the results
by e-mail, and the Communication Result Report printed by the machine. You can set whether to use
both of these together in User Parameter (switch 10, bit 6) in the Fax Features menu. See “Parameter
Settings”.
• You can program one of the User Function keys with operations for Sender Settings. User Function
keys allow you to omit steps 2, 3, and 7. For details about the User Function keys, see “General
Settings/Adjust”.
102
Sender Settings
• You can use Communication Result Report, etc. to check usage status by specified users. If user
authentication is set, you can check usage by logged-in users. If User Code is set to sender, you can
count the number of uses by each user.
• To cancel the Sender Settings, cancel the transmission. See “Canceling a Transmission”.
103
2. Other Transmission Features
E-mail Options
This section explains the settings required for using the Internet Fax function.
• To use Internet Fax functions, the Hard Disk Drive Option and printer/scanner functions must be
2 installed.
Allows you to enter a subject for the e-mail document you want to send.
1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].
3. Select [E-mail Options] using [ ] or [ ], and then press the [OK] key.
4. Select [Attach Subject] using [ ] or [ ], and then press the [OK] key.
5. Enter the subject line, and then press the [OK] key.
Depending on the type of characters to enter, press the [Shift] key to switch the mode.
The screen returns to that of step 4.
104
E-mail Options
• If you send e-mail without setting a subject, a subject is automatically inserted. For details about how
the subject is automatically inserted, see “E-mail Subject” and “Received images”.
• You cannot send a subject only as e-mail without an original.
• You can program one of the User Function keys with operations for E-mail Options. User Function
keys allow you to omit steps 2 and 3. For details about the User Function keys, see “General Settings/
Adjust”.
• For details about text entry, see “Entering Text”, About This Machine.
• For the maximum number of characters for an e-mail subject, see “Maximum Values”.
You can confirm sent documents were properly received using e-mail or the Journal.
When Reception Notice is set under “E-mail Options”, the receiver sends back a reception notice message.
Once the reception notice message is received, “OK” appears in the Result column of the Journal, allowing
the originator to verify the transmission was received.
• The Reception Notice feature is only available if the receiver supports MDN (Message Disposition
Notification).
1. Place the original, and then select the scan settings you require.
105
2. Other Transmission Features
2 3. Select [E-mail Options] using [ ] or [ ], and then press the [OK] key.
4. Select [Return Receipt] using [ ] or [ ], and then press the [OK] key.
5. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
• If the fax is not received normally, “Error” appears in the Result column.
• Only the last 50 communications appear in the Journal. If you do not receive a reception notice
message before the last 50 communications are finished, “OK” might not be printed in the Journal's
Result column. This may happen even if the mail is received normally at the other end.
106
E-mail Options
• If you specify mailing list addresses, do not set for Reception Notice. Otherwise, you will receive
multiple reception notice messages from e-mail recipients, and the Result column will be overwritten
each time a new notice message is received. However, if you receive a reception notice message
indicating an error, “Error” appears in the Result column and will not be overwritten, even if you
subsequently receive a reception notice message as “OK” following the error message.
• Reception notice results are only shown in the Journal. The Result column in all other files, lists, and
transmission reports show “--”.
2
• Reception notice messages themselves are not recorded in the Journal.
• You can select whether the Reception Notice is printed every time or printed only when an error
occurs. This can be set with User Parameter (switch 21, bit 0) in the Fax Features menu. See “Parameter
Settings”.
• You cannot broadcast e-mail using Reception Notice. The documents are sent to the destinations in
the order in which they were specified.
• You can program one of the User Function keys with operations for E-mail Options. User Function
keys allow you to omit steps 2 and 3. For details about the User Function keys, see “General Settings/
Adjust”.
107
2. Other Transmission Features
• In the USA, the Fax Header must contain the telephone number of the line your machine is connected
2 to. It will be printed on the header of every page you send. Required in the USA.
1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].
3. Select [Print Fax Header] using [ ] or [ ], and then press the [OK] key.
• You can program fax header names using the Program Fax Information function in the Fax Features
menu. For details about the programming method, see “Registering Fax Information”.
• You can select whether or not dates, fax header names, file numbers, or page numbers are printed
by changing their respective User Parameters (switch 18, bit 3, 2, 1, 0) in the Fax Features menu.
See “Parameter Settings”.
108
Fax Header Print
• You can program one of the User Function keys with operations for this function. Using the User
Function key allows you to omit steps 2 through 5. For details about the User Function keys, see
“General Settings/Adjust”.
• In the USA, law requires that your telephone number be included in the Fax Header. Register the
telephone number (own fax number) and switch on Fax Header Print with User Parameters (switch
18, bit 1) in the Fax Features menu.
2
• p.199 "General Settings/Adjust"
• p.217 "Registering Fax Information"
• p.226 "Parameter Settings"
109
2. Other Transmission Features
Label Insertion
With this function you can have the receiver's name printed on the document that is received at the other
end.
2 • To use this function, set Label Insertion to [On] when registering fax destinations in the Address Book,
and also select [Programmed Name] when sending fax documents.
• When there is an image around the area where the Label is to be printed, that image is deleted.
The receiver's name is printed as follows:
• Receiver's name: printed at the top of the page and preceded by “To:”.
Set this function as follows:
• Set Label Insertion to [On] when programming fax destinations.
• Select [Programmed Name] for Label Insertion when sending fax documents.
1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].
3. Select [Label Insertion] using [ ] or [ ], and then press the [OK] key.
4. Select [Programmed Name] or [Off] using [ ] or [ ], and then press the [OK] key.
110
Label Insertion
111
2. Other Transmission Features
• Documents can be sent to facsimiles that have the Personal Box function.
• A SUB Code cannot be used with Internet Fax.
• To use this function, set [SUB Code TX] to [On].
• Program this function to one of the User Function keys in advance. For details about the User Function
keys, see “General Settings/Adjust”.
• Obtain the SUB Code of the other party in advance.
• When sending a confidential document, inform the other party of the SUB Code in advance.
• This machine cannot receive documents that are transmitted with a SUB Code.
1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].
3. Select [SUB Code TX] using [ ] or [ ], and then press the [OK] key.
112
Setting SUB Codes for Transmission
7. Press the User Function key ([F1] to [F3]) programmed with [SUB/SEP Code].
BRJ037S
If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then try again.
113
2. Other Transmission Features
9. When a password is required, enter the SID Code using the number keys, and then press
the [OK] key.
2
When a SID Code is not required, just press the [OK] key.
The standby screen returns.
10. Press the [Start] key.
If you use Immediate Transmission and the fax machine at the destination does not support the SUB
Code function, a message will appear on the display to inform you of this. When this happens, press
[Exit] to cancel the transmission.
• Make sure the number of digits in the SUB Code matches the specification of the machine to which
you are sending. For the maximum number of digits for the SUB Code of this machine, see “Maximum
Values”.
• You can store SUB Codes as well as names and fax numbers in the destination list. For registering into
the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”, Network
and System Settings Guide.
• The SUB Code is printed on lists and reports.
Setting a Password
There are times when you may want to use an “SID” (Sender ID) when sending confidential faxes with the
SUB Code function.
When you use a Transfer Box that has a password, enter the SID Code as the password.
• For the maximum number of digits for the SID Code, see “Maximum Values”.
• You can enter numbers, , , and spaces.
• You can store SID Codes as well as names and fax numbers in the destination list. For registering into
the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”, Network
and System Settings Guide.
114
Setting SUB Codes for Transmission
115
2. Other Transmission Features
2 This function enables the machine to receive documents from multiple destinations.
2. Select [SEP Code RX] using [ ] or [ ], and then press the [OK] key.
116
Setting SEP Codes for Reception
6. Press the User Function key ([F1] to [F3]) programmed with [SUB/SEP Code].
BRJ037S
If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then try again.
8. When a password is required, enter the PWD Code using the number keys, and then press
the [OK] key.
When a PWD Code is not required, just press the [OK] key.
The standby screen returns.
9. Press the [Start] key.
• Make sure the number of digits in the SEP Code matches the specification of the machine from which
you are receiving. For the maximum number of digits for the SEP Code of this machine, see “Maximum
Values”.
• You can enter numbers, , , and spaces.
• You can store SEP Codes as well as names and fax numbers in the destination list. For registering into
the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”, Network
and System Settings Guide.
• The SEP Code is printed on lists and reports.
117
2. Other Transmission Features
Entering a Password
2
There are times you may want to use a password when receiving faxes by SEP Code Reception.
• For the maximum number of digits for the PWD Code, see “Maximum Values”.
• You can enter numbers, , , and spaces.
• You can store PWD Codes as well as names and fax numbers in the destination list. For registering
into the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”,
Network and System Settings Guide.
• The PWD Code is printed on lists and reports.
• You can turn this function on or off with the User Parameter (switch 03, bit 3) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
This report is printed after each SEP Code Reception is completed and shows its result.
118
Setting SEP Codes for Reception
• You can turn this function on or off with the User Parameter (switch 03, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
2
• To view the report without text disruption, select a font of even character width in your e-mail
application's settings.
• You can also check the result of a SEP Code Reception with the Journal.
119
2. Other Transmission Features
2 • When you use [2 Sided TX] under [TX Mode], the originals cannot be sent by using the exposure
glass.
• This function is only available with Memory Transmission.
1. Place the original in the ADF, and then select the scan settings you require.
2. Press [TX Mode].
3. Select [2 Sided TX] using [ ] or [ ], and then press the [OK] key.
4. Select the transmission mode using [ ] or [ ], and then press the [OK] key.
Select [2 Sided from 1st Page] to send a two-sided original from the first page.
Select [1 Sided for 1st Page] if you want to send a cover letter as the first page.
5. Select the position of the placed document using [ ] or [ ], and then press the [OK] key.
To cancel Two-Sided Transmission, press the [Escape] key. The display returns to that of step 3.
120
Two-Sided Transmission (Double-Sided Transmission)
6. Select the page opening orientation using [ ] or [ ], and then press the [OK] key.
• The front and back of the scanned original will be printed in order on separate sheets at the other
end. The orientation of alternate sheets may be reversed at the other end. If you want to print the
original with the same orientation at the other end, specify the original position and page opening
orientation.
BRJ021S
• For details about acceptable original size and paper thickness for two-sided scanning with the ADF,
see “Acceptable Original Sizes”.
• You can program one of the User Function keys with operations for this function. Using the User
Function keys allows you to omit steps 2, 3, and 7. For details about the User Function keys, see
“General Settings/Adjust”.
• Make sure that the specified original position matches the orientation of originals loaded in the ADF.
121
2. Other Transmission Features
122
3. Reception
This section explains reception and reception functions such as printing received documents or routing
received documents to other fax machines.
Types of Reception
This section explains different ways of receiving fax documents.
3
Immediate Reception
Each page of a fax document is printed as soon as it is received. This method is used for standard fax
documents.
BBB032S
• When receiving important fax documents, it is recommended that you confirm the contents of the
received documents with the senders.
• The machine may not be able to receive fax documents when free memory space is low.
• If free memory reaches 0% during Immediate Reception, any further reception becomes impossible
and the current communication is terminated.
• Reception is always by Immediate Reception unless “Combine Two Originals” or [2 Sided Print] is
set to “On”, in which cases the machine switches to Memory Reception.
• If the Substitute Reception is used, a fax document is not printed: it is stored in memory.
• This machine supports Standard and Detail resolutions for reception. Faxes sent at Fine or Super Fine
resolution is printed on your machine at Detail resolution. This may differ from the sender's intended
resolution.
123
3. Reception
Memory Reception
The machine waits until all pages of the document have been received into memory before printing it.
BBB033S
• If there is a power failure (the main power switch is turned off) or the machine is unplugged for about
twelve hours, all the documents stored in memory are deleted. As soon as the main power switch is
turned on, the Power Failure Report is printed to help you check the list of deleted files. Simply turning
off the power by pressing the operation switch does not delete stored documents. See “Turning Off
the Main Power / In the Event of Power Failure”, Troubleshooting.
• The machine might not be able to receive large numbers of documents or documents with high data
content. If this is the case, we recommend that you disable “Combine Two Originals” or “2 Sided
Print”.
• The machine may not be able to receive fax documents when free memory space is low.
• If free memory reaches 0% during Memory Reception, any further reception becomes impossible and
the current communication is terminated.
• Reception is always by Immediate Reception unless “Combine Two Originals” or “2 Sided Print” is
set to “On”, in which cases the machine switches to Memory Reception.
Substitute Reception
Substitute Reception is used when the machine cannot print any fax documents.
In Substitute Reception, a received fax document is stored in memory instead of being printed. Fax
documents received using Substitute Reception are automatically printed when the condition which caused
the machine to use Substitute Reception is rectified.
Depending on why the machine cannot print, Substitute Reception might be used for all fax documents
received, or for only those documents that match a condition specified in the User Parameters in the Fax
Features menu.
124
Types of Reception
The Receive File indicator lights to let you know when fax documents have been received using Substitute
Reception.
3
BRJ038S
• Reception may not take place if there is not enough free memory.
• If free memory reaches 0% during Substitute Reception, any further reception becomes impossible
and the current communication is terminated.
• When a fax document is received after “Store(Notify)” or “Store(Do not Notify)” is selected for
Reception File Setting in the Fax Features menu, the Receive File indicator lights. For details about
Reception File Setting, see “Reception File Setting”.
• The Receive File indicator may light even when receiving documents using Immediate Reception.
The machine is printing with a The machine is busy printing The document is automatically printed
different function. with a different function. after the current job finishes.
is lit. The cover is open. Close the cover shown in the display.
125
3. Reception
The message “Problem All trays are out of Call your service representative.
with this tray” appears. action.
In User Parameters (switch 05, bit 2, 1) on the Fax Features menu, specify the following conditions for
Substitute Reception:
• When Own Name or Own Fax Number is received
The machine switches to Substitute Reception only when the sender has programmed their Own Name
or Own Fax Number. If the power is switched off for more than twelve hours, all the documents stored
in memory are deleted. In this case, the Journal can be used to identify the senders of the deleted
documents, so you can ask them to resend.
If a sender has not programmed their Own Name or Own Fax Number, the machine may fail to
receive an important fax document. It is recommended that you ask important senders to program an
Own Name or Own Fax Number in advance.
• Free
The machine switches to Substitute Reception regardless of whether or not the sender has programmed
their Own Name or Own Fax Number.
• Disable
The machine does not receive any documents.
126
Types of Reception
127
3. Reception
Reception Modes
There are three ways you can set up the machine to handle incoming calls.
• Auto Switch
• Manual Reception (the optional handset or an external telephone required)
• Auto Reception
The reception mode can be switched under Switch Reception Mode in the Fax Features menu. See
“Reception Settings”.
3
• The optional handset or an external telephone is required to use this machine as a telephone.
Auto Switch
In this mode, the machine rings a number of times. You can answer the call while the machine is ringing. If
you do not answer the call, the machine automatically changes to receive fax documents.
• You can change the number of rings using “RX Mode Auto Switch Time” in the Fax Features menu.
See “Reception Settings”.
• When the other party send a fax document, the machine changes to receive the fax document
automatically.
• You can connect a telephone answering machine with Auto Switch.
• Set a smaller number of rings for the telephone answering machine than for the fax machine.
• This function will not work with certain answering machines.
Manual Reception
When a telephone call comes in, the machine rings. If the call is a fax document, you must switch manually
to facsimile mode.
1. When the machine rings, pick up the optional handset or the handset of the external
telephone.
128
Reception Modes
2. If you hear beeps, press the [Start] key or the User Function key programmed with Start
Manual Reception. (The [Start] key is only available in facsimile mode when an original is
not placed.)
3. If you pressed the [Start] key in step 2, press [Start RX].
4. Replace the optional handset or the handset of the external telephone. The machine will 3
start receiving.
• When the operation switch is off, even if the main power switch is on, you cannot operate this machine
using only the optional handset or the handset of the external telephone. You must first press the
operation switch to turn on the machine.
Auto Reception
When a telephone call comes in, the machine automatically receives it as a fax document.
Use this setting on a dedicated fax line.
BRJ039S
129
3. Reception
2. Select the reception mode using [ ] or [ ], and then press the [OK] key.
3
• For details about Switch Reception Mode, see “Reception Settings”.
• For details about the User Function keys, see “General Settings/Adjust”.
130
Receiving E-mail
Receiving E-mail
This section explains this machine's e-mail reception functions.
• To use Internet Fax and Mail to Print functions, the Hard Disk Drive Option and printer/scanner
functions must be installed.
If a TIFF-F file is attached to an e-mail, the machine receives the e-mail by Internet Fax. If a JPEG or PDF
file is attached to an e-mail, the machine receives the e-mail by Mail to Print.
Only one attached file can be printed from a received e-mail.
3
When multiple files are attached to an e-mail, the reception method and the file that is printed vary
according to the file type and the order of the attached files.
If JPEG or PDF files are attached along with other types of file, the machine receives the e-mail by Mail to
Print. Only the first JPEG or PDF file is printed and the other files are deleted.
131
3. Reception
• If Reception Protocol is set to POP3 or IMAP4, you can use the E-mail Storage in Server setting (in
System Settings) to configure the machine to either retain or delete the received e-mail from the server.
See “System Settings”, Network and System Settings Guide.
• To specify whether or not the machine prints the header (title) and text (body) of each e-mail it receives,
use [Parameter Setting] (switch 21 bit 5) in [Fax Features]. See “Parameter Settings”.
• If [Require Secure Password Authentication (SPA) for all client connections] is selected in Windows
Server 2003/2003 R2, reception is not possible.
• With User Parameter (switch 21, bit 1) in the Fax Features menu, you can have the machine send the
return receipt in response to the reception notice request attached to the sent e-mail. For details about
Parameter Setting, see “Parameter Settings”.
• If memory runs out, e-mail will not be received at the specified intervals. Reception will resume when
sufficient memory becomes available.
• E-mail auto-reception should be set in “System Settings”. When you select auto-reception, set the
reception interval in minutes under E-mail Recept. Interval, in System Settings. See “System Settings”,
Network and System Settings Guide.
• E-mail can also be received manually. For details about the manual reception, see “Manual e-mail
reception”.
132
Receiving E-mail
• Program the Manual E-mail Reception function to a User Function key beforehand. For details about
the User Function keys, see “General Settings/Adjust”. 3
1. Press the User Function key ([F1] to [F3]) programmed with Manual E-mail Reception.
BRJ037S
The machine accesses the server to check for e-mail and receives any new e-mail.
The standby display appears.
• Alternatively, press the [Job Information] key, and then select [Manual E-mail Reception] to receive
e-mail.
133
3. Reception
Received images
Here is an example of an Internet Fax document sent from this machine and received on a computer using
the Outlook Express e-mail application.
The received image varies according to the e-mail application.
• When Internet Fax e-mail is sent to computer, the following information is always inserted in the e-
mail text “This E-mail was sent from “Host Name” (product name) Queries to: “Administrator's e-mail
address””. To check the machine's host name and administrator's e-mail address, use Host Name or
3 Admin. E-mail Address under System Settings. For details about Host Name and Admin. E-mail
Address, see “System Settings”, Network and System Settings Guide.
BBB034S
134
Receiving E-mail
6. Subject
Shows the subject specified in “E-mail Options” at the time of transmission. If no subject is specified, one is
automatically assigned in the format shown in 1 above.
7. The message is inserted in all e-mail. “xxxx” is the machine name.
8. Attachment File
Any document included by the sender is displayed as an attached document.
• The display format of the sender name differs according to that of the Stamp Sender Name setting
and other functions. 3
• The display format of the subject varies according to Stamp Sender Name and other settings. For the
format of the subject, see “E-mail Subject”.
Mail to Print
JPEG or PDF files that are attached to e-mails are printed using the Mail to Print function.
The reception method for e-mail is the same as the method for Internet Fax. For details about reception
methods, see “Auto e-mail reception” and “Manual e-mail reception”.
Mail to Print is not available with the following functions:
Checkered Mark, TSI Print (Transmitting Subscriber Identification Print), Reception Time, Auto Fax Reception
Power-Up, Memory Lock, Program Special Sender, Resolution, Page Separation and Length Reduction,
Center Mark, 2 Sided Print, Communication Page Count, Forwarding, Auto Paper Select function, Just size
printing
• To print a JPEG or PDF file, the optional PostScript 3 unit must be installed.
• Version 1.3, 1.4, 1.5, and 1.6 PDF files are printable. However, this machine might not be able to
print PDF files if they were sent from certain machines or created in certain environments.
• This machine cannot print Exif format JPEG images captured by digital cameras, but it can print JFIF
format JPEG images created on multi-function peripherals. However, this machine might not be able
to print JPEG images if they were sent from certain machines or created in certain environments.
• The Fax Features menu provides a user parameter setting (switch 21, bit 2) that you can use to enable
or disable this function. Text and TIFF files will still be printed even if this function is disabled.
135
3. Reception
• If a JPEG or PDF file is received when the Mail to Print function is disabled, the file will be detected as
an error and Error Mail Notification is sent back to the sender. You can turn this function on or off with
the User Parameter (switch 21, bit 7) in Parameter Settings.
• For details about Parameter Setting, see “Parameter Settings”.
• Only one attached file can be printed from a received e-mail. If multiple JPEG or PDF files are attached,
the first JPEG or PDF file is printed and the other files are deleted.
• If an e-mail contains multiple or unsupported files, its reception result is detected as an error, but an
error notification is not sent to the sender.
3 • Printing is in black and white even if the image that is received contains color.
• Printed JPEG images and PDF files are counted as printer jobs.
• If an encrypted PDF is received, the PDF file is printed only if its password matches this machine's
password.
• You can check the results of Mail to Print reception using the Journal. In the Journal, “P.1” is always
printed in the number of pages column and “S”, which indicates the Standard resolution, is always
printed in the communication mode column regardless of the actual page/resolution. If the machine
receives files that are unprintable due to their format, “error” will be printed in the result column.
• When receiving by Mail to Print, this machine does not respond to reception notification requests
attached to the received e-mail.
136
Reception Functions
Reception Functions
This section explains useful functions for receiving fax documents.
• To use Internet Fax and IP-Fax functions, the Hard Disk Drive Option and printer/scanner functions
must be installed.
BBB038S
• To use this function, specify the Forwarding destination in advance. Forwarding can be specified
under Forwarding on the Fax Features menu. See “Forwarding”.
• A fax number, Internet Fax address, IP-Fax destination, or folder address can be set as a forwarding
destination.
• If an e-mail address is programmed as the destination, documents received are forwarded as e-mail.
• If you would like the machine to forward received documents to a particular destination according
to the sender, specify the Forwarding destination for each sender under Fax Features, Administrator
Tools, Program Special Sender. Documents from other senders are forwarded to the default
Forwarding destination specified for this function. For details about Program Special Sender, see
“Program Special Sender”.
137
3. Reception
• You can select whether the machine prints out the documents it forwards with User Parameter (switch
11, bit 6) in the Fax Features menu. For details, see “Parameter Settings”.
• You can set whether or not the Folder Transfer Result Report is transmitted to the specified e-mail
address if folders are programmed as the forwarding destinations to which documents are sent from
all senders or Special Senders. For details, see “Administrator Tools”.
• The Fax Features menu provides a user parameter setting (switch 32, bit 0) that allows you to select
a priority order for alternative destinations for sent documents. When this parameter is set, if the
specified receiver is a group destination that includes an address not registered for the specified
transmission type, the document is routed to an alternative destination.
3 • User Parameters (switch 37, bit 4) on the Fax Features menu allows you to include the sender's name
in the names of files sent to folders. For details, see “Parameter Settings”.
• Garbling of the file name and data loss can result if the receiver's operating system cannot accept
certain characters in file names. To prevent this, use User Parameters (switch 37, bit 5) to limit the file
names to plain characters only. For details, see “Parameter Settings”.
• If you limit file names to plain characters only but errors still occur, disable display of the sender's
name in the file name of documents forwarded to folders.
• Using the User Parameters (switch 38, bit 7-0 and switch 39, bit 7-0) on the Fax Features menu, you
can specify the number of fax resend attempts and the interval between them. These settings become
useful when the receiver is a folder destination and the connection to the destination computer fails.
For details, see “Parameter Settings”.
• For the maximum number of destinations you can program in a group, see “Maximum Values”.
You can receive a document sent by Internet Fax using SMTP reception.
With SMTP reception, e-mail is received as soon as it is sent to the e-mail address set by the machine.
138
Reception Functions
BBB037S
3
• Set this machine beforehand using the MX record of the DNS server to enable SMTP reception.
• Use the Reception Protocol setting in System Settings to set the reception protocol. See “System
Settings”, Network and System Settings Guide.
• You can route received e-mail to other Internet Fax machines as well.
• Even if SMTP reception is enabled on the DNS server, e-mail sent from the SMTP server will not be
received and the machine reports an error if SMTP reception is not set in “System Settings”. Also, the
SMTP server sends error notification e-mail to the originator.
• If an error occurs while receiving e-mail, reception is aborted, the e-mail is deleted, and Error Report
is printed. Also, the SMTP server will send error notification e-mail to the originator.
• When the SMTP server attempts to route received documents to this machine while the machine is
transmitting e-mail, the machine will respond to the SMTP server with a “busy” signal. Then, the SMTP
server usually tries resending the documents until the set timeout.
139
3. Reception
BBB038S
• Before routing e-mail received via SMTP, you first must set “SMTP RX File Delivery” to “On” in the
Fax Features menu. See “E-mail Settings”.
• Depending on security settings, this function may not be available.
The originator can request transfer of e-mail sent to another fax machine by specifying the e-mail address
as follows:
Fax Number
fax=destination fax number@host name of this machine. domain name
Example: to transfer to fax number 212-123-4567, specify:
fax=2121234567@abc.company.com
Single destination programmed in the Quick Dial Keys
fax= registration number of 3 digits or less@host name of this machine.domain name
Example: to transfer to the destination number 001:
fax= 001@abc.company.com
Group destination programmed in the destination list
fax= registration number of 3 digits or less@host name of this machine.domain name
Example: to transfer to the destination programmed under group number 004:
fax= 004@abc.company.com
• E-mail received via SMTP can also be routed to single or group destinations programmed in the
destination list.
140
Reception Functions
• If an e-mail transfer request is received when the “SMTP RX File Delivery” is “Off” in the Fax Features
menu, this machine responds with an error message to the SMTP server.
• You can make settings that limit transfer to specified originators.
• Using this function, you can also send documents from your e-mail application to e-mail addresses
and G3 fax machines' destinations through this machine simultaneously.
• For the maximum number of destinations you can program in a group, see “Maximum Values”.
• The Fax Features menu provides a user parameter setting (switch 32, bit 0) that allows you to select
a priority order for alternative destinations for sent documents. When this parameter is set, if the
specified receiver is a group destination that includes an address not registered for the specified
transmission type, the document is routed to an alternative destination. See “Parameter Settings”.
3
JBIG Reception
If you use JBIG (Joint Bi-level Image Experts Group) compression, you can send photographic originals
faster than with other methods of compression. It allows you to receive documents sent in the JBIG format
through JBIG Transmission.
• This function is not available with Internet Fax function and Mail to Print functions.
This machine can be set to shut down automatically if no one has used it for a while. In these situations,
even though the operation switch is off, the machine can still receive incoming documents as long as the
main power switch is on.
• Reception is not possible if both the operation switch and the main power switch are turned off.
• You can set whether documents are printed as soon as they are received (Immediate Reception) with
the User Parameter (switch 14, bit 0) in the Fax Features menu. See “Parameter Settings”.
• You can also have fax documents received by Memory Reception (Substitute Reception) printed after
the machine is turned on.
141
3. Reception
142
Printing Options
Printing Options
This section explains useful functions for printing received documents.
When this function is turned on, the machine beeps to let you know when a received document is printed.
• You can alter the volume of the beep or turn it off completely using “Adjust Sound Volume” in General
3
Settings/Adjust (set the volume to the minimum level). See “Adjusting the Volume”, Troubleshooting.
Checkered Mark
When this function is turned on, a Checkered Mark is printed on the first page of fax documents to help
you separate them.
BBB039S
• You can turn this function on or off using Checkered Mark in the Fax Features menu. See “Reception
Settings”.
Center Mark
When this function is enabled, marks are printed halfway down the left side and at the top center of each
page received.
This makes it easy for you to position a hole puncher correctly when you file received documents.
143
3. Reception
3 BBB040S
• You can enable or disable this function using Center Mark in the Fax Features menu. See “Reception
Settings”.
• The Center Mark may deviate a little from the exact center of the edge.
Reception Time
You can have the date, time, and file number printed at the bottom of the document when it is received.
• You can turn this function on or off using Print Reception Time in the Fax Features menu. See “Reception
Settings”.
• When a received document is split and printed on two or more sheets, the reception time is printed
on the last sheet.
• The time when the document was printed can also be recorded on the document. If you need this
function, contact your service representative.
Two-Sided Printing
144
Printing Options
BBA047S
3
• To use this function, all pages of the received document must be of the same size-inform the sending
party of this beforehand if necessary. You must also have paper set in the machine of the same size
as that sent by the sending party. In Two-Sided Printing, this machine will correctly receive in A4 ,
B5 JIS (81/2 × 14 , 81/2 × 11 ). The following table shows the results that can be achieved
when receiving with this machine.
BRJ022S
• This function works only when all pages are of the same width and received into memory.
• This function cannot be used with Combine Two Originals.
• You can turn this function on or off using 2 Sided Print in the Fax Features menu. For details, see
“Reception Settings”.
• Printouts may vary depending on how the sender sets the originals.
• You can select to have documents only from selected senders printed in this way.
• Stored documents of the same size are printed on the same paper. Some stored documents may be
unavailable for this printing option.
145
3. Reception
When two documents of the same size and orientation are received consecutively, they are printed on a
single sheet when you turn this function on. This can help you economize on paper.
• This function does not work with documents larger than A5 or 81/2 × 51/2 . When A5 or
81/2 × 51/2 size paper is loaded in the machine, each page of the received document is printed
on a single sheet.
3 • If paper matching the size and orientation of a received document is available, Combine Two
Originals is not possible.
BAS038S
• You can turn this function on or off with the User Parameter (switch 10, bit 1) in the Fax Features menu.
See “Parameter Settings”.
• This function uses Memory Reception.
If the size of a received document is longer than the paper loaded in the machine, each page of the
document can be split and printed on several sheets, or reduced and printed on a single sheet.
146
Printing Options
BBB045S
3
For example, this function splits the document if the document length is 20 mm (0.79 inch) or longer than
the paper used. The document is reduced if it is less than 20 mm (0.79 inch). When a document is split, an
asterisk ( ) is inserted at the split position and about 10 mm (0.39 inch) of the split area is duplicated on
the top of the second sheet.
• Your service representative can customize this function with the following settings:
• Reduction
• Print split mark
• Overprinting
• Overprinting length
• Guideline for split
• You can adjust the overprinting and reduction lengths within the following ranges:
• Overprinting length: 4 mm (0.16 inch), 10 mm (0.39 inch), 15 mm (0.59 inch)
• Guideline for split: 5-155 mm (5 mm steps)/0.2-6.1 inches (0.2 inch steps)
You can have the sender's Own Name or Own Fax Number printed on documents that this machine
receives.
Usually the sender's Fax Header is printed on received documents. When you receive an Internet Fax
document, the e-mail address of the sender is printed. If the sender has not programmed their Fax Header,
you will not be able to identify them. However, if you turn this function on, the sender's Own Name or Own
Fax Number is printed instead so you can find out where the document came from.
• You can turn this function on or off with the User Parameter (switch 02, bit 3) in the Fax Features menu.
See “Parameter Settings”.
147
3. Reception
If there is no paper in the machine that matches the size of a received document, the machine will choose
a paper size based on the paper available.
If you have not set the same size paper in the paper tray, incoming fax documents are printed on the nearest
3 size available.
For example, if your machine does not have 51/2 × 81/2 loaded and you receive a 51/2 × 81/2 size
document, the document is printed on 81/2 × 11. If your machine does not have 81/2 × 11 loaded and
you receive an 81/2 × 11 size document, the document is printed on two sheets of 51/2 × 81/2.
• The document is split over two sheets of paper depending on the paper size. See “Page Separation
and Length Reduction”.
• Paper placed in the bypass tray is not usually selected for printing a received document.
• Widths that this machine can receive are A4 and 81/2 × 11. Any documents narrower than A4 or
81/2 × 11 are received at A4 or 81/2 × 11 width. The length of documents depends on the document.
• The paper size used to print a received document may be different from the size of the sent original.
• When a different size of document from the priority tray is received, the tray containing the same size
of paper as the received document is used.
148
Printing Options
This function is enabled with User Parameter (switch 05, bit 5) in the Fax Features menu. See “Parameter
Settings”.
If the paper tray is not stocked with paper of a suitable size to print a received document, a message
appears on the display prompting you to load paper of the required size. When you have loaded new
paper, press [Exit] to print the document.
3
• After pressing [Exit], procedure varies depending on machine status when the message occurred.
• If any received documents or reports were being printed automatically, the machine
automatically continues printing from where it left off.
• If any documents or reports were being printed manually, the machine does not resume printing.
Perform the operation from the beginning again.
149
3. Reception
150
4. Confirming Communication
Information
This section explains the features of the [Job Information] key, which you can use to confirm communication
results on the screen or printed reports.
BRJ036S
2. Select [Print TX Standby File List] using [ ] or [ ], and then press the [OK] key.
To cancel printing before pressing the [OK] key, press the [Escape] key. The standby display appears.
3. Press the [Start] key.
To cancel printing after pressing the [Start] key, press the [Clear/Stop] key. The display returns to that
of step 2.
151
4. Confirming Communication Information
The display returns to that of step 2 after printing a TX Standby File List.
4. Press the [Escape] key.
The standby display appears.
152
Printing a File from Memory
BRJ036S
2. Select [Check/Stop TX File] using [ ] or [ ], and then press the [OK] key.
To cancel printing, press the [Escape] key. The display returns to that of step 2.
4. Press [Print].
153
4. Confirming Communication Information
154
Checking the Transmission Result (TX File Status)
Confirming on Display
BRJ036S
2. Select [TX File Status] using [ ] or [ ], and then press the [OK] key.
When a fax is sent, the Own Fax Number or Own Name information of the receiver appears. When
an Internet Fax is sent, the e-mail address you entered or the name programmed in the machine's
destination list appears. For a transmission from a computer, “-- LAN-Fax -->” is shown.
4. Press the [Escape] key twice.
The standby display appears.
• Only the transmission results of the latest communications are displayed. For the maximum number of
communication results you can check on this machine, see “Maximum Values”.
155
4. Confirming Communication Information
• You can view sent fax documents and their lists, using Web Image Monitor on a network computer.
For details, see the Web Image Monitor's Help.
• If a transmission is completed while you are using this function, the result will not appear. To view the
latest result, exit TX File Status, and then try again.
• You can program one of the User Function keys with operations for this function. Using the key allows
you to omit steps 1 and 2. For details about the User Function keys, see “General Settings/Adjust”.
• When documents are transmitted from the computer to the machine, “--LAN-Fax -->” appears. To
check if the documents are sent to the receiver, confirm the same File No.
Confirming by Report
• For details about Parameter Setting and User Function key, see “Parameter Settings” or “General
Settings/Adjust”.
156
Checking the Transmission Result (TX File Status)
Confirming by E-mail
Use the E-mail TX Result function to send reports by e-mail to a computer, and then confirm them on the
computer. 4
The available reports are:
• Communication Result Report.
• Immediate TX Result Report.
• Polling with SEP RX Result.
• To confirm transmission results by e-mail, the Hard Disk Drive Option and printer/scanner functions
must be installed.
• You must first register the e-mail addresses of the destinations the report is to be sent to on the
destination list. For details about registering e-mail addresses, see “Registering Addresses and Users
for Facsimile/Scanner Functions”, Network and System Settings Guide.
157
4. Confirming Communication Information
You can confirm transmission results using both the E-mail TX Result function, which sends the results by e-
mail, and the Communication Result Report printed by the machine.
You can set whether to use both of these together in User Parameter (switch 10, bit 6) in the Fax Features
menu. See “Parameter Settings”.
This report is printed when a Memory Transmission is completed, so you can check the result of the
transmission.
• You can turn this function on or off with the User Parameter (switch 03, bit 0) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• You can select whether to include part of the original image on the report with the User Parameter
(switch 04, bit 7) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
• The Pg(s) column gives the total number of pages. The Page Not Sent column gives the number of
pages that could not be sent successfully.
• “--” indicates that the Internet Fax document was sent to the mail server programmed in this machine.
(However, this does not mean the e-mail was delivered.)
• To view the report without text disruption, select a font of even character width in your e-mail
application's settings.
• If two or more destinations are specified, this report is printed after the fax document is sent to all the
destinations.
• If the machine is set up not to print this report and the fax document could not be successfully
transmitted, a Communication Failure Report is printed. See “Communication Failure Report”.
158
Checking the Transmission Result (TX File Status)
If you turn this report on, a report is printed after every Immediate Transmission so you have a record of
whether the transmission was successful or not.
If the machine is set up not to print this report and the fax document could not be successfully transmitted,
the Error Report is printed instead.
• You can switch this report on or off in the User Parameter (switch 03, bit 5) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter 4
(switch 04, bit 4) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
• To view the report without text disruption, select a font of even character width in your e-mail
application's settings.
• If the page was sent successfully, the Page column gives the total number of pages sent successfully.
This report is printed when a document could not be successfully transmitted with Memory Transmission.
If the machine is set up to print a Communication Result Report, this report is not printed. Use it to keep a
record of failed transmissions so you can send them again.
• You can select whether the Communication Failure Report is automatically printed using the User
Parameter (switch 04, bit 1) in the Fax Features menu.
• This report is only printed if the Communication Result Report is turned off and a document could not
be successfully transmitted with Memory Transmission.
• You can select whether to include part of the original image on the report with the User Parameter
(switch 04, bit 7) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
159
4. Confirming Communication Information
• The Pg(s) column gives the total number of pages. The Page Not Sent column gives the number of
pages that could not be sent successfully.
• “Unprogrammed” indicates that the document could not be sent because the forwarding destination
is not programmed.
• “--” indicates that the Internet Fax document was sent to the mail server programmed in this machine.
(However, this does not mean the e-mail was delivered.)
160
Checking the Reception Result (RX File Status)
Confirming on Display
BRJ036S
2. Select [RX File Status] using [ ] or [ ], and then press the [OK] key.
When a fax or IP-Fax is received, the sender's fax number or Fax Header information appears. When
an Internet Fax is received, the sender's e-mail address appears.
4. Press the [Escape] key twice.
The standby display appears.
• Only the reception results of the latest communications are displayed. For the maximum number of
communication results you can check on this machine, see “Maximum Values”.
161
4. Confirming Communication Information
• You can view received fax documents and their lists, using Web Image Monitor on a network
computer. For details, see the Web Image Monitor's Help.
• If a document is received while you are using this function, the result will not appear. To view the latest
result, exit RX File Status, and then try again.
• You can program one of the User Function keys with operations for this function. Using the key allows
you to omit steps 1 and 2. For details about the User Function keys, see “General Settings/Adjust”.
4 Confirming by Report
Journal
Print the Journal to confirm the latest reception results.
For details, see “Printing the Journal”.
162
Printing the Journal
• The contents of a Journal printed automatically are deleted after printing. Keep the journal if you
require a record of transmissions and receptions.
BRJ036S
2. Select [Print Journal] using [ ] or [ ], and then press the [OK] key.
• You can set whether the Journal is automatically printed after every 50 communications with the User
Parameter (switch 03, bit 7) in the Fax Features menu.
• Depending on security settings, the Journal is not automatically printed.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
163
4. Confirming Communication Information
• You can program one of the User Function keys with operations for this function. Using the key allows
you to omit steps 1, 2, and 4. For details about the User Function keys, see “General Settings/Adjust”.
• Depending on security settings, the Destination/Sender name may not appear.
• For the maximum number of communication results printed in the Journal, see “Maximum Values”.
Journal
4
This section explains the items printed in the Journal.
BRJ041S
1. Printing date
Shows the date and time the report was printed.
2. Programmed Fax Header
Shows the sender name programmed for printing.
164
Printing the Journal
3. Date
Shows the transmission or reception date.
4. Time
Shows the transmission or reception start time.
5. Other end
• For fax destinations
Shows the name (for display) programmed by the other end.
Shows the programmed fax number if the name (for display) was not programmed.
If neither name nor fax number was programmed by the other end, an entered fax number or a name
programmed in a destination list is shown for transmissions.
• For Internet Fax destinations
At time of transmission, it shows the e-mail address or name programmed in the destination list. At time of 4
reception, it shows the e-mail address of the sender.
At time of broadcasting transmission, it shows the number of destinations after the e-mail addresses or
names of destination.
When documents are transmitted from the computer to the machine, “--LAN-Fax -->” appears. To check if
the documents are sent to the receiver, confirm the same File No.
• For IP-Fax destinations
Shows the IP-Fax destination or name programmed in the destination list. The fax destination details appear
on the reception report.
• For Folder destinations
Shows the name programmed in the destination list.
6. Communication mode
• For fax transmissions and receptions
After “G3”, “T” for outgoing faxes or “R” for incoming faxes, and the communication mode appear in
alphabetical letters or symbols.
• For Internet Fax transmissions and receptions
After (e-mail mark), “T” for outgoing e-mail or “R” for incoming e-mail, and the communication mode
appear in alphabetical letters or symbols. Documents sent from Internet Fax destinations are received by
Internet Fax, and documents sent from e-mail destinations are received by Mail to Print. “Q” indicates
outgoing e-mail for which a Reception Notice is set in “TX Mode”, whereas “A” indicates reception notice
e-mail.
• For IP-Fax transmissions and receptions
After (IP-Fax mark), “T” for outgoing faxes or “R” for incoming faxes, and the communication mode
appear in alphabetical letters or symbols.
• For forwarding to the folder destinations
After (folder mark) and “T” for outgoing faxes, the communication mode appears in alphabetical letters
or symbols.
7. Communication time
Shows time taken for transmissions or receptions.
165
4. Confirming Communication Information
8. Number of pages
Shows the number of pages transmitted or received.
9. Communication result
Shows the result of transmissions or receptions.
OK: All pages were properly transmitted or received. When Reception Notice is activated using the Internet Fax
E-mail Options, receipt of Reception Notice is shown.
--: The Internet Fax document was sent to the mail server programmed in this machine. (However, this does not
mean the e-mail was delivered.) When using LAN-Fax, the results of communication from a computer to this
machine are shown.
E: A communication error occurred.
D: Power was disconnected during communication. Not all fax documents were transmitted.
• For Mail to Print reception, “P.1” is always printed in the number of pages column and “S”, which
indicates the Standard resolution, is always printed in the communication mode column regardless
of the actual page/resolution.
• To prioritize a fax number or name programmed in the destination list, contact your service
representative.
Use this function to send the Journal to the administrator's e-mail address.
The Journal is sent automatically after every 50 communications. A CSV format Journal is attached to the
e-mail.
• To transmit the Journal by e-mail, the Hard Disk Drive Option and printer/scanner functions must be
installed.
• To transmit the Journal by e-mail, it is necessary to make settings with User Parameter (switch 21, bit
4) in the Fax Features menu. See “Parameter Settings”.
• This machine does not store sent CSV files. It is recommended that you double-check the e-mail address
of an administrator before the Journal is transmitted. If the e-mail address of the administrator is not
correct, your important Journal may be lost. Sent CSV files are not left on the fax machine.
• If the administrator's address is wrong, you may not be able to acquire the Journal.
166
Printing the Journal
• If the Journal fails to be transmitted in e-mail format, the Journal is printed out.
• The name of an attached CSV file is “JOURNAL year, month, date, hours, minutes”. For example,
the file name transmitted in 14:40 on 20th, December, 2007 is “JOURNAL200712201440.csv”.
• The subject of a Journal sent by e-mail begins with “Journal”.
Journal by e-mail
If the setting is made so that the Journal is transmitted as e-mail, it is transmitted to the e-mail address of an
administrator.
4
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu. For details about Parameter Setting, see “Parameter
Settings”.
• To confirm the administrator's e-mail address, use Admin. E-mail Address under System Settings. See
“System Settings”, Network and System Settings Guide.
• Depending on security settings, the Destination/Sender name may not appear.
167
4. Confirming Communication Information
• If the main power switch is turned off for about twelve hours, all documents protected by Memory
Lock are deleted. When this happens, the Power Failure Report is printed so you can confirm which
documents have been deleted. See “Turning Off the Main Power / In the Event of Power Failure”,
Troubleshooting.
BRJ038S
BRJ036S
168
Printing a File Received with Memory Lock
3. Select [Print Memory Lock File] using [ ] or [ ], and then press the [OK] key.
If no documents were received while Memory Lock was switched on, the message "There are no
memory lock files." is shown, and then the display returns to that of step 3.
4. Enter a 4-digit Memory Lock ID with the number keys, and then press the [Start] key.
If the Memory Lock ID does not match, the "Specified code does not match the programmed Memory
Lock ID." message appears, and then the display returns to the previous screen. Retry after checking
the Memory Lock ID.
5. Press the [Escape] key.
The standby display appears.
• Even when Memory Lock is available, if free memory is insufficient, reception is not possible.
• You can also apply a Memory Lock to documents that come only from certain senders.
• Documents received by SEP Code Reception are automatically printed even if this function is switched
on.
• If you print a Memory Lock File, it is deleted.
169
4. Confirming Communication Information
170
5. Fax via Computer
This section explains how to use this machine's facsimile function from a computer via a network.
BBB052S
• To specify IP-Fax destinations or Internet Fax destinations, the Hard Disk Drive Option and printer/
scanner functions must be installed.
• Errors occurring when the machine is used as a LAN-Fax will not be displayed on the computer. Check
for errors by using Web Image Monitor. See Web Image Monitor help.
171
5. Fax via Computer
• It is recommended that you use Web Image Monitor running under the same network environment
as this machine. Otherwise, the Web browser may not open and an error may occur.
• This function supports both IPv4 and IPv6 addresses.
Before Use
• When a personal computer and the machine are connected in parallel, See “Printing with Parallel
5 Connection”, Printer Reference and “Connecting the Machine”, Network and System Settings Guide.
• When using Ethernet or wireless LAN, see “Connecting the Machine”, Network and System Settings
Guide.
This section provides information about LAN-Fax Driver, Address Book, and LAN-Fax Cover Sheet Editor.
LAN-Fax Driver
This driver allows you to use LAN-Fax functions.
172
Sending Fax Documents from Computers
• Display
VGA 640 × 480 pixels or more
Address Book
Address Book helps you edit LAN-Fax transmission destinations.
Operating systems
Microsoft Windows 2000/XP/Vista
Microsoft Windows Server 2003/2003 R2/2008
• If the plug and play function starts, click [Cancel] in the [Found New Hardware] dialog box, and then
insert the CD-ROM.
• Auto Run might not work automatically with certain OS settings. If this is the case, double-click
“Setup.exe”, located on the CD-ROM root directory.
• If you want to cancel Auto Run, hold down the [SHIFT] key (when your system is Windows 2000/
XP/Vista or Windows Server 2003/2003 R2, hold down the left [SHIFT] key) while inserting the CD-
ROM. Keep the [SHIFT] key held down until the computer stops reading the CD-ROM.
• Clicking [Cancel] during installation aborts the installation. If you cancel the installation, restart your
computer and install the rest of the software or printer driver.
173
5. Fax via Computer
You need to install a LAN-Fax Driver on your computer before using the LAN-Fax functions.
The LAN-Fax Driver is on the CD-ROM included with the machine.
Address Book and LAN-Fax Cover Sheet Editor are installed with the LAN-Fax Driver. Address Book helps
you edit LAN-Fax transmission destinations. LAN-Fax Cover Sheet Editor helps you edit LAN-Fax cover
sheets.
Use the following procedure to install LAN-Fax Driver, Address Book, and LAN-Fax Cover Sheet Editor at
5 one time.
• Before installing the above applications, install SmartDeviceMonitor for Client. For details about
installing SmartDeviceMonitor for Client, see “Using the SmartDeviceMonitor for Client Port”, Printer
Reference.
174
Sending Fax Documents from Computers
9. Click [Finish].
10. Click [Exit].
This section explains how to set properties required for using the LAN-Fax Driver.
1. On the [Start] menu, select [Control Panel]. Then select [Printers and Other Hardware], and
5
then [Printers and Faxes].
In Windows 2000, point to [Settings] on the [Start] menu, and then click [Printers].
In Windows XP Professional, Windows Server 2003/2003 R2, select [Printers and Faxes] on the
[Start] menu.
In Windows Vista or Windows Server 2008, select [Control Panel] on the [Start] menu. Then select
[Hardware and Sound], and then [Printers].
2. Select to highlight [LAN-Fax M13], then click [Properties] on the [File] menu.
In Windows Vista, click [Set printer properties].
3. Click [Printing Preferences...] to set the following properties.
• Paper Size
• Orientation
• Tray
• Resolution
4. Click [OK].
1. On the [Start] menu, select [Control Panel]. Then select [Printers and Other Hardware], and
then [Printers and Faxes].
In Windows 2000, point to [Settings] on the [Start] menu, and then click [Printers].
175
5. Fax via Computer
In Windows XP Professional, Windows Server 2003/2003 R2, select [Printers and Faxes] on the
[Start] menu.
In Windows Vista or Windows Server 2008, select [Control Panel] on the [Start] menu. Then select
[Hardware and Sound], and then [Printers].
2. Select to highlight [LAN-Fax M13], then click [Properties] on the [File] menu.
With Windows Vista, click [Set printer properties].
3. Click the [Accessories] tab, and then make the settings for the option configuration.
4. When the machine is connected to a network, option configuration is automatically
performed. If the settings do not match the installed optional units, click [Load from Device].
5. When the machine is connected locally to your computer, select the check boxes for the
installed optional units.
6. Click [Apply].
Option configuration settings are complete.
5 7. Click [OK].
[Accessories] tab
The [Accessories] tab contains the following items besides option configuration items.
• Prohibit manual destination entry
Check this option to inhibit direct destination specification.
• Enable E-mail
Check this when using Internet Fax with the LAN-Fax function.
• IP-Fax
Check this option when using IP-Fax.
After checking this option, select a protocol by clicking an appropriate radio button.
• If the options on this machine are not configured as instructed, LAN-Fax functions may fail.
• When this machine is connected to a network and the port is set via the “SmartDeviceMonitor for
Client” port, option configuration is automatically performed. For details, see LAN-Fax Driver's Help.
Basic Transmission
This section explains how to send fax documents created using Windows applications.
To send a fax, simply select [Print...] from the Windows application, then select [LAN-Fax M13] as the
printer, and then specify a destination in the [LAN-Fax] dialog box.
Open the application document you want to send or create a new document, and then perform the following
procedure.
176
Sending Fax Documents from Computers
• When using SmartDeviceMonitor for Client, you cannot send documents to this machine using more
than one LAN-Fax at the same time.
• The machine can retain documents sent from a LAN-Fax Driver as files to be sent.
• For the maximum values of the following items, see “Maximum Values”.
• Number of destinations you can specify per file
• Number of documents sent from a LAN-Fax Driver that the machine can retain as files to be sent
177
5. Fax via Computer
• To use a destination list to specify a destination, you must insert the machine's address book data into
the destination table of the LAN-Fax Driver. See “Using the Machine's Address Book as the LAN-Fax
Destination List”.
• For details about specifying destinations, see the LAN-Fax Driver's Help.
• p.189 "Using the Machine's Address Book as the LAN-Fax Destination List"
• In order to use this method, you need to register destinations in the address list using Address Book.
• To use device address data as the LAN-Fax Driver destination table, you must convert the destinations
registered on the machine to a CSV file and send that file to your computer. For details, see “Using
the Machine's Address Book as the LAN-Fax Destination List”.
178
Sending Fax Documents from Computers
2. Select a CSV file containing the desired destination list, from the [Address Book:] dropdown
menu.
Up to the three most recently used files appear in the dropdown menu. To use a destination list that
did not appear, click [Browse...], and then select the file.
3. Select [Contact] or [Group] in the [Name:] dropdown menu as the display format.
Destination list contents change as follows, depending on the option selected:
• Contact: Individual name, company name, department name, fax number
• Group: Group name
4. If you selected [Contact] in step 3, select the type of fax from the [Type:] dropdown menu.
To send by standard fax or IP-Fax, select [Fax]. To send by Internet Fax, select [E-mail].
5. Click the destination in the destination list to highlight it, and then click [Set as Destination].
The selected destination is added and appears in the [List of Destination:] box.
If you add a destination by mistake, click the wrong destination, and then click [Delete from List]. 5
In the Address Book list box, directly enter the name you want to search for. You can then jump to the
name you entered.
6. To specify more destinations, repeat steps 2 through 4.
• For details about specifying destinations, see the LAN-Fax Driver's Help.
• Destination list contents can be narrowed down by selecting the first letter of a contact name, company
name or group name in the [Search] dropdown menu.
• p.189 "Using the Machine's Address Book as the LAN-Fax Destination List"
179
5. Fax via Computer
5
• For details about specifying destinations, see the LAN-Fax Driver's Help.
• For the maximum number of digits that can be included in a destination, see “Maximum Values”.
Specifying Options
• For details about transmission options, see the LAN-Fax Driver's Help.
180
Sending Fax Documents from Computers
• Click [Edit Cover Sheet...] to edit the cover sheet. For details, see “Editing Fax Cover Sheets”.
To display preview
Selecting the [Preview] check box allows you to check how the fax document will be output at the
destination.
181
5. Fax via Computer
Saving as files
You can save the fax document in TIFF format (TIFF-F).
• Single-page documents are saved as single-page TIFF files, and multiple-page documents are saved
as multi-page TIFF files.
182
Sending Fax Documents from Computers
From “SmartDeviceMonitor for Admin”, “SmartDeviceMonitor for Client”, or Web Image Monitor, you
can check information about files sent using LAN-Fax Driver.
For the maximum number of transmission results you can check, see “Maximum Values”.
Also, you can save the contents of the Journal in a personal computer as a CSV file using [Load Fax Journal]
in “SmartDeviceMonitor for Admin”.
• When data is transmitted from the LAN-Fax Driver via the “SmartDeviceMonitor for Client” port, the
"Data-transmission complete." message appears on the computer's display, so you can easily
ascertain the communication progress. However, if the volume of communication data from the LAN-
Fax to this machine increases, the message may appear during the operation, due to the differences
in memory capacity between this machine and “SmartDeviceMonitor for Client”. For more accurate
fax transmission results, use “E-mail TX results”.
5
• The job history may differ from the machine's transmission results. In that case, refer to the machine's
transmission results.
• See the relevant Help for details.
After communicating in the LAN-Fax mode, this function transmits the communication results with the
computer by e-mail.
• To confirm transmission results by e-mail, the Hard Disk Drive Option and printer/scanner functions
must be installed.
When you have done [Send] or [Send & Print] using the LAN-Fax, and when the communication was
successful, it transmits e-mail of the transmission result.
Result notification e-mail is sent when printing is complete, or if an error occurs during communication
between this machine and a computer.
183
5. Fax via Computer
When entering the machine's programmed address, click the [Device Address] radio button, and then
enter the registration number of the destination list in the [Device Address] box.
The [Device Address] box is unavailable when [Specify destinations] is selected, and you cannot enter
anything in the text box.
4. Click [Send] or [Send & Print].
• You can confirm transmission results using the E-mail TX Result function and the Communication Result
Report. You can set whether to use both of these together in User Parameter (switch 10, bit 6) in the
Fax Features menu. See “Parameter Settings”.
• If there be any insufficient configurations in the e-mail menu on this machine, or if “Auto Specify Sender
Name” is set to “Off”, the LAN-Fax result notification e-mail is not transmitted, and the LAN-Fax Result
Report is printed. See “Connecting the Machine”, Network and System Settings Guide for the e-mail
settings, and see “LAN-Fax Result Report” for the LAN-Fax Result Report.
5
• p.184 "LAN-Fax Result Report"
• p.226 "Parameter Settings"
• Whether or not the LAN-Fax Result Report is printed, can be configured with User Parameter (Switch
20, bit 0) in the Fax Features menu. See “Parameter Settings”.
• When executing [Send] or [Send & Print] with the LAN-Fax Driver, and when the E-mail TX Result
Report has not arrived, the Communication Result Report is printed. For details about Communication
Result Report, see “Communication Result Report (Memory Transmission)”.
184
Sending Fax Documents from Computers
• You can also save documents in TIFF format. For details about saving in TIFF format, see “Saving as 5
files”.
• You can select the length of time the machine keeps document data in memory if print failed due to
problems such as paper shortage or paper jams. Make this setting with User Parameters (switch 20,
bit 5, 4, 3, 2) in the Fax Features menu. Data is deleted when the specified length of time elapses.
See “Parameter Settings”.
• For details about printing the fax image, see the LAN-Fax Driver's Help.
You can program and edit destinations in the address list using the Address Book.
• For details about the Address Book, see the LAN-Fax Driver's Help.
• You can use files created in CSV format as Address Book data. For this purpose, create CSV files that
conform to a certain format. For more information, see Help.
185
5. Fax via Computer
1. On the [Start] menu, point to [All Programs], [LAN-Fax Utilities], and then click [Address
Book].
The [Address Book] dialog box appears.
If LAN-Fax Driver has already started up, click [Edit Address Book...].
2. Click [New/Browse...], and then select the CSV file containing the address list to be edited.
3. Enter the destination and name.
You can enter a contact name, company name, department name, fax number, e-mail address, and
IP-Fax address. The name and destination (Fax Number, E-mail address or IP-Fax address) cannot
be omitted.
4. Click [Add].
The destination is added to the destination list.
5. Click [Close].
• To program the contents of the destination list of this machine to the Address Book, select the [Use
device address] check box, then enter the destination list's registration number in the [Device Address:]
field.
• For [Line:] under [Fax Number:], the following line types are selectable; G3, G3-2, G3-3, G4, G3
Dir. Auto, G3 PABX Auto, or I-G3. However, this machine supports G3 only.
• For [Protocol:] under [IP-Fax address:], select [H.323] or [SIP].
• To bypass the SMTP server, under the [E-mail address:] box, select the [Do not use SMTP server]
check box.
1. On the [Start] menu, point to [All Programs], [LAN-Fax Utilities], and then click [Address
Book].
The [Address Book] dialog box appears.
If LAN-Fax Driver has already started up, click [Edit Address Book...].
2. Click [New/Browse...], and then select the CSV file containing the address list to be edited.
186
Sending Fax Documents from Computers
LAN-Fax Cover Sheet Editor allows you to edit the format for fax cover sheets.
187
5. Fax via Computer
• It is necessary to create a cover sheet file before attaching a cover sheet to fax document using LAN-
Fax Driver.
1. On the [Start] menu, point to [All Programs], [LAN-Fax Utilities], and then click [LAN-Fax
Cover Sheet Editor].
The [LAN-Fax Cover Sheet Editor] dialog box appears.
2. Edit the cover sheet.
For details about operations, see Help.
3. Click [Save as...] on the [File] menu.
4. Select a folder, and then enter a file name.
5. Click [Save].
• Cover sheet data is stored in its own format (using “fcp” as its extension).
188
Sending Fax Documents from Computers
You can check information about this machine's fax functions using a computer and save files on a computer
using SmartDeviceMonitor for Admin.
• For details about SmartDeviceMonitor for Admin and its installation, see “Using SmartDeviceMonitor
for Admin”, Network and System Settings Guide.
• For details, see “Using SmartDeviceMonitor for Admin”, Network and System Settings Guide and
SmartDeviceMonitor for Admin Help.
Using SmartDeviceMonitor for Admin, you can copy the machine's Address Book data as a CSV file to a
computer. This file can then be used as the LAN-Fax Destination List, and can also be installed on the
machine using [Address Management Tool]. This section explains how to use the Address Book for LAN-
Fax.
189
5. Fax via Computer
• When destinations registered in groups by this machine are inserted into Address Book, each person's
destination is determined according to the following order of priority (check before inserting and
changing the order of priority, if necessary): IP-Fax destination Fax number E-mail address
• You may not be able to use the machine when it is updating the Address Book using CSV files (retrieved
using SmartDeviceMonitor for Admin) that contain user codes.
• For details, see “SmartDeviceMonitor for Admin” Help.
190
Sending Fax Documents from Computers
6. Close the [Address Management Tool] dialog box, and then close SmartDeviceMonitor for
Admin.
This will be followed by a procedure for displaying the computer's Address Book file on the LAN Fax
screen.
This section explains typical operation error messages displayed on the computer when using the LAN-
Fax Driver, and solutions to those messages.
The number of entries in Destinations The number of destinations specified exceeds the maximum
exceed the limits. Up to 300 entries can possible. The maximum number of destinations that can be
be entered. specified at one time is 300.
“LAN-Fax” has already been launched. The [LAN-Fax] dialog box is already open. Quit LAN-Fax
Cannot launch it again. once, and then start it up again.
191
5. Fax via Computer
• To use this function, the Hard Disk Drive Option and printer/scanner functions are required.
• It is recommended that you use a Web Image Monitor running under the same network environment
as this machine. Otherwise, the Web browser may not open and an error may occur.
• When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
“192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine.
• You need to select “Store(Notify)” or “Store(Do not Notify)” as the “Reception File Setting” in the Fax
5 Features menu. For details about Reception File Setting, see “Reception File Setting”.
• You can also check and manage the documents using DeskTopBinder. For details about the operation
on DeskTopBinder, see the DeskTopBinder's manual and Help.
• For details about using Web Image Monitor, see “Monitoring and Configuring the Printer”, Network
and System Settings Guide.
Viewing, Printing, and Deleting Received Fax Documents Using Web Image
Monitor
This section explains how to view and/or print received fax documents using Web Image Monitor.
192
Viewing Fax Information Using a Web Browser
If the programmed user code was deleted using the Address Book Management function under System
Settings, a message indicating incorrect user code entry appears. If this is the case, reprogram a user
code.
5. Click the property icon of the desired fax document.
When viewing a list of the fax documents, you can select the thumbnail display, icon display, or detail
display. Click , , or .
6. View the content of the fax document.
7. To download the received fax document, click [PDF] or [Multi-page: TIFF], and then click
[Download].
A downloading confirmation dialog box appears.
When you select [PDF], make the necessary “PDF File Security Settings” before clicking [Download].
Acrobat Reader starts and the selected document is displayed.
8. Close the Web browser.
5
• If your computer cannot be connected to Web Image Monitor, see “Monitoring and Configuring the
Printer”, Network and System Settings Guide.
• To enlarge the preview image, click [Enlarge Image]. Enlargement cannot be performed without
Acrobat Reader installed. For more information, see Help on the Web Image Monitor.
• To download the document data on the list of received fax documents, click [TIFF] or [PDF]. For details
about downloading, see the Web Image Monitor Help.
• The method for downloading differs depending on the selected format. For more information, see
Help on the Web Image Monitor.
193
5. Fax via Computer
6. Click [Print].
To cancel printing, press [Cancel] before clicking [Print].
7. Click [OK].
The display returns to that of step 5.
8. Close the Web browser.
• You can change the printing order of selected multiple documents. You can also have documents
printed on both sides of the paper. For more information, see Help on the Web Image Monitor.
• After selecting multiple documents, you can also cancel deletion of some of the selected documents.
For more information, see Help on the Web Image Monitor.
If the receiving machine is compliant with T.37 full mode Internet Fax, you can program the receiver's
properties from Web Image Monitor.
194
Viewing Fax Information Using a Web Browser
195
5. Fax via Computer
196
6. Fax Features
This section describes User Tools in the Fax Features menu.
• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off or the [Clear Modes] key is pressed.
• Default settings are shown in bold type.
BRJ032S
2. Select the menu using [ ] or [ ], and then press the [OK] key.
To change the Fax Features, select [Fax Features].
3. Select the item using [ ] or [ ], and then press the [OK] key.
4. Change settings by following instructions on the display, and then press the [OK] key.
197
6. Fax Features
• To cancel changes made to settings and return to the initial display, press the [User Tools/Counter]
key.
6
BRJ032S
• You can also quit User Tools by pressing the [Escape] key.
198
General Settings/Adjust
General Settings/Adjust
This section describes the User Tools in the General Settings/Adjust menu under Fax Features.
Adjust Sound Volume
Adjust the sound volume during On Hook Mode and Immediate Transmission.
The default setting is 2 (the second lowest level).
For details about how to adjust the sound volume, see “Adjusting the Volume”, Troubleshooting.
Program Fax Information
Register the sender details that appear on the recipient's fax machine and faxed document.
For details about Program Fax Information, see “Registering Fax Information”.
On Hook Release Time
Use this function to specify a time to cancel On Hook mode after you transmit using On Hook dialing.
This is useful when On Hook dialing is cancelled in fax information service.
The default setting is 3 minutes.
Set User Function Key 6
Frequently used functions can be programmed as User Function key.
The User Function keys can be programmed with the following items:
• Print Journal
• TX File Status (Transmission File Status)
• RX File Status (Reception File Status)
• 2 Sided TX (Two-sided transmission)
• Print Fax Header
• Forwarding
• Switch Reception Mode
• Start Manual Reception
• Sender Settings
• E-mail Options
• Print TX Status Report (Print Transmission Status Report)
• Manual E-mail Reception
• Select Line/SMTP
• SUB/SEP Code
• Specify Dest. Reg. No. (Specify Destination Registration Number)
• Not programmed
199
6. Fax Features
• For details about the display panel and how to use the keys, see “Reading the Display Panel and
Using Keys”.
200
Reception Settings
Reception Settings
This section describes the User Tools in the Reception Settings menu under Fax Features.
Switch Reception Mode
Specify the method for receiving fax documents.
The default setting is Auto Reception.
RX Mode Auto Switch Time
Specify the number of rings with the Auto Switch Time.
In Auto Switch Mode, the machine rings a number of times to give you the chance to pick up the
handset before taking the call automatically.
The default setting is 8 Times.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Reception Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [RX Mode Auto Switch Time] using [ ] or [ ], and then press the [OK] key.
4. Enter the number of rings from 1 to 29 using the number keys, and then press the [OK] key. 6
5. Press the [User Tools/Counter] key.
Authorized Reception
Specify whether or not unwanted fax documents are to be screened out.
The default setting is Off.
To use this function, program the Special Senders function in advance. For details, see “Programming
Initial Set Up of a Special Sender”.
Checkered Mark
Specify whether or not a checkered mark is to be printed on the first page of received fax documents.
The default setting is On.
Center Mark
Specify whether or not a center mark is to be printed halfway down the left side and at the top center
of each page received.
The default setting is Off.
Print Reception Time
Specify whether or not received date and time are to be printed at the bottom of received fax
documents.
The default setting is Off.
2 Sided Print
Specify whether or not received fax documents are to be printed on both sides of the paper.
201
6. Fax Features
202
E-mail Settings
E-mail Settings
This section describes the User Tools in the E-mail Settings menu under Fax Features.
Default settings are shown in bold type.
Internet Fax Settings
You can select to display or not. When you want to send an Internet Fax, set On to display
the icon.
The default setting is Off.
Maximum E-mail Size
Use this setting to limit the size of sent e-mail, so that destinations that refuse e-mail over a certain size
can still receive your e-mail. When this function is set to on, you cannot send e-mail that is larger than
the specified limit.
The default setting is Off.
When e-mail exceeds the maximum file size, an Error Report is output, and the e-mail is deleted.
Even when e-mail does not exceed the size limit, it may be rejected if it does not meet the requirements
of the server settings. 6
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Maximum E-mail Size] using [ ] or [ ], and then press the [OK] key.
4. Select [On] using [ ] or [ ], and then press the [OK] key.
5. Enter an upper limit on the size of outgoing e-mail using the number key, and then press the [OK]
key.
Specify a size limit of 128 - 102,400 KB.
If you make a mistake, press the [Clear/Stop] key, and then reenter the number.
6. Press the [User Tools/Counter] key.
SMTP RX File Delivery
This function is available on systems that allow routing of e-mail received via SMTP.
The default setting is Off.
When an authorized e-mail is set, e-mail received from addresses that do not match the authorized
address is discarded and an error message is returned to the SMTP server.
The authorized e-mail address is compared with the addresses of e-mail originators, as illustrated by
the following examples.
• When the authorized e-mail address is set to “@aaa.abcd.com”:
abc@aaa.abcd.com - accepted
def@aaa.xyz.com - not accepted
203
6. Fax Features
• For details about the display panel and how to use the keys, see “Reading the Display Panel and
Using Keys”.
204
IP-Fax Settings
IP-Fax Settings
This section describes the User Tools in the IP-Fax Settings menu under Fax Features.
Default settings are shown in bold type.
Make settings to use IP-Fax.
Set H.323 for the gatekeeper, SIP for SIP server, and the VoIP gateway to G3 fax if necessary. Check the
settings of the network to which this machine is connected before making settings.
The following characters can be used for registration of the alias telephone number in H.323 Setting. Make
sure you enter these characters correctly:
• Numbers
• Symbols ( and )
The following characters can be used for registration of the SIP User Name in SIP Settings. Make sure you
enter these characters correctly:
• Alphanumeric symbols (lower and upper cases)
• Symbols (;?:&= $,-_.!~ '@()%/[])
Use numbers and periods (“.”) to enter the correct IP addresses for the gatekeeper, SIP server, and VoIP
6
gateway. To obtain the correct IP addresses, consult administrator.
Enable H.323
Specify whether or not H.323 is used for IP-Fax transmission.
The default setting is Off.
Enable SIP
Specify whether or not SIP is used for IP-Fax transmission.
The default setting is Off.
H.323 Settings
Set the IPv4 address and alias telephone number of the gatekeeper.
To use the gatekeeper, set the parameter setting (switch 34, bit 0) to “On”.
The default parameter setting for switch 34, bit 0 is Off.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [IP-Fax Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [H.323 Settings] using [ ] or [ ], and then press the [OK] key.
4. Select [Gatekeeper Address (Main)] using [ ] or [ ], and then press the [OK] key.
5. Enter the IPv4 address of the gatekeeper, and then press the [OK] key.
6. Select [Own Fax No.] using [ ] or [ ], and then press the [OK] key.
7. Enter Own Fax No. and then press the [OK] key.
205
6. Fax Features
206
IP-Fax Settings
5. Select [Not Programmed] using [ ] or [ ], and then press the [OK] key.
6. Enter the Prefix using the number key, and then press the [OK] key.
For documents sent using a VoIP gateway to G3 Fax, prefixes can be used. If the first several
digits of IP-Fax number and the VoIP gateway- specific prefix are identical, documents can be
transmitted using the registered digits of the VoIP gateway. For example, if both 03 and 04 have
been registered as VoIP gateway number while 0312345678 is also specified, documents can
be transmitted via a VoIP gateway for which 03 is used as a prefix.
When you wish to use the VoIP gateways regardless of the IP-Fax destination numbers, register
only the VoIP gateway addresses without registering the prefix.
7. Enter VoIP gateway address and then press the [OK] key.
8. Select [H.323] or [SIP] using [ ] or [ ], and then press the [OK] key.
9. Press the [User Tools/Counter] key.
Deleting VoIP gateway:
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [IP-Fax Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Gateway Settings] using [ ] or [ ], and then press the [OK] key. 6
4. Select [Delete] using [ ] or [ ], and then press the [OK] key.
5. Select the VoIP gateway you want to delete using [ ] or [ ], and then press the [OK] key.
6. Press [Yes].
7. Press the [User Tools/Counter] key.
207
6. Fax Features
Administrator Tools
This section describes the User Tools in the Administrator Tools Settings menu under Fax Features.
Print Journal
Prints a Journal. Up to 50 of the latest results of transmission/reception results can be checked on this
machine.
You can also print the journal using the [Job Information] key.
Print TX Standby File List
Use this function to print the transmission standby file list.
You can also print the transmission standby file list using the [Job Information] key.
Communication Page Count
Checks the transmission and reception on the display.
Memory Lock
When you switch Memory Lock on, received documents are stored in memory and not printed
6 automatically. When a document is received in the Memory Lock mode, the Receiving File indicator
blinks. To print this document, enter the Memory Lock ID. A user without the ID cannot print the
document. This prevents unauthorized users from accessing the document.
To use Memory Lock, program the Memory Lock ID, and then switch Memory Lock on.
To store incoming documents from Special Senders only in Memory Lock, program each sender with
“Program Special Sender”.
This function cannot be used with Internet Fax or Mail to Print.
The default setting is Off.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Memory Lock] using [ ] or [ ], and then press the [OK] key.
4. Select [On] using [ ] or [ ], and then press the [OK] key.
5. Press the [User Tools/Counter] key.
Forwarding
Specify whether or not received fax documents are to be forwarded to a programmed receiver.
The default setting is Off.
For details about Forwarding, see “Forwarding”.
Folder TX Result Report
When a folder is included in the forwarding destination or the forwarding destination by special
sender, the specified destination will be notified of the results of forwarding.
208
Administrator Tools
To forward to two or more destinations, specify group destination. For details about how to specify
group destination, see “Registering a Names to a Group”, Network and System Settings Guide.
Even if the Folder Transfer Result Report is not successfully transmitted, the report is not printed on this
machine.
The default setting is Do not E-mail.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Folder TX Result Report] using [ ] or [ ], and then press the [OK] key.
4. Select [E-mail] using [ ] or [ ], and then press the [OK] key.
5. Search and select a receiver using the Quick Dial keys or the [Search Destination] key, and then
press the [OK] key.
6. Press the [User Tools/Counter] key.
Parameter Setting
Parameter Setting allows you to customize various settings to suit your needs. To change function
settings, set the Parameter Switches. For details, see “Parameter Settings”.
Program Special Sender 6
Program/Change/Delete Special Senders, perform initial setup, and print the Special Sender List.
You can set functions for each sender if Special Senders are preprogrammed. For details, see
“Program Special Sender”.
Program Memory Lock ID
Program a Memory Lock ID to be entered before printing documents when the Memory Lock function
is activated.
Preprogram the ID when you set “Memory Lock” and “Program Special Sender”-“Memory Lock”.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Program Memory Lock ID] using [ ] or [ ], and then press the [OK] key.
4. Enter the ID using the number key, and then press the [OK] key.
A Memory Lock ID can be any four-digit number, except 0000.
If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then enter
again.
5. Press the [User Tools/Counter] key.
For details about printing a file received with Memory Lock, see “Printing a File Received with Memory
Lock”.
Select Dial/Push Phone
Use this function to select a line type.
209
6. Fax Features
6 Use this setting if your machine is connected to a PABX that requires you to dial a certain number
such as “0” followed by a pause to connect to the outside line. By programming “0” as the
Outside Access No., a pause will be inserted automatically after the “0” when dialing.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [G3 Analog Line] using [ ] or [ ], and then press the [OK] key.
4. Select [Extension/Outside] using [ ] or [ ], and then press the [OK] key.
5. Select [Extension] or [Outside] using [ ] or [ ], and then press the [OK] key.
6. Select [Outside Access No.] using [ ] or [ ], and then press the [OK] key.
7. Enter the Outside Access No. using the number key, and then press the [OK] key.
You can program the number up to two digits.
If you make a mistake, press the [Clear/Stop] key, and then enter again.
8. Press the [User Tools/Counter] key.
Memory File Transfer
If the printer has stopped functioning or run out of toner or paper, you can transfer the files in facsimile
memory to another machine for printing. Note that this function forwards all documents that are stored
in memory, including files that were received with Memory Lock. Use this function only in emergencies.
For details, see “Memory File Transfer”.
RDS On/Off (Remote Diagnostic System)
If your machine has a problem, a service representative can perform various diagnostic tasks over
the telephone line from the service station to try to find out what is wrong with your machine. The
210
Administrator Tools
service representative can also use RDS to change some of your machine's settings if you request it.
When the machine is shipped, this feature is turned on.
Menu Protect
Using Menu Protect, you can prevent unauthenticated users from changing the User Tools.
For details, consult your administrator.
211
6. Fax Features
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Memory File Transfer] using [ ] or [ ], and then press the [OK] key.
4. Press [Line], then use [ ] or [ ] to select [G3], [H.323], or [SIP], and then press the [OK]
key.
5. Enter the forwarding destination, and then press the [Start] key.
212
Memory File Transfer
If you make a mistake, press the [Clear/Stop] key, and then try again.
6. Press the [User Tools/Counter] key.
• The document is not deleted after you forward it. It is stored in the machine.
• All documents stored in facsimile memory are forwarded, including received with Memory Lock.
• If you program SUB Codes as User Function keys beforehand, you can use SUB Codes and a
password to specify a forwarding destination. Take care to change only those settings that are
required. For details about the User Function keys, see “General Settings/Adjust”.
213
6. Fax Features
• To use this function, the Hard Disk Drive Option and printer/scanner functions are required.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Reception Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Reception File Setting] using [ ] or [ ], and then press the [OK] key.
4. Select [Store(Notify)], [Store(Do not Notify)] , or [Print] using [ ] or [ ], and then press the
[OK] key.
If you select [Store(Notify)] and specify a notification destination, notification that the document was
received is sent to the specified e-mail address. Further, you can register a group destination. For the
maximum number of destinations you can specify in a group, see “Maximum Values”.
5. Press the [User Tools/Counter] key.
214
Reception File Setting
• You can use “Parameter Settings” (switch 10, bit 5) to select whether or not to print stored received
documents. See “Parameter Settings”.
• Documents saved on the hard disk are categorized as received and stored documents.
• You cannot change to a different setting if received documents have been stored on the hard disk. To
change to different setting, print documents stored on the hard disk if necessary, and then delete them.
• You cannot use the control panel to manage stored documents.
• With [Store(Notify)] or [Store(Do not Notify)] selected, more memory space is used as the number of
saved documents increases. After memory space becomes insufficient, no more documents are saved
on the hard disk. When this happens, the machine starts printing and then overwriting old documents,
or it deletes the received document data without printing it and then prints the Reception File Erased
Report.
• You can store received documents up to a total of approximately 320 pages of A4 size Standard
<ITU-T 1Chart>.
• You cannot send received documents.
• It is recommended that you use Web Image Monitor running under the same network environment
as this machine. Otherwise, the Web browser may not open and an error may occur.
6
Even if the machine is set to store documents on its hard disk when it cannot print them if they cannot be
stored normally because of the following conditions, the machine usually prints them.
• Error occurs on the hard disk of the machine
• The memory is full
• The number of received documents exceeds the number of received documents you can store on the
machine's hard disk or facsimile memory
In this case, you can have machine delete the document data without printing it. The machine prints the
Reception File Erased Report to confirm information in the received document instead.
Using the User Parameters (switch 10, bit 7) on the Fax Features menu, you can select whether or not to
turn on this function. See “Parameter Settings”.
• For details about storing documents on the machine's hard disk, see “Reception File Setting”.
215
6. Fax Features
• You cannot change to a different setting if received documents have been stored on the hard disk. To
change to different setting, print documents stored on the hard disk if necessary, and then delete them.
When a received document is stored, this report is sent to the e-mail address set as the destination for
notification.
• Depending on your e-mail application, a phishing warning might appear after you receive a
“Reception Report e-mail”. To prevent phishing warnings appearing after you receive a “Reception
Report e-mail”, you must add the sender to your e-mail application's exclusion list. For details about
how to do this, see your e-mail application's Help.
6
216
Registering Fax Information
• You can confirm programmed settings from the Parameter Settings List. It is recommended to print and
keep the Parameter Settings List when you program or change settings. For information about how to
print the Parameter Settings List, see “Printing the Parameter Settings List”.
Fax Header
The Fax Header is printed as the header of every fax you send. You should include your name in the
Fax Header.
You can register “Fax Header” using up to 32 alphanumeric characters, symbols, and spaces.
You can set whether or not to print the Fax Header (for printing) in [Print Fax Header] under [TX Mode].
For details about how to set, see “Fax Header Print”.
Own Name 6
The Own Name is sent to the other party when you send or receive a fax. This name should include
your name. The Own Name is shown on the display of the other machine and printed in a report.
Own Name works only if the other machine is of the same manufacturer and has the Own Name
function.
You can register “Own Name” using up to 20 alphanumeric characters and symbols.
Own Fax Number (facsimile number of sender)
The sender's Own Fax Number is sent to the other party when sending a fax. The Own Fax Number
is shown on the display of the other machine and printed in a report.
This function is available regardless of the manufacturer of the other party's machine.
You can register “Own Fax Number” using up to 20 numbers, spaces, and the “ ” symbol.
217
6. Fax Features
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [General Settings/Adjust] using [ ] or [ ], and then press the [OK] key.
3. Select [Program Fax Information] using [ ] or [ ], and then press the [OK] key.
4. Select fax information you want to program/change using [ ] or [ ], and then press the
[OK] key.
5. Program/change the selected fax information, and then press the [OK] key.
6. Press the [User Tools/Counter] key.
1. Select [Fax Header] using [ ] or [ ], and then press the [OK] key.
218
Registering Fax Information
2. Enter the fax header, and then press the [OK] key.
To change the programmed Fax Header, press the [Clear/Stop] key, and then enter again.
• You can register “Fax Header” using up to 32 alphanumeric characters, symbols, and spaces.
• For details about entering text, see “Entering Text”, About This Machine.
1. Select [Own Name] using [ ] or [ ], and then press the [OK] key.
2. Enter the own name, and then press the [OK] key.
To change the programmed Own Name, press the [Clear/Stop] key, and then enter again.
• You can register “Own Name” using up to 20 alphanumeric characters and symbols.
• For details about entering text, see “Entering Text”, About This Machine.
1. Select [Own Fax Number] using [ ] or [ ], and then press the [OK] key.
219
6. Fax Features
2. Enter the own fax number using the number keys, and then press the [OK] key.
To change the programmed Own Fax Number, press the [Clear/Stop] key, and then enter again.
When you enter “ ” and space, press [ ], [Space] for each.
If you make a mistake, press the [Clear/Stop] key, and then enter again.
• You can register “Own Fax Number” using up to 20 numbers, space, and “ ” symbol.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
6
2. Select [General Settings/Adjust] using [ ] or [ ], and then press the [OK] key.
3. Select [Program Fax Information] using [ ] or [ ], and then press the [OK] key.
4. Select fax information you want to delete using [ ] or [ ], and then press the [OK] key.
220
Registering Fax Information
221
6. Fax Features
Forwarding
Print documents received and forward to a specified end receiver. This is useful if, for example, you are
visiting another office and would like a copy of your documents to be sent to that office.
You can also specify a “folder” as the forwarding destination.
222
Forwarding
• One end receiver can be registered for each special sender. To register two or more end receivers,
use group destination. Up to 100 destinations can be specified in a group. However, when adding
a group to another group, a maximum of 150 destinations can be specified in a group.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key. 6
223
6. Fax Features
If you make a mistake, press the [Clear/Stop] key, and then enter again.
6. Press the [User Tools/Counter] key.
• In Step 5, you can search for and specify the forwarding destination by pressing the Search Destination
key or a User Function key. To specify a forwarding destination by pressing a User Function key, you
must first register the [Specify Dest. Reg. No.] function as a User Function key. For details about the
User Function keys, see “General Settings/Adjust”.
• For details about how to register folders, see “Registering Folders”, Network and System Settings
Guide.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
224
Forwarding
Forwarding Mark
BBM015S
You can specify whether or not to print a Forwarding Mark in the User Parameters (switch 02, bit 0). See
“Parameter Settings”.
This function is not available when Forwarding is performed to a folder destination.
225
6. Fax Features
Parameter Settings
User Parameters allow you to customize various settings to suit your needs. To change function settings, set
the User Parameter Switches.
Switches and Bits
Each User Parameter has a set of switches, and each of the switches consist of eight bits, whose values
are “0” or “1”. The right most bit is bit 0 and the left most is bit 7. You can adjust the settings to match
your needs by switching the value of bits between “0” and “1”.
Switch 02:
0 0 0 1 1 0 1 1
7 6 5 4 3 2 1 0
226
Parameter Settings
227
6. Fax Features
228
Parameter Settings
• 1: On
Switch: 10, Bit: 6
Use both e-mail notification and printed reports to confirm the transmission result
• 0: Off
• 1: On
Switch: 10, Bit: 7
Have the machine delete the document data without printing it when an error occurs
• 0: Off
• 1: On
Switch: 11, Bit: 2
Detect and report nearly blank documents when scanning
• 0: Off
• 1: On
Switch: 11, Bit: 6
Local print when forwarding 6
• 0: Off
• 1: On
Switch: 14, Bit: 0
Print documents received with Auto Power-On Reception
• 0: Immediate printing (On)
• 1: When turning on the operation switch (Off)
Switch: 14, Bit: 1
Long Document Transmission (Well Log)
• 0: Off
• 1: On
Switch: 14, Bit: 3
Reset when function changed
• 0: Off
• 1: On
Switch: 15, Bit: 2, 1, 0
Selecting the available paper feed tray
You cannot specify any values other than the following
• 001: Tray 1
229
6. Fax Features
• 010: Tray 2
• 011: Tray 3
Switch: 15, Bit: 5
Select the specified paper feed tray
• 0: Off
• 1: On
Switch: 17, Bit: 2
Whether you need to press [Add Dest] after entering a Quick Dial/Group Dial when broadcasting
• 0: Not necessary
• 1: Necessary
Switch: 17, Bit: 3
Whether or not to reset the settings when original is scanned
• 0: On
• 1: Off
6 Switch: 18, Bit: 0
Print date with Fax Header
• 0: Off
• 1: On
Switch: 18, Bit: 1
Print transmitter origin with Fax Header
• 0: Off
• 1: On
Switch: 18, Bit: 2
Print file number with Fax Header
• 0: Off
• 1: On
Switch: 18, Bit: 3
Print page number with Fax Header
• 0: Off
• 1: On
Switch: 19, Bit: 1
Sort Journal by transmission type
• 0: Off
230
Parameter Settings
• 1: On
Switch: 20, Bit: 0
Automatic printing of the LAN-Fax Result Report
• 0: Off
• 1: On
Switch: 20, Bit: 5, 4, 3, 2
Reprinting time of stored documents in memory that could not be printed using LAN-Fax Driver
• 0000: 0 minutes
• 0001: 1 minute
• 0010: 2 minutes
• 0011: 3 minutes
• 0100: 4 minutes
• 0101: 5 minutes
• 0110: 6 minutes
• 0111: 7 minutes 6
• 1000: 8 minutes
• 1001: 9 minutes
• 1010: 10 minutes
• 1011: 11 minutes
• 1100: 12 minutes
• 1101: 13 minutes
• 1110: 14 minutes
• 1111: 15 minutes
Switch: 21, Bit: 0
Print results of sending Reception Notice Request message
• 0: Off (print only when an error occurs)
• 1: On (print every time)
Switch: 21, Bit: 1
Respond to e-mail reception acknowledgment request
• 0: Off
• 1: On
Switch: 21, Bit: 2
Choose whether to print JPEG or PDF files attached to incoming e-mail
231
6. Fax Features
• 0: Do not print
• 1: Print
Switch: 21, Bit: 3
File format for files forwarded to folder destinations
• 0: TIFF
• 1: PDF
Switch: 21, Bit: 4
Transmit Journal by E-mail
• 0: Off
• 1: On
Switch: 21, Bit: 5
Limit printing of specified data in normal e-mail (attached TIFF files)
• 0: No
• 1: Yes
6 Switch: 21, Bit: 6
Not displaying Network Errors
• 0: Off
• 1: On
Switch: 21, Bit: 7
Transmit Error Mail Notification
• 0: On
• 1: Off
Switch: 22, Bit: 0
Detect a dial tone before sending faxes when using the telephone line
• 0: Not detect (Off)
• 1: Detect (On)
Switch: 32, Bit: 0
Select priority order for alternative destinations if there is no destination of the specified type.
• 0: Paper Output Priority
<Priority Order>
1. IP-Fax destination
2. Fax number
3. E-mail address
232
Parameter Settings
4. Folder
• 1: Off
Electronic Output Priority
<Priority Order>
1. E-mail address
2. Folder
3. IP-Fax destination
4. Fax number
Switch: 32, Bit: 1
Specify whether or not originals placed faced down on the exposure glass are scanned at 81/2 ×
14
• 0: Off
• 1: On
Switch: 34, Bit: 0
Use gatekeeper with IP-Fax 6
• 0: Off
• 1: On
Switch: 34, Bit: 1
Use SIP Server with IP-Fax
• 0: Off
• 1: On
Switch: 37, Bit: 4
Display the sender's information in the file name of documents that are forwarded to folder destinations
• 0: Off
• 1: On
Switch: 37, Bit: 5
Specify whether or not to limit the file names of documents that are forwarded to folder destinations
to plain characters only
• 0: Off
• 1: On
Switch: 38, Bit:7, 6, 5, 4, 3, 2, 1, 0
Maximum number of resends the machine attempts after failing to forward a fax from a sender
(including special senders) to a folder destination
• 00000000/00000001: 1 time(s) 1111110/11111111: 254 time(s)
233
6. Fax Features
• Access to some User Parameter Setting may require options, or other settings may need to be made
beforehand.
• It is recommended that you print and store the “Parameter Settings List” when you program or change
parameter settings.
• Do not change any bit switches other than those shown on the previous pages.
6 1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.
4. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.
234
Parameter Settings
5. Select the switch number you want to change using the scroll keys, and then press the [OK]
key.
When the bit number is pressed, the current value switches between 1 and 0.
Repeat step 6 to change another bit number for the same switch.
7. Press the [OK] key.
6
• For details about how to print parameter settings list, see “Printing the Parameter Settings List”.
Print this list to see the current Parameter Settings. However, only items of importance or often-used items
are included in the list.
235
6. Fax Features
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.
6
4. Select [Parameter Settings List] using [ ] or [ ], and then press the [OK] key.
To cancel printing a list, press the [Escape] key. The display returns to that of step 4.
6. Press the [User Tools/Counter] key.
236
Home Position
Home Position
Specify the type of original immediately after the power is turned on and when [Clear Modes] key is
pressed.
Home Position
• Image Density
For details about Image Density, see “Image Density (Contrast)”.
• Resolution
For details about Resolution, see “Resolution”.
• Original Type
For details about Original Type, see “Original Type”.
• Transmission Mode
For details about Transmission Mode, see “Transmission Modes”.
• Label Insertion
For details about Label Insertion, see “Label Insertion”. 6
• Fax Header
For details about Fax Header, see “Fax Header Print”.
237
6. Fax Features
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
238
Home Position
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.
4. Select [Home Position] using [ ] or [ ], and then press the [OK] key.
6
5. Select the switch number you want to change using the scroll keys, and then press the [OK]
key.
239
6. Fax Features
240
Program Special Sender
BRANCH 1
241
6. Fax Features
• Authorized RX
• Forwarding
• Memory Lock
• 2 Sided Print
• You cannot program senders as Special Senders if they do not have Own Name or Own Fax Number
programmed.
• The machine cannot differentiate between SEP Code RX documents from Special Senders.
• You cannot use the following functions with Internet Fax receptions.
• Authorized RX
• Memory Lock
• You can program up to 24 characters for the sender.
• To use Forwarding or 2 Sided Print with Internet Fax reception, program the sender's e-mail address.
• You can check Own Name and Own Fax Number using the Journal. You can check programmed
6 Special Senders using the specified sender list.
• For details about checking registered special senders, see “Printing Special Sender List”.
• To specify whether or not to configure “Initial Set UP of a Special Sender”, use the “Special RX
Function” setting in “Initial Set Up”. For details, see “Programming Initial Set Up of a Special Sender”.
Authorized Reception
• To use this function, program the Special Senders function, and then select “On” in “Authorized
Reception” with “Reception Settings”.
• Without programming Special Senders, the Authorized RX function will not work, even if you select
“On”.
• If you select “Off” for “Authorized Reception” in “Initial Set Up”, settings are the same as the Reception
Settings.
• You can change Special Senders in the same way as you program them.
242
Program Special Sender
• By setting User Parameters (switch 8, bit 2), you can configure the machine to receive transmissions
from specified senders only or to receive transmissions from other than specified senders only. See
“Parameter Settings”.
Forwarding
Print received documents, and then transfer them to those receivers programmed beforehand.
Folder destination can be registered.
It is also possible to forward faxes sent only by senders programmed as Special Senders.
• If you specify “On” in “Forwarding” and select [Same as Basic Settings], the fax document is
forwarded to the receivers programmed in “Forwarding”.
• If you do not program any Special Senders, the machine transfers all incoming documents to the other
end receivers specified in “Forwarding”. 6
• You can set the fax destination, Internet Fax destination, IP-Fax destination, and folder destination,
as a forward destination.
• Set folder destinations using the Address Book Management function under System Settings. See
“Registering Folders”, Network and System Settings Guide.
• If you have specified a folder for forwarding, you can specify the file format you want to use for
forwarding in “Parameter Setting” (switch 21, bit 3). See “Parameter Settings”.
Memory Lock
Store incoming documents from programmed senders (Special Senders) in memory without printing them.
People without the Memory Lock ID cannot print the documents, and therefore this function is useful for
receiving confidential documents. If you do not program any senders, the machine receives fax document
from all senders using Memory Lock reception.
• You must register Memory Lock ID in advance. For details about how to register Memory Lock ID,
see “Administrator Tools”.
• If you program the same sender in Memory Lock and Forwarding, Forwarding is disabled.
243
6. Fax Features
2 Sided Print
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
6
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.
244
Program Special Sender
6. Enter the sender name, and then press the [OK] key.
• For details about specifying items in step 8, see “Authorized RX (Authorized Reception)”,
“Forwarding”, “Memory Lock” , or “2 Sided Print”.
245
6. Fax Features
1. Select [Authorized RX] using [ ] or [ ], and then press the [OK] key.
6
2. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
Forwarding
This section describes how to specify Forwarding.
Specify when programming a Special Sender.
• One forward destination can be registered for each Special Sender. To register two or more forward
destinations, use group destinations. Up to 100 destinations can be specified in a group. However,
when adding a group to another group, a maximum of 150 destinations can be specified in a group.
246
Program Special Sender
2. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
Selecting [Same as Basic Settings] will result in the same setting made for [Forwarding] under
[Administrator Tools].
If you select [Off] or [Same as Basic Settings], the display returns to that of step 1.
3. Specify an end receiver using the Quick Dial keys, and then press the [OK] key.
Pressing switches the destination.
• In Step 3, you can search for and specify the forwarding destination by pressing the [Search
Destination] key or a User Function key. To specify a forwarding destination by pressing a User
Function key, you must first register the [Specify Dest. Reg. No.] function as a User Function key. For
details about the User Function keys, see “General Settings/Adjust”.
• Set folder destinations using [Address Book Management] under [System Settings]. For details about
registering folder destinations, see “Registering Folders”, Network and System Settings Guide.
• When a folder is specified as the forward destination, you can set a file format for forwarding. See
“Parameter Settings” (switch 21, bit 3).
• Deleting a destination specified as a forward destination from the destination list causes the settings
of the forward destination to be deleted, so they must be registered again. When a destination is
changed, a document is transmitted to the new destination. If there is no destination of the specified
type, you can set which destination to be used as an alternative destination. See “Parameter
Settings” (switch 32, bit 0).
247
6. Fax Features
Memory Lock
This section describes how to specify Memory Lock.
Specify when programming a Special Sender.
• You must register Memory Lock ID in advance. For details about how to register Memory Lock ID,
see “Administrator Tools”.
1. Select [Memory Lock] using [ ] or [ ], and then press the [OK] key.
6 2. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
Selecting [Same as Basic Settings] will result in the same setting made for [Memory Lock] under
[Administrator Tools].
2 Sided Print
This section describes how to specify 2 Sided Print.
Specify when programming a Special Sender.
1. Select [2 Sided Print] using [ ] or [ ], and then press the [OK] key.
248
Program Special Sender
2. Select [Set] or [Do not Set] using [ ] or [ ], and then press the [OK] key.
Selecting [Same as Basic Settings] will result in the same setting made for [2 Sided Print] under
[Reception Settings].
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.
4. Select [Initial Set Up] using [ ] or [ ], and then press the [OK] key.
249
6. Fax Features
5. Select [Authorized Reception] or [Special RX Function] using [ ] or [ ], and then press the
[OK] key.
6. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.
250
Program Special Sender
4. Select [Delete Special Sender] using [ ] or [ ], and then press the [OK] key.
5. Select the sender you want to delete using [ ] or [ ], and then press the [OK] key.
6. Press [Yes].
6
To cancel deleting a special sender, press [No]. The display returns to that of step 5.
7. Press the [User Tools/Counter] key.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
251
6. Fax Features
3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.
4. Select [Print Special Sender List] using [ ] or [ ], and then press the [OK] key.
252
7. Appendix
This section explains specifications of the facsimile function.
Optional Equipment
This section explains the functions of options.
Handset
You can make or receive calls by installing the optional handset and dialing manually.
• For details about the functions, see “On Hook Dial” and “Manual Dial”.
253
7. Appendix
Specifications
Fax Transmission and Reception
Component Specifications
Standard G3
Resolution G3:
8 × 3.85 lines/mm, 200 × 100 dpi (Standard character),
8 × 7.7 lines/mm, 200 × 200 dpi (Detail character),
8 × 15.4 lines/mm (Fine character)
Power Consumption
Component Specifications
254
Specifications
Scan line density 8 × 3.85 lines/mm, 200 × 100 dpi (Standard character),
8 × 7.7 lines/mm, 200 × 200 dpi (Detail character),
8 × 15.4 lines/mm (Fine character)
IP-Fax transmission function Specify an IP address and send faxes to an IP-Fax compatible fax
through a network.
Also capable of sending faxes to a G3 fax connected to a telephone
7
line via a VoIP gateway.
IP-Fax reception function Receive faxes sent from an IP-Fax compatible fax through a
network.
Also capable of receiving faxes from a G3 fax connected to a
telephone line via a VoIP gateway.
Scan line density 200 × 100 dpi (Standard character), 200 × 200 dpi (Detail
character), 200 × 400 dpi (Fine character)*1
255
7. Appendix
Component Specifications
Internet communication Send and receive e-mail with a computer that has an e-mail
address.
E-mail send functions Automatic conversion of sent documents to e-mail format and e-
7 mail transmission. Memory transmission only.
E-mail receive functions Automatic detection and printing of appended TIFF-F (MH) files and
ASCII text. Memory reception only.
*1 Full mode
This section explains the specifications required for the Internet Fax destination machine.
When communicating with full mode-compatible machines, you can take advantage of higher
specifications for coding, original size, and resolution. For details about the specifications available in full
mode, see “Internet Fax Transmission and Reception” in “Specifications”.
Component Specifications
256
Specifications
Component Specifications
7
• p.254 "Specifications"
257
7. Appendix
Maximum Values
The following list contains the maximum value for each item.
Item Description
Memory 4 MB
Number of documents you can store in memory for Memory Transmission 200
Number of pages you can store in memory (using A4 Standard <ITU-T Approx. 320
1 Chart>)
Number of destinations you can specify for all files (including files in 300
memory)
7 Number of destinations you can search for at a time 100
Number of characters you can enter in the e-mail subject line 128
Number of documents sent from a LAN-Fax Driver that the machine can 200
retain as files to be sent
Number of received documents you can store on the machine's hard disk 200
258
Maximum Values
Item Description
Number of destinations you can register in the Address Book of the LAN- 2,000
Fax
• The maximum number of pages that can be stored or transmitted may decrease depending on the
contents of documents.
259
7. Appendix
Trademarks
Adobe, Acrobat, Acrobat Reader, and Reader are either registered trademarks or trademarks of Adobe
Systems Incorporated in the United States and/or other countries.
Microsoft®, Windows®, Windows Server®, Windows Vista®, and Outlook® are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
7 Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
• The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
Microsoft® Windows Server® 2003 R2 Datacenter Edition
• The product names of Windows Server 2008 are as follows:
260
Trademarks
261
7. Appendix
262
INDEX
Canceling a transmission while the original is being
scanned..................................................................93
1 Sided for 1st Page...........................................120 Canceling a transmission while the original is being
2 Sided from 1st Page........................................120 transmitted..............................................................94
2 Sided Print.......................................201, 244, 248 Canceling an Immediate Transmission................93
2 sided printing...................................................144 Center Mark................................................143, 201
2 Sided TX...........................................................120 Changing a fax destination..................................68
Changing default settings...................................197
A
Changing the Home Position..............................238
About This Machine.................................................7 Changing the User Parameters..........................234
Acceptable original sizes.....................................37 Check Destination key...........................................60
Accessing User Tools..........................................197 Check/Stop TX File...............................................95
Add Dest................................................................23 Checkered Mark........................................143, 201
Add User..............................................................195 Checking files stored in memory........................151
Address Book..............................................173, 185 Checking the reception result.............................161
Address Book Management.................................66 Checking the result of the communication.........158
Adjust Sound Volume..........................................199 Checking the result of the Immediate Transmission.
Administrator Tools.............................................208 ..............................................................................159
Advanced Search..................................................86 Checking the specified destination......................60
Attach a Cover Sheet..........................................181 Checking the storage result..................................97
Attach Subject......................................................104 Checking the transmission result........................155
Attaching a created cover sheet........................188 Checking transmission using LAN-Fax Driver..........
Authorized Reception.........................................201 ..............................................................................183
Authorized RX.............................................242, 246 Clear Modes key............................................14, 93
Auto e-mail reception.........................................132 Clear/Stop key...............................................93, 94
Auto fax reception power-up.............................141 Combine Two Originals.....................................146
Auto Reception....................................................129 Communicating indicator......................................94
Auto Run program...............................................173 Communication Failure Report...........................159
Auto Switch..........................................................128 Communication Page Count..............................208
Automatic Redial...................................................23 Communication Result Report............................158
Confirming by e-mail..........................................157
B Confirming by report..................................156, 162
Basic transmission...............................................176 Confirming by report and e-mail.......................158
Before use............................................................172 Confirming on display................................155, 161
Broadcasting sequence........................................23 Confirming the reservations for SEP Code Reception
Bypassing the SMTP server...................................56 ..............................................................................118
Confirming the result of a SEP Code Reception......
C ..............................................................................118
Canceling a Memory Transmission......................93 Confirming transmission results by e-mail.........183
Canceling a transmission......................................93 Copy Reference.......................................................7
Canceling a transmission before the original is Counterfeit bank bills...............................................9
scanned..................................................................93 Creating a cover sheet........................................188
Canceling a transmission before the transmission is CSI - Own Fax Number.....................................126
started.....................................................................95
263
D Fax via computer.................................................171
Fine.........................................................................42
Darker key..............................................................43
Folder TX Result Report.......................................208
Deleting a fax destination.....................................71
Forwarding................................208, 222, 243, 246
Deleting a Special Sender..................................250
Forwarding destination.......................................137
Deleting Fax Information....................................220
Forwarding Mark................................................225
Deleting fax information using a Web browser......
..............................................................................194 Forwarding received documents.......................137
Deleting programmed destinations....................187 Full mode.......................................................34, 194
Detail......................................................................42 Functions not available for internet fax reception...
................................................................................34
Detecting blank sheet............................................39
Functions not available for internet fax transmission
Display List.............................................................77 ................................................................................33
Display panel.........................................................11 Functions not available for IP-Fax transmission.......
Double-Sided Transmission................................120 ................................................................................30
Dual Access...........................................................23 G
E G3 Analog Line...................................................210
E-mail........................................................... 203, 205 Gatekeeper (VoIP gatekeeper)............................29
E-mail Options.....................................................104 Gateway (VoIP gateway).....................................29
E-mail subject.........................................................34 Gateway Settings................................................206
E-mail text............................................................134 General Settings/Adjust.....................................199
E-mail TX Result...................................................157 H
E-mail TX results...................................................183
H.323.....................................................................29
ECM (Error Correction Mode).............................24
H.323 Settings....................................................205
Edit Cover Sheet..................................................188
Handset.........................................................92, 128
EditDest............................................................49, 53
Home Position...................................................... 237
Editing Address Book..........................................185
Home Position Parameter List.............................237
Editing fax cover sheets......................................187
How to read this manual.......................................10
Editing programmed destinations......................186
Enable H.323......................................................205 I
Enable SIP............................................................205 If memory runs out while storing an original.......24
Entering a destination directly............................179 If there is no paper of the correct size...............148
Entering a pause....................................................47 Image density (contrast)........................................43
Entering a tone.......................................................47 Image Density key.................................................43
Entering an e-mail address...................................53 Immediate Reception..........................................123
Entering an IP-Fax destination..............................49 Immediate Transmission..................................17, 24
Entering numbers using the number keys.............46 Immediate TX Result Report................................159
Escape key.............................................................14 Important..................................................................9
External telephone........................................92, 128 Installing individual applications........................174
F Internet fax destination machines.......................256
Internet Fax functions............................................31
Facsimile key.......................................................... 14
Internet Fax Settings............................................203
Fax...............................................................203, 205
IP.............................................................................84
Fax Header Print.................................................108
IP-Fax functions......................................................27
264
J N
JBIG reception.....................................................141 Names of major functions.....................................10
JBIG transmission...................................................42 Network and System Settings Guide.....................7
Job Information key............95, 151, 155, 161, 163 Notes on using Internet Fax..................................32
Journal.........................................................162, 164 Notes on using IP-Fax...........................................29
Journal by e-mail.................................................167 Notice.......................................................................9
JPEG.....................................................................135 O
Just size printing................................................... 148
OK key...................................................................14
L On Hook Dial........................................................90
Label Insertion.....................................................110 On Hook Dial key.................................................90
LAN-Fax Cover Sheet Editor.....................173, 187 On Hook Release Time.......................................199
LAN-Fax Driver...........................................171, 172 Operation switch.................................................141
LAN-Fax operation messages............................191 Original size..........................................................37
LAN-Fax Result Report........................................184 Original Type.........................................................41
LDAP Search..........................................................75 P
LDAP server............................................................86
Legal prohibition......................................................9 Page separation and length reduction..............146
Lighter key..............................................................43 Paper size and scanned area..............................38
Parallel Memory Transmission.......................17, 22
M Parameter Setting................................................209
Mail to Print..........................................................135 Parameter Settings..............................................226
Making settings for option configuration..........175 Password (PWD).................................................118
Managing facsimile functions using Password (SID)....................................................114
SmartDeviceMonitor for Admin.........................189 Pause/Redial key...........................................47, 62
Manual............................................................49, 53 PDF.......................................................................135
Manual Dial...........................................................92 Photo.......................................................................41
Manual e-mail reception....................................133 Placing into the ADF..............................................36
Manual Reception............................................... 128 Placing on the exposure glass..............................36
Manuals for this machine........................................7 Placing originals....................................................36
Maximum E-mail Size.........................................203 Preventing transmission to the wrong destination....
Maximum values.................................................258 ................................................................................63
MDN....................................................................105 Preview.................................................................181
Memory File Transfer.................................210, 212 Print.......................................................................153
Memory Lock.....................................208, 243, 248 Print completion beep.........................................143
Memory Reception..............................................124 Print Fax Header.........................................108, 181
Memory Storage Report.......................................97 Print Journal.................................................163, 208
Memory Transmission.....................................17, 19 Print Memory Lock File........................................168
Memory Transmission sequence..........................23 Print Reception Time............................................201
Menu Protect.......................................................211 Print TX Standby File............................................153
Mixing scan settings for a multiple page original... Print TX Standby File List.............................151, 208
................................................................................44 Printer Reference......................................................7
Printing a file from memory.................................153
265
Printing a file received with Memory Lock........168 Receiving e-mail..................................................131
Printing a list of files in memory..........................151 Receiving Internet Fax documents.....................132
Printing and saving..............................................185 Reception File Setting.................................202, 214
Printing fax information using a Web browser........ Reception functions.............................................137
..............................................................................193 Reception modes.................................................128
Printing on both sides..........................................144 Reception Notice.................................................105
Printing Special Sender List.................................251 Reception notice message..................................105
Printing the Journal..............................................163 Reception Report e-mail.....................................216
Printing the Parameter Settings List.....................235 Reception Settings...............................................201
Program..............................................60, 62, 72, 73 Reception time.....................................................144
Program Fax Information....................................199 Redial.....................................................................62
Program Memory Lock ID..................................209 Registering a fax destination................................66
Program Special Sender............................209, 241 Registering Fax Information.......................217, 218
Programmed Name............................................110 Report.................97, 118, 151, 158, 159, 164, 184
Programming an End Receiver...........................223 Resolution...............................................................42
Programming destination information from Web Return Receipt......................................................105
browser................................................................194
Returning the machine to the standby mode.......14
Programming destinations from Check Destination
screen.....................................................................72 Routing e-mail received via SMTP.....................139
Programming destinations from Redial screen........ RTI - Own Name.................................................126
................................................................................73 RX File Status........................................................161
Programming destinations in the Address Book...... RX Mode Auto Switch Time................................201
................................................................................66
S
Programming Initial Set Up of a Special Sender.....
..............................................................................249 Saving as files......................................................182
Programming new destinations..........................185 Scan Settings..........................................................41
Programming/Changing Special Senders.......244 Scanner Reference..................................................7
Properties.............................................................175 Scroll keys..............................................................14
PWD Code..........................................................118 Search Address Book............................................75
Q Search by destination list......................................77
Search by E-mail Address....................................82
Quick Dial key.................................................58, 59
Search by fax number........................................... 80
Quitting the forwarding function........................224
Search by IP-Fax destination................................84
Quitting User Tools..............................................198
Search by LDAP server..........................................86
R Search by Name...................................................75
RDS On/Off........................................................210 Search by Registration No...................................79
Re-entering a fax number to confirm destination.... Search Destination key.........................................75
................................................................................63 Search Fax Destination...................................80, 84
Reading the display...............................................14 Search LDAP....................................................75, 86
Reading the display panel and using keys..........14 Searching for a destination in the Address Book....
Receive File indicator.................................124, 168 ................................................................................75
Received images.................................................134 Security Reference...................................................7
Receiving documents according to parameter- Select Dial/Push Phone......................................209
specified settings.................................................126 Select Line..............................................................49
Receiving documents unconditionally...............125 Select Server..........................................................86
266
Selecting type of transmission..............................18 Standard................................................................42
Selection keys........................................................14 Start Manual Reception......................................128
Send at Specified Time.........................................99 Stop TX.............................................................94, 95
Send Later..............................................................99 Stored Reception File User Setting.....................202
Send via SMTP Server..........................................56 Stored Recpt.File User Set..................................202
Sender Settings....................................................101 SUB Code TX.......................................................112
Sending at a specific time.....................................99 SUB/SEP Code..........................................112, 116
Sending at specific time......................................180 Subject.................................................................104
Sending by Internet Fax........................................53 Substitute Reception............................................124
Sending by IP-Fax.................................................49 Switch Reception Mode.....................................201
Sending fax documents from computers...........171 Switch RX Mode key..................................128, 129
Sending originals using the exposure glass.......21, Switching between Memory and Immediate
26 Transmission...........................................................17
Sending over a fax line.........................................46 Switching the reception mode............................129
Sending to an e-mail address..............................53 Symbols..................................................................10
SEP Code RX........................................................116 System Settings......................................................66
SEP Code RX Reserve Report.............................118 T
SEP Code RX Result Report.................................118
Set User Function Key.........................................199 T.37 full mode...............................................34, 194
Setting a port number............................................53 Terminology...........................................................29
Setting LAN-Fax Driver properties.....................175 Text.........................................................................41
Setting print properties........................................175 TIFF-F format..........................................................31
Setting priority trays............................................148 To add new receiver...........................................195
Setting transmission function defaults................... 98 To edit machine properties already programmed. .
..............................................................................195
SID Code.............................................................114
Tone........................................................................47
SIP...........................................................................29
Top to Bottom......................................................120
SIP server................................................................29
Top to Top............................................................120
SIP Settings..........................................................206
Trademarks..........................................................260
SMTP reception using Internet Fax....................138
Transmission....................................................19, 24
SMTP RX File Delivery.........................................203
Transmission modes...............................................17
Specifications......................................................254
Transmitting Journal by e-mail............................166
Specifying a destination........................................46
Troubleshooting.......................................................7
Specifying a destination using a destination list......
..............................................................................178 TSI - Transmitting Subscriber Identification.......147
Specifying a destination using Address Book.......... TSI Print (Transmitting Subscriber Identification Print)
..............................................................................178 ..............................................................................147
Specifying a destination using the Quick Dial keys Two-sided printing..............................................144
................................................................................58 Two-Sided Transmission.....................................120
Specifying a group of destinations using the Quick TX File Status........................................................155
Dial keys.................................................................59 TX Mode............99, 104, 105, 108, 110, 112, 116
Specifying an IP address......................................49 TX Standby File List..............................................151
Specifying automatic deletion of incoming faxes Types of reception...............................................123
when an error occurs..........................................215
Specifying options...............................................180 U
Stamp...................................................................101 User Parameter List..............................................226
267
User Tools/Counter key.......................................66
Using the machine's Address Book as the LAN-Fax
Destination List.....................................................189
Using the software...............................................172
V
Viewing fax information using a Web browser.......
..............................................................................192
Viewing received fax documents using a Web
browser................................................................192
W
Web Image Monitor...........................................192
When placing an original into the ADF...............39
When placing an original on the exposure glass...
................................................................................38
When using a gatekeeper server or SIP server.......
................................................................................51
EN USA D069-7101
Quick Reference Scanner Guide
1. {Search Destination} key 6. Display Panel 8. {User Tools/Counter} key 13. {Start} key
2. {Check Destination} key 6.1 E-mail icon 9. {Clear Modes} key Press this to begin scanning or
3. {Job Information} key 6.2 E-mail/Scan to Folder/ 10. {Clear/Stop} key sending.
4. {Color Scan} key WSD Scanner/ -clears an entered numeric 14. {#} key (Enter key)
5. Function keys Network Delivery Scanner value. 15. Number keys
Press the {Scanner} key to Press to switch between -stops scanning. 16. {OK} key
activate these keys. screens. 11. Main power indicator 17. {Original} key
6.3 Destination field 12. Operation switch 18. {Escape} key
Standard available: 6.4 [Options] Press this to turn the machine 19. {Lighter} key, {Darker} key
7. Scroll keys on/off. 20. Selection keys
Copier:
21. Quick Dial keys
Scanner:
Printer:
To use the scanner functions, several
settings must be made beforehand. Facsimile:
For details about these settings,
see Scanner Reference chapter 8
on the supplied CD-ROM.
How to scan...
Available scan functions: Registering an E-mail (Network and System Settings Guide
5. Registering Addresses and Users
A Scan to E-mail destination... for Facsimile/Scanner Functions)
D Save to Removable Memory Device
D Select [Address Book Management] using the {U} or {T}
E Scan to Delivery Server This button needs to be key, and then press the {OK} key.
selected as a first step. E Select [Program / Change] using the {U} or {T} key, and
F Scan via TWAIN Driver
then press the {OK} key.
For details about C, D, E, and F, see Scanner F Enter the registration number you want to program using
Reference on the supplied CD-ROM. the number keys or the Quick Dial keys, and then press the
{OK} key.
G Enter the name, and then press the {OK} key.
How to use Scan to E-mail/ (1. Sending Scan Files by E-mail) F Only for scan to e-mail I Only for scan to e-mail H Press [Details].
Scan to Folder... (2. Sending Scan Files to Folders) Press [Options], select [Sender’s Name], and then specify Enter the subject if necessary. I Select [E-mail Settings] using the {U} or {T} key, and then
the sender. • Press [Options]. press the {OK} key.
A Press the {Scanner} key. • Select [Attach Subject], and then press the {OK} key.
J Enter the e-mail address using the number keys and the
Depending on the security settings, the logged-on user may • Enter the subject, and then press the {OK} key.
Quick Dial keys, and then press the {OK} key.
B Press the {Clear Modes} key. be specified as [Sender’s Name]. • Press the {Escape} key.
K Select [E-mail/Internet Fax Dest.] using the {U} or {T} key,
C If delivery scanner appears: G If necessary, press [Options] to specify the resolution and J Press the {Start} key. and then press the {OK} key.
• Press (6.2) to switch to the E-mail or Scan to Folder orientation of the originals. You must press the {#} key to send scan files that are L Select [On] or [Off] to specify whether or not SMTP server
screen. scanned from the exposure glass. is to be used using the {U} or {T} key, and then press the
H Select file type if necessary. {OK} key.
D Place originals. • Press [Options]. K If you still have originals to send, place them on the M Press [End].
• If necessary, specify the original type and scanning • Select [File Type], and then press the {OK} key. machine, and then press the {Start} key.
density. • Select the file type, and then press the {OK} key. N Press the {OK} key.
• Press the {Escape} key.
E Select destination(s). L After all originals are scanned, press the {#} key. For details about registering folders, see 5. Registering
In total, up to 100 destinations can be specified. Addresses and Users for Facsimile/Scanner Functions,
Network and System Settings Guide .
8 Scanner Features
9 Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Note................................................................................................................................................................8
Laws and Regulations.........................................................................................................................................9
Legal Prohibition.............................................................................................................................................9
About the Scanner Functions...........................................................................................................................10
Display Panel....................................................................................................................................................12
Reading the Display and Using Keys.........................................................................................................12
Confirmation Displays.................................................................................................................................13
1. Sending Scan Files by E-mail
Before Sending Scan Files by E-mail..............................................................................................................15
Overview of Sending Scan Files by E-mail................................................................................................15
Preparation for Sending by E-mail.............................................................................................................16
Registering E-mail Addresses in the Address Book...................................................................................18
E-mail Screen...............................................................................................................................................19
Basic Procedure for Sending Scan Files by E-mail........................................................................................21
Specifying E-mail Destinations........................................................................................................................24
Selecting a Destination Registered to a Quick Dial Key...........................................................................24
Selecting the Destination from the Machine's Address Book...................................................................24
Entering an E-mail Address Manually........................................................................................................30
Selecting Destinations by Searching an LDAP Server...............................................................................31
Registering a Directly-Entered Destination in the Address Book..............................................................34
Specifying the E-mail Sender..........................................................................................................................36
Selecting a Sender Registered to a Quick Dial Key.................................................................................36
Selecting a Sender from the List..................................................................................................................37
Using a Registration Number to Specify a Sender Name........................................................................39
Searching for a Sender by Name..............................................................................................................40
Searching for a Sender by E-mail Address...............................................................................................42
Setting the Return Receipt Function.................................................................................................................45
Entering the E-mail Subject..............................................................................................................................46
1
Security Settings to E-mails..............................................................................................................................47
Sending Encrypted E-mail...........................................................................................................................47
Sending E-mail with a Signature.................................................................................................................48
2. Sending Scan Files to Folders
Before Sending Files by Scan to Folder.........................................................................................................51
Overview of Sending Scan Files by Scan to Folder..................................................................................51
Preparation for Sending by Scan to Folder...............................................................................................53
Registering Destination Folders in the Address Book................................................................................55
Scan to Folder Screen.................................................................................................................................56
Basic Procedure When Using Scan to Folder................................................................................................58
Specifying Scan to Folder Destinations..........................................................................................................60
Selecting a Destination Registered to a Quick Dial Key...........................................................................60
Selecting the Destination from the Machine's Address Book...................................................................60
Sending Files to a Shared Folder...............................................................................................................66
Sending Files to an FTP Server....................................................................................................................71
Sending Files to NetWare Server...............................................................................................................73
Registering the Path to the Selected Destination in the Address Book.....................................................78
3. Sending Scan Files Using WSD
Before Sending Scan Files Using WSD..........................................................................................................81
Overview of Sending Scan Files Using WSD............................................................................................81
Preparation for Sending Files Using WSD.................................................................................................83
Using the WSD Scanner (Push Type).............................................................................................................87
WSD Scanner (Push Type) Screen.............................................................................................................87
Basic Procedure for Sending Scan Files Using WSD (Push Type)...........................................................87
Specifying the Destination Client Computer..............................................................................................89
Using the WSD Scanner (Pull Type)...............................................................................................................93
Basic Procedure for Sending Scan Files Using WSD (Pull Type).............................................................93
Configuring the Scan Settings on a Client Computer....................................................................................95
Changing a Scan Profile.............................................................................................................................95
Creating a New Scan Profile......................................................................................................................96
Scan Profile Items and Settings...................................................................................................................96
4. Saving Scan Files on a Removable Memory Device
Before Saving Files on a Removable Memory Device..................................................................................99
2
Overview of Saving Files on a Removable Memory Device...................................................................99
Basic Procedure for Saving Scan Files on a Removable Memory Device................................................101
5. Delivering Scan Files
Before Delivering Files...................................................................................................................................103
Overview of Scan File Delivery................................................................................................................103
Preparing to Deliver Files..........................................................................................................................104
Installing DeskTopBinder Lite from the Supplied CD-ROM...................................................................106
Network Delivery Scanner Screen..........................................................................................................107
Basic Procedure for Delivering Files.............................................................................................................109
Specifying Delivery Destinations..................................................................................................................112
Selecting a Destination Using a Quick Dial Key.....................................................................................112
Selecting a Destination Registered in the Destination List of the Delivery Server.................................112
Specifying the Sender...................................................................................................................................118
Selecting a Sender Registered to a Quick Dial Key...............................................................................118
Selecting a Sender by Searching the Delivery Server's Destination List...............................................119
Entering the Subject of the E-mail to Be Transmitted via the Delivery Server............................................125
6. Scanning Originals with the Network TWAIN Scanner
Before Using the Network TWAIN Scanner...............................................................................................127
Overview of the Network TWAIN Scanner............................................................................................127
Preparing to Use the Network TWAIN Scanner.....................................................................................128
Installing the TWAIN Driver from the Supplied CD-ROM.....................................................................130
Basic Network TWAIN Scanner Procedure................................................................................................132
Scan Settings When Using TWAIN Scanner..............................................................................................134
Setting Original Orientation on the TWAIN Scanner............................................................................134
7. Various Scan Settings
Specifying Send Options..............................................................................................................................137
Resolution...................................................................................................................................................137
Original Orientation..................................................................................................................................138
Original Setting.........................................................................................................................................140
Scan Size...................................................................................................................................................141
File Type.....................................................................................................................................................143
Notes About and Limitations of File Types..............................................................................................145
PDF Security Encryption............................................................................................................................145
3
PDF Security Permissions...........................................................................................................................148
Selecting Original Type................................................................................................................................151
Adjusting Image Density................................................................................................................................153
8. Scanner Features
Accessing User Tools.....................................................................................................................................155
Changing User Tools.................................................................................................................................155
Closing User Tools.....................................................................................................................................156
Scan Settings..................................................................................................................................................157
Destination List Settings..................................................................................................................................159
Send Settings..................................................................................................................................................160
Output Settings...............................................................................................................................................163
Administrator Tools........................................................................................................................................164
9. Appendix
Relationship between Resolution and Scan Size........................................................................................165
When Using the E-mail, Folder Sending, WSD Scanner, or Network Delivery Functions.................165
When Using as a TWAIN Scanner..........................................................................................................166
Software Supplied on CD-ROM..................................................................................................................168
Auto-Run Program.....................................................................................................................................168
TWAIN Driver............................................................................................................................................168
DeskTopBinder Lite....................................................................................................................................169
Values of Various Set Items for Transmission/Delivery Function...............................................................171
Transmission function.................................................................................................................................171
Network Delivery Function.......................................................................................................................173
About WIA Scanning....................................................................................................................................175
Specifications.................................................................................................................................................178
Trademarks.....................................................................................................................................................181
INDEX...........................................................................................................................................................183
4
Manuals for This Machine
Read this manual carefully before you use this machine.
Refer to the manuals that are relevant to what you want to do with the machine.
5
• Change the user name and password of the administrator using Web Image Monitor.
For details, see "Setting Up the Machine", Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
6
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
7
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
Note
8
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.
9
About the Scanner Functions
This section describes functions you can use in the scanner mode.
You can use the scanner functions to send scan files to computers, to scan originals from a computer using
the TWAIN driver, and to save scan files on a removable memory device.
For details about each function, see respective chapters.
Sending scanned files (Network Scanner)
Scan files can be sent to or stored on a computer, and you can specify the format of a scan file
according to how the file will be used.
• Sending by e-mail
You can send scan files to specified e-mail addresses.
For details, see chapter 1 "Sending Scan Files by E-mail".
• Sending to folders
Scan files can be stored in shared network folders, or on FTP or Netware servers.
For details, see chapter 2 "Sending Scan Files to Folders".
• Sending using WSD (Push Type)
You can use Web Services on Devices (WSD) to send scan files to a client computer.
For details, see chapter 3 "Sending Scan Files Using WSD".
• Delivering
You can deliver scan files using a delivery server.
For details, see chapter 5 "Delivering Scan Files".
Scanning originals from a client computer
• WSD (Pull Type)
You can use the WSD scanner function to scan files from a networked or directly connected
computer.
For details, see chapter 3 "Sending Scan Files Using WSD".
• TWAIN scanner
You can use the TWAIN driver to scan files from a networked or directly connected computer.
For details, see chapter 6 "Scanning Originals with the Network TWAIN Scanner".
Saving files
You can save scan files on a removable memory device such as a USB memory stick or an SD card.
For details, see chapter 4 "Saving Scan Files on a Removable Memory Device".
10
• This machine’s scanner functions are only available as the network functions. They are not available
through direct (USB) connection.
11
Display Panel
This section explains the display, the control panel keys, and the two confirmation displays: Check Dest.
and File Status.
In this manual you can find explanations about the E-mail screen, Scan to Folder screen, WSD scanner
screen, and the network delivery scanner screen.
For details about each of these screens, see "E-mail Screen", "Scan to Folder Screen", "WSD Scanner (Push
Type) Screen", and "Network Delivery Scanner Screen".
This section explains how to read the display and use the selection keys.
BRB006S
1. Selection keys
Press to select an item displayed at the bottom of the screen.
Example: the standby screen
• When the instruction "press [ ] to switch to the E-mail screen" is given in this manual, press the
left selection key.
• When the instruction "press [Manual]" is given in this manual, press the center selection key.
• When the instruction "press [Options]" is given in this manual, press the right selection key.
2. [Escape] key
Press to cancel operation or return to the preceding display.
12
3. [OK] key
Press to specify a function on the display or determine a selected function.
4. Scroll key
Press to move the cursor in each direction, step by step. When the [ ], [ ], [ ], or [ ] key appears in this manual,
press the scroll key of the same direction.
Confirmation Displays
This section explains two confirmation displays: Check Dest. and File Status.
Check destination
This section explains about displayed items and how to display the Check Dest. screen.
Use the Check Dest. screen to check the details of e-mail, Scan to Folder, or delivery destinations.
Pressing the [Check Destination] key switches the screen from the initial scanner screen to the Check Dest.
screen.
Check Dest.
ARO002S
1. Destination
Displays the transmission or delivery destinations.
When multiple destinations are specified, you can change the display by pressing the [ ] or [ ] key.
2. Transmission function icon
Displays the icon of the transmission function (e-mail, Scan to Folder, or delivery function) in use.
3. [Program]
For e-mail or Scan to Folder, if you press [Program], the destination that is entered directly or specified by
browsing the server can be registered in the machine's address book.
File status
This section explains the items that appear on the screen and how to display File Status.
Use the File Status screen to check e-mail, Scan to Folder, and delivery results.
13
Press the [Job Information] key to display File Status.
File Status
BRB014S
1. Date / Time
Displays the date and time the machine sent a transmission request, or the date and time " Done", " Error",
or " Canceled" was confirmed.
2. Destination
The destination is displayed with the icon of the transmission function (e-mail, Scan to Folder, or delivery
function).
If you have selected multiple destinations, the first selected destination is displayed. Other destinations
appear as “+ X” (X indicates the number of destinations.) when sending files by e-mail or delivering them.
3. Number of scanned pages
Displays the number of scanned pages.
4. Status
One of the following transmission status is displayed: " Done", " Sending", " Waiting", " Error" or "
Canceled".
5. [Print]
Press to print transmission results.
• Depending on the security settings, some transmission results might not appear in File Status.
14
1. Sending Scan Files by E-mail
You can attach scan files to e-mails and send them via connections such as LAN and the Internet.
1
Before Sending Scan Files by E-mail
This section explains the necessary preparations and the procedure for sending scan files by e-mail.
This section describes the process for sending scan files by e-mail.
ZZZ801S
1. This machine
You can attach scan files to e-mail and send them to a mail server. You can also encrypt and/ or attach signature
to the scan files you send by e-mail.
2. SMTP server
You need to have an access to an e-mail server that supports SMTP (Simple Mail Transfer Protocol), to send scan
files by e-mail. However, it is not essential to have an e-mail server inside the LAN where this machine belongs.
It transfers a received e-mail to a specified destination through a LAN or the Internet.
3. Client computer
Use e-mail client software to receive e-mail messages and scan file attachments that are generated by this
machine.
4. LDAP Server
Use this server for administering e-mail accounts, searching the network, and authenticating the computers that
access the machine. Using the LDAP server, you can search for destinations from the machine.
15
1. Sending Scan Files by E-mail
To send scanned files by e-mail, you must first perform the following:
1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.
16
Before Sending Scan Files by E-mail
1
4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and then press the
[OK] key.
To specify a static IPv4 address for this machine, press [Specify], and then press the left selection key
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address] to make necessary settings, and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.
7. Select [LAN Type] and [Ethernet], and then press the [OK] key.
8. Select [File Transfer], select [SMTP Server], and then press the [OK] key.
9. Select [Server Name], enter the SMTP server host name or IPv4 address, and then press the
[OK] key.
• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet] and then configure the network settings.
17
1. Sending Scan Files by E-mail
1
The Scanner Features screen appears.
3. Select [Scan Settings], [Destination List Settings], [Send Settings], or [Administrator Tools],
and then configure the relevant settings.
You can register frequently used e-mail addresses in the address book.
1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.
3. Select [Address Book Management], and then press the [OK] key.
• For details about registering e-mail addresses in the address book, see "Registering Addresses and
Users for Facsimile/Scanner Functions", Network and System Settings Guide.
18
Before Sending Scan Files by E-mail
• You can also register e-mail addresses in the address book using Web Image Monitor or
SmartDeviceMonitor for Admin. For details about how to display Web Image Monitor or install
SmartDeviceMonitor for Admin, see "Monitoring and Configuring the Printer", Network and System
Settings Guide. For details about registering addresses in the address book, see Web Image
Monitor or SmartDeviceMonitor Help. 1
• Depending on the machine type, you may not be able to use the machine when it is updating the
address book using CSV files (retrieved using SmartDeviceMonitor for Admin) that contain user codes.
• Encrypted files can be sent by e-mail only to destinations for which decryption is set. For details about
sending encrypted files by e-mail, see "Security Settings to E-mails".
E-mail Screen
This section explains the screen layout when sending scan files by e-mail.
Main Screen
BRB007S
ZZZ602S
19
1. Sending Scan Files by E-mail
ZZZ603S
1. E-mail icon
Indicates that the E-mail screen is displayed.
2. Destination field
Displays a selected destination. If multiple destinations are selected, press the [ ] or [ ] key to display the
destinations in the order they were selected. To check the selected destination, press the [Check Destination]
key.
3. E-mail / Scan to Folder / Network Delivery Scanner
Press to switch between screens. You can also use this key to switch between the E-mail and Scan to Folder
functions when sending the same file to both e-mail and Scan to Folder destinations at the same time.
4. [Manual]
When specifying a destination that is not registered, press [Manual], and then enter the e-mail address of
the destination using the Quick Dial keys.
5. [Options]
Press to make the scan settings and specify formats of files you want to send.
6. [Add Dest]
When selecting multiple destinations after a manual entry of an e-mail address, press [Add Dest], and then
enter the e-mail address of the destination.
7. [EditDest]
When changing an e-mail address that has been entered, press [EditDest], and then enter the new e-mail
address.
8. [View]
Press to check the addresses registered in a group.
20
Basic Procedure for Sending Scan Files by E-mail
3. Place originals.
4. If necessary, select the original type.
For details, see "Selecting Original Type".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Select the destination.
You can specify multiple destinations.
For details, see "Specifying E-mail Destinations".
7. Press [Options] to select [Sender's Name], and then specify the e-mail sender.
For details, see "Specifying the E-mail Sender".
8. If necessary, select [Return Receipt] under [Options] to make settings for the Return Receipt
function.
For details, see "Setting the Return Receipt Function".
21
1. Sending Scan Files by E-mail
9. If necessary, select [Attach Subject] under [Options] to specify the e-mail subject.
For details, see "Entering the E-mail Subject".
10. If necessary, select [E-mail Encryption] or [E-mail Signature] under [Options] to apply
1 security settings to e-mail.
For details, see "Security Settings to E-mails".
11. If necessary, specify other settings under [Options] such as resolution and original
orientation.
For details, see "Specifying Send Options".
12. Press the [Start] key.
• When scanning from the exposure glass
If you are scanning only one original, press the [ ] key to send the scan file.
If you are scanning multiple originals, place them on the machine, and then press the [Start] key.
Repeat this step until originals are scanned, and then press the [ ] key.
• When scanning from the ADF/ARDF
Transmission starts immediately after originals are scanned.
• If you have selected two or more destinations, the destinations can be made to appear one by one
by pressing the [ ] or [ ] key.
• To cancel a selected destination, display the destination in the destination field, and then press the
[Clear/Stop] key.
• In [System Settings], you can specify the administrator's e-mail address as the default sender name.
This lets you send e-mail without entering anything for [Sender’s Name]. For details, see "File Transfer",
Network and System Settings Guide.
• Depending on the security setting, the logged-on user may be specified as [Sender’s Name].
• To use Message Disposition Notification, log on to the machine as a user and specify the sender.
Note, however, that the [Return Receipt] notification e-mail may not be transmitted if the e-mail
software of the recipient does not support Message Disposition Notification.
• If you press the [Check Destination] key, the initial scanner screen switches to the Check Dest. screen.
You can use the Check Dest. screen to check the details of the selected destinations. For details, see
"Check destination".
• To cancel scanning, press the [Clear/Stop] key.
• When [E-mail Encryption] is selected under [Options], if you specify multiple destinations, a delivery
failure message will appear each time a scan file is sent to a destination where decryption settings
have not been configured.
22
Basic Procedure for Sending Scan Files by E-mail
23
1. Sending Scan Files by E-mail
This section explains how to select a destination registered to a Quick Dial key.
For details about how to register an e-mail destination to a Quick Dial key, see "Registering Addresses and
Users for Facsimile/Scanner Functions", Network and System Settings Guide.
BRB005S
This section explains how to select the destination from the machine's address book.
24
Specifying E-mail Destinations
• To use this function, you must register the destinations in [System Settings] in advance. For details, see
"Registering Addresses and Users for Facsimile/Scanner Functions", Network and System Settings
Guide.
1
You can use the following methods to select destinations registered in the machine's address book:
• Select a destination from the list
• Enter the destination's registration number
• Search for a destination by name
• Search for a destination by e-mail address
BRB003S
2. Press the [ ] or [ ] key to select [Display List], and then press the [OK] key.
3. Press the [ ] or [ ] key to select the destination from the list, and then press the [ ] key.
The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.
25
1. Sending Scan Files by E-mail
• If under [System Settings], [LDAP Search] is set to [On], a screen to select a search object appears
when you press the [Search Destination] key. On the screen, select [Search Address Book], and then
press the [OK] key.
• To cancel a selected destination, press the [ ] or [ ] key to select the target destination, and then
press the [ ] key.
• Depending on the security settings, some destinations may not appear in the destination list.
BRB003S
3. Use the number keys to enter the three-digit number assigned to the destination, and then
press the [OK] key.
Example: To enter 003
26
Specifying E-mail Destinations
Press the [3] key, and then press the [OK] key.
1
4. Press the [OK] key.
• If under [System Settings], [LDAP Search] is set to [On], a screen to select a search object appears
when you press the [Search Destination] key. On the screen, select [Search Address Book], and then
press the [OK] key.
BRB003S
27
1. Sending Scan Files by E-mail
3. Enter the beginning of the destination name, and then press the [OK] key twice.
1
Destinations that match the search conditions are displayed.
4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.
The check box on the left side of the selected destination is selected.
5. Press the [OK] key.
28
Specifying E-mail Destinations
BRB003S
3. Enter the beginning of the e-mail address, and then press the [OK] key twice.
The check box on the left side of the selected destination is selected.
5. Press the [OK] key.
29
1. Sending Scan Files by E-mail
• If under [System Settings], [LDAP Search] is set to [On], a screen to select a search object appears
when you press the [Search Destination] key. On the screen, select [Search Address Book], and then
1 press the [OK] key.
• Up to 100 destinations can be displayed as search results.
• To cancel a selected destination, press the [ ] or [ ] key to select the target destination, and then
press the [ ] key.
1. Press [Manual].
• Depending on the security settings, [Manual] may not be displayed. For details, consult the
administrator.
• To modify or change an entered e-mail address, press [EditDest].
• To add another destination, press [Add Dest], and then enter an e-mail address.
• You can register manually-entered e-mail addresses in the machine's address book. For details, see
"Registering a Directly-Entered Destination in the Address Book".
30
Specifying E-mail Destinations
BRB003S
31
1. Sending Scan Files by E-mail
1
If authentication is required to access the server, the authentication screen appears. Enter the user
name and password correctly.
The Search LDAP screen reappears.
5. Select the [Advanced Search], and then press the [OK] key.
32
Specifying E-mail Destinations
The check box on the left side of the selected destination is selected.
13. Press the [OK] key.
33
1. Sending Scan Files by E-mail
• [Last Word]: The names which end with the entered character or characters are targeted.
For example, to search for "ABC", enter "C".
• [Exact Match]: The names which correspond to an entered character or characters are targeted.
1 For example, to search for "ABC", enter "ABC".
• [Fuzzy Search]: a vague search (The function of this vague search depends on the system
supported by the LDAP server.)
This section explains how to register a directly-entered destination in the machine's address book. You can
also register a destination selected from the LDAP server.
BRB004S
34
Specifying E-mail Destinations
1
4. Press [Details] and [Reg. No.] to specify registration information. After you have made all
settings, press the [OK] key.
For details about specifying registration information, see "Registering Addresses and Users for
Facsimile/Scanner Functions", Network and System Settings Guide.
5. Press the [Escape] key
• Depending on the security settings, [Program] may not appear. In such case, you cannot complete
the registration.
• To register in the machine's address book a destination searched for and selected from the LDAP
server, display the destination, and then press [Program].
35
1. Sending Scan Files by E-mail
• Senders must be registered in advance under [System Settings]. For details, see "Registering Addresses
and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
• In [System Settings], you can specify the administrator's e-mail address as the default sender name.
This lets you send e-mail without entering anything for [Sender’s Name]. For detail, see "File Transfer",
Network and System Settings Guide.
• Depending on the security setting, the logged-on user may be specified as [Sender’s Name].
• When a protection code has been set, a screen for entering the protection code appears after selecting
the sender. Enter the protection code, and then press the [OK] key. If the protection code you entered
is correct, the sender name is displayed.
This section explains how to select a sender registered to a Quick Dial key.
For details about how to register e-mail senders to Quick Dial keys, see "Registering Addresses and Users
for Facsimile/Scanner Functions", Network and System Settings Guide.
1. Press [Options].
36
Specifying the E-mail Sender
1
3. Press the Quick Dial key to which the sender is registered.
BRB005S
This section explains how to select a sender from the machine's address book list.
1. Press [Options].
37
1. Sending Scan Files by E-mail
1
3. Press the [Search Destination] key.
BRB003S
5. Press the [ ] or [ ] key to select the sender, and then press the [ ] key.
The check box on the left side of the selected sender is selected.
To cancel a selected sender, press the [ ] or [ ] key to select the target sender, and then press the
[ ] key.
6. Press the [OK] key.
38
Specifying the E-mail Sender
1
"Programmed" appears, and then the Send Options screen reappears.
Select the sender using the registration numbers specified by senders in the machine's address book.
1. Press [Options].
BRB003S
39
1. Sending Scan Files by E-mail
4. Press the [ ] or [ ] key to select [Search by Registration No.], and then press the [OK] key.
1
5. Use the number keys to enter the three-digit number assigned to the sender, and then press
the [OK] key.
Example: To enter 001
Press the [1] key, and then press the [OK] key.
This section explains how to search by name for a sender in the machine's address book.
1. Press [Options].
40
Specifying the E-mail Sender
1
3. Press the [Search Destination] key.
BRB003S
5. Enter the beginning of the sender name, and then press the [OK] key twice.
41
1. Sending Scan Files by E-mail
1
8. Press the [OK] key.
This section explains how to search by e-mail address for a sender in the machine's address book.
1. Press [Options].
42
Specifying the E-mail Sender
BRB003S
5. Enter the beginning of the sender's e-mail address, and then press the [OK] key twice.
43
1. Sending Scan Files by E-mail
1
"Programmed" appears, and then the Send Options screen reappears.
44
Setting the Return Receipt Function
1. Press [Options].
2. Press the [ ] or [ ] key to select [Return Receipt], and then press the [OK] key.
• To use the Return Receipt function, you must specify the sender. Note, however, that the [Return
Receipt] notification e-mail may not be transmitted if the e-mail software of the recipient does not
support Message Disposition Notification.
• When the administrator's e-mail address is automatically specified as a sender, notification e-mail
will not be sent even if [Return Receipt] is selected. For details about [Admin. E-mail Address] and
[Auto Specify Sender Name], see "System Settings", Network and System Settings Guide.
45
1. Sending Scan Files by E-mail
2. Press the [ ] or [ ] key to select [Attach Subject], and then press the [OK] key.
3. Select the user text, and then press the [OK] key.
• If you do not specify the e-mail subject, the settings specified in [Default E-mail Subject] on the [Send
Settings] tab under [Scanner Features] will be applied. For details, see "Send Settings".
46
Security Settings to E-mails
Use the following procedure to specify a destination for which encryption is configured, and encrypt and
send an e-mail.
Destinations for which encryption can be configured for each transmission are indicated by this symbol
.
1. Press [Options].
2. Press the [ ] or [ ] key to select [E-mail Encryption], and then press the [OK] key.
47
1. Sending Scan Files by E-mail
3. Press the [ ] or [ ] key to select [Encrypt dest. with ], and then press the [OK] key.
1
appears on the left side of the specified setting.
Use the following procedure to apply a signature to an e-mail that has scan file attachments.
1. Press [Options].
2. Press the [ ] or [ ] key to select [E-mail Signature], and then press the [OK] key.
3. Press the [ ] or [ ] key to select [Use Signatures], and then press the [OK] key.
48
Security Settings to E-mails
• The certificate (device certificate) installed on this machine is used to attach signatures.
• Note that the following can result if certain signature settings are specified by the administrator:
• [E-mail Signature] does not appear. This is because you cannot apply signatures to scan files 1
that are sent by e-mail.
• You cannot change the [E-mail Signature] settings. This is because a signature is always applied
to scan files that are sent by e-mail.
• If you do not want to send signed e-mail, select [Do not Use Signatures] in step 4.
49
1. Sending Scan Files by E-mail
50
2. Sending Scan Files to Folders
Using the Scan to Folder function, you can send scan files over the network to shared folders, FTP server
folders, or NetWare folders.
This section describes the process for sending scan files by Scan to Folder.
ZZZ802S
1. This machine
You can send scan files to shared network folders. To send scan files to shared network folders, use the SMB
protocol.
2. Computer with a shared folder
To use this function, it is necessary to create a shared folder in advance. You can specify a shared folder to save
scan files.
3. Client computer
You can also browse scanned files saved to a shared folder from a client computer.
51
2. Sending Scan Files to Folders
ZZZ803S
1. This machine
You can send scan files to FTP server folders. To send scan files to FTP server folders, use the FTP protocol.
2. FTP server
The FTP server is a server that provides file transfer services among computers on the same network. Transferred
files are stored on this server. It is essential to have the FTP server inside the LAN/WAN where this machine
belongs. It is not possible to access an FTP server via a proxy server.
3. Client computer
You can browse scanned files saved to an FTP server from a client computer. You need to have an FTP client
program on the computer to connect to an FTP server.
ZZZ804S
1. This machine
You can send scan files to NetWare folders. To send scan files to NetWare folders, use the NCP protocol.
52
Before Sending Files by Scan to Folder
2. NetWare server
You can use this server to share files over the network via NetWare. By sending image data to the server, files
can be stored on the server.
3. Client computer
To download files, a computer must be running the NetWare client and be logged onto the server.
1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.
53
2. Sending Scan Files to Folders
4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and then press the
[OK] key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address], and then press the [OK] key.
Select [Effective Protocol], select [SMB], and then select [Active]. Then press the [OK] key.
To send files to Netware folders, select [NetWare], and then select [Active].
6. Select [LAN Type] and [Ethernet], and then press the [OK] key.
• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet] and then configure the network settings.
54
Before Sending Files by Scan to Folder
Select [Scan Settings], [Destination List Settings], [Send Settings], or [Administrator Tools], and then
configure the relevant settings.
1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.
3. Select [Address Book Management], and then press the [OK] key.
• For details about registering the address of a destination folder in the address book, see "Registering
Addresses and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
• You can register entries in the address book using Web Image Monitor or SmartDeviceMonitor for
Admin. For details about how to display Web Image Monitor or install SmartDeviceMonitor for
Admin, see "Monitoring and Configuring the Printer", Network and System Settings Guide. For details
about registering addresses in the address book, see Web Image Monitor or SmartDeviceMonitor
Help.
• Depending on the machine type, you may not be able to use the machine when it is updating the
address book using CSV files (retrieved using SmartDeviceMonitor for Admin) that contain user codes.
55
2. Sending Scan Files to Folders
This section describes the screen layout when sending scan files by Scan to Folder.
Main screen
BRB008S
ZZZ605S
ZZZ606S
56
Before Sending Files by Scan to Folder
57
2. Sending Scan Files to Folders
3. Place originals.
4. If necessary, select the original type.
For details, see "Selecting Original Type".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Select a destination.
You can specify multiple destinations.
For details, see "Specifying Scan to Folder Destinations".
7. If necessary, press [Options] to specify the resolution and orientation of the originals.
58
Basic Procedure When Using Scan to Folder
If you are scanning multiple originals, place them on the machine, and then press the [Start] key.
Repeat this step until originals are scanned, and then press the [ ] key.
• When scanning from the ADF/ARDF
Transmission starts immediately after originals are scanned.
• If you have selected more than one destination, the destinations can be made to appear one by one
by pressing the [ ] or [ ] key.
2
• To cancel a selected destination, display the destination in the destination field, and then press the
[Clear/Stop] key. To cancel a destination selected from the address book, press the selected
destination again.
• To cancel scanning, press the [Clear/Stop] key.
59
2. Sending Scan Files to Folders
This section explains how to select a destination registered to a Quick Dial key.
For details about how to register a Scan to Folder destination to a Quick Dial key, see "Registering
Addresses and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
BRB005S
This section explains how to select the destination from the machine's address book.
60
Specifying Scan to Folder Destinations
• To use this function, you must register the destinations in [System Settings] in advance.
You can select a destination registered in the machine's address book by any of the following methods:
• Select the destination from the destination list
• Select the destination by entering it's registration number
• Search for a destination by name 2
• Search for a destination by folder path
• If you have specified the address protection code for accessing the address book, the screen for
entering the address protection code appears. Enter the protection code, and then press the [OK]
key. If the protection code you entered is correct, you can specify Scan to Folder destinations from
the address book.
• Depending on the security setting, some destinations may not appear in the destination list.
BRB003S
61
2. Sending Scan Files to Folders
3. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.
2 The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.
4. Press the [OK] key.
• To cancel a selected destination, press the [ ] or [ ] key to select the target destination, and then
press the [ ] key.
• Depending on the security settings, some destinations may not appear in the destination list.
BRB003S
62
Specifying Scan to Folder Destinations
2. Press the [ ] or [ ] key to select [Search by Registration No.], and then press the [OK] key.
3. Using the number keys, enter the three-digit registration number assigned to the destination, 2
and then press the [OK] key.
Example: To enter 002
Press the [2] key, and then press the [OK] key.
BRB003S
63
2. Sending Scan Files to Folders
2 3. Enter the beginning of the destination name, and then press the [OK] key twice.
The check box on the left side of the selected destination is selected.
5. Press the [OK] key.
64
Specifying Scan to Folder Destinations
BRB003S
3. Enter the beginning of the folder path, and then press the [OK] key twice.
Enter the folder path in the following format: \\computer name\folder name.
The check box on the left side of the selected destination is selected.
5. Press the [OK] key.
65
2. Sending Scan Files to Folders
2 This section explains how to specify the destination when sending files to a shared network folder.
• The shared folder must have been created on the client computer in advance. For details about creating
shared folders, see Windows Help.
• You can create the shared folder under Windows 98/Me/2000/XP/Vista, Windows NT 4.0,
Windows Server 2003/2003 R2/2008, and Mac OS X 10.2 or later.
• Depending on the operating system of the client computer, access to the shared folder may require
authentication.
• This machine does not support DFS (Distributed File System).
You can send a file to a shared folder over the network by any of the following methods:
• Enter the path to the destination manually
• Specifying the destination folder path by browsing
1. Press [Dest.:].
66
Specifying Scan to Folder Destinations
4. Enter the path to the destination folder, and then press the [OK] key. 2
The following is an example of a path where the folder name is “user” and the computer name is
“desk01”: \\desk01\user.
Instead of specifying the destination using its computer name, you can also use its IPv4 address.
5. Enter a user name used to log on to the client computer, and then press the [OK] key.
6. Enter the password used to log on to the client computer, and then press the [OK] key.
67
2. Sending Scan Files to Folders
• If authentication is required to access the folder, the login screen appears. Enter the user name and
password.
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• Computer and shared folder names containing more than 12 characters cannot be displayed.
• To modify or change an entered folder path, press [EditDest].
• To add another destination, press [Add Dest], and then enter its folder path.
• The connection test may take time.
• Even if the connection test was successful, the machine may fail to transfer the file if you do not have
write privileges for the file or there is not enough free hard disk space.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".
• p.78 "Registering the Path to the Selected Destination in the Address Book"
1. Press [Dest.:].
68
Specifying Scan to Folder Destinations
If you cannot find the destination computer, press the [ ] or [ ] key. Select the computer, and then
press the [OK] key. The computer folder opens. Press [Up] or the [Escape] key to go up one level.
6. A login screen appears if authentication is required. Enter a user name and password used
to log on to the client computer, and then press the [OK] key.
69
2. Sending Scan Files to Folders
9. Press [Com.Test].
• If authentication is required to access the folder, the login screen appears. Enter the user name and
password.
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• If you press [Cancel] while browsing the network, the Path Entry Method screen reappears.
• Computer and shared folder names containing more than 12 characters cannot be displayed.
• Up to 100 computers and shared folders can be displayed on the "Browse Ntwrk" screen.
• The machine may fail to transfer the file if you do not have the write privileges for the shared folder
or there is not enough free hard disk space.
70
Specifying Scan to Folder Destinations
• You can register the path to the destination in the machine' address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".
• p.78 "Registering the Path to the Selected Destination in the Address Book"
1. Press [Dest.:].
3. Enter the FTP server name, and then press the [OK] key.
Instead of specifying the destination using its server name, you can also use its IPv4 address.
4. If you change the port number specified under [System Settings], enter a new number using
the number keys, and then press the [OK] key.
71
2. Sending Scan Files to Folders
5. Enter the user name, and then press the [OK] key.
7. Enter the path to the destination folder, and then press the [OK] key.
The following is an example of a path where the sub folder name is “lib” and the folder name is “user”:
user\lib.
72
Specifying Scan to Folder Destinations
2
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• The connection test may take time.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".
• p.78 "Registering the Path to the Selected Destination in the Address Book"
This section explains how to specify destinations when sending files to a NetWare server.
The NetWare folder of the destination can be specified in an NDS tree or on a NetWare Bindery server,
depending on the NetWare environment. Consult your administrator.
You can send a file to NetWare server by any of the following methods:
• Enter the destination path of the Netware server directly
• Specify the path by browsing to the destination on the Netware server
1. Press [Dest.:].
73
2. Sending Scan Files to Folders
2 3. Select the connection type, and then press the [OK] key.
Select [NDS] to specify a folder in the NDS tree. Select [Bindery] to specify a folder on the NetWare
Bindery server.
5. Enter the destination folder path, and then press the [OK] key.
If you set the connection type to [NDS], the NDS tree name is “tree”, the name of the context including
the volume is “context”, the volume name is “volume”, and the folder name is “folder”, the path will
be \\tree\volume.context\folder”. If you set the connection type to [Bindery], the NetWare server
name is “server”, the volume name is “volume”, and the folder name is “folder”, the path will be “\
\server\volume\folder”.
6. Enter a user name to log on to the NDS tree or Netware Bindery server, and then press the
[OK] key.
74
Specifying Scan to Folder Destinations
If you select [NDS] for connection type, enter the user name, and then enter the name of the context
containing the user object. If the user name is “user” and the name of the Context is “context”, the
user name will be “user.context”.
7. If a password is specified for the log on user, enter it, and then press the [OK] key.
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• You can connect only to folders that you have the read privileges for.
• The connection test may take time.
• Even if the connection test was successful, the machine may fail to transfer the file if you do not have
write privileges for the file or there is not enough free hard disk space.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".
75
2. Sending Scan Files to Folders
• p.78 "Registering the Path to the Selected Destination in the Address Book"
3. Select the connection type, and then press the [OK] key.
Select [NDS] to specify a folder in the NDS tree. Select [Bindery] to specify a folder on the NetWare
Bindery server.
76
Specifying Scan to Folder Destinations
5. Select the NDS tree or NetWare Bindery server that contains the required destination folder,
and then press the [OK] key.
2
A list of NDS contexts or NetWare Bindery server volumes appears.
6. A login screen appears if authentication is required. Enter a user name and password, and
then press the [OK] key.
7. Select a context or volume that contains the required destination folder, and then press the
[OK] key.
9. The path to the selected folder is displayed. Check the path is correct, and then press the
[OK] key.
77
2. Sending Scan Files to Folders
10. The destination is displayed. Check the destination is correct, and then press the [OK] key.
2
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• Only folders that you have the read privileges for are displayed.
• If the language used for the NDS tree or by the NetWare Bindery server differs from that used by the
machine, file names in the NDS tree or on the NetWare Bindery server might appear garbled.
• If the selected NDS tree or NetWare Bindery server requires authentication, a login screen appears.
Enter a user name and password for logging on to the NDS tree or NetWare Bindery server. If you
log on to the NDS tree, enter a user name, and then enter the name of the context containing the user
object. If the user name is "user" and the name of the Context is "context", the user name will be
"user.context".
• The machine may fail to transfer the file if you do not have write privileges for the folder or there is
not enough free hard disk space.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".
• p.78 "Registering the Path to the Selected Destination in the Address Book"
This section explains how to register folder paths you have entered manually or specified by browsing the
network to the machine's address book.
78
Specifying Scan to Folder Destinations
BRB004S
4. Press [Details] and [Reg. No.] to specify registration information. After you have made all
settings, press the [OK] key.
• Depending on the security settings, [Program] may not appear. In such case, you cannot complete
registration. For details, consult your administrator.
79
2. Sending Scan Files to Folders
80
3. Sending Scan Files Using WSD
If your computer has a WSD-compliant operating system such as Windows Vista, you can send scan files
to the computer or send scanning requests to this machine from the computer simply by connecting the
computer to the network.
• This function is available only if your computer has a WSD-compliant operating system such as
Windows Vista. Check your computer's settings before using the WSD scanner.
• The example explanations shown in this manual are based on Windows Vista Ultimate.
• When you configure the personal authentication function or user code authentication, the WSD
scanner function will be automatically disabled. To perform WSD scanning again, you must enable
the WSD scanner function. For details about enabling this function, see "Enabling WSD using Web
Image Monitor".
This section describes the process of sending scan files using WSD.
81
3. Sending Scan Files Using WSD
3
ZZZ805S
1. This machine
From this machine you can specify destinations, and then send scan files to WSD-compliant client computers.
2. Client computers (WSD-compliant)
WSD-compliant computers receive the sent scan files via the network.
ZZZ805S
1. This machine
Scans originals after receiving a scanning request from a client computer, and then sends the scan files over the
network to the client computer.
2. Client computers (WSD-compliant)
You can specify scan settings and send scanning requests from client computers using Windows Fax and Scan
or a similar application. Client computers can receive files scanned by this machine.
82
Before Sending Scan Files Using WSD
To send scanned files using WSD, you must first perform the following:
• Check the machine is properly connected to the network
• Configure the network settings in [System Settings]
• Enable WSD using Web Image Monitor
• Register the machine to a client computer
1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.
83
3. Sending Scan Files Using WSD
4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and then press the
[OK] key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key
3 to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address] to make necessary settings, and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.
• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet] and then configure the network settings.
84
Before Sending Scan Files Using WSD
• For details about displaying Web Image Monitor, see "Monitoring and Configuring the Printer",
Network and System Settings Guide. For details about using Web Image Monitor, see Web Image
Monitor Help.
• If the [Found New Hardware] dialog box appears, install the printer driver using the procedure shown
under "Installing the Printer Driver".
• When registration is complete, the scan profile is created automatically. To change the scan profile,
see "Changing a Scan Profile".
85
3. Sending Scan Files Using WSD
86
Using the WSD Scanner (Push Type)
This section explains the layout of the screen that allows you to send scan files using WSD (Push Type).
Main Screen
3
BRB009S
1. WSD icon
Indicates that the WSD screen is displayed.
2. Destination field
Displays a selected destination. If multiple destinations are selected, press the [ ] or [ ] key to display the
destinations in the order they were selected. To check the selected destination, press the [Check Destination]
key.
3. E-mail / Scan to Folder / Network Delivery Scanner / WSD Scanner
Press to switch between screens.
4. [WSD Dest]
The list of available destinations is displayed here.
If all of the destinations cannot be displayed, press the [ ] or [ ] key to move through the list.
5. [Options]
Press to make scan settings.
Basic Procedure for Sending Scan Files Using WSD (Push Type)
This section explains the basic procedure for sending scan files using WSD (Push Type).
87
3. Sending Scan Files Using WSD
• If the message "Updating destination list has failed. Try again?" appears, press [Retry]. The destination
list will then be updated.
3. Place originals.
4. If necessary, press [Options] to configure the original orientation.
For details, see "Original Orientation".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Specify the destination.
For details, see "Specifying the Destination Client Computer".
7. Press the [Start] key.
When scanning batches, place subsequent originals after each scan file, or batch of scan files been
sent.
• If you are using this machine as a WSD scanner, you can specify only one destination per scan job.
• To cancel a specified destination, press the destination again, or press the [Clear/Stop] key.
• To cancel scanning, press the [Clear/Stop] key.
• You cannot scan originals while other originals are being scanned.
• Two-sided originals are scanned for sideways opening (top-to-top orientation).
• If scanning takes too long, the client computer might time out, causing the message "Automatic
Scanning could not be completed" to appear. If this happens, the scan files are sent again. Depending
on the settings of the client computer, you might have to perform a procedure on the client computer
directly. To check the files have been sent successfully, use the machine's Scanned Files Status screen
or the client computer. For details, see "Files status".
• If scanning does not begin after you press the [Start] key, the machine might not be registered to the
computer or the profile might be incorrectly configured. For details, see "Registering the machine to
the client computer" or "Creating a New Scan Profile".
88
Using the WSD Scanner (Push Type)
3
Specifying the Destination Client Computer
This section explains how to specify a destination client computer for the scan files you are sending by
WSD.
You can specify the destination computer using either of the following methods:
• Selecting a destination computer from the destination list
• Searching for a destination computer and then selecting it
• If you are using this machine as a WSD scanner, you can specify only one destination per scan job.
• If the destination computer does not appear but the machine is already registered to the destination
computer, press [Update]. This will update the destination list with the latest information.
89
3. Sending Scan Files Using WSD
2. Press the [ ] or [ ] key to select the destination from the list, and then press the [ ] key.
The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.
• In the destination list, each destination client computer is displayed using up to 20 characters.
• We recommend you register easily recognizable computer names.
• If a WSD-compatible computer is connected to the network, the following five destinations appear
on the display panel automatically. For details about the saving location of files in each destination,
see the relevant computer's settings.
• Scan to "Computer Name"
• Scan for Print to "Computer Name"
• Scan for E-mail to "Computer Name"
• Scan for Fax to "Computer Name"
• Scan for OCR to "Computer Name" (Scan for OCR to "Computer Name" might not be available
depending on the destination client computer.)
• If the target destination does not appear, take one of the following steps:
• Display the destination by selecting the initial letter of its title
• Display the destination by pressing the [ ] or [ ] key
• You can also search for the destination by pressing the [Search Destination] key. For details, see
"Searching for a destination client computer".
• The destination list can display up to 250 client computer destinations.
• You cannot use the Quick Dial keys while you are using the WSD scanner function.
90
Using the WSD Scanner (Push Type)
3
BRB003S
91
3. Sending Scan Files Using WSD
The check box on the left side of the selected destination is selected.
92
Using the WSD Scanner (Pull Type)
Basic Procedure for Sending Scan Files Using WSD (Pull Type)
This section explains the basic procedure for sending scan files using WSD (Pull Type).
1. On the client computer, click the [Start] menu, point to [All Programs], and then click
[Windows Fax and Scan].
3
2. Place an original on this machine.
3. In the [Windows Fax and Scan] window, click the [File] menu, point to [New], and then
click [Scan...].
4. If a dialog box for selecting the device you want to use appears, select the name of the
device in the list, and then click [OK].
The [New Scan] dialog box appears.
5. Make settings for the type of original, type of scanning, and orientation of the original, etc.
For details, see "Scan Profile Items and Settings".
6. In the [New Scan] dialog box, click [Scan].
The original is scanned.
Send the scan data by e-mail as an attachment or save it as a file.
• If the [Administrator Tools] are not enabled in Web Image Monitor, you cannot use the WSD scanner
function. To use this function, you must set the external scan setting to [Do not Prohibit]. For details see
"Enabling WSD using Web Image Monitor".
• Only one original can be scanned per scanning request. If you select [Feeder (Scan one side)], only
one side of the original will be scanned. If you select [Feeder (Scan both sides)], both sides of the
original will be scanned.
• If you select [TIFF] for [File Type] in the scan profile, scanned pages of two-sided originals are
combined and sent as a single file.
• When scanning from the ADF, you must click [Scan] in the [New Scan] dialog box each time you
scan an original.
• You cannot scan originals while other originals are being scanned.
• Two-sided originals are scanned for sideways opening (top-to-top orientation).
• Transmission results of WSD scanning (Pull Type) jobs do not appear in File Status.
93
3. Sending Scan Files Using WSD
• If scanning takes too long, the computer might time out and the error message "Automatic Scanning
could not be completed" will appear on the computer screen. If this happens, change the scan settings
or scan the originals one side at a time.
• The Blank Page Detect function is not available when you are using the WSD scanner (Pull Type).
• To scan an original correctly, place it as shown in the following table:
Placing an original
Scanning method
Original orientation
(Exposure glass/ADF)
3
top corner touching top left corner of exposure
glass
Exposure glass
94
Configuring the Scan Settings on a Client Computer
• If a profile does not appear in the [Scanner and Cameras] dialog box, the associated machine might
be turned off, or the required WSD scanner settings might not have been specified. For details about
WSD scanner settings, see "Preparation for Sending Files Using WSD".
• If a profile does not appear in the [Scan Profile] dialog box, recreate it as a new profile. For details,
see "Creating a New Scan Profile".
• You can create multiple profiles.
95
3. Sending Scan Files Using WSD
• You can register multiple profiles. If multiple profiles are registered, the profile specified as default in
the [Scan Profiles] dialog box is applied.
• To specify a scan profile as the default profile, perform one of the following procedures:
• In the [Scan Profiles] dialog box, click the scan profile, and then click [Set as Default].
• After you create a new scan profile, in the [Add New Profile] dialog box, select the [Set this
profile as default] check box.
The following table tells you the scan profile settings that you can configure.
96
Configuring the Scan Settings on a Client Computer
97
3. Sending Scan Files Using WSD
98
4. Saving Scan Files on a Removable
Memory Device
Using the scanner function, you can save scan files on a removable memory device.
• This machine supports FAT16 format USB memory sticks and SD cards. Other forms of removable
memory device are not compatible.
• Make sure that the format of the removable memory device is FAT16.
• Saving might fail if the USB memory stick features password protection or other security features.
• Certain types of USB memory sticks cannot be used.
• To save files on a removable memory device, you must attach the optional media slot to the machine.
• Do not connect the optional media slot to other machines.
• Connect only USB memory sticks to the optional media slot, not any other form of USB device.
• Do not turn the machine's main power switch to off while data is being written. Doing so can result in
corrupted data.
• If the machine's main power is accidentally switched off while data is being written, you must check
the data on your media for corruption when you switch the machine back on.
• USB memory sticks and SD cards must not be wider than 35mm (1.4inch).
99
4. Saving Scan Files on a Removable Memory Device
ZZZ807S
4 1. This Machine
If the optional media slot is installed, the machine can save scan files on a removable memory device.
2. Removable Memory Device
Scan files are saved on a removable memory device.
3. Client Computer
Using applications on a client computer, scan files saved on a removable memory device can be printed and
viewed.
• Files saved on a removable memory device cannot be printed or sent using the functions of this
machine. To perform operations on files saved on a removable memory device, you must use an
application on a client computer.
100
Basic Procedure for Saving Scan Files on a Removable Memory Device
6. Select [Store to Memory Device], and then press the [OK] key.
8. Press [Options], to select [Send Options], and then press the [OK] key.
For details, see "Specifying Send Options".
9. If necessary, select the original type.
For details, see "Selecting Original Type".
10. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
101
4. Saving Scan Files on a Removable Memory Device
• You cannot specify where the data is saved. Files are saved in the root directory of the removable
memory device.
• Up to 2 GB of data can be saved. However, depending on the number of files already stored on the
4 removable memory device, new files might not be saved, even if there appears to be sufficient free
space.
• If the removable memory device is partitioned, files are saved on the first partition.
• To cancel writing, press the [Clear/Stop] key. If files are being written when writing is cancelled, any
partially written files are deleted. Only complete files are stored on the removable memory device.
• The LED lamp on the media slot flashes when an inserted SD card is being accessed and remains lit
when a USB memory stick is attached.
102
5. Delivering Scan Files
Using the ScanRouter delivery software, you can deliver by various methods scan files produced by the
machine.
• To use the network delivery scanner function, your network must have a delivery server on which the
ScanRouter delivery software (optional) is installed. You must also register destination and sender
information on the delivery server. For details about the ScanRouter delivery software, see the manuals
that are supplied with it.
5
Overview of Scan File Delivery
This section describes the process for delivering files using the network delivery scanner.
ZZZ808S
1. This machine
You can send scan files to the delivery server.
2. Delivery server
Install the ScanRouter delivery software on this computer to use it as the delivery server.
After receiving a scan file, the delivery server delivers the file according to the setting specified for the destination.
The delivery settings are as follows:
• Storing the file in an in-tray
• Delivering the file by e-mail
• Storing the file in a selected folder
For details about the ScanRouter delivery software, see the manuals supplied with ScanRouter delivery software.
103
5. Delivering Scan Files
3. Client Computer
How to check a file from the client computer depends on the delivery method.
For example, you can check a file by one of the following methods:
• Use DeskTopBinder to view a file delivered to the in-tray.
• Use e-mail software to receive e-mail with an attached file.
• Browse a folder for a stored file.
1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.
104
Before Delivering Files
4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and press the [OK]
key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key 5
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address], and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.
7. Select [LAN Type] and [Ethernet], and then press the [OK] key.
8. Select [File Transfer], and then press the [OK] key.
9. Select [Delivery Option], and then select [On].
• If an extended wireless LAN board (optional) is installed, press [LAN Type] on the [Interface Settings],
then press [Ethernet], and then configure the network settings.
105
5. Delivering Scan Files
Select [Scan Settings], [Destination List Settings], [Send Settings], [Administrator Tools], and then
configure the relevant settings.
• To view files delivered to an in-tray, DeskTopBinder Lite must be installed on the client computer. For
details about installing DeskTopBinder Lite, see "Installing DeskTopBinder Lite from the Supplied CD-
5 ROM".
• The settings you must configure in [System Settings] vary depending on your network environment.
For details about network settings, see "Connecting the Machine", Network and System Settings
Guide.
This section explains how to install DeskTopBinder Lite on a client computer from the supplied CD-ROM.
To view or receive files delivered to the in-trays, you must install DeskTopBinder Lite on the client computer.
1. Make sure Windows is running on the client computer, and then insert the CD-ROM into the
CD-ROM drive.
The installer starts.
2. Click [DeskTopBinder Lite].
The [DeskTopBinder Lite Setup] dialog box appears.
For the subsequent installation steps, see the Setup Guide displayed from the [DeskTopBinder Lite
Setup] dialog box.
• Before you start the installation, check the system requirements for DeskTopBinder Lite. For details,
see "DeskTopBinder Lite".
• You can install the software using the auto-run program. For details about the auto-run program, see
"Auto-Run Program".
106
Before Delivering Files
This section describes the screen layout when using the network delivery scanner.
Main screen
BRB010S
ZZZ608S
107
5. Delivering Scan Files
4. [Manual]
To send a file by e-mail via the delivery server to a destination not registered in the delivery server’s
Destination List, press [Manual], and then enter the e-mail address of the destination using the Quick Dial
keys. For details about how to send a file by e-mail via the delivery server, see the ScanRouter delivery
software manuals.
5. [Options]
Press to make the scan settings.
6. [Add Dest]
When selecting multiple destinations after a manual entry of an e-mail address, press [Add Dest], and then
enter the e-mail address of the destination.
7. [EditDest]
When changing an e-mail address that has been entered, press [EditDest], and then enter the new e-mail
address.
108
Basic Procedure for Delivering Files
• You must register destinations and senders in advance using the ScanRouter delivery software installed
on the delivery server.
5
3. Place originals.
4. If necessary, select the original type.
For details, see "Selecting Original Type".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Select the destination.
109
5. Delivering Scan Files
8. If necessary, select [Sender's Name] under [Options], and then specify the sender.
The sender you specify appears in the subject line of e-mail that is sent via the delivery server. Select
the sender from the destinations registered on the delivery server. For details, see "Specifying the
Sender".
9. If necessary, select [Attach Subject] under [Options], and then specify the subject.
The subject entered here is set for e-mail that is sent via the delivery server.
For details, see "Entering the Subject of the E-mail to Be Transmitted via the Delivery Server".
10. Press the [Start] key.
• To send e-mail via delivery server, press [Manual] on the delivery screen, and then enter a destination
e-mail address. For details about the procedure for manually entering e-mail addresses, see "Entering
an E-mail Address Manually".
• If you have selected two or more destinations, the destinations can be made to appear one by one
by pressing the [ ] or [ ] key.
• To cancel a selected destination, display the destination in the destination field, and then press the
[Clear/Stop] key.
• You can use the Return Receipt function when sending e-mail via delivery server. An e-mail is sent to
the sender selected in step 8, notifying him/her that the recipient has read his/her e-mail. For details
about the procedure for setting the Return Receipt function, see "Setting the Return Receipt Function".
• To enable the Return Receipt function, it is necessary to make the settings to send e-mail by SMTP with
ScanRouter delivery software. For details about how to specify this setting, see the manuals supplied
with the ScanRouter delivery software. Note, however, that if the receiving party's e-mail application
does not support Message Disposition Notification (MDN), notification e-mail might not be returned.
• Register the sender’s e-mail address using the ScanRouter delivery software in advance.
110
Basic Procedure for Delivering Files
• If you press the [Check Destination] key, the initial scanner screen switches to the Check Dest. screen.
You can use the Check Dest. screen to check the details of the selected destinations. For details, see
"Check destination".
• To cancel scanning, press the [Clear/Stop] key.
111
5. Delivering Scan Files
5 This section explains how to select a destination using a Quick Dial key.
For details about how to register a delivery destination to a Quick Dial key, see "Registering Addresses
and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
1. Press a Quick Dial key of the same number as the [Short ID] of the destination registered in
the delivery server.
Repeat this step to add more destinations.
BRB005S
• For details about how to set Short IDs, see the manuals supplied with the ScanRouter delivery software.
This section explains how to select destinations registered in the delivery server's Destination List.
There are four methods of selecting a destination that is registered in the delivery server's Destination List:
112
Specifying Delivery Destinations
BRB003S
3. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.
The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.
113
5. Delivering Scan Files
• To cancel a selected destination, press the key to select the target destination, and then press the
[ ] key.
• Depending on the security settings, some destinations may not appear in the destination list.
5 Select a destination by entering its Short ID number (registered using the ScanRouter delivery software).
For details about how to set Short IDs, see the manuals supplied with the ScanRouter delivery software.
BRB003S
3. Using the number keys, enter the three-digit registration number assigned to the destination,
and then press the [OK] key.
Example: To enter 003
Press the [3] key, and then press the [OK] key.
114
Specifying Delivery Destinations
BRB003S
3. Enter the beginning of the destination name, and then press the [OK] key twice.
115
5. Delivering Scan Files
4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.
The check box on the left side of the selected destination is selected.
5. Press the [OK] key.
BRB003S
116
Specifying Delivery Destinations
3. Enter the beginning of the comment, and then press the [OK] key twice.
4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.
The check box on the left side of the selected destination is selected.
5. Press the [OK] key.
5
117
5. Delivering Scan Files
• Senders must be registered in advance under [System Settings]. For details, see "Registering Addresses
and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
• In [System Settings], you can specify the administrator's e-mail address as the default sender name.
This lets you send e-mail without entering anything for [Sender’s Name]. For detail, see "File Transfer",
Network and System Settings Guide.
5 • Depending on the security setting, the logged-on user may be specified as [Sender’s Name].
• When a protection code has been set, a screen for entering the protection code appears after selecting
the sender. Enter the protection code, and then press the [OK] key. If the protection code you entered
is correct, the sender name is displayed.
This section explains how to select a sender registered to a Quick Dial key.
For details about how to register e-mail senders to Quick Dial keys, see "Registering Addresses and Users
for Facsimile/Scanner Functions", Network and System Settings Guide.
1. Press [Options].
118
Specifying the Sender
BRB005S
This section explains how to select a sender by searching the delivery server's Destination List.
There are four methods of selecting a sender that is registered in the delivery server's Destination List:
• Select the sender from the sender list
• Select the sender by entering the registration number
• Select the sender by name
119
5. Delivering Scan Files
1. Press [Options].
BRB003S
5. Press the [ ] or [ ] key to select the sender, and then press the [ ] key.
The check box on the left side of the selected sender is selected.
To cancel a selected sender, press the [ ] or [ ] key to select the target sender, and then press the
[ ] key.
120
Specifying the Sender
1. Press [Options].
121
5. Delivering Scan Files
BRB003S
5. Use the number keys to enter the three-digit number assigned to the sender, and then press
the [OK] key.
Example: To enter 001
Press the [1] key, and then press the [OK] key.
122
Specifying the Sender
1. Press [Options].
BRB003S
123
5. Delivering Scan Files
5. Enter the beginning of the sender name, and then press the [OK] key twice.
124
Entering the Subject of the E-mail to Be Transmitted via the Delivery Server
1. Press [Options].
2. Press the [ ] or [ ] key to select [Attach Subject], and then press the [OK] key.
• If you specify a default subject line in [Default E-mail Subject] under [Scanner Features], you will not
have to enter a subject line for each e-mail you send. For details, see "Send Settings".
125
5. Delivering Scan Files
126
6. Scanning Originals with the Network
TWAIN Scanner
The TWAIN driver allows you to scan originals on the machine from a client computer via the network.
• To use the network TWAIN scanner, you must install the TWAIN driver, which is on the supplied CD-
ROM. For details about installing the TWAIN driver, see "Installing the TWAIN Driver from the
Supplied CD-ROM".
• To use the network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder, must
be installed on the client computer. DeskTopBinder Lite is on the supplied CD-ROM. For details about
installing DeskTopBinder Lite, see "Installing DeskTopBinder Lite from the Supplied CD-ROM". 6
• p.130 "Installing the TWAIN Driver from the Supplied CD-ROM"
• p.106 "Installing DeskTopBinder Lite from the Supplied CD-ROM"
ZZZ805S
127
6. Scanning Originals with the Network TWAIN Scanner
1. This Machine
Scans an original after receiving a scan instruction from a client computer, and then sends the scan file over the
network to the client computer.
2. Client Computer
Specifies the scanner settings and controls the scanner using an application, such as DeskTopBinder Lite, that
supports the network TWAIN scanner. Receives the files scanned by the machine and displays them using an
application that supports the network TWAIN scanner.
• When using the machine as a network TWAIN scanner, you do not need to press the [Scanner] key
on the machine's control panel. The screen switches automatically when you scan an original from a
client computer using the TWAIN driver. To use functions other than the network TWAIN scanner,
press [Exit].
6
Preparing to Use the Network TWAIN Scanner
To use this machine as a network TWAIN scanner, you must first perform the following:
• Check the machine is properly connected to the network
• Configure the network settings in [System Settings]
• Install the TWAIN driver on a client computer
• Install a TWAIN-compliant application on the same client computer
128
Before Using the Network TWAIN Scanner
Note that the settings you must configure will vary depending on your operating environment. For details
about network settings and configuration procedures, see "Network Settings Required to Use Network
TWAIN Scanner", Network and System Settings Guide.
1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.
4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and press the [OK]
key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address], and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.
• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet], and then configure the network settings.
129
6. Scanning Originals with the Network TWAIN Scanner
For details about installing the TWAIN driver, see "Installing the TWAIN Driver from the Supplied CD-
ROM".
This section explains how to install the TWAIN driver on a client computer from the supplied CD-ROM.
To use the network TWAIN scanner, you must install the TWAIN driver on a client computer.
1. Start Windows, and then insert the CD-ROM labeled into the CD-ROM drive of the client
computer.
The installer starts.
2. Click [TWAIN Driver].
3. The installer of the TWAIN driver starts. Follow the instructions.
• Before you start the installation, check the system requirements for the TWAIN driver. For details about
the system requirements, see "Software Supplied on CD-ROM".
• You can install the software using the auto-run program. For details about the auto-run program, see
"Auto-Run Program".
• If the installer does not start automatically, see "Auto-Run Program".
• When the installation is complete, a message about restarting the client computer may appear. In this
case, restart the client computer.
• After the installation is complete, a folder with the name of the machine in use is added in [Programs]
or [All Programs] on the [Start] menu. Help can be displayed from here.
• Notes on using the network TWAIN scanner are provided in "Readme.txt". Be sure to read them before
use.
130
Before Using the Network TWAIN Scanner
131
6. Scanning Originals with the Network TWAIN Scanner
• To use the network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder and
the TWAIN driver must be installed on the client computer.
• Under the Windows XP SP2/Vista or Windows Server 2003/2003 R2/2008 operating system,
when the Windows firewall or an antivirus program is enabled, "Cannot find the scanner." or "No
response from the scanner." may appear and scanning with the TWAIN scanner may fail. In this case,
check the settings of the Windows firewall or antivirus program. For details, see Windows Help.
The following procedure uses Windows XP and DeskTopBinder Lite by way of example.
1. On the [Start] menu, point to [All Programs], point to [DeskTopBinder], and then click
[DeskTopBinder].
2. On the [Tools] menu, click [Scanner Settings...].
3. Click [Select Scanner Driver...].
6 4. Select the name of the machine you want to use in the list, and then click [Select].
5. Click [OK].
6. Place originals.
7. On the [File] menu, point to [Add Document], and then click [Scan...] to display the Scanner
Control dialog box.
The Scanner Control dialog box and DeskTopBinder viewer will appear.
A dialog box that is used to control a scanner using the TWAIN driver is referred to as the Scanner
Control dialog box.
8. Make settings for the type of original, type of scanning, and orientation of the original, etc.
For details, see the TWAIN driver Help.
9. In the Scanner Control dialog box, click [Scan].
Depending on the security setting, if you press [Scan], a dialog box for entering the user name and
password may appear.
If there are more originals to be scanned, place the next original, and then click [Continue].
If there are no more originals to be scanned, click [Complete].
10. On the [File] menu of the DeskTopBinder viewer, click [Exit].
11. Enter the file name, and then click [OK].
The DeskTopBinder viewer closes and the image is stored in DeskTopBinder Lite.
132
Basic Network TWAIN Scanner Procedure
• If you have already selected a scanner, you do not need to select the scanner unless you want to
change it.
• Using DeskTopBinder, you can edit and print scan files. For more information about
DeskTopBinder, see DeskTopBinder manuals.
• The model name of the connected scanner appears in the title bar of the Scanner Control dialog box.
If there is more than one scanner of the same model on the network, make sure you have selected the
correct scanner. If you have not, click [Select Scanner Driver...], and then select the scanner again. If
the correct scanner does not appear in the list, check that the scanner is correctly connected to the
network and that its IPv4 address has been specified. If the correct scanner still does not appear: in
the Network Connection Tool that is installed with the TWAIN driver, select the [Use a specific
scanner.] check box, and then specify the IP address or host name of the scanner you want to use.
For details, see the Help for the Network Connection Tool.
• If you are scanning originals from DeskTopBinder using the network TWAIN scanner, you cannot
cancel scanning without first saving the documents. If you are no longer using the documents, save
them first, and then delete them using DeskTopBinder.
• The Blank Page Detect function is not available when you are using the TWAIN scanner.
6
133
6. Scanning Originals with the Network TWAIN Scanner
This section explains how to correctly display the top/bottom orientation of scanned originals on a client
computer screen.
To correctly display the top/bottom orientation of the scanned original on a client computer, the placement
of the original and the settings made in the Scanner Control dialog box must match.
Placing originals
The following table shows the relationship between the original orientation and the Scanner Control dialog
box settings:
Exposure Glass
134
Scan Settings When Using TWAIN Scanner
ADF
135
6. Scanning Originals with the Network TWAIN Scanner
• Originals are normally rectangular ( ) or horizontally long ( ). However, the table above uses
squares to make original orientation easier to understand. Even if the actual shape of the original is
different, the combination of original orientation and the orientation specified on the scanner driver
does not change.
• For details about the Scanner Control dialog box, see the TWAIN driver Help.
• Depending on the settings, originals of different sizes are scanned differently.
136
7. Various Scan Settings
This chapter describes various scan settings.
• For details about setting Sender's Name, Attach Subject, Return Receipt, E-mail Encryption, and E-
mail Signature, see chapter 1 "Sending Scan Files by E-mail".
Resolution 7
Select resolution for scanning originals.
Select [100 dpi], [200 dpi], [300 dpi], [400 dpi], or [600 dpi] as the scanning resolution.
1. Press [Options].
2. Press the [ ] or [ ] key to select [Resolution], and then press the [OK] key.
137
7. Various Scan Settings
Original Orientation
This section explains how to correctly display the top/bottom orientation of scanned originals on a client
computer screen.
1. Press [Options].
2. Press the [ ] or [ ] key to select [Original Orientation], and then press the [OK] key.
3. Select [ ] or [ ] for the same orientation as the original, and then press the [OK]
key.
138
Specifying Send Options
Placing originals
To correctly display the top/bottom orientation of the scanned original on a client computer, the placement
of the original and the settings made on the control panel must match.
Place originals correctly by referring to the following table:
Exposure Glass
Turn the original over, and then place it face down on the exposure glass.
BPS005S
7
BPS006S
ARDF
Hold the original so that its text is in the natural readable orientation, and then place it face up in the
ARDF.
BRB012S
139
7. Various Scan Settings
BRB011S
Original Setting
This section explains the settings for scanning one-sided or two-sided originals.
This function is not available unless ARDF is installed.
1. Press [Options].
2. Press the [ ] or [ ] key to select [Original Setting], and then press the [OK] key.
3. Select [1 Sided Original] to scan one-sided originals, and then press the [OK] key. Select [2
Sided Orig.(T to T ) ] or [2 Sided Orig.(T to B ) ] to scan two-sided originals, and then
press the [OK] key.
The following table explains the relationship between the page opening orientation and control panel
selection key.
2 Sided Orig.(T to T )
140
Specifying Send Options
2 Sided Orig.(T to B )
Scan Size
1. Press [Options].
2. Press the [ ] or [ ] key to select [Scan Size], and then press the [OK] key.
3. Press the scroll keys to select the scan size in the list, and then press the [OK] key.
141
7. Various Scan Settings
• If Custom Size is selected, the dimensions of the scan area (width and length) can be specified.
7
ALO031S
1. Vertical
2. Horizontal
Placing an original on the exposure glass
ALO032S
1. Vertical
2. Horizontal
142
Specifying Send Options
1. Press [Options].
2. Press the [ ] or [ ] key to select [Scan Size], and then press the [OK] key.
3. Press the scroll keys to select [Custom Size], and then press the [OK] key.
4. Using the number keys, enter the horizontal width, and then press the [OK] key or [ ] key.
7
5. Using the number keys, enter the vertical length, and then press the [OK] or [ ] key.
File Type
143
7. Various Scan Settings
• To deliver files, set the file type using the delivery server computer. For details, see the manuals supplied
with the ScanRouter delivery software.
File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail
or Scan to Folder, and saving files on a removable memory device.
You can select one of the following file types:
• [Single Page:TIFF/JPEG], [Single Page:PDF]
If you select a single-page file type when scanning multiple originals, one file is created for single
page and the number of files sent is the same as the number of pages scanned.
• [Multi-page:TIFF], [Multi-page:PDF]
If you select a multi-page file type when scanning multiple originals, scanned pages are combined
and sent as a single file.
Selectable file types differ depending on the scan settings and other conditions. For details about file
types, see "Notes About and Limitations of File Types".
1. Press [Options].
7
2. Press the [ ] or [ ] key to select [File Type], and then press the [OK] key.
3. Press the [ ] or [ ] key to select the file type, and then press the [OK] key.
144
Specifying Send Options
Depending on the file format you select, the following limitations will apply:
[Single Page:TIFF/JPEG]
• Originals scanned in black and white are sent as TIFF files.
• According to the settings specified for [Compress. (Gray/Full Clr)] under [Scanner Features],
originals scanned in full color or gray scale are sent in one of the following file types:
[On] ... JPEG
[Off] ... TIFF
[Multi-page:TIFF]
• When full color or gray scale is specified for [Original Type] and [Compress. (Gray/Full Clr)]
is set to [On] under [Scanner Features], you cannot select [Multi-page:TIFF].
• Encryption is possible only for scan files sent by e-mail or Scan to Folder and saved on a removable
device.
• You cannot open an encrypted file without a password. Make sure you do not forget a file's password.
1. Press [Options].
145
7. Various Scan Settings
2. Press the [ ] or [ ] key to select [PDF Security Encryption], and then press the [OK] key.
The password entered here will be required to open the PDF file.
6. Enter the password again, and then press the [OK] key.
"Programmed" appears, and then the PDF Security Encryption screen reappears.
7. Press the [Escape] key twice.
• The Encryption Password must be different from the Master Password (which is used for changing PDF
Security Permissions).
• You can enter up to 32 alphanumeric characters for a document password.
146
Specifying Send Options
1. Press [Options].
2. Press the [ ] or [ ] key to select [PDF Security Encryption], and then press the [OK] key.
7
4. Select [40 bit] or [128 bit], and then press the [OK] key.
"Programmed" appears, and then the PDF Security Encryption screen reappears.
5. Press the [Escape] key twice.
• PDF file created under the [128 bit] Encryption Level cannot be viewed using Adobe Acrobat Reader
3.0 and 4.0.
• If [Permit Low Resolution Only] is specified as the print permission in [PDF Security Permissions], you
cannot select [40 bit].
147
7. Various Scan Settings
Set a Master Password to restrict unauthorized printing, changing, copying, or extracting of a PDF file's
content.
Only users who have the Master Password can reset or change these restrictions.
• Encryption is possible only for scan files sent by e-mail or Scan to Folder.
• You cannot reset or change a file's restriction setting without the Master Password. Make sure you do
not forget the Master Password.
1. Press [Options].
2. Press the [ ] or [ ] key to select [PDF Security Permissions], and then press the [OK] key.
148
Specifying Send Options
The password entered here will be required to change the security settings of the PDF file.
6. Enter the password again, and then press the [OK] key.
"Programmed" appears, and then the PDF Security Permissions screen reappears.
7. Select [Permissions], and then press the [OK] key.
7
8. Change the PDF security settings.
You can specify the following security settings:
• Print permission: [Prohibit], [Permit All] and [Permit Low Resolution Only].
• Changing permission: [Prohibit] or [Permit].
• Copying or extracting content permission: [Prohibit] or [Permit].
The following is a procedure to prohibit printing of scanned PDF files.
9. Select [Print], and then press the [OK] key.
149
7. Various Scan Settings
150
Selecting Original Type
151
7. Various Scan Settings
BRB002S
• To scan originals in gray scale, you must first select [Scanner Features], [Original Type], and then
[Type 3(B&W: Text)] or [Type 4(B&W: Photo)], select [Gray Scale]. Then, to scan your originals in
gray scale, select the original type that you set to [Gray Scale]. For details about [Original Type], see
"Scanner Features".
• If images scanned in gray scale are not clear enough, you can rescan them by selecting [Type 1
7 (Colour: Text)] or [Type 2(Colour: Photo)].
152
Adjusting Image Density
BRB013S
The density indicator " " moves one place per button push.
The image density changes in five increments as follows:
7
ABU042S
153
7. Various Scan Settings
154
8. Scanner Features
This chapter describes the user tools in the Scanner Features menu.
• Procedures for configuring system settings differ from procedures for configuring other settings. You
must return to the initial screen when you finish configuring the system settings. For details about
returning to the initial screen, see "Closing User Tools".
• Any changes you make in [Scanner Features] remain in effect even if the main power switch or
operation switch is turned off, or the [Clear Modes] key is pressed.
• Depending on the sending method, some settings cannot be applied.
BRB001S
155
8. Scanner Features
3. Select the item using the [ ] or [ ] key, and then press the [OK] key.
4. Change settings by following instructions on the display, and then press the [OK] key.
BRB001S
156
Scan Settings
Scan Settings
This section describes the user tools in the Scan Settings menu under Scanner Features.
Default settings are shown in bold type.
Default Scan Settings
Various basic settings (resolution and scan size) can be set. You can register the scan settings in the
same way as specifying them. For details, see "Specifying Send Options".
• Resolution
• 100 dpi
• 200 dpi
• 300 dpi
• 400 dpi
• 600 dpi
• Scan Size
• Paper size for setting
A4 , A5 , A5 , B5 JIS , 81/2×14 , 81/2×13 , 81/2×11 , 51/2×81/2 ,
51/2×81/2 , [Custom Size]
Custom size paper setting will be as follows: Vertical: 139.0 to 216.0 mm
(5.5 to 8.5inch), Horizontal: 139.0 to 356.0 mm (5.5 to 14.0 inch)
Original Setting 8
This setting is available only when you have installed the optional ARDF.
Set the default for whether originals are one-sided or two-sided and if two-sided, the relationship
between those sides. When the originals are always the same, set this for the default to make operation
easier.
• 1 Sided Original
• 2 Sided Orig. (Top to Top )
• 2 Sided Orig. (Top to Bottom )
Orig. Orientation Priority
Select the default for Original Orientation. When originals are always placed in the same way, select
that orientation as the default to make operation easier.
Original Type Setting
Make these settings according to the paper type of the original.
Settings made here are assigned to the [Full Colour/B&W] and [Original Type] keys of the scanner
function.
• Type 1 (Colour: Text)
157
8. Scanner Features
8 Specify whether to scan originals in Full Color or Black & White mode.
• Full Colour Priority
• Black & White Priority
Blank Page Detect
Use the Blank Page Detect function to prevent blank pages being scanned.
If the first page of the originals is blank, the machine beeps to warn you that you might have placed
blank originals.
• On
• Off
When the Blank Page Detect function is set to [On], the outermost 1mm of an original’s edge border
cannot be scanned.
Blank pages of custom size originals may not be detected.
This function is available only for scanning from the ADF.
The machine cannot perform blank page detection on the second or subsequent pages of an original.
158
Destination List Settings
159
8. Scanner Features
Send Settings
This section describes the user tools in the Send Settings menu under Scanner Features.
This section explains how to set the defaults for settings such as the compression level for the scan file and
switching to and from the network TWAIN scanner function.
Default settings are shown in bold type.
Details of items of Send Settings are as follows:
PC Scan Command Stdby Time
If the machine receives a TWAIN or WSD (Pull Type) scanning request while it is writing data to
memory or performing e-mail, Scan to Folder, network delivery, or WSD scanning jobs, it switches
to the network TWAIN or WSD (Pull Type) scanner function either immediately or after a specified
standby time elapses following the last key operation.
Use this setting to specify whether the machine switches to TWAIN or WSD (Pull Type) immediately
or waits until the standby time elapses when it receives a TWAIN or WSD (Pull Type) scanning request.
The default setting is On, 10 second(s).
If you select [Off], the machine will switch to the network TWAIN or WSD (Pull Type) scanner function
immediately.
If you select [On], use the number keys to enter a standby time (3-30 seconds). The machine will
switch to the network TWAIN or WSD (Pull Type) scanner function when the time specified here
elapses following the last key operation.
8 File Type Priority
Select whether to send the scanned originals as single-page files or a multiple page file.
For single-page files, select either TIFF/JPEG or PDF. For multi-page files, select either TIFF or PDF.
• Single Page:TIFF/JPEG
• Single Page:PDF
• Multi-page:TIFF
• Multi-Page:PDF
Compression (B&W)
Select whether or not to compress black and white scan files.
• On
• Off
Compression reduces the time required for transferring the scan file.
The actual time required for file transfer varies depending on the file size and network load.
Compress. (Gray/Full Clr)
Specify whether or not to compress multi-level (Gray Scale/Full Color) scan files.
160
Send Settings
• On
• Off
If you select [On], you can specify the compression level from one to five.
The image quality is better for lower compression, but the time required for file transfer increases
accordingly.
The actual time required for file transfer varies depending on the file size and network load.
Print&Del. Scanner Journal
Up to 100 transmission/delivery results can be checked on this machine. If the stored transmission/
delivery results reach 100, select whether to print the delivery journal.
Depending on security settings, the journal might not be printed.
• Print and Delete All
The transmission/delivery journal is printed automatically. The printed journal is deleted.
• Do not Print:Delete Oldest
Transmission/delivery results are deleted one by one as new results are stored.
• Do not Print: Disable Send
Transmission/delivery cannot be performed when the journal is full.
Print Scanner Journal
The scanner journal is printed and deleted.
Delete Scanner Journal
The scanner journal is deleted without being printed. 8
Max. E-mail Size
Select whether or not to limit the size of an e-mail to which an image is attached.
• On: 2048 KB
• Off
When [On] is selected, enter the size limit (128-45,389 KB) with the number keys.
When the SMTP limits the size, match that setting.
Divide & Send E-mail
Select whether or not an image exceeding the size specified in Max. E-mail Size should be divided
and sent using more than one e-mail. This function is enabled only when [On] is selected for [Max.
E-mail Size].
• On (per page)
• On (per max. size): 5 (Maximum Number of Divisions)
• Off
161
8. Scanner Features
When [On (per max. size)] is selected, enter the Max. number of divisions (2-355) with the number
keys.
When [Multi-page:TIFF] or [Multi-page:PDF] is selected for [File Type Priority], the image will not be
divided even if [On (per page)] is selected. When [On (per max. size)] is selected, some received
files may not be able to be restored, depending on the type of e-mail software.
When [Off] is selected, the e-mail is not sent if its size exceeds the limit, and an error message appears.
The scan file is discarded.
Set the maximum e-mail size within the capacity of the SMTP server.
Insert Addit. E-mail Info
Select the language in which e-mail information such as title, date, administrator mail address is sent.
• On (British English)
• Off
Select one of the following 22 languages:
British English, American English, German, French, Italian, Spanish, Dutch, Portuguese, Polish, Czech,
Swedish, Finnish, Hungarian, Norwegian, Danish, Japanese, Simplified Chinese, Traditional
Chinese, Russian Hangul, Catalan, and Turkish.
The e-mail text which is a template cannot be changed.
Default E-mail Subject
If an e-mail subject is not entered when sending e-mail, the default e-mail subject is applied when
scan files are sent by e-mail.
8 Select whether to use the host name or a specified text as the default e-mail subject.
The default setting is Host Name.
E-mail Encryption Priority
Select whether or not to encrypt e-mail.
• Encrypt Dest. with
• Do not Encrypt
[E-mail Encryption Priority] is available only when the S/MIME function is enabled.
E-mail Signature Priority
Select whether or not to sign e-mail.
• Use Signatures
• Do not Use Signatures
[E-mail Signature Priority] is available only when the S/MIME function is s enabled.
162
Output Settings
Output Settings
This section explains the output settings that are available in [Output Settings] under [Scanner Features].
Default settings are shown in bold type.
Output Method Priority
Specify whether to send scan files or save them on a removable memory device.
• Send
• Store to Memory Device
If [Output Method Priority] is displayed, the Removable Memory Device function is available.
163
8. Scanner Features
Administrator Tools
This section explains the user tools that are available in [Administrator Tools] under [Scanner Features].
Menu Protect
You can specify user access levels for functions whose settings can be changed by users other than
the administrator. Using Menu Protect, you can prevent unauthenticated users from changing the user
tools.
Menu Protect is a Scanner Features setting item. You can also specify user access levels for the default
setting for each function.
For details, consult your administrator.
164
9. Appendix
When Using the E-mail, Folder Sending, WSD Scanner, or Network Delivery
Functions
This section explains the relationship between resolution and scan size when using the e-mail, Scan to
Folder, WSD Scanner, or network delivery functions.
If [Type 3(B&W: Text)] or [Type 4(B&W: Photo)] is selected as the original type
All combinations up to A4 and Legal (81/2×14) and 600 dpi can be scanned.
If [Gray Scale] is selected as the original type
Refer to the table below for the maximum resolution available for each scan size.
9
Scan size and maximum resolution
Scan size Maximum resolution (dpi)
If [Type 1(Colour: Text)] or [Type 2(Colour: Photo)] is selected as the original type
Refer to the table below for the maximum resolution available for each scan size.
165
9. Appendix
This section explains the relationship between resolution and scan size when using the machine as a TWAIN
scanner.
To specify the scan area or resolution on the machine you are using as a network TWAIN scanner directly,
see the TWAIN driver Help.
• Certain original types and resolution settings can reduce scanning quality.
If [Binary(Text)], [Binary(Photo)], or [8 Colors] is selected in [Col./Grad.:]
The scan size determines the maximum possible resolution.
9 Refer to the table below for the maximum resolution available for each scan size.
81/2×13 540
166
Relationship between Resolution and Scan Size
A4 578
81/2×13 312
A4 333
B5 385
A5 472
51/2×81/2 479
B6 546
A6 600
9
167
9. Appendix
Auto-Run Program
TWAIN Driver
This section tells you the file path to the TWAIN driver and the TWAIN driver's system requirements.
You must install this driver if you want to scan originals or use the machine as a network TWAIN scanner.
9 File path
The TWAIN driver is stored in the following folder on the CD-ROM:
\DRIVERS\TWAIN
System requirements
• Computer hardware
PC/AT-compatible machines that support the operating system properly
• Operating system
Microsoft Windows 2000/XP/Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2008
• Display resolution
800 × 600 pixels, 256 colors or higher
168
Software Supplied on CD-ROM
DeskTopBinder Lite
This section tells you the file path to DeskTopBinder Lite, the DeskTopBinder Lite system requirements, and
the applications that are installed with DeskTopBinder Lite.
DeskTopBinder is installed on the client computers to integrate and manage various kinds of files such as
scan files, files created with applications, and existing scan files. This software allows you to use various
functions for stored scan files such as viewing stored files. Also, with ScanRouter delivery software, you
can view the files stored in in-trays of the delivery server or use other functions for stored files. For details
about DeskTopBinder Lite, see DeskTopBinder Lite manuals or DeskTopBinder Lite Help.
File path
DeskTopBinder Lite is stored in the following folder on the CD-ROM provided with this machine:
\UTILITY\DESKV2
System requirements
• Computer hardware
PC/AT-compatible machines that support the following operating system properly
• Operating system
Microsoft Windows 2000 Professional SP1 or later
Microsoft Windows 2000 Server SP1 or later
Microsoft Windows 2000 Advanced Server SP1 or later
Microsoft Windows XP Professional/Home Edition
Microsoft Windows Vista Ultimate/Enterprise/Business/Home Premium/Home Basic
Microsoft Windows Server 2003 Standard Edition/Enterprise Edition
Microsoft Windows Server 2003 R2 Standard Edition/Enterprise Edition 9
Microsoft Windows Server 2008 Standard/Enterprise
• Display resolution
800 × 600 pixels, 64K colors or higher
Software installed with DeskTopBinder Lite
• Auto Document Link
Auto Document Link on the client computer monitors in-trays of the delivery server periodically,
retrieves files delivered to in-trays, and notifies the user of delivery.
• Function Palette
Function Palette allows you to use DeskTopBinder functions such as Scan using TWAIN scanner
or Print without starting DeskTopBinder. To use these functions from Function Palette, you must
first configure those using DeskTopBinder Extended Features. For details about Function
Palette, see DeskTopBinder manuals.
• SmartDeviceMonitor for Client
169
9. Appendix
SmartDeviceMonitor for Client provides functions for continuous device status monitoring on the
network via TCP/IP or IPX/SPX.
170
Values of Various Set Items for Transmission/Delivery Function
• Depending on the type or settings of the file or original, you may not be able to specify the destination
or enter the maximum number of characters stated below.
Transmission function
Sending E-mail
The following table tells you the maximum values of the e-mail sending function settings.
Values of Set Items for Sending by E-mail
Folder Transmission
The following table tells you the maximum values of the Scan to Folder function settings.
171
9. Appendix
Simultaneous transmission
The following table tells you the maximum values of settings for using the E-mail and Scan to Folder functions
simultaneously.
172
Values of Various Set Items for Transmission/Delivery Function
The following table tells you the values of setting items for the network delivery scanner function.
Values of Set Items for Network Delivery
173
9. Appendix
Number of addresses you can 100 addresses You can specify 50 destinations
specify at the same time by direct entry, including LDAP
search. Select the remaining 50
destinations from registered
addresses.
The maximum number of
destinations you can specify
differs depending on which
ScanRouter delivery software
you are using. For details, see the
manuals supplied with the
ScanRouter delivery software.
174
About WIA Scanning
• To use this machine as a WIA scanner, you must download the WIA driver from the supplier's Web
site and install it on your computer.
The network TWAIN scanner function also allows you to scan originals from your computer; however,
functions you can use differ between the TWAIN and WIA scanners.
The following table tells you the functions available or not available with the TWAIN and WIA scanners.
For details about the TWAIN scanner, see "Scanning Originals with the Network TWAIN Scanner".
1. Scan
Specify the number of files for scanning from the ADF Yes *1 Yes *1
2. Setting
Initial Settings
• Compression Yes No
Deskew Yes No
175
9. Appendix
Scan Settings:
• 8 Colors Yes No
Gam-Curve: Yes No
Eras.Bgrnd: Yes No
Advanced
176
About WIA Scanning
Comb./Series Yes No
Endorser Yes No
3. Properties
General
Authenticate
Network Connection
*1 You might not be able to specify settings for this function from some applications. 9
*2 The preview does not reflect changes made for settings while it is displayed. To display the preview
image with the changed settings applied, first close the preview, and then open it again.
177
9. Appendix
Specifications
The following table tells you the specifications of the scanner.
Specifications
Component Specifications
• Length
139 216 mm (5.5 8.5 inches)
Original sizes that can be scanned
• Width
139 356 mm (5.5 14 inches)
9 Scan speed
(B&W): MH, ITU-T No1 Chart)
Full color: 10 page/min
(Original Type Setting: Full Colour: Text / Photo,
Compresss. (Gray/Full Clr): Default, Original
Chart)
Scanning speed differs depending on the
following; operating environment of the machine
and computer, scan settings, and the content of
originals (denser images require more time).
178
Specifications
Component Specifications
• Basic
10BASE-T, 100BASE-TX
Interface • Optional
1000BASE-T, IEEE 802.11a/g (Wireless
LAN)
Protocol for sending using WSD Web Services on Devices for scanning
179
9. Appendix
Component Specifications
180
Trademarks
Trademarks
Adobe®, Acrobat®, PostScript®, and Reader® are either registered trademarks of Adobe Systems
Incorporated in the United States and/or other countries.
Pentium® is a registered trademark of Intel Corporation.
NetWare® is a registered trademark of Novell, Inc.
Microsoft®, Windows®, Windows NT®, Windows Server®, and Windows Vista® are either registered
trademarks or trademarks of Microsoft Corporation in the U.S. and/or other countries.
Mac OS is a trademark of Apple Inc., registered in the U.S. and other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
• The product name of Windows 98 is Microsoft® Windows® 98.
• The product name of Windows Me is Microsoft® Windows® Millennium Edition (Windows Me).
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Professional
• The product names of Windows Vista are as follows: 9
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Enterprise
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
• The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
• The product names of Windows Server 2008 are as follows:
181
9. Appendix
182
INDEX
A DeskTopBinder Lite............................106, 130, 169
Dest. List Priority 1...............................................159
A.C.S Sensitivity...................................................158
Dest. List Priority 2...............................................159
Accessing User Tools..........................................155
Destination (delivery)
Address book search by comment.........................................................116
registering destination folders...........................................55
search by name...............................................................115
registering e-mail addresses.............................................18 selecting by entering the registration numbers.............114
ADF.......................................................................135 selecting from a Quick Dial key.....................................112
Adjusting Image Density.....................................153 selecting from the delivery server's address book........112
Administrator Tools.............................................164 selecting from the list.......................................................113
Advanced search..................................................32 Destination (e-mail)
ARDF....................................................................139 entering manually..............................................................30
registering a directly-entered destination in the address
Auto-run program...............................................168
book....................................................................................34
B searching an LDAP server.................................................31
searching by e-mail address.............................................28
Basic operation
searching by name............................................................27
delivering scan files.........................................................109
selecting by entering the registration numbers................26
network TWAIN scanner................................................ 132
selecting from a Quick Dial key........................................24
saving on a memory device...........................................101
selecting from the machines address book......................24
sending scan files by e-mail..............................................21
sending scan files by Scan to Folder................................58 Destination (folder)
entering the path of the NetWare server directly...........73
WSD scanner (Pull Type)..................................................93
entering the path to a shared network folder manually.......
WSD scanner (Push Type)................................................87
.............................................................................................66
Blank Page Detect...............................................158 entering the path to an FTP server manually....................71
C registering the path to the selected destination in the address
book....................................................................................78
CD-ROM..............................................................168 searching by folder path...................................................64
Certificate...............................................................49 searching by name............................................................63
Compress. (Gray/Full Clr).................................160 selecting by entering the registration numbers................62
Compression (B&W)...........................................160 selecting from a Quick Dial key........................................60
selecting from the list..........................................................61
Configuring scan settings on a client computer.......
................................................................................95 selecting from the machine's address book.....................60
specifying the path by browsing the NetWare server.........
Confirmation displays...........................................13
.............................................................................................76
Check destination..............................................................13
specifying the path by browsing the shared network folder
File status............................................................................13
.............................................................................................68
Connecting to the network..... 16, 53, 83, 104, 128 Destination (WSD scanner)
Custom Size.........................................................141 searching the destination...................................................90
selecting the destination....................................................89
D
Destination list.........................................25, 61, 113
Default E-mail Subject.........................................162
Destination List Settings.......................................159
Default Scan Settings..........................................157
Display
Delete Scanner Journal....................................... 161 confirmation displays......................................................... 13
Delivering scan files....................................103, 109 Display and using keys.........................................12
Delivery................................................................103 Display panel.........................................................12
Delivery destination.............................................112 Divide & Send E-mail..........................................161
Delivery server.....................................................103
183
E O
E-mail destination..................................................24 Options................................................................137
E-mail Encryption Priority....................................162 Orig. Orientation Priority....................................157
E-mail screen..........................................................19 Original orientation
E-mail Sender........................................................36 TWAIN scanner..............................................................134
E-mail Signature Priority.....................................162 Original Orientation...........................................138
Enabling WSD.......................................................84 Original Setting..........................................140, 157
Encrypting PDF file..............................................145 Original type.......................................................151
Encryption Original Type Setting..........................................157
e-mail..................................................................................47 Outline
Exposure glass............................................134, 139 delivering scan files.........................................................103
network TWAIN scanner................................................ 127
F saving on a memory device..............................................99
File Type...............................................................143 sending scan files by e-mail..............................................15
sending scan files by Scan to Folder................................51
File Type Priority..................................................160
WSD scanner.....................................................................81
FTP....................................................................52, 71
Output Settings....................................................163
FTP server...............................................................52
Functions................................................................10 P
I PC Scan Command Stdby Time.........................160
PDF Security Encryption......................................145
Insert Addit. E-mail Info.......................................162
PDF Security Permissions....................................148
Install
DeskTopBinder Lite.........................................................106 Placing originals..................................................139
TWAIN driver..................................................................130 Preparation
network TWAIN scanner................................................ 128
L sending scan files by e-mail..............................................16
Laws and regulations...............................................9 sending scan files by Scan to Folder................................53
WSD scanner.....................................................................83
LDAP server.....................................................15, 31
Prg. Dest...........................................................34, 78
M Print Scanner Journal..........................................161
Manual...................................................................20 Print&Del. Scanner Journal.................................161
Max. E-mail Size.................................................161 R
Memory device.............................................99, 101
Menu Protect.......................................................164 Registering of WSD scanner.................................85
Registration number................26, 39, 62, 114, 121
N Resolution.............................................................137
NCP.................................................................52, 73 Resolution and scan size....................................165
NetWare server..............................................53, 73 e-mail...............................................................................165
Network delivery function..................................173 network delivery..............................................................165
Scan to Folder.................................................................165
Network delivery scanner screen......................107
TWAIN scanner..............................................................166
Network TWAIN scanner...................................127
WSD scanner..................................................................165
Notes about file types.........................................145
Return Receipt........................................................21
Notice.......................................................................7
184
S WSD scanner (Pull Type)..................................................82
WSD scanner (Push Type)................................................82
S/MIME.................................................................47 Sending scan files by e-mail..........................15, 21
Saving on a memory device........................99, 101 Sending scan files by Scan to Folder...................58
Scan profile Sending scan files to folders.................................51
changing............................................................................. 95
Sending scan files using WSD scanner (Pull Type).
creating...............................................................................96
................................................................................93
items and settings...............................................................96
Sending scan files using WSD scanner (Push Type)
Scan Settings.......................................................157 ................................................................................87
Scan Size.............................................................141 Sending scan files with WSD................................81
Scan to e-mail........................................................15 Sending scan files with WSD (Pull Type).............93
Scan to Folder........................................................51 Sending scan files with WSD (Push Type)...........87
Scan to Folder destination....................................60 Setting the Return Receipt function.......................45
Scan to Folder screen...........................................56 Signature................................................................48
Scanner Features....................................17, 54, 105 SmartDeviceMonitor.............................................19
accessing.........................................................................155 SMB.................................................................51, 66
changing..........................................................................155
SMTP server...........................................................15
quitting.............................................................................156
Specifications......................................................178
ScanRouter delivery software....................103, 106
Specifying custom size........................................142
Screen layout
Subject...........................................................46, 125
delivering scan files.........................................................107
sending scan files by e-mail..............................................19 Symbol......................................................................8
sending scan files by Scan to Folder................................56 System Settings........................16, 53, 83, 104, 128
WSD scanner.....................................................................87 T
Search Dest.....................................................31, 90
Template size.......................................................141
Security
e-mail..................................................................................47 Trademarks..........................................................181
encryption (e-mail)............................................................47 Transmission function..........................................171
signature (e-mail)...............................................................48 TWAIN driver............................129, 130, 132, 168
Selecting an encryption level for a PDF file......147 TWAIN scanner.......................................... 127, 132
Send options........................................................137 scan settings.....................................................................134
Send Settings.......................................................160 U
Sender (delivery).................................................118
search by name...............................................................123
Update Server Dest. List......................................159
searching the delivery server's destination list..............119 User Tools
selecting by entering a registration number..................121 accessing.........................................................................155
selecting from a Quick Dial key.....................................118 changing..........................................................................155
selecting from the list.......................................................119 quitting.............................................................................156
Sender (e-mail)......................................................36 V
searching by e-mail address.............................................42
searching by name............................................................40 Values of set items...............................................171
e-mail...............................................................................171
selecting by entering a registration number....................39
network delivery..............................................................173
selecting from a Quick Dial key........................................36
Scan to Folder.................................................................171
selecting from the list..........................................................37
simultaneous transmission...............................................172
Sender Name................................37, 39, 119, 121
WSD scanner..................................................................173
Sending files
185
W
Web Image Monitor.............................................19
WIA Scanning.....................................................175
WSD scanner.........................................................81
WSD scanner destination.....................................89
WSD scanner screen.............................................87
186
MEMO
187
MEMO
USA D468-6751
EN
Operating Instructions
Network and System Settings Guide
1 System Settings
2 Connecting the Machine
3 Using a Printer Server
4 Monitoring and Configuring the Printer
5 Registering Addresses and Users for Facsimile / Scanner Functions
6 Special Operations under Windows
7 Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine...............................................................................................................................10
Notice................................................................................................................................................................12
Important......................................................................................................................................................12
How to Read This Manual...............................................................................................................................13
Symbols........................................................................................................................................................13
Names of Major Items.................................................................................................................................13
Note..............................................................................................................................................................13
About IP Address.........................................................................................................................................14
Laws and Regulations......................................................................................................................................15
Legal Prohibition..........................................................................................................................................15
Display Panel....................................................................................................................................................16
Reading the Display and Using Keys.........................................................................................................16
Accessing User Tools.......................................................................................................................................18
Changing Default Settings...........................................................................................................................18
Exiting User Tools.........................................................................................................................................19
1. System Settings
General Features..............................................................................................................................................21
Tray Paper Settings..........................................................................................................................................24
Timer Settings....................................................................................................................................................26
Interface Settings..............................................................................................................................................28
Network........................................................................................................................................................28
Parallel Interface..........................................................................................................................................32
Wireless LAN...............................................................................................................................................33
Print I/F Settings List.....................................................................................................................................34
File Transfer.......................................................................................................................................................36
Administrator Tools...........................................................................................................................................40
Programming the LDAP server.........................................................................................................................46
Programming the LDAP server....................................................................................................................46
Changing the LDAP server..........................................................................................................................53
Deleting the LDAP server.............................................................................................................................54
Programming the Realm...................................................................................................................................56
Programming the Realm..............................................................................................................................56
Changing the Realm....................................................................................................................................58
1
Deleting the Realm.......................................................................................................................................58
2. Connecting the Machine
Connecting to the Interfaces............................................................................................................................61
Connecting to the Ethernet Interface..........................................................................................................62
Connecting to the Gigabit Ethernet Interface............................................................................................63
Connecting to the USB Interface................................................................................................................65
Connecting to the IEEE 1284 Interface.....................................................................................................66
Connecting to the Wireless LAN Interface.................................................................................................66
Network Settings Required to Use the Printer/LAN-Fax...............................................................................69
Ethernet.........................................................................................................................................................69
Wireless LAN...............................................................................................................................................70
Network Settings Required to Use Internet Fax.............................................................................................72
Ethernet.........................................................................................................................................................72
Wireless LAN...............................................................................................................................................74
Network Settings Required to Use E-mail Function.......................................................................................76
Ethernet.........................................................................................................................................................76
Wireless LAN...............................................................................................................................................77
Network Settings Required to Use Scan to Folder Function.........................................................................80
Ethernet.........................................................................................................................................................80
Wireless LAN...............................................................................................................................................81
Network Settings Required to Use the Network Delivery Scanner..............................................................83
Ethernet.........................................................................................................................................................83
Wireless LAN...............................................................................................................................................84
Network Settings Required to Use WSD Scanner.........................................................................................86
Ethernet.........................................................................................................................................................86
Wireless LAN...............................................................................................................................................87
Network Settings Required to Use Network TWAIN Scanner.....................................................................89
Ethernet.........................................................................................................................................................89
Wireless LAN...............................................................................................................................................90
Using Utilities to Make Network Settings.......................................................................................................92
Interface Settings..........................................................................................................................................92
File Transfer..................................................................................................................................................98
Connecting the Machine to a Telephone Line and Telephone..................................................................101
2
Connecting the Telephone Line................................................................................................................101
Selecting the Line Type..............................................................................................................................101
Connecting the Optional Handset or an External Telephone................................................................101
3. Using a Printer Server
Preparing Printer Server................................................................................................................................105
Using NetWare..............................................................................................................................................106
Setting Up as a Print Server (NetWare 3.x)............................................................................................107
Setting Up as a Print Server (NetWare 4.x, 5/5.1, 6/6.5).................................................................108
Using Pure IP in the NetWare 5/5.1 or 6/6.5 Environment................................................................109
Setting Up as a Remote Printer (NetWare 3.x).......................................................................................111
Setting Up as a Remote Printer (NetWare 4.x, 5/5.1, 6/6.5)............................................................113
4. Monitoring and Configuring the Printer
Using Web Image Monitor...........................................................................................................................117
Displaying Top Page.................................................................................................................................118
When User Authentication is Set..............................................................................................................120
About Menu and Mode............................................................................................................................120
Access in the Administrator Mode...........................................................................................................122
List of Setting Items.....................................................................................................................................123
Displaying Web Image Monitor Help.....................................................................................................129
Using SmartDeviceMonitor for Admin.........................................................................................................131
Installing SmartDeviceMonitor for Admin...............................................................................................132
Changing the Network Interface Board Configuration..........................................................................133
Locking the Menus on the Machine's Control Panel..............................................................................134
Changing the Paper Type.........................................................................................................................135
Managing User Information.....................................................................................................................135
Configuring Energy Save Mode..............................................................................................................141
Setting a Password....................................................................................................................................141
Checking the Machine Status...................................................................................................................142
Changing Name and Comment...............................................................................................................143
Load Fax Journal.......................................................................................................................................144
Viewing and Deleting Spool Print Jobs....................................................................................................145
Managing Address Information...............................................................................................................145
Using SmartDeviceMonitor for Client..........................................................................................................147
3
Monitoring Printers....................................................................................................................................147
Checking the Machine Status...................................................................................................................148
When Using IPP with SmartDeviceMonitor for Client............................................................................148
Printer Status Notification by E-Mail............................................................................................................150
Setting the Account for E-mail Notification.............................................................................................151
Mail Authentication...................................................................................................................................152
Auto E-mail Notification............................................................................................................................153
On-demand E-mail Notification...............................................................................................................154
Format of On-demand E-mail Messages................................................................................................154
Remote Maintenance by telnet.....................................................................................................................156
Using telnet................................................................................................................................................156
8021x........................................................................................................................................................157
access.........................................................................................................................................................158
appletalk....................................................................................................................................................159
authfree......................................................................................................................................................160
autonet........................................................................................................................................................160
bonjour.......................................................................................................................................................161
devicename...............................................................................................................................................163
dhcp............................................................................................................................................................163
dhcp6.........................................................................................................................................................164
diprint.........................................................................................................................................................165
dns..............................................................................................................................................................165
domainname..............................................................................................................................................167
etherauth....................................................................................................................................................168
etherconfig.................................................................................................................................................168
help.............................................................................................................................................................168
hostname....................................................................................................................................................169
ifconfig........................................................................................................................................................169
info..............................................................................................................................................................170
ipp...............................................................................................................................................................171
ipsec...........................................................................................................................................................171
ipv6.............................................................................................................................................................172
logout.........................................................................................................................................................172
4
lpr................................................................................................................................................................172
netware......................................................................................................................................................173
pathmtu.......................................................................................................................................................174
prnlog.........................................................................................................................................................175
rhpp............................................................................................................................................................175
route............................................................................................................................................................175
set................................................................................................................................................................177
show...........................................................................................................................................................180
slp...............................................................................................................................................................180
smb.............................................................................................................................................................180
snmp...........................................................................................................................................................181
sntp.............................................................................................................................................................184
spoolsw......................................................................................................................................................185
ssdp............................................................................................................................................................186
ssh...............................................................................................................................................................186
status...........................................................................................................................................................187
syslog..........................................................................................................................................................187
upnp...........................................................................................................................................................187
web.............................................................................................................................................................188
wiconfig......................................................................................................................................................189
wins.............................................................................................................................................................192
wsmfp.........................................................................................................................................................193
SNMP.............................................................................................................................................................195
Getting Printer Information over the Network.............................................................................................196
Current Printer Status.................................................................................................................................196
Printer configuration..................................................................................................................................202
Understanding the Displayed Information...................................................................................................204
Print Job Information..................................................................................................................................204
Print Log Information.................................................................................................................................204
Configuring the Network Interface Board...............................................................................................205
Message List...................................................................................................................................................216
System Log Information.............................................................................................................................216
5
5. Registering Addresses and Users for Facsimile/Scanner Functions
Address Book.................................................................................................................................................225
Managing Names in the Address Book..................................................................................................227
Sending fax by Quick Dial.......................................................................................................................227
Sending e-mail by Quick Dial..................................................................................................................228
Sending received fax documents or scanned files to a shared folder directly.....................................228
Preventing unauthorized user access to shared folders from the machine...........................................228
Managing users and machine usage......................................................................................................228
Registering Names.........................................................................................................................................230
Registering Names....................................................................................................................................230
Changing a Registered Name.................................................................................................................231
Deleting a Registered Name....................................................................................................................233
Authentication Information............................................................................................................................235
Registering a User Code...........................................................................................................................235
Changing a User Code.............................................................................................................................238
Deleting a User Code...............................................................................................................................241
Displaying the Counter for Each User......................................................................................................244
Printing the Counter for Each User...........................................................................................................245
Printing the Counter for All Users.............................................................................................................247
Clearing the Number of Prints..................................................................................................................248
Fax Destination..............................................................................................................................................251
Registering a Fax Destination...................................................................................................................252
Changing a Fax Destination.....................................................................................................................254
Deleting a Fax Destination........................................................................................................................261
Registering an IP-Fax Destination.............................................................................................................264
Changing a Registered IP-Fax Destination..............................................................................................266
Deleting a Registered IP-Fax Destination................................................................................................271
E-mail Destination..........................................................................................................................................274
Registering an E-mail Destination.............................................................................................................274
Changing an E-mail Destination..............................................................................................................277
Deleting an E-mail Destination.................................................................................................................279
Registering Folders........................................................................................................................................282
Registering an SMB Folder.......................................................................................................................282
6
Changing an SMB Folder.........................................................................................................................289
Deleting an SMB Folder...........................................................................................................................293
Registering an FTP Folder.........................................................................................................................295
Changing an FTP Folder...........................................................................................................................300
Deleting an FTP Folder..............................................................................................................................304
Registering an NCP Folder.......................................................................................................................306
Changing an NCP Folder.........................................................................................................................312
Deleting an NCP Folder............................................................................................................................316
Registering Names to a Group.....................................................................................................................319
Registering a Group..................................................................................................................................319
Registering Names to a Group................................................................................................................320
Adding a Group to Another Group.........................................................................................................322
Displaying Names Registered in a Group..............................................................................................324
Removing a Name from a Group............................................................................................................326
Deleting a Group within Another Group.................................................................................................328
Changing a Group Name........................................................................................................................330
Deleting a Group......................................................................................................................................332
Registering a Protection Code......................................................................................................................334
Registering a Protection Code to a Single User......................................................................................334
Registering a Protection Code to a Group User.....................................................................................337
Registering SMTP and LDAP Authentication................................................................................................341
SMTP Authentication.................................................................................................................................341
LDAP Authentication..................................................................................................................................344
Searching.......................................................................................................................................................348
Searching by Name..................................................................................................................................348
Searching from the Display List................................................................................................................349
Searching by Registration Number..........................................................................................................350
Searching by User Code..........................................................................................................................351
Searching by Fax Number.......................................................................................................................351
Searching by E-mail Address...................................................................................................................352
Searching by Destination Folder Name..................................................................................................353
6. Special Operations under Windows
Printing Files Directly from Windows............................................................................................................355
7
Setup...........................................................................................................................................................355
Using a Host Name Instead of an IPv4 Address....................................................................................355
Printing Commands...................................................................................................................................356
7. Appendix
When Using Windows Terminal Service/Citrix Presentation Server/Citrix XenApp..............................361
Operating Environment.............................................................................................................................361
Supported Printer Drivers..........................................................................................................................361
Limitations...................................................................................................................................................361
Using DHCP...................................................................................................................................................363
Using AutoNet...........................................................................................................................................363
Configuring the WINS Server......................................................................................................................364
Using Web Image Monitor......................................................................................................................364
Using telnet................................................................................................................................................364
Using the Dynamic DNS Function................................................................................................................366
Updating....................................................................................................................................................366
DNS Servers Targeted for Operation......................................................................................................367
DHCP Servers Targeted for Operation....................................................................................................367
Setting the Dynamic DNS Function..........................................................................................................367
Precautions.....................................................................................................................................................369
Connecting a Dial-Up Router to a Network............................................................................................369
NetWare Printing......................................................................................................................................370
When the IEEE 802.11 Interface Unit is Installed.......................................................................................372
Configuring IEEE 802.1X..............................................................................................................................373
Installing a Site Certificate........................................................................................................................373
Installing Device Certificate......................................................................................................................374
Setting Items of IEEE 802.1X for Ethernet................................................................................................375
Setting Items of IEEE 802.1X for Wireless LAN......................................................................................376
Specifications.................................................................................................................................................378
Copyrights......................................................................................................................................................380
expat...........................................................................................................................................................380
NetBSD......................................................................................................................................................380
Sablotron....................................................................................................................................................382
JPEG LIBRARY............................................................................................................................................383
8
SASL...........................................................................................................................................................383
MD4...........................................................................................................................................................384
MD5...........................................................................................................................................................384
Samba(Ver 3.0.4).....................................................................................................................................384
RSA BSAFE®..............................................................................................................................................385
Open SSL...................................................................................................................................................385
Open SSH..................................................................................................................................................387
Open LDAP................................................................................................................................................391
Heimdal......................................................................................................................................................392
IPSTM print language emulations.............................................................................................................392
Trademarks.....................................................................................................................................................393
INDEX...........................................................................................................................................................395
9
• Change the user name and password of the administrator using Web Image Monitor.
For details, see "Setting Up the Machine", Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Printer Guide
• Quick Reference Fax Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
11
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
12
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
Note
13
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.
This machine comes in two models which vary in copy/print speed. To ascertain which model you have,
see “Machine Types”, About This Machine.
About IP Address
In this manual, “IP address” covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.
14
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.
15
Display Panel
The display panel shows machine status, error messages, and function menus.
• A force or impact of more than 30 N (about 3 kgf) will damage the display panel.
If you press the [User Tools/Counter] key, the User Tools menu screen appears.
Using the System Settings menu screen as an example, this section explains how to use the machine's
display panel.
BKR002S
1. The settings menu appears. Press the [ ] or [ ] key to scroll to the setting you want to specify or
change, and then press the [OK] key to display the screen for specifying that setting.
2. The number of pages in the displayed settings menu appears. If you cannot see the entire menu, press
the [ ] or [ ] key to scroll the screen.
This section explains how to read the display and use the Selection keys.
If you press the [Copy] key, the initial copy screen appears.
Using the initial copy screen menu as an example, this sections how to use the machine's control panel.
BKR003S
1. Scroll keys
16
Press to move the cursor in each direction, step by step.
When the [ ], [ ], [ ], or [ ] key appears in this manual, press the scroll key of the same direction.
2. Selection keys
Correspond to items at the bottom line on the display.
Example: The Printer display
• When the instruction “press [JobReset]” appears in this manual, press the left selection key.
• When the instruction “press [Prt.Jobs]” appears in this manual, press the center selection key.
• When the instruction “press [Menu]” appears in this manual, press the right selection key.
3. [Escape] key
Press to cancel an operation or return to the previous display.
4. [OK] key
Press to set a selected item or an entered numeric value.
17
Accessing User Tools
This section describes how to access User Tools menu.
User Tools allow you to change or set defaults.
• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off, or the [Clear Modes] key is pressed.
BKR020S
2. Select [System Settings] using the [ ] or [ ], and then press the [OK] key.
3. Change settings by following instructions on the display, and then press the [OK] key.
18
Exiting User Tools
BKR020S
19
20
1. System Settings
This chapter describes user tools in the System Settings menu. For details on how to access System Settings,
see "Accessing User Tools".
1
General Features
This section describes the User Tools in the General Features menu under System Settings.
Prog/Change/Del User Text
You can register text phrases you often use when specifying settings, such as ".com" and "Regards".
You can register up to 40 entries.
• Program/Change
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [General Features] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog/Change/Del User Text] using [ ] or [ ], and then press the [OK] key.
5. Select [Program/Change] to program/Change text phrases using [ ] or [ ], and then
press the [OK] key.
6. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.
To change programmed text phrases, select the text phrases you want to change.
7. Enter the text phrases you want to program, and then press the [OK] key.
Enter the user text using up to 80 characters.
8. Press the [User Tools/Counter] key.
• Delete
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [General Features] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog/Change/Del User Text] using [ ] or [ ], and then press the [OK] key.
5. Select [Delete] using [ ] or [ ], and then press the [OK] key.
6. Select the text phrases you want to delete using [ ] or [ ], and then press the [OK] key.
7. Press [Yes].
To cancel deleting a text phrase, press [No].
8. Press the [Escape] key.
9. Press the [User Tools/Counter] key.
21
1. System Settings
22
General Features
Key Repeat
Set whether or not to repeat the functions of the [ ], [ ], [Lighter], and [Darker] keys when those keys
are pressed and held down.
The default setting is [Normal]. 1
Measurement Unit
You can switch the measurement between [mm] and [inch].
The default setting is [inch].
23
1. System Settings
24
Tray Paper Settings
25
1. System Settings
Timer Settings
This section describes the user tools in the Timer Settings menu under System Settings.
1 Auto Off Timer
After a specified period has passed, following job completion, the machine automatically turns off,
in order to conserve energy. This function is called "Auto Off".
The machine status after the Auto Off operation is referred to as "Off mode", or "Sleep mode".
For the Auto Off Timer, specify the time to elapse before Auto Off.
The time can be set from 1 to 240 minutes, using the number keys.
The default setting is “1” min.
Auto Off may not work when error messages appear.
Energy Saver Timer
The machine automatically enters Low Power mode automatically after a job is finished, and the
selected time elapsed.
The time can be set from 1 to 240 minutes, using the number keys.
The default setting is “15” min.
Energy Saver may not work when error messages appear.
The machine automatically prints any fax or printer data received while in Energy Saver mode.
System Auto Reset Timer
The System Reset setting automatically switches the screen to that of the function set in Function Priority
when no operations are in progress, or when an interrupted job is cleared. This setting determines the
system reset interval.
The time can be set from 10 to 999 seconds, using the number keys.
The default setting is [On], “60” sec.
Copier Auto Reset Timer (copier)
Specifies the time to elapse before copier modes reset.
If [Off] is selected, the machine does not automatically switch to the user code entry screen.
The time can be set from 10 to 999 seconds, using the number keys.
The default setting is [On], “60” sec.
Facsimile Auto Reset Timer (facsimile)
Specify the time to elapse before the facsimile mode resets.
The time can be set from 30 to 999 seconds, using the number keys.
The default setting is “30” sec.
26
Timer Settings
27
1. System Settings
Interface Settings
This section describes the user tools in the Interface Settings menu under System Settings.
1
Network
This section describes the user tools in the Network menu under Interface Settings.
Machine IPv4 Address
Specify the machine's IPv4 network address.
The default setting is [Auto-Obtain (DHCP)].
When you select [Specify], enter the IPv4 address and subnet mask as "xxx.xxx.xxx.xxx" ("x" indicates
a number).
When you select [Specify], make sure that IPv4 address is different from that of other machines on
the network.
To set the "IPv4 address", press [IP Add.].
To set the "subnet mask", press [Subnet M].
When the physical address (MAC address) appears, press [Mac Add.].
IPv4 Gateway Address
A gateway is a connection or interchange point between two networks.
Specify the gateway address for the router or host computer used as a gateway.
The default setting is “0.0.0.0”.
Machine IPv6 Address
Displays the machine's IPv6 network address.
• [Link-local Address]
The machine's specified link-local address appears.
• [Manual Config. Address]
The machine's manually configured address appears.
• [Stateless Address:] 1-5
The specified stateless address appears.
IPv6 Gateway Address
Displays the machine's IPv6 gateway address.
IPv6 Stateless Setting
Specify IPv6 Stateless Address Auto configuration.
The default setting is [Inactive].
28
Interface Settings
DNS Configuration
Make settings for the DNS server.
The default setting is [Auto-Obtain (DHCP)].
When you select [Specify], enter the DNS Server IPv4 address as "xxx.xxx.xxx.xxx" ("x" indicates a 1
number).
The default setting of DNS server 1-3 are "0.0.0.0".
DDNS Configuration
Specify the DDNS settings.
The default setting is [Active].
IPsec
Specify whether to activate or inactivate the machine's IPsec function.
The default setting is [Inactive].
Domain Name
Specify the domain name.
The default setting is [Auto-Obtain (DHCP)].
When you select [Specify], enter the domain name using up to 63 characters.
WINS Configuration
Specify the WINS server settings.
The default setting is [On].
If [On] is selected, enter the WINS Server IPv4 address as "xxx.xxx.xxx.xxx" ("x" indicates a number).
The default settings of WINS server 1-2 are "0.0.0.0".
If DHCP is in use, press [Scope ID] and then specify the scope ID.
Enter a scope ID using up to 31 characters.
Effective Protocol
Select the Protocol to use in the network.
The default setting for “IPv4” is [Active].
The default setting for "IPv6" is [Inactive].
The default setting for "NetWare" is [Inactive].
The default setting for "SMB" is [Active].
The default setting for "AppleTalk" is [Inactive].
"AppleTalk" appears when the optional PostScript 3 module is installed.
NCP Delivery Protocol
Select the protocol NCP delivery.
29
1. System Settings
1 NW Frame Type
Select the frame type when you use NetWare.
The default setting is [Auto Select].
SMB Computer Name
Specify the SMB computer name.
Enter the computer name using up to 15 characters.
"*+,/:;<>=?[\]|. and spaces cannot be entered.
Do not set a computer name starting with RNP and rnp.
Use uppercase letters for alphabets.
SMB Work Group
Specify the SMB work group.
Enter the computer name using up to 15 characters.
"*+,/:;<>=?[\]|. and spaces cannot be entered.
Use uppercase letters for alphabet.
Ethernet Speed
Set the access speed for networks.
The default setting is [Auto Select].
Select a speed that matches your network environment. [Auto Select] should usually be selected.
10Mbps Half
Duplex
10Mbps Full
Duplex
100Mbps
Half Duplex
100Mbps Full
Duplex
Auto Select
30
Interface Settings
IEEE802.1X Auth.(Ethernet)
Set the IEEE 802.1X authentication for Ethernet.
The default setting is [Inactive].
For details about IEEE 802.1X Authentication, see “Configuring IEEE 802.1X”. 1
Restr.IEEE802.1X Auth. Def.
You can return the IEEE 802.1X Authentication settings to their defaults.
LAN Type
When you have installed the wireless LAN interface board, select the method of connection.
The default setting is [Ethernet].
[LAN Type] is displayed when wireless LAN board is installed. If Ethernet and wireless LAN are both
connected, the selected interface has priority.
Ping Command
Check the network connection with ping command using given IPv4 address.
If you fail to connect to the network, check the following, and then retry the ping command.
• Make sure that "IPv4" in [Effective Protocol] is set to [Active].
• Check that the machine with assigned IPv4 address is connected to the network.
• There is a possibility that the same IPv4 address is used for the specified equipment.
Permit SNMPv3 Communictn.
Set the encrypted communication of SNMPv3.
The default setting is [Encryption/Cleartext].
If you select to [Encryption Only], you need to set an encryption password for the machine.
Permit SSL/TLS Comm.
Set the encrypted communication of SSL/TLS.
The default setting is [Ciphertext Priority].
If you set to [Ciphertext Only], you need to install the SSL certificate for the machine.
Host Name
Specify the host name.
Enter the host name using up to 63 characters.
Machine Name
Specify the machine name.
Enter the machine name using up to 31 characters.
31
1. System Settings
Parallel Interface
1
This section describes the user tools in the Parallel Interface menu under Interface Settings.
[Parallel Interface] is displayed when this machine is installed with the IEEE 1284 interface board.
Parallel Timing
Set the timing for the control signal of the parallel interface.
Normally, you do not need to change this setting.
The default setting is [ACK outside].
Parallel Comm. Speed
Set the communication speed for the parallel interface. If the speed is too high, data may not be
transferred smoothly. If this happens, change the setting to [Standard].
The default setting is [High Speed].
Selection Signal Status
Set the level for the select signal of the parallel interface.
The default setting is [High].
Input Prime
Set whether to validate or invalidate the input prime signal upon reception.
Normally, you do not need to change this setting.
The default setting is [Inactive].
Bidirectional Comm.
Set the printer's response mode to a status acquisition request when using a parallel interface. If you
experience problems using another manufacturer's machine, set this to [Off].
The default setting is [On].
When set to [Off], the bidirectional communication function will be disabled, and the printer driver
will not be installed under Windows Auto Detect function.
Signal Control
Specify how error during printing or sending facsimile from the computer is to be dealt with.
Normally, you do not need to change this setting.
The default setting is [Job Acceptance Priority].
32
Interface Settings
Wireless LAN
This section describes the user tools in the Wireless LAN menu under Interface Settings.
[Wireless LAN] is displayed when this machine is installed with the wireless LAN interface board. 1
Be sure to make all settings simultaneously.
Communication Mode
Specify the communication mode of the wireless LAN.
The default setting is [Infrastructure Mode].
SSID Setting
Specify SSID to distinguish the access point in [Infrastructure Mode] or [802.11 Ad-hoc Mode].
The characters that can be used are ASCII 0x20-0x7e (32 bytes).
If blank is specified in [802.11 Ad-hoc Mode], "ASSID" appears.
Ad-hoc Channel
Specify the channel to use when [802.11 Ad-hoc Mode] has been selected. Set the channel that
matches the type of wireless LAN being used.
The following channels are available:
• IEEE 802.11b/g(2.4GHz)
[1]-[13] channels
• IEEE 802.11a(5GHz)
[36], [40], [44], and [48] channels
The default setting is [11].
The channel in use might differ depending on the country.
Security Method
Specify the encryption of the Wireless LAN.
The default setting is [Off].
If you select [WEP], always enter WEP key. If you select [WPA], specify the encryption and
authentication methods.
Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode].
• WEP
If you select [WEP], enter WEP key.
When using 64 bit WEP, up to 10 characters can be used for hexadecimal and up to five
characters for ASCII. When using 128 bit WEP, up to 26 characters can be used for hexadecimal
and up to 13 characters for ASCII.
The number of characters that can be entered is limited to 10 or 26 for hexadecimal and 5 or
13 for ASCII.
33
1. System Settings
• WPA
• Encryption Method
Select either [TKIP] or [CCMP (AES)].
1 • Authentication Method
Select either [WPA-PSK], [WPA], [WPA2-PSK], or [WPA2].
If you selected [WPA-PSK] or [WPA2-PSK], enter the pre-shared key (PSK) of 8- 63
characters in ASCII code.
When [WPA] or [WPA2] are selected, authentication settings and certificate installation
settings are required. For details about setting methods, see "Configuring IEEE 802.1X".
Wireless LAN Signal
When using in infrastructure mode, you can check the machine's radio wave status using the control
panel.
Radio wave status is displayed when you press [Wireless LAN Signal].
Restore Defaults
You can return the wireless LAN settings to their defaults.
34
Interface Settings
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
1
4. Select [Print I/F Settings List] using [ ] or [ ], and then press the [OK] key.
35
1. System Settings
File Transfer
This section describes the user tools in the File Transfer menu under System Settings.
1 Delivery Option
Enable or disable sending stored or scanned documents to the ScanRouter delivery server.
The default setting is [Off].
Specify this option when selecting whether or not to use the ScanRouter delivery software. If you do,
you will have to preregister I/O devices in the ScanRouter delivery software.
SMTP Server
Specify the SMTP server name.
If DNS is in use, enter the host name.
If DNS is not in use, enter the SMTP server IPv4 address.
The default setting for "Port No." is “25”.
Enter the server name using up to 127 characters. Spaces cannot be entered.
Enter port number between 1 and 65535 using the number keys, and then press the [ ] key.
The SMTP server shares the same port number with the Direct SMTP server.
SMTP Authentication
Specify SMTP authentication (PLAIN, LOGIN, CRAMMD5, DIGEST-MD5). When sending e-mail to
an SMTP server, you can enhance the SMTP server security level using authentication that requires
entering the user name and password.
If the SMTP server requires authentication, set [SMTP Authentication] to [On], and then specify the
user name, password and encryption.
Enter the user name and password to be set for the Administrator's e-mail address when using Internet
Fax.
The default setting is [Off].
• Enter the user name using up to 191 characters.
Spaces cannot be entered. Depending on the SMTP server type, "realm" must be specified. Add
"@" after the user name, as in "user name@realm".
• Enter the E-mail address using up to 128 characters.
• Enter the password using up to 128 characters.
Spaces cannot be entered.
• Select Encryption as follows:
"Encrypt"-[Auto]
Use if the authentication method is PLAIN, LOGIN, CRAM-MD5, or DIGEST-MD5.
"Encrypt"-[On]
36
File Transfer
37
1. System Settings
38
File Transfer
39
1. System Settings
Administrator Tools
This section describes the user tools in the Administrator Tools menu under System Settings.
1 Administrator Tools are used by the administrator. To change these settings, contact the administrator.
We recommend specifying Administrator Authentication before making Administrator Tools settings.
Address Book Management
You can add, change or delete information registered in the Address Book.
For details, see "Address Book".
• Program/Change
You can register and change names as well as user codes.
• Name
You can register a name, key display, registration number, and title selection.
• Reg. No.
• Auth. Info
You can register a user code, and specify the functions available to each user code. You
can also register user names and passwords to be used when accessing an LDAP server.
• Auth. Protect
You can register a protection code.
• Fax Settings
You can register a fax number, international TX mode, label insertion.
• E-mail Settings
You can register e-mail address.
• Folder Info
You can register the protocol, path, port number, and server name.
• Register Group to
You can put names registered in the Address Book into a group.
• Delete
You can delete a name from the Address Book.
You can register up to 150 names.
You can register up to 100 user codes.
You can also register and manage names in the Address Book using Web Image Monitor or
SmartDeviceMonitor for Admin.
40
Administrator Tools
Prgrm./Change/Delete Group
Names registered in the Address Book can be added into a group. You can then easily manage the
names registered in each group.
• Program/Change 1
You can register and change groups.
• Group Name
You can register a name, key display, registration number, and title selection.
• Reg. No.
• Auth. Protect
You can register a protection code.
• Register Group to
You can put groups registered in the Address Book into a group.
• Delete
You can delete a group from the Address Book.
You can register up to 10 groups.
You can also register and manage groups in the Address Book using Web Image Monitor or
SmartDeviceMonitor for Admin.
Use SmartDeviceMonitor for Admin provided with the printer scanner unit.
Address Book:Print List
You can print the destination list registered in the Address Book.
• Destination List
Prints the list of names in the Address Book.
• Group Destination List
Prints the list of groups in the Address Book.
• Quick Dial Labels
Prints the quick dial label.
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book:Print List] using [ ] or [ ], and then press the [OK] key.
5. Select a desired list to print using [ ] or [ ], and then press the [OK] key.
If the selection screen of the print method is displayed, press [Duplex] or [1 Sided].
6. Press the [Start] key.
The list is printed.
41
1. System Settings
42
Administrator Tools
43
1. System Settings
• Search Base
• Port No.
• SSL (Use Secure Connection)
1 • Authentication
• UserName
• Password
• Realm Name
• Search Conditions
• Search Options
To start an LDAP search, make sure that the items listed below are set. For other items, check your
environment and make any necessary changes.
This function supports LDAP Version 2.0 and 3.0.
To use the LDAP server, select [On] under LDAP Search.
For details about how to program the LDAP Server, see "Programming the LDAP server".
LDAP Search
Specify whether or not to use the LDAP server for searching.
The default setting is [Off].
If you select [Off], LDAP server list will not appear on the searching display.
Prog./Change/Delete Realm
Program the realm to be used for Kerberos authentication.
• Realm Name
• KDC Server Name
• Domain Name
Be sure to set both the realm name and KDC server name when programming a realm.
For details about [Prog./Change/Delete Realm], see "Programming the Realm".
AOF (Always On)
Specify whether or not to use Auto Off.
The default setting is [On].
Firmware Version
You can check the version of the software installed in this machine.
Network Security Level
For details about this function, consult your administrator.
44
Administrator Tools
45
1. System Settings
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
46
Programming the LDAP server
4. Select [Prog/Chnge/Del LDAP Server] using [ ] or [ ], and then press the [OK] key.
1
5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.
6. Select the LDAP server you want to program or change using [ ] or [ ], and then press the
[OK] key.
When programming the server, select [*Not Programmed].
9. Select [Server Name] using [ ] or [ ], and then press the [OK] key.
47
1. System Settings
10. Enter the server name, and then press the [OK] key.
1
11. Select [Search Base] using [ ] or [ ], and then press the [OK] key.
Select the root folder to start the search from e-mail addresses registered in the selected folder which
is the search targets.
12. Enter the search base, and then press the [OK] key.
For example, if the search target is the sales department of ABC company, enter "dc=sales department,
o=ABC". (In this example, the description is for an active directory. "dc" is for the organization unit,
and "o" is for the company.)
Search base registration may be required depending on your server environment. When registration
is required, unspecified searches will result in error.
Check your server environment and enter any required specifications.
13. Select [Port No.] using [ ] or [ ], and then press the [OK] key.
Specify the port number for communicating with the LDAP server. Specify a port that is compliant with
your environment.
48
Programming the LDAP server
14. Enter the port number using the number keys, and then press the [OK] key.
1
15. Select [SSL] using [ ] or [ ], and then press the [OK] key.
16. Select [On] using [ ] or [ ], and then press the [OK] key.
Use SSL to communicate with the LDAP server.
To use SSL, the LDAP server must support SSL.
When SSL is set to [On], the port number automatically changes to "636".
If you do not use SSL, security problems may occur. SSL setting must be enabled on this machine. For
details, consult your network administrator.
17. Select [Authentication] using [ ] or [ ], and then press the [OK] key.
49
1. System Settings
1
If you select [Kerberos Authentication], a password is sent using an encryption process that prevents
passwords from being revealed during transmission to the KDC server where authentication occurs.
If you select [Digest Authentication], a password is sent using an encryption process that prevents
passwords from being revealed during transmission to the LDAP server.
If you select [Cleartext Authentication], a password is sent to the LDAP server as is, without any
encryption processing.
If you select [Kerberos Authentication], proceed to step 19 to 21, and then proceed to step 22.
If you select [Digest Authentication] or [Cleartext Authentication], proceed to step 19 to 20, and then
proceed to step 22.
If you select [Off], proceed to step 22.
19. Enter the User Name, and then press the [OK] key.
The user name and password are required for administrator authentication to access the LDAP server.
You can connect to the LDAP server using a user name and password stored in the Address Book. For
details, see "Registering SMTP and LDAP Authentication".
50
Programming the LDAP server
Access the LDAP server to check that the proper connection is established. Check authentication works
according to the authentication settings.
23. Press [Exit].
24. Select [Search Conditions] using [ ] or [ ], and then press the [OK] key.
If the connection test fails, check your settings and try again.
This function does not check search conditions or the search base.
25. Select necessary search items such as [Name], [E-mail Address], [Fax Number], [Company
Name], and [Department Name] using [ ] or [ ], and then press the [OK] key.
You can enter an attribute as a typical search keyword. Using the entered attribute, the function
searches the LDAP server's Address Book.
26. Enter attribute, and then press the [OK] key.
The attribute value may change depending on the server environment. Check the attribute value
complies with your server environment before setting it.
You can leave items blank, but you cannot leave attributes blank when searching for e-mail address
from the LDAP server Address Book.
51
1. System Settings
1
27. Press [Exit].
28. Select [Search Options] using [ ] or [ ], and then press the [OK] key.
30. Enter the Key Display, and then press the [OK] key.
The registered "Key Display" appears as a keyword for searching LDAP.
52
Programming the LDAP server
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog/Chnge/Del LDAP Server] using [ ] or [ ], and then press the [OK] key.
6. Select the LDAP server you want to program or change using [ ] or [ ], and then press the
[OK] key.
53
1. System Settings
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog/Chnge/Del LDAP Server] using [ ] or [ ], and then press the [OK] key.
54
Programming the LDAP server
6. Select the LDAP server you want to delete using [ ] or [ ], and then press the [OK] key.
1
7. Press [Yes].
55
1. System Settings
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog./Change/Delete Realm] using [ ] or [ ], and then press the [OK] key.
56
Programming the Realm
6. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.
1
7. Select [Realm Name], [KDC Server Name], or [Domain Name] using [ ] or [ ], and then
press the [OK] key.
57
1. System Settings
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog./Change/Delete Realm] using [ ] or [ ], and then press the [OK] key.
6. Select the Realm you want to change using [ ] or [ ], and then press the [OK] key.
7. Set each item as necessary.
8. Press the [OK] key after setting each item.
9. Press the [User Tools/Counter] key.
58
Programming the Realm
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
1
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog./Change/Delete Realm] using [ ] or [ ], and then press the [OK] key.
6. Select the realm you want to delete using [ ] or [ ], and then press the [OK] key.
7. Press [Yes].
59
1. System Settings
60
2. Connecting the Machine
This chapter describes how to connect the machine to the network and specify the network settings.
• A network interface cable with a ferrite core must be used for RF interference suppression.
BKR005S
61
2. Connecting the Machine
This section describes how to connect Ethernet interface cable to the Ethernet interface.
1. A ferrite core for the Ethernet interface cable is supplied with this machine. Attach the ferrite
core at the machine end of the Ethernet cable
BKR010S
BKR006S
4. Connect the other end of the Ethernet interface cable to a network connection device such
as a hub.
62
Connecting to the Interfaces
BKR022S
2
1. Indicator (green)
Lights up green when the machine is connected correctly to the network.
2. Indicator (yellow)
Lights up yellow when 100BASE-TX is in operation. Goes off when 10BASE-T is in operation.
• For details about how to turn on the main power switch, see "Turning On the Power", About This
Machine.
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.
This section describes how to connect the Ethernet interface cable to the Gigabit Ethernet port.
63
2. Connecting the Machine
1. Attach one ferrite core at the machine end of the Ethernet cable, and then attach the other
ferrite core about 10 cm (4 inch) (1) from this core.
BKR011S
BKR008S
4. Connect the other end of the Ethernet interface cable to a network connection device such
as a hub.
5. Turn on the main power switch of the machine.
BKR021S
1. Indicator (yellow)
When 100BASE-TX is operating, the LED is lit yellow. When 10BASE-T is operating, it is turned off.
64
Connecting to the Interfaces
2. Indicator (green)
When 10BASE-T is operating, the LED is lit green. When 100BASE-TX is operating it is turned off.
3. Indicators (both green and yellow)
When 1000BASE-T is operating, both LED are lit.
• For details about how to turn on the main power switch, see "Turning On the Power", About This
Machine.
2
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.
This section describes how to connect the USB2.0 interface cable to the USB2.0 port.
• Properly shielded and grounded cables and connectors must be used for connections to a host
computer (and/or peripheral) in order to meet emission limits.
BKR007S
2. Connect the other end to the USB2.0 port on the host computer.
• This machine does not come with a USB interface cable. Make sure you purchase the appropriate
cable for the machine and your computer.
• The USB2.0 interface board is supported by Windows 2000/XP/Vista, Windows Server
2003/2003 R2/2008, Mac OS 9.2.2, Mac OS X 10.3.3 or higher.
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.
65
2. Connecting the Machine
This section describes how to connect the IEEE 1284 interface cable to the IEEE 1284 interface board.
• Properly shielded and grounded cables and connectors must be used for connections to a host
2 computer (and/or peripheral) in order to meet emission limits.
BKR009S
You might have to use a conversion adapter to connect the cable to the interface. For details about
acquiring a conversion adapter, consult your sales or service representative.
4. Connect the other end of the cable into the interface connector on the host computer.
Check the shape of the connector to the computer. Connect the cable firmly.
5. Turn on the main power switch of the machine.
6. Turn on the host computer.
When using Windows 2000/XP/Vista and Windows Server 2003/2003 R2/2008, a printer driver
installation screen might appear when the computer is turned on. If this happens, click [Cancel] on
the screen.
• For details about how to turn on the main power switch, see "Turning On the Power", About This
Machine.
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.
66
Connecting to the Interfaces
• Check the machine's IPv4 address and subnet mask, or the IPv6 address settings.
• For details about how to set the IPv4 address and subnet mask from the control panel of the machine,
see "Interface Settings".
• Before using this machine with a wireless LAN interface, you must select [Wireless LAN] in [LAN Type].
2
Setup procedure
This section describes how to setup wireless LAN interface.
Set up wireless LAN according to the following procedure:
BBM002S
• Select [802.11 Ad-hoc Mode] when connecting Windows XP as a wireless LAN client using Windows
XP standard driver or utilities, or when not using the infrastructure mode.
• When [802.11 Ad-hoc Mode] is selected in Communication mode, select the channel for [Channel].
Set a channel that matches the type of wireless LAN being used. For details about setting the channel,
see "Interface Settings ".
• You can specify either "WEP" or "WPA" to the Security Method.
• Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode].
67
2. Connecting the Machine
• If you select the [WPA] option for Security Method, select one of the following: [WPA-PSK], [WPA],
[WPA2-PSK], or [WPA2]. If you select [WPA-PSK] or [WPA2-PSK], enter your PSK. If you select
[WPA] or [WPA2], authentication settings and certificate installation settings are required. For details
about setting methods, see "Configuring IEEE 802.1X”.
• For details about how to specify wireless LAN settings from the control panel on the machine, see
"Interface Settings".
2
• p.28 "Interface Settings"
• p.373 "Configuring IEEE 802.1X"
68
Network Settings Required to Use the Printer/LAN-Fax
• These settings should be made by the system administrator, or with the advice of the system
2
administrator.
Ethernet
This section lists the settings required for using the printer or LAN-Fax function with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".
69
2. Connecting the Machine
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN board is installed. If Ethernet and wireless LAN are
both connected, the selected interface has priority.
Wireless LAN
This section lists the settings required for using the printer or LAN-Fax function with a wireless LAN
connection.
For details about how to specify the settings, see "Interface Settings".
70
Network Settings Required to Use the Printer/LAN-Fax
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.
71
2. Connecting the Machine
• These settings should be made by the system administrator, or with the advice of the system
2 administrator.
Ethernet
This section lists the settings required for using Internet Fax with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
72
Network Settings Required to Use Internet Fax
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and
wireless LAN are connected, the selected interface takes precedence.
• SMTP Server and Fax E-mail Account must be specified in order to send Internet Fax.
• When POP before SMTP is set to [On], also make settings for Reception Protocol and POP3/IMAP4
Settings.
• When SMTP Authentication is set to [On], also make setting for Admin. E-mail Address.
• POP3/IMAP4 Settings, E-mail Communication Port, and Fax E-mail Account must be specified in
order to receive Internet Fax.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.
73
2. Connecting the Machine
Wireless LAN
This section lists the settings required for using Internet Fax with a wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
74
Network Settings Required to Use Internet Fax
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.
• SMTP Server and Fax E-mail Account must be specified in order to send Internet Fax.
• When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3/
IMAP4 Settings.
• When SMTP Authentication is set to [On], you must also make settings for Admin. E-mail Address.
• POP3/IMAP4 Settings, E-mail Communication Port, and Fax E-mail Account must be specified in
order to receive Internet Fax.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.
75
2. Connecting the Machine
2 • These settings should be made by the system administrator, or with the advice of the system
administrator.
Ethernet
This section lists the settings required for sending e-mail with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
76
Network Settings Required to Use E-mail Function
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and
wireless LAN are connected, the selected interface takes precedence.
• When POP before SMTP is set to [On], also make settings for Reception Protocol and POP3/IMAP4
Settings.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.
Wireless LAN
This section lists the settings required for sending e-mail with an Wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
77
2. Connecting the Machine
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
78
Network Settings Required to Use E-mail Function
• [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and
wireless LAN are connected, the selected interface takes precedence.
• When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3/
IMAP4 Settings.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.
79
2. Connecting the Machine
2 • These settings should be made by the system administrator, or with the advice of the system
administrator.
Ethernet
This section lists the settings required for sending files with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
80
Network Settings Required to Use Scan to Folder Function
Wireless LAN
This section lists the settings required for sending files with an Wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
81
2. Connecting the Machine
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.
82
Network Settings Required to Use the Network Delivery Scanner
• These settings should be made by the system administrator, or with the advice of the system
2
administrator.
Ethernet
This section lists the settings required for delivering data to the network with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
83
2. Connecting the Machine
Wireless LAN
This section lists the settings required for delivering data to the network with an wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
84
Network Settings Required to Use the Network Delivery Scanner
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed.
When both Ethernet and wireless LAN are connected, the selected interface takes precedence.
• If Delivery Option is set to [On], check that IPv4 Address is specified.
85
2. Connecting the Machine
• These settings should be made by the system administrator, or with the advice of the system
2 administrator.
Ethernet
This section lists the settings required for using WSD Scanner function with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".
86
Network Settings Required to Use WSD Scanner
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN board is installed. If Ethernet and wireless LAN are
both connected, the selected interface has priority.
Wireless LAN
This section lists the settings required for using WSD Scanner function with a wireless LAN connection.
For details about how to specify the settings, see "Interface Settings".
87
2. Connecting the Machine
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.
88
Network Settings Required to Use Network TWAIN Scanner
• These settings should be made by the system administrator, or with the advice of the system
2
administrator.
Ethernet
This section lists the settings required for using the network TWAIN Scanner with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
89
2. Connecting the Machine
• [LAN Type] is displayed when the wireless LAN interface board is installed.
• When both Ethernet and wireless LAN are connected, the selected interface takes precedence.
2 Wireless LAN
This section lists the settings required for using the network TWAIN Scanner a wireless LAN connection.
For details about how to specify the settings, see "Interface Settings".
90
Network Settings Required to Use Network TWAIN Scanner
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed.
When both Ethernet and wireless LAN are connected, the selected interface takes precedence.
91
2. Connecting the Machine
2
• These settings should be made by the system administrator, or with the advice of the system
administrator.
• For details about using Web Image Monitor, see "Using Web Image Monitor".
• For details about using SmartDeviceMonitor for Admin, see "Using SmartDeviceMonitor for Admin".
• For details about using telnet, see "Using telnet".
Interface Settings
92
Using Utilities to Make Network Settings
93
2. Connecting the Machine
94
Using Utilities to Make Network Settings
95
2. Connecting the Machine
96
Using Utilities to Make Network Settings
97
2. Connecting the Machine
File Transfer
This section describes how to make File Transfer settings using utilities.
Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin, and telnet.
[File Transfer] [SMTP Server]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
98
Using Utilities to Make Network Settings
99
2. Connecting the Machine
100
Connecting the Machine to a Telephone Line and Telephone
• Make sure the connector is the correct type before you start.
BKR001S
Select the line type to which the machine is connected. There are two types: tone and pulse dial.
Select the line type using Administrator Tools.
You can connect the optional handset or an external telephone to the machine.
101
2. Connecting the Machine
• When you use the optional handset or an external telephone with the [On Hook Dial] key for telephone
calls, you can not talk with the other party without pressing the [On Hook Dial] key after talking off
the receiver.
TT DP
BHJ310S
The switch on the handset should be in the appropriate position-TT (Tone Dialing) or DP (Pulse Dialing).
Adjusting the handset bell volume
Ringer
x
BHJ311S
Receiver
BKR030S
102
Connecting the Machine to a Telephone Line and Telephone
• Some external telephones may not be connected or may suffer reduced functionality.
103
2. Connecting the Machine
104
3. Using a Printer Server
This chapter describes how to configure the machine as a network printer.
1. Open the [Printers and Faxes] window from the [Start] menu.
The [Printers and Faxes] window appears.
2. Click the icon of the machine you want to use. On the [File] menu, click [Properties]. The
printer properties appear.
3. On the [Sharing] tab, click [Share this printer].
4. To share the machine with users using a different version of Windows, click [Additional
Drivers...].
If you have installed an alternative driver by selecting [Share As:] during the printer driver installation,
this step can be ignored.
5. Click [OK], and then close the printer properties.
105
3. Using a Printer Server
Using NetWare
This section describes the setting procedure for network printers in the NetWare environment. In the
NetWare environment, you can connect the machine as a “print server” or “remote printer”.
• This procedure assumes an environment is already prepared for normal NetWare running
the printing service setting.
• The procedure is explained with the following example settings:
• File server's name ...CAREE
• Print server's name ...PSERV
• Printer's name ...R-PRN
• Queue name ...R-QUEUE
Using SmartDeviceMonitor for Admin
To use the machine in a NetWare environment, use SmartDeviceMonitor for Admin to set the NetWare
printing environment.
Printers listed by SmartDeviceMonitor for Admin
SmartDeviceMonitor for Admin lists printers connected to the network. If you cannot identify the
machine you want to configure, print configuration page, and then check the machine name.
• The NetWare Client provided by Novell is required to set the printing environment using
SmartDeviceMonitor for Admin under the following environments:
• NDS or Bindery mode in Windows 2000
106
Using NetWare
Follow the procedure below to connect the machine as a print server using NetWare 3.x.
3
1. Start Web Image Monitor.
2. Click [Login].
A dialog box for entering the login user name and password appears.
3. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4. Click [Configuration] in the left area, and then click [NetWare Print Settings].
• Print Server Name: Enter the NetWare print server name. To use the interface board as a print
server, enter the name of a print server that is not active on the file server. Use up to 47 characters.
• Logon Mode: Specify whether to designate a file server or NDS tree when logging on to
NetWare.
• File Server Name: When a file server name is entered here, only the specified file server is
searched for. This item is mandatory. Use up to 47 characters.
• NDS Tree: To enable NDS mode, enter the name of the NDS tree you want to log on to. Use up
to 32 alphanumeric characters.
• NDS Context Name: To enable NDS mode, enter the print server context. Use up to 127
characters.
• Operation Mode: Specify whether to use the interface board as a print server or a remote printer.
• Remote Printer No.: This item is effective when the interface board is specified as a remote printer.
Enter the same number as the number of the printer to be created on the print server (0 to 254
characters).
• Job Timeout: When the interface board is used as a NetWare remote printer, the printer cannot
detect when a print job ends. Therefore, the printer terminates printing when a certain period of
time has elapsed since it last received print data (i.e., when it has not received print data for a
certain period of time). Specify here this period of time (3 to 255 seconds). The initial value is
15 (seconds).
• Frame Type: Select the frame type from the drop-down menu.
• Print Server Protocol: Select the protocol for NetWare from the drop-down menu.
• NCP Delivery Protocol: Select the protocol for NCP delivery.
107
3. Using a Printer Server
• To check the configuration is correct, enter the following from the command prompt:
F:> USERLIST
• If the printer works as configured, the name of the print server appears as a connected user.
3 • If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
Use the [Network] dialog box of Windows to change the frame type of the computer.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
Follow the procedure below to connect the machine as a print server using NetWare 4.x, NetWare 5/5.1,
or NetWare 6 / 6.5.
• When using the printer as a print server in NetWare 4.x, NetWare 5/5.1, or NetWare 6/6.5, set
it to the NDS mode.
• When using NetWare 5/5.1 or NetWare 6/6.5, set the printer as a print server.
108
Using NetWare
• To check the configuration is correct, enter the following from the command prompt:
F:> USERLIST
• If the printer works as configured, the name of the print server appears as a connected user.
• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer. If no printer names appear in the list, match the frame
types of IPX/SPXs for the computer and printer. Use the [Network] dialog box of Windows to change
the frame type of the computer. 3
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
Follow the procedure below to connect the machine as a print server in a pure IP environment of NetWare
5/5.1 or NetWare 6/6.5.
• When creating a queued print server in a pure IP environment of NetWare 5/5.1 or NetWare 6/6.5,
create a print queue on the file server using NetWare Administrator.
• This printer is not available as a remote printer for use in a pure IP environment.
• To use the printer in a pure IP environment, set it to IPv4.
109
3. Using a Printer Server
110
Using NetWare
4. Click [Configuration] in the left area, and then click [NetWare Print Settings].
5. Confirm the settings, and then click [Device Name].
Configuration is now complete. Wait several minutes before restarting Web Image Monitor.
6. Click [Logout].
7. Quit Web Image Monitor.
• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
3
Use the [Network] dialog box of Windows to change the frame type of the computer.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
Follow the procedure below to use the machine as a remote printer under NetWare 3.x.
111
3. Using a Printer Server
9. From the [Print Server Information] menu, select [Print Server Configuration].
10. From the [Print Server Configuration] menu, select [Printer Configuration].
11. Select the printer indicated as [Not Installed].
Use the same printer number specified as the remote printer number using SmartDeviceMonitor for
Admin.
12. To change the printer name, enter a new name.
A name “printer x” is assigned to the printer. The “x” stands for the number of the selected printer.
13. As type, select [Remote Parallel, LPT1].
3 The IRQ, Buffer size, Starting form, and Queue service mode are automatically configured.
14. Press the [Esc] key, and then click [Yes] on the confirmation message.
15. Press the [Esc] key to return to [Print Server Configuration Menu].
16. Assign print queues to the created printer.
17. From [Print Server Configuration Menu], select [Queues Serviced By Printer].
18. Select the printer created.
19. Press the [Insert] key to select a queue serviced by the printer.
You can select several queues.
20. Follow the instructions on the screen to make other necessary settings.
Following these steps, check that the queues are assigned.
21. Press the [Esc] key until “Exit?” appears, and then select [Yes] to exit PCONSOLE.
22. Start the print server by entering the following from the console of the NetWare server.
If the print server is in operation, quit and restart it.
To quit
CAREE: unload pserver
To start
CAREE: load pserver [print server name]
If the printer works as configured, the message “Waiting for job” appears.
112
Using NetWare
• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
Use the [Network] dialog box of Windows to change the frame type of the computer.
3
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
Follow the procedure below to use the printer as a remote printer under NetWare 4.x, 5/ 5.1 and 6/6.5.
• To use the printer as a remote printer under NetWare 4.x, 5/5.1, 6/6.5, set it to NDS mode.
• Do not use the printer as a remote printer when Pure IP is used.
113
3. Using a Printer Server
9. In the [Class of new object] box, click [Printer], and then click [OK]. For NetWare 5, click
[Printer (Non NDPS)].
10. In the [Printer name] box, enter the printer name
11. Select the [Define additional properties] check box, and then click [Create].
12. Assign print queues to the created printer. Click [Assignments, and then click [Add] in the
[Assignments] area.
13. In the [Available objects] box, click the queue you created, and then click [OK].
14. Click [Configuration], click [Parallel] in the [Printer type] list, and then click
3 [Communication].
15. Click [Manual load] in the [Communication type] area, and then click [OK]. Check the
settings, and then click [OK].
16. Set up the network connection to a print server. Select a context specified, and then click
[Create] on the [Object] menu.
17. In the [Class of new object] box, click [Print Server], and then click [OK]. For NetWare 5,
click [Print Server (Non NDPS)].
18. In the [Print Server Name:] box, enter the print server name.
Use the same print server name specified using SmartDeviceMonitor for Admin.
19. Select the [Define additional properties] check box, and then click [Create].
20. Assign the printer to the created print server. Click [Assignments], and then click [Add] in
the [Assignments] area.
21. In the [Available objects] box, click the queue you created, and then click [OK].
22. In the [Printers] area, click the printer you assigned, and then click [Printer Number].
23. Enter the printer number, and then click [OK]. Check the settings, and then click [OK].
Use the same printer number specified as the remote printer number using SmartDeviceMonitor for
Admin.
24. Start the print server by entering the following from the console of the NetWare server.
If the print server is in operation, quit and restart it.
To exit
CAREE: unload pserver
To start
CAREE: load pserver [print server name]
25. Enter the printer server name as the context name, and then press the [Enter] key.
26. Select the printer name on the context menu, and then press the [Enter] key.
114
Using NetWare
2. Click [Login].
A dialog box for entering the login user name and login password appears.
3. Enter the user login name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4. Click [Configuration] in the left area, and then click [NetWare Print Settings].
5. Confirm the settings, and then click [Device Name].
Configuration is now complete. Wait several minutes before restarting Web Image Monitor.
6. Click [Logout].
3
7. Quit Web Image Monitor.
• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
Use the [Network] dialog box of Windows to change the frame type of the computer.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
115
3. Using a Printer Server
116
4. Monitoring and Configuring the
Printer
This chapter describes how to monitor and configure the printer.
117
4. Monitoring and Configuring the Printer
• If you are using a proxy server, change the Web browser settings. Contact your administrator for
information about the settings.
• If you click your browser's back button but the previous page does not appear, click the browser's
refresh button and try again.
• Machine information is not automatically updated. To perform an update, click [Refresh] in the display
area.
• We recommend using Web Image Monitor in the same network.
• You cannot access to the machine from outside the firewall.
• When using the machine under DHCP, the IP address may be automatically changed by the DHCP
server settings. Enable DDNS setting on the machine, and then connect using the machine's host name.
Alternatively, set a static IP address to the DHCP server.
4 • If the HTTP port is disabled, connection to the machine using the machine's URL cannot be established.
SSL setting must be enabled on this machine. For details, consult your network administrator.
• When using the SSL encryption protocol, enter “https://(machine's IP address or host name)/”.
• Internet Explorer must be installed on your computer. Use the most recent available version. We
recommend Internet Explorer 6.0 or later.
• When you are using Firefox, fonts and colors may be different, or tables may be out of shape.
• When using a host name under Windows Server 2003/2003 R2/2008, or Windows Vista with
IPv6 protocol, perform host name resolution using an external DNS server. The host file cannot be
used.
• To use JAWS 7.0 under Web Image Monitor, you must be running Windows OS and Microsoft
Internet Explorer 5.5 SP2, or a later version.
This section explains the Top Page and how to display Web Image Monitor.
• When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
“192.168.001.010”, you must enter it as “192.168.1.10”.
118
Using Web Image Monitor
4
BKR010S
1. Menu area
If you select menu, its content will be shown on the work area, or the sub area.
2. Tab area
Details about each menu appear.
3. Header area
The dialog box for switching to the user mode and administrator mode appears, and each mode's menu will be
displayed.
The link to help and dialog box for keyword search appears.
4. Help
Use Help to view or download Help file contents.
5. Display area
Displays the contents of the item selected in the menu area.
Machine information in the display area is not automatically updated. Click [Refresh] at the upper right in the
display area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire
browser screen.
• When using a host name under Windows Server 2003/2003 R2/2008, or Windows Vista with
IPv6 protocol, perform host name resolution using an external DNS server. The host file cannot be
used.
119
4. Monitoring and Configuring the Printer
1. Click [Login].
2. Enter a login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4 • For user code authentication, enter a user code in [Login User Name], and then click [Login].
• The procedure may differ depending on the Web browser used.
• When you log on and made the setting, always click [Logout].
There are two modes available with Web Image Monitor: guest mode and administrator mode.
Displayed Items may differ depending on the machine type.
Guest Mode
In the guest mode, machine status, settings, and print job status can be viewed, but the machine settings
cannot be changed.
120
Using Web Image Monitor
4
BKR011S
1. Home
The [Status], [Device Info], and [Counter] tab are displayed. Details of the tab menu are displayed on the work
area.
2. Fax Received File
Displays received fax files.
3. Printer: Print Jobs
Allows you to display list of Sample Print, Locked Print, Hold Print, and Stored Print jobs.
4. Job
Displays all print files.
5. Configuration
Displays current machine and network settings.
Administrator Mode
In the administrator mode, you can configure various machine settings.
121
4. Monitoring and Configuring the Printer
4
BKR012S
1. Home
The [Status], [Device Info], and [Counter] tab are displayed. Details of the tab menu are displayed on the work
area.
2. Printer: Print Jobs
Allows you to display list of Locked Print, Sample Print, Hold Print, and Stored Print jobs.
3. Job
Displays all print files.
4. Address Book
User information can be registered, displayed, changed, and deleted.
5. Configuration
System settings for the machine, interface and security can be made.
6. Reset Device
Click to reset the printer. If a print job is being processed, the printer will be reset after the print job is completed.
This button is located on Top Page.
7. Reset Printer Job
Click to reset current print jobs and print jobs in queue. This button is located on Top Page.
Follow the procedure below to access Web Image Monitor in the administrator mode.
122
Using Web Image Monitor
2. Enter your login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
The following tables show Web Image Monitor items that can be viewed or modified depending on the
selected mode on the Web browser. Select one of the following modes to log on Web Image Monitor:
• Guest mode: logged on as a user
• Administrator mode: logged on as an administrator
Home
Status 4
Menu Guest mode Administrator mode
Device Info
Counter
123
4. Monitoring and Configuring the Printer
Job
Job List
Printer
Fax History
124
Using Web Image Monitor
Address Book
On-demand E-mail
None Read/Modify
Notification
User Authentication
None Read/Modify
Management
Administrator Authentication
None Read/Modify
Management
125
4. Monitoring and Configuring the Printer
Program/Change
None Read/Modify
Administrator
Printer
Fax
Scanner
126
Using Web Image Monitor
Interface
Network
Security
127
4. Monitoring and Configuring the Printer
RC Gate
Webpage
128
Using Web Image Monitor
When using Help for the first time, clicking the icon marked “?” ( ) makes the following screen appear,
in which you can view Help in two different ways, as shown below:
Viewing Help on our Web site
Downloading Help to your computer
Downloading and Checking Help
You can download Help to your computer. As the Help URL, you can specify the path to the local file
to view the Help without connecting to the Internet.
Downloading Help
129
4. Monitoring and Configuring the Printer
• If you save the Help files on your hard disk, you must access them directly - you cannot link to them
using the Help button ( ).
130
Using SmartDeviceMonitor for Admin
131
4. Monitoring and Configuring the Printer
• Allows you to check job histories of printed, faxed (LAN-Fax), scanned, and photocopied
documents identified by user codes.
• Allows selection of functions such as printing and scanning for each user code.
• Fax numbers and e-mail addresses stored in the machine can be changed and saved by
computer.
• You can check each fax job history entry.
• You can make settings for and display the status changes of group devices.
• Using Address Management Tool, you can manage LAN-Fax numbers, user names for Scan to
Folder, and addresses for sending and receiving Internet faxes.
• The e-mail sender's name and folder can be protected.
4
Installing SmartDeviceMonitor for Admin
• Auto Run may not work under certain operating system settings. In this case, launch “Setup.exe”
located on the CD-ROM root directory.
• If you are required to restart the computer after installing SmartDeviceMonitor for Admin, restart the
computer and continue the configuration.
132
Using SmartDeviceMonitor for Admin
Follow the procedure below to change the network interface board configuration using
SmartDeviceMonitor for Admin.
A Web browser opens and the window for entering the login user name and password for the Web
Image Monitor administrator appears.
NIB Setup Tool starts. Click [Web browser], and then click [OK].
5. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
6. Configure settings using Web Image Monitor.
7. Click [Logout].
8. Quit Web Image Monitor.
9. Quit SmartDeviceMonitor for Admin.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
133
4. Monitoring and Configuring the Printer
Follow the procedure below to lock the menus on the machine's control panel.
A Web browser opens and the window for entering the login user name and password for the Web
Image Monitor administrator appears.
5. Enter the login user name and password, and then click [Login].
For details about the user name and password, consult your network administrator.
The [System] page of Web Image Monitor appears.
6. On the [Protect Printer Display Panel], select [Level 1] or [Level 2].
7. Click [OK].
8. Click [Logout].
9. Quit Web Image Monitor.
10. Quit SmartDeviceMonitor for Admin.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
134
Using SmartDeviceMonitor for Admin
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about setting items, see Help in the General Settings on Configuration page.
Follow the procedure below to manage the user's information using SmartDeviceMonitor for Admin.
Prints jobs can be managed and functions restricted by user codes.
135
4. Monitoring and Configuring the Printer
A Web browser opens and the window for entering the login user mane and password for the Web
Image Monitor administrator appears.
5. Enter the user name and password, and then click [Login].
For details about the user name and password, consult your network administrator.
User Management Tool starts.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about User Management Tool, see SmartDeviceMonitor for Admin Help.
136
Using SmartDeviceMonitor for Admin
4. Specify the save location and file name, and then click [Save].
5. Click [Exit] on the [File] menu to quit User Management Tool.
137
4. Monitoring and Configuring the Printer
5. Select the check box of the items you want to reset, and then click [OK].
A confirmation message appears.
6. Click [OK].
The count for the selected paper type becomes 0 and [Modified] is displayed for [Status].
7. On the [Edit] menu, click [Apply Settings].
138
Using SmartDeviceMonitor for Admin
Restricting Functions
Follow the procedure below to restrict use of individual functions.
139
4. Monitoring and Configuring the Printer
• For details about setting restrictions, see SmartDeviceMonitor for Admin Help.
140
Using SmartDeviceMonitor for Admin
• For details about the setting for Energy Save mode, see SmartDeviceMonitor for Admin Help.
Setting a Password
141
4. Monitoring and Configuring the Printer
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. In the list, select a machine whose configuration you want to change.
4. On the [Tools] menu, click [NIB Setup Tool].
4 A Web browser opens and the dialog box for entering the login user name and password for the
Web Image Monitor administrator appears.
NIB Setup Tool starts when the network interface board is default. Follow the instructions on the screen.
5. Enter the login user name and password, and then click [Login].
For details about the user name and password, consult your network administrator.
6. Click [Configuration].
7. Click [Program/Change Administrator] on the [Device Settings] area, and then change the
settings.
8. Click [OK].
9. Click [Logout].
10. Quit Web Image Monitor.
11. Quit SmartDeviceMonitor for Admin.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
142
Using SmartDeviceMonitor for Admin
3. Click the [View] menu, and then click [Select Device List Columns].
4. From [Device] in the [Select Device List Columns] dialog box, select the items you want to
display, and then click [Add].
Selected items will move to [Show].
5. Move all the items you want to display, and then click [OK].
An icon in the list indicates the machine's status.
6. For information about a machine's status, select the machine you want to know about, and
then click [Open] in the [Device Settings] menu.
The dialog box of the selected machine appears.
7. Click the application whose status you want to view.
The machine's status is displayed. 4
8. Quit SmartDeviceMonitor for Admin.
• For details about items in the dialog box, see SmartDeviceMonitor for Admin Help.
Follow the procedure below to change the name and comment for the machine.
143
4. Monitoring and Configuring the Printer
• In the [Device Name] box, enter a device name on the machine using up to 31 characters.
• In the [Comment] box, enter a comment on the machine using up to 31 characters.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
144
Using SmartDeviceMonitor for Admin
• To display Spool Printing Job List, [Spool Printing] must be set to [Active] on Web Image Monitor in
advance.
• To delete the Spool Printing Job, select the document you want to delete and then click [Delete].
• For details, see Help in the [Spool Printing Job List] area.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
145
4. Monitoring and Configuring the Printer
2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. Select a machine in the list, and then click [Address Management Tool] on the [Tools] menu.
The dialog box for entering the login user name and password appears.
4. Enter the login user name and password, and then click [OK].
For details about the login user name and password, consult your network administrator.
[Address Management Tool] starts. Make the necessary settings.
4 5. Click [Exit].
6. Quit SmartDeviceMonitor for Admin.
146
Using SmartDeviceMonitor for Client
Monitoring Printers
Follow the procedure below to monitor the machine using SmartDeviceMonitor for Client.
1. Right-click the SmartDeviceMonitor for Client icon, point to [Properties], and then click
[Monitor Device Settings...].
4
To display the machine status on the task bar, you must first select the [To be Monitored] check box,
and then select the [Displayed on Task Bar] check box.
3. Click [OK].
The dialog box closes and the configured machine is monitored.
147
4. Monitoring and Configuring the Printer
• For details about status icons, see SmartDeviceMonitor for Client Help.
Follow the procedure below to check machine status using SmartDeviceMonitor for Client.
1. Right-click the SmartDeviceMonitor for Client icon, and then click the machine.
• For details about items in the dialog box, see SmartDeviceMonitor for Client Help.
When using IPP with SmartDeviceMonitor for Client, note the following:
• The network printer can only receive one print job from SmartDeviceMonitor for Client at a time. While
the network printer is printing, another user cannot access it until the job is finished. In this case,
SmartDeviceMonitor for Client tries to access the network printer until the retry interval expires.
• If SmartDeviceMonitor for Client cannot access the network printer and times out, it will stop sending
the print job. In this case, you should cancel the paused status from the print queue window.
SmartDeviceMonitor for Client will resume access to the network printer. You can delete the print job
from the print queue window, but canceling a print job printed by the network printer might cause the
next job sent from another user to be incorrectly printed.
• If a print job sent from SmartDeviceMonitor for Client is interrupted and the network printer cancels
the job because something went wrong, send the print job again.
• Print jobs sent from another computer do not appear in the print queue window, regardless of protocol.
• If various users send print jobs using SmartDeviceMonitor for Client to network printers, the printing
order might not be the same as that in which the jobs were sent.
• An IP address cannot be used for the IPP port name because the IP address is used for the
SmartDeviceMonitor for Client port name.
148
Using SmartDeviceMonitor for Client
• When setting SSL, a protocol for encrypted communication, under environment which server
authentication is issued, enter “https://( machine's IP address or host name)/ ”. Internet Explorer
must be installed on your computer. Use the highest version. Internet Explorer 6.0 or higher is
recommended.
• If the [Security Alert] dialog box appears when accessing the machine using IPP to create or configure
an IPP port, or when printing, install the certificate. To select the certificate store location when using
Certificate Import Wizard, click [Place all certificates in the following store], and then click [Local
Computer] under [Trusted Root Certification Authorities].
149
4. Monitoring and Configuring the Printer
• Depending on your e-mail application, a phishing warning might appear after you receive an e-mail
message. To prevent phishing warnings appearing after you receive e-mail from a specified sender,
you must add the sender to your e-mail application's exclusion list. For details about how to do this,
4 see your e-mail application's Help.
The e-mail notification functions you can set are as follows:
• Auto e-mail notification
Information including the machine status is automatically sent by e-mail. Before you use this function,
register the e-mail address to be used.
• On-demand e-mail notification
Information including the machine status is sent by e-mail when a request from the administrator is
received.
The information that can be notified by auto e-mail notification is as follows:
• Call Service
• Out of Toner
• Toner Almost Empty
• Paper Misfeed
• Cover Open
• Out of Paper
• Unit Connection Error
• File Storage Memory Full Soon
• Log Error
• Device Access Violation
• Replacement Required: Unit
• Replacement Required Soon: Unit
150
Printer Status Notification by E-Mail
• For details about login user name and password, see Security Reference, which is the administrator's
manual.
• For details about the settings, see Web Image Monitor Help.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
Before you use Auto E-mail Notification or On-demand E-mail notification, setup an e-mail account to be
used for the function. Perform the following configuration task in Web Image Monitor.
151
4. Monitoring and Configuring the Printer
• E-mail Notification User Name: Enter the administrator's user name as the mail originator name.
• E-mail Notification Password: Enter the password of the mail notification user.
4. Click [OK].
5. Click [Logout].
6. Quit Web Image Monitor.
• The user name and e-mail address that is already registered as e-mail destination cannot be specified
as the recipient of e-mail notification.
Mail Authentication
4
You can configure mail authentication to prevent illegal use of the mail server.
SMTP Authentication
Specify SMTP authentication.
When mail is sent to the SMTP server, authentication is performed using the SMTP AUTH protocol by
prompting the mail originator to enter the user name and password. This prevents illegal use of the
SMTP server.
1. Log on to Web Image Monitor in administrator mode.
2. Click [Configuration] in the menu area, and then click [E-mail] on the [Device Settings] area.
3. Make the following settings in SMTP column:
• SMTP Server Name: Enter the IP address or host name of the SMTP server
• SMTP Port No.: Enter the port number used when sending e-mail to the SMTP server.
• SMTP Authentication: Enable or disable SMTP authentication.
• SMTP Auth. E-mail Address: Enter the e-mail address.
• SMTP Auth. User Name: Enter the SMTP account name.
• SMTP Auth. Password: To set or change the password for SMTP AUTH.
• SMTP Auth. Encryption: Select whether to encrypt the password or not.
Encryption-Auto Select: If the authentication method is PLAIN, LOGIN, CRAM-MD5, or
DIGEST-MD5.
Encryption-Active: If the authentication method is CRAM-MD5 or DIGEST-MD5.
Encryption-Inactive: If the authentication method is PLAIN or LOGIN.
4. Click [OK]
5. Click [Logout].
6. Quit Web Image Monitor.
152
Printer Status Notification by E-Mail
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about the settings, see Web Image Monitor Help.
153
4. Monitoring and Configuring the Printer
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about the settings, see Web Image Monitor Help.
To use mail notification, you need to send an on-demand e-mail message to this machine.
Using your mail software, enter the following:
Item Description
154
Printer Status Notification by E-Mail
Item Description
155
4. Monitoring and Configuring the Printer
Using telnet
1. Use the IP address or the host name of the machine to start telnet.
% telnet “IP address”
2. Enter your user name and password.
For details about the user name and password, consult your network administrator.
For user authentication, enter a login user name and password.
For user code authentication, enter a user code in User Name.
3. Enter a command.
4. Quit telnet.
msh> logout
The configuration message about saving the changes appears.
5. Enter “yes” to save the changes, and then press the [Enter] key.
If you do not want to save the changes, enter “no”, and then press the [Enter] key. To make further
changes, enter “return” at the command line, and then press the [Enter] key.
• If the message “Can not write NVRAM information” appears, the changes are not saved. Repeat the
procedure above.
• When the changes are saved, the network interface board is reset automatically with that changes.
• When the network interface board resets, the print job in print process will be printed. However, print
jobs in queue will be canceled.
156
Remote Maintenance by telnet
8021x
eap {tls|ttls|leap|peap} {chap| You can specify the EAP authentication type.
mschap|mschapv2|pap|md5| tls: EAP-TLS (default) 4
tls}
ttls: EAP-TTLS
leap: LEAP
peap: PEAP
chap, mschap, mschapv2, pap, md5, or tls are settings for
the phase 2 method, and must be set when using EAP-TTLS
or PEAP.
Do not make these settings when using other EAP
authentication types.
If you select EAP-TTLS, you can select chap, mschap,
mschapv2, pap, or md5.
If you select PEAP, you can select mschapv2 or tls.
username "character string" You can specify the login user name for the Radius server.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.
username2 "character string" You can specify the phase 2 username for EAP-TTLS/PEAP
phase 2 authentication.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.
domain name "character string" You can specify the login domain name for the Radius server.
The characters you can enter are ASCII 0x20-0x7e (31
bytes), but not "@" or "\".
The default is blank.
password "character string" You can specify the login for the Radius server.
157
4. Monitoring and Configuring the Printer
srvcert {on|off} You can set the server certificate. The default is "off".
imca {on|off} You can enable or disable the certificate when the
intermediate certificate authority is present. The default is
"off".
srvid "character string" You can set the server ID and subdomain of the certificate
server.
clear {a each command|all} Returns the selected setting to its default value.
If you specify "all", all settings will be restored to their default
values. However, IEEE 802.1x Auth. status (enable or
disable) for Ethernet and wireless LAN will not be initialized.
access
Use the “access” command to view and configure access control. You can also specify two or more access
ranges.
View settings
msh> access
IPv4 configuration display
msh> access ID range
IPv6 configuration display
msh> access ID range6
IPv6 access mask configuration display
msh> access ID mask6
IPv4 configuration
msh> access ID range “start-address end-address”
Example: to specify accessible IPv4 addresses between 192.168.0.10 and 192.168.0.20:
msh> access 1 range 192.168.0.10 192.168.0.20
158
Remote Maintenance by telnet
IPv6 configuration
msh> access ID range6 “start-address end-address”
Example: to specify accessible IPv6 addresses between 2001:DB8::100 and 2001:DB8::200.
msh> access 1 range6 2001:DB8::100 2001:DB8::200
IPv6 access mask configuration
msh> access ID mask6 “base-address prefixlen”
Example: to specify accessible IPv6 addresses to 2001:DB8::/32
msh> access 1 mask6 2001:DB8:: 32
Access control initialization
msh> access flush
• Use the “flush” command to restore the default settings so that all access ranges become
4
“0.0.0.0” for IPv4, and “::” for IPv6.
• You can specify each IPv6 entry by either range or mask. For the range parameter, you can select
“start-address end-address”. For the mask parameter, you can select “base-address prefixlen”.
• The access range restricts computers from use of the machine by IP address. If you do not need to
restrict printing, make the setting “0.0.0.0” for IPv4, and “::” for IPv6.
• Valid ranges must be from lower (start address) to higher (end address).
• For IPv4 and IPv6, you can select an ID number between 1 and 5.
• IPv6 can register and select the range and the mask for each access ranges.
• IPv6 mask ranges between 1 - 128 can be selected.
• Up to five access ranges can be specified. The entry is invalid if the target number is omitted.
• You cannot send print jobs, or access Web Image Monitor and diprint from a restricted IP address.
appletalk
159
4. Monitoring and Configuring the Printer
authfree
autonet
160
Remote Maintenance by telnet
• If an interface is not selected, the current interface connection settings remain in effect.
• For details about AutoNet, refer to autonet parameters.
bonjour
161
4. Monitoring and Configuring the Printer
162
Remote Maintenance by telnet
devicename
Use the “devicename” command to display and change the printer name.
View settings
msh> devicename
Printer name configuration
msh> devicename name “string”
• Enter a printer name using up to 31 alphanumeric characters.
• Set single names for each printer.
Printer name initialization
msh> devicename clear name
4
• Reset the printer name to its default.
dhcp
163
4. Monitoring and Configuring the Printer
dhcp6
164
Remote Maintenance by telnet
diprint
The direct printing port enables direct printing from a network-connected computer.
Use the “diprint” command to change direct printing port settings.
View settings
The following command displays the current direct printing port settings:
msh> diprint
Example output:
port 9100
timeout=300(sec)
bidirect on
4
conn multi
apl async
• The “port” specifies the port number of the direct printing port.
• The “bidirect” setting indicates whether the direct printing port is bidirectional or not.
Setting timeout
msh> diprint timeout [30-5535]
• You can specify the timeout interval to use when the printer is expecting data from the network.
• The default is 300 seconds.
• This command functions in conjunction with the “lpr” command.
Specifying the number of concurrent connections
msh> diprint conn {multi|single}
• The above command specifies the number of concurrent diprint connections. Specify “multi” for
multiple connections or “single” for a single connection.
• The default is “multi”.
dns
Use the “dns” command to configure or display DNS (Domain Name System) settings.
View settings
The following command displays current DNS settings:
msh> dns
IPv4 DNS server configuration
The following command enables or disables the IPv4 DNS server address:
165
4. Monitoring and Configuring the Printer
166
Remote Maintenance by telnet
A records registration
msh> dns arecord {dhcp|own}
• dhcp: You can specify the method of registering an A record when the dynamic DNS function
is enabled and DHCP is used.
• own: To register an A record using the printer as the DNS client.
The DNS server address and the domain name already designated are used for the registration.
Record updating interval settings
msh> dns interval [1-255]
• You can specify the interval after which records are updated when using the dynamic DNS
function.
• The updating interval is specified hourly. It can be entered between 1 and 255 hours. 4
• The default is 24 hours.
resolv.conf display
msh> dns resolv
Specifying the protocol when asking names during dual stacking
msh> dns resolv protocol {ipv4|ipv6}
• Appears during dual stacking only.
domainname
Use the “domainname” command to display or configure the domain name settings.
You can configure the Ethernet interface or IEEE 802.11 interface.
View settings
The following command displays the current domain name:
msh> domainname
Interface domain configuration
msh> domainname “interface_name”
Setting the Domain Name
msh> domainname “interface_name” name “domain name”
• A domain name can be entered using up to 63 alphanumeric characters.
• The Ethernet interface and IEEE 802.11 interface will have the same domain name.
• wlan can be specified only when the IEEE 802.11 interface is installed.
167
4. Monitoring and Configuring the Printer
etherauth
4 Use the "etherauth" command to display or modify the authentication related parameters for Ethernet.
View settings
msh> etherauth
802.1x Configuration
msh> etherauth 8021x {on|off}
• {on} means "active" and {off} means "inactive".
etherconfig
Use the "etherconfig" command to view and configure the Ethernet parameters.
View settings
msh> etherconfig
Specify Ethernet speed
msh> etherconfig speed {auto|10f|10h|100f|100h}
• auto = Auto Select
• 10f = 10 Mbps Full Duplex
• 10h = 10 Mbps Half Duplex
• 100f = 100 Mbps Full Duplex
• 100h = 100 Mbps Half Duplex
• The default is "auto".
help
Use the “help” command to display the available command list and the procedures for using those
commands.
168
Remote Maintenance by telnet
hostname
ifconfig
Use the “ifconfig” command to view and configure TCP/IP (IP address, subnet mask, broadcast address,
default gateway address) for the printer.
View settings
msh> ifconfig
IPv4 configuration
msh> ifconfig “interface_name” “parameter” “address”
• If you did not enter an interface name, it is automatically set to the Ethernet interface.
169
4. Monitoring and Configuring the Printer
• wlan can be specified only when the IEEE 802.11 interface is installed.
The following explains how to configure an IPv4 address 192.168.15.16 on Ethernet interface.
msh> ifconfig ether 192.168.15.16
IPv6 configuration
msh> ifconfig ether inet6 “interface_name” “printer_name”
4 The following explains how to configure a IPv6 address to 2001:DB8::100 with prefix length 64 on
the Ethernet interface.
msh> ifconfig ether inet6 2001:DB8::100 64
Netmask configuration
msh> ifconfig “interface_name” netmask “address”
The following explains how to configure a subnet mask 255.255.255.0 on Ethernet interface.
msh> ifconfig ether netmask 255.255.255.0
Broadcast address configuration
msh> ifconfig “interface_name” broadcast “address”
Changing the interface
msh> ifconfig “interface” up
• When using the optional IEEE 802.11 interface unit, you can specify either Ethernet or IEEE
802.11 interface.
info
Use the “info” command to display printer information such as paper tray, output tray, and printer language.
170
Remote Maintenance by telnet
ipp
ipsec
171
4. Monitoring and Configuring the Printer
Viewing settings
The following command displays the current IPsec settings:
msh> ipsec
ipv6
logout
Use the “logout” command to save the changes and quit telnet.
Quit telnet
msh> logout
A confirmation message appears.
{yes|no|return}
Enter [yes], [no] or [return] by typing the word, and then press the [Enter] key.
To save the changes and quit telnet, enter [yes].
To discard the changes and quit telnet, enter [no].
To continue making changes, enter [return]
lpr
172
Remote Maintenance by telnet
Use the “netware” command to view and configure the NetWare settings such as the print server name or
file server name.
NetWare Printer Server Names
msh> netware pnamecharacter string
• Enter the NetWare print server name using up to 47 characters.
NetWare File Server Names
msh> netware fname character string
• Enter the NetWare file server name using up to 47 characters.
Encap type
msh> netware encap {802.3|802.2|snap|ethernet2|auto}
Remote Printer Number
msh> netware rnum [0-254]
• The default is 0.
Timeout
msh> netware timeout [3-255]
• The default is 15.
Printer server mode
msh> netware mode pserver
msh> netware mode ps
Remote printer mode
msh> netware mode rprinter
173
4. Monitoring and Configuring the Printer
ipv4pri IPv4+IPX(IPv4)
ipxpri IPv4+IPX(IPX)
ipv4 IPv4
ipx IPX
pathmtu
Use the “pathmtu” command to display and configure the PathMTU Discovery service function.
View settings
msh> pathmtu
Configuration
msh> pathmtu {on|off}
• The default is “on”.
• If the MTU size of the sent data is larger than the router's MTU, the router will declare it
impassable, and communication will fail. If this happens, selecting the “pathmtu” to “on”
optimizes the MTU size and prevents data output failure.
174
Remote Maintenance by telnet
• Depending on the environment, information might not be obtained from the router, and
communication will fail. If this happens, select the “pathmtu” to “off”.
prnlog
rhpp
route
Use the “route” command to view and control the routing table.
Specified route information display
msh> route get “destination”
175
4. Monitoring and Configuring the Printer
176
Remote Maintenance by telnet
Use the “set” command to set the protocol information display “active” or “inactive”.
View settings
The following command displays protocol information (active/inactive).
msh> set ipv4
msh> set ipv6
msh> set ipsec
msh> set appletalk
msh> set netware
msh> set smb
msh> set protocol
• When protocol is specified, information about TCP/IP, AppleTalk, NetWare and SMB appears.
msh> set lpr
msh> set lpr6
msh> set ftp
msh> set ftp6
msh> set rsh
msh> set rsh6
msh> set diprint
msh> set diprint6
msh> set web
177
4. Monitoring and Configuring the Printer
178
Remote Maintenance by telnet
• Disabling IPv6 also disables lpr6, ftp6, rsh6, diprint6, ssl6, ipp6, http6, bonjour6, wsdev6, and
sftp6.
msh> set ipsec {up|down}
msh> set appletalk {up|down}
msh> set netware {up|down}
msh> set smb {up|down}
msh> set lpr {up|down}
msh> set lpr6 {up|down}
msh> set ftp {up|down}
msh> set ftp6 {up|down}
msh> set rsh {up|down} 4
msh> set rsh6 {up|down}
msh> set diprint {up|down}
msh> set diprint6 {up|down}
msh> set web {up|down}
msh> set snmp {up|down}
msh> set ssl {up|down}
msh> set ssl6 {up|down}
• If Secured Sockets Layer (SSL, an encryption protocol) function is not available for the printer,
you cannot use the function by enabling it.
msh> set nrs {up|down}
msh> set rfu {up|down}
msh> set rfu6 {up|down}
msh> set ipp {up|down}
msh> set ipp6 {up|down}
msh> set http {up|down}
msh> set http6 {up|down}
msh> set bonjour {up|down}
msh> set bonjour6 {up|down}
msh> set ssh {up|down}
msh> set ssdp {up|down}
msh> set nbt {up|down}
msh> set sftp {up|down}
msh> set sftp6 {up|down}
179
4. Monitoring and Configuring the Printer
show
4
Use the “show” command to display network interface board configuration settings.
View settings
msh> show
• If “-p” is added, you can view settings one by one.
slp
smb
Use the “smb” command to configure or delete the computer or workgroup name for SMB.
Computer name settings
msh> smb comp “computer name”
• Set computer name using up to 15 characters.
• Names beginning with “RNP” or “rnp” cannot be entered.
180
Remote Maintenance by telnet
snmp
Use the “snmp” command to display and edit SNMP configuration settings such as the community name.
View settings
msh> snmp
• Default access settings 1 is as follows:
Community name:public
IPv4 address:0.0.0.0
IPv6 address:::
IPX address:00000000:000000000000
Access type:read-only
Effective Protocol:IPv4/IPv6/IPX
• Default access settings 2 is as follows:
Community name:admin
IPv4 address:0.0.0.0
IPv6 address:::
181
4. Monitoring and Configuring the Printer
IPX address:00000000:000000000000
Access type:read-write
Effective Protocol:IPv4/IPv6/IPX
• If “-p” is added, you can view settings one by one.
• To display the current community, specify its registration number.
Display
msh> snmp ?
Community name configuration
msh> snmp “number” name “community_name”
no not accessible
Protocol configuration
Use the following command to set protocols “active” or “inactive”: If you set a protocol “inactive”,
all access settings for that protocol are disabled.
msh> snmp {ipv4|ipv6|ipx} {on|off}
• Specify “ipv4” for IPv4, “ipv6” for IPv6, or “ipx” for IPX/SPX.
• {on} means “active” and {off} means “inactive”.
• All protocols cannot be turned off concurrently.
Configuration of protocol for each registration number
msh> snmp “number” active {ipv4|ipv6|ipx} {on|off}
182
Remote Maintenance by telnet
• To change the protocol of access settings, use the following command. However, if you have
disabled a protocol with the above command, activating it here has no effect.
Access configuration
msh> snmp “number” {ipv4|ipv6|ipx} “address”
• You can configure a host address according to the protocol used.
• The network interface board accepts requests only from hosts that have IPv4, IPv6, and IPX
addresses with access types of “read-only” or “read-write”. Enter “0” to have network interface
board accept requests from any host without requiring a specific type of access.
• Enter a host address to deliver “trap” access type information to.
• To specify IPv4 or IPv6, enter “ipv4” or “ipv6” followed by a space, and then the IPv4 or IPv6
address.
• To specify IPX/SPX, enter “ipx” followed by a space, the IPX address followed by a decimal,
4
and then the MAC address of the network interface board.
sysLocation configuration
msh> snmp location
Deleting sysLocation
msh> snmp clear location
sysContact setting
msh> snmp contact
Deleting sysContact
msh> snmp clear contact
SNMP v1v2 function configuration
msh> snmp v1v2 {on|off}
• Specify “on” to enable, and “off” to disable.
SNMP v3 function configuration
msh> snmp v3 {on|off}
• Specify “on” to enable, and “off” to disable.
SNMP TRAP configuration
msh> snmp trap{v1|v2|v3} {on|off}
• Specify “on” to enable, and “off” to disable.
Remote Configuration Authorization configuration
msh> snmp remote {on|off}
• Specify “on” to enable, and “off” to disable the SNMP v1v2 setting.
183
4. Monitoring and Configuring the Printer
sntp
The printer clock can be synchronized with a NTP server clock using Simple Network Time Protocol (SNTP).
Use the “sntp” command to change SNTP settings.
View settings
msh> sntp
NTP IPv4 server address configuration
You can specify the IPv4 address of the NTP server.
msh> sntp server “IPv4_address”
NTP hostname configuration
You can specify the hostname of the NTP server.
184
Remote Maintenance by telnet
• You can only select either the address or host name for the ntp server.
spoolsw
Use the “spoolsw” command to view and configure Job Spool settings.
You can only specify diprint, trap, lpr, ipp, ftp, sftp, wsd (printer), and smb (TCP/IP) protocol.
• The “spoolsw” command for configuring Job Spool settings is available only when the optional hard
disk is installed.
View settings
The Job Spool setting appears.
msh> spoolsw
Job Spool setting
msh> spoolsw spool {on|off}
• Specify “on” to enable Job Spool, or “off” to disable it.
Resetting Job spool setting
msh> spoolsw clear job {on|off}
• When the printer power is cut during job spooling, this determines whether to reprint the spooled
job.
Protocol configuration
msh> spoolsw diprint {on|off}
185
4. Monitoring and Configuring the Printer
ssdp
ssh
186
Remote Maintenance by telnet
status
syslog
Use the “syslog” command to display the information stored in the printer's system log.
View message
msh> syslog
upnp
Use the “upnp” command to display and configure the universal plug and play.
187
4. Monitoring and Configuring the Printer
web
Use the “web” command to display and configure parameters on Web Image Monitor.
View settings
4 msh> web
URL configuration
You can set URLs linked by clicking [URL] on Web Image Monitor.
msh> web “ID” url http:// “The URL or IP address you want to register”/
• Specify “1” or “2” for ID as the number corresponding to the URL. Up to two URLs can be
registered and specified.
Resetting URLs registered as link destinations
msh> web “ID” clear url
• Specify “1” or “2” for ID as the corresponding number to the URL.
Link name configuration
You can enter the name for URL that appears on Web Image Monitor.
msh> web “ID” name “Name you want to display”
• Specify “1” or “2” for ID the corresponding number to the link name.
Resetting URL names registered as link destinations
msh> web “ID” clear name
• Specify “1” or “2” for ID as the number corresponding to the link name.
Help URL Configuration
You can set URLs linked by clicking “?” on Web Image Monitor.
msh> web help http://“Help URL or IP address”/help/
Resetting Help URL
msh> web clear help
188
Remote Maintenance by telnet
wiconfig
mode {ap|802.11adhoc} You can set the infrastructure mode (ap) or the 802.11 Ad
hoc mode (802.11adhoc).
The default is the infrastructure mode.
ssid “ID value” You can specify an SSID in infrastructure mode. The
characters you can enter in the SSID string are ASCII
0x20-0x7e (32 bytes). If you do not specify a character
string, the machine will connect to the nearest access point.
The default SSID is blank.
channel frequency “channel no.” In 802.11 ad hoc mode, you can select a channel between
1 and 14, or 36, 40, 44, or 48.
Be sure to set the same channel for all ports that will transmit
and receive data.
The default is “11”.
key “key value” val [1|2|3|4] You can specify the WEP key when entering in hexadecimal.
With a 64-bit WEP, you can use 10 digit hexadecimals. With
a 128-bit WEP, you can use 26 digit hexadecimals.
Up to four WEP keys can be registered. Specify the number
to be registered with “val”.
When a WEP is specified by key, the WEP specified by key
phrase is overwritten.
To use this function, set the same key number and WEP key
for all ports that transmit data to each other. Put “0x”on the
front of WEP key.
189
4. Monitoring and Configuring the Printer
keyphrase “phrase” val [1|2|3|4] You can specify the WEP key when entering in ASCII.
With a 64-bit WEP, you can use 5 digit hexadecimals. With
a 128-bit WEP, you can use 13 digit hexadecimals.
Up to four WEP keys can be registered. Specify the number
to be registered with “val”.
When a WEP is specified by key phrase, the WEP specified
by key is overwritten.
4 To use this function, set the same key number and WEP key
for all ports that transmit data to each other.
You can omit the numbers with “val”. The key number is set
to1 when making these omissions. The default is blank.
encval [1|2|3|4] You can specify which of the four WEP keys is used for packet
encoding. “1” is set if a number is not specified.
wepauth {open|shared} You can set an authorization mode when using WEP. The
specified value and authorized mode are as follows:
open: open system authorized (default)
shared: shared key authorized rate
wpaenc {tkip|ccmp} You can specify WPA encryption key when using WPA
encryption.
tkip: TKIP
ccmp: CCMP (AES) (default)
wpaauth {wpapsk|wpa| You can specify the WPA authentication mode when using
wpa2psk|wpa2} WPA encryption.
wpapsk: WPA-PSK authentication (default)
wpa: WPA authentication
wpa2psk: WPA2-PSK authentication
190
Remote Maintenance by telnet
eap {tls|ttls|leap|peap} {chap| You can specify the EAP authentication type.
mschap|mschapv2|pap|md5| tls: EAP-TLS (default)
tls}
ttls: EAP-TTLS
leap: LEAP
peap: PEAP
4
chap, mschap, mschapv2, pap, md5, or tls are settings for
the phase 2 method, and must be set when using EAP-TTLS
or PEAP.
Do not make these settings when using other EAP
authentication types.
If you select EAP-TTLS, you can select chap, mschap,
mschapv2, pap, or md5.
If you select PEAP, you can select mschapv2 or tls.
username “character string” You can specify the login user name for the Radius server.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.
username2 “character string” You can specify the phase 2 username for EAP-TTLS/PEAP
phase 2 authentication.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.
domain “character string” You can specify the login domain name for the Radius server.
The characters you can enter are ASCII 0x20-0x7e (31
bytes), but not “@” or “\”.
The default is blank.
password “character string” You can specify the login for the Radius server.
Usable characters: ASCII 0x20-0x7e (128 bytes). The
default is blank.
191
4. Monitoring and Configuring the Printer
srvcert {on|off} You can set the server certificate. The default is “off”.
imca {on|off} You can enable or disable the certificate when the
intermediate certificate authority is present. The default is
“off”.
srvid “character string” You can set the server ID and subdomain of the certificate
server.
Usable characters: ASCII 0x20-0x7e (128 bytes). The
default is blank.
clear {a each command|all} Returns the selected setting to its default value.
If you specify “all”, all settings will be restored to their default
values.
miccheck {on|off} You can enable or disable the MIC check function.
The default setting is “On” (enabled).
If you specify “Off”, you cannot perform MIC checks. We
recommend you specify “On” for the MIC check function
when using this machine.
wins
192
Remote Maintenance by telnet
Address configuration
Use the following command to configure a WINS server IP address:
wins “interface_name” {primary|secondary} “IP address”
• Use the “primary” command to configure a primary WINS server IP address.
• Use the “secondary” command to configure a secondary WINS server IP address.
• Do not use “255.255.255.255” as the IP address. 4
NBT (NetBIOS over TCP/IP) Scope ID Selection
You can specify the NBT scope ID.
msh> wins “interface_name” scope “scope ID”
• The scope ID can be entered using up to 31 alphanumeric characters.
• Be sure to specify the interface.
• wlan can be specified only when the IEEE 802.11 interface is installed.
wsmfp
Use the “wsmfp” command to view and configure WSD (Device), WSD (Printer) and WSD (Scanner)
settings.
View settings
msh> wsmfp
Comment settings
msh> wsmfp comments “comment”
• If you do not specify a comment, current setting is displayed.
Location configuration
msh> wsmfp location “location”
• If you do not specify a comment, current setting is displayed.
193
4. Monitoring and Configuring the Printer
194
SNMP
SNMP
Using the SNMP manager, you can get information about the machine.
The SNMP agent operating on UDP and IPX is incorporated into the built-in Ethernet board and optional
IEEE 802.11 interface unit of this machine.
This machine also supports SNMPv3, which increases user authentication, data encryption, and access
control security.
To encrypt communication by SNMPv3, you must specify the machine's encrypted password.
• If you changed the machine's community name, change the configuration of the connected computer
accordingly, using SNMP Setup Tool. For details, see SNMP Setup Tool Help. 4
The default community names are [public] and [admin]. You can get MIB information using these community
names.
Start SNMP Setup Tool
• Windows 2000:
Click the [Start] button.
Point to [SmartDeviceMonitor for Admin] on the [Programs] menu.
Click [SNMP Setup Tool].
• Windows XP/Vista, Windows Server 2003/2003 R2/2008
Click the [Start] button.
Point to [SmartDeviceMonitor for Admin] on the [All Programs] menu.
Click [SNMP Setup Tool].
195
4. Monitoring and Configuring the Printer
This section explains how you can check the machine's status and the items displayed. Depending on the
options installed on the machine, some items might not be displayed.
• UNIX: Use the “lpq” command and “rsh”, “rcp”, “ftp”, and “sftp” parameters.
• mshell: Use the “status” command.
4 Messages Description
Cannot multi-install: SD Card The SD card has been configured using another
device.
Card/Counter not inserted The machine is waiting for prepaid card or key.
Coin or amount not inserted The machine is waiting for coin to be inserted.
Coin/Key Counter not inserted The machine is waiting for coin or key counter.
Cover Open: Duplex Unit The cover of the duplex unit is open.
196
Getting Printer Information over the Network
Messages Description
Cover Open: Lower Right Cover The lower right cover is open.
Error: Address Book An error has occurred in the data of the address
book.
Error: HDD Board A hard disk drive board error has occurred.
Error: Media Link Board An error has occurred on the File Format Converter.
Error: Optional Font An error has occurred in the font file of the machine.
Error: Optional RAM An error has occurred in the optional memory unit.
Error: Parallel I/F Board An error has occurred in the parallel interface.
Error: Rem. Certificate Renewal An error has occurred in the remote server renewal.
Error: USB Board An error has occurred in the USB interface board.
197
4. Monitoring and Configuring the Printer
Messages Description
Error: Wireless Card Wireless card is not inserted during start up, or the
IEEE 802.11 interface unit or the wireless card is
taken out after start up.
Immed. Trans. not connected It did not connect directly with the other party of the
4 transmission.
In Use: Input Tray The input tray is being used by other functions.
Key Card not inserted The machine is waiting for key card to be inserted.
Key Card/Counter not inserted The machine is waiting for key card or key counter
to be inserted.
Key Counter not inserted The machine is waiting for key counter to be left in
it.
Malfunction: Ext. Charge Unit There is a problem with the external charge unit.
Memory Low: Copy Memory shortage has occurred while the copy was
operating.
198
Getting Printer Information over the Network
Messages Description
Mismatch: Paper Size Indicated paper tray does not contain paper of
selected size.
Nearly Full: Log Data Capacity The log is nearing data capacity
Nearly Full: Waste Toner Bottle2 Waste toner bottle 2 is nearly full.
Not Detected: Duplex Unit The duplex feed unit is not correctly set.
Not Detected: Fusing Unit The fusing unit is not correctly set.
Not Detected: Input Tray The paper feed tray is not correctly set.
Not Detected: Transfer Unit The transfer unit is not correctly set.
Not Detected: WasteToner Bottle Waste toner bottle is not correctly set.
Not Detected: Int. Transfer Unit Int.transfer unit is not correctly set.
199
4. Monitoring and Configuring the Printer
Messages Description
Paper Misfeed: Duplex Unit The paper has jammed in Duplex Unit.
Prepaid Card not inserted The prepaid card is not inserted, or has insufficient
credit.
Proxy Address/Port Incorrect The proxy address and port setting is incorrect.
Proxy User /Password Incorrect The proxy user name and password setting is
incorrect.
Replace Transfer Cleaning Unit It is time to replace the transfer cleaning unit.
200
Getting Printer Information over the Network
Messages Description
Tray Error: Chaptering The paper feed tray specification error has
occurred because chaptering as well as the normal
paper use the same tray for printing.
Tray Error: Duplex Printing Selected paper tray cannot be used for duplex
printing.
Waiting for Job Suspension The machine is waiting for Job Suspension.
201
4. Monitoring and Configuring the Printer
Printer configuration
Input Tray
Item Description
Output Tray
Item Description
Printer Language
Item Description
202
Getting Printer Information over the Network
Item Description
• For details about UNIX commands and parameters, see UNIX Supplement.
203
4. Monitoring and Configuring the Printer
4 Item Description
• For details about UNIX commands and parameters, see UNIX Supplement.
204
Understanding the Displayed Information
Item Description
JobName (when designating Job ID on telnet) Name of the document for printing
Appears when the print request ID is specified.
• For details about UNIX commands and parameters, see UNIX Supplement.
205
4. Monitoring and Configuring the Printer
Item Description
Common
Mode
AppleTalk
IPv4
IPv6
4 IPsec
NetWare
SMB
Parallel
USB
Ethernet interface
Syslog priority
NVRAM version
Device name
Comment
Location
Contact
Soft switch
Mode
Net
Object
Type
206
Understanding the Displayed Information
Item Description
Zone
Mode (IPv4)
Mode (IPv6)
ftp
lpr
rsh 4
telnet
diprint
web
http
ftpc
snmp
ipp
autonet
Bonjour
ssl
nrs
rfu
nbt
ssdp
ssh
sftp
WSD (Device)
WSD (Printer)
207
4. Monitoring and Configuring the Printer
Item Description
WSD (Scanner)
rhpp
IPv4
DHCP
Address
Netmask
4 Broadcast
Gateway
IPv6
Stateless
Manual
Gateway
DHCPv6-lite
DUID
IPsec
Manual Mode
Excluded Protocol
https
dns
dhcp
wins
EncapType
Host name
DNS Domain
208
Understanding the Displayed Information
Item Description
IPv4
IPv6
Time Zone 4
SNTP Server polling time
RHPP Port
RHPP timeout
NetWare
EncapType
RPRINTER number
Context name
Switch
Mode
NDS/Bindery
209
4. Monitoring and Configuring the Printer
Item Description
Packet negotiation
Login Mode
Protocol
4 Transfer Protocol
Switch
Mode
Direct print
Notification
Workgroup name
Computer name
Comment
Protocol
Host Name
Communication Mode
SSID
Channel
Security
WEP Authentication
210
Understanding the Displayed Information
Item Description
WPA Encryption
WPA Authentication
Pre-Shared Key
User name
Domain name
EAP Type 4
Password
Server cert.
Intermediate CA
Server ID
Sub domain
MIC check
Ethernet
802.1X Authentication
IPv4
IPv6
211
4. Monitoring and Configuring the Printer
Item Description
Resolver Protocol
Domain name
ether
wlan
DDNS
ether
4 wlan
ether
Primary WINS
Secondary WINS
wlan
Primary WINS
Secondary WINS
UUID
Profile
TTL
URL
Location
212
Understanding the Displayed Information
Item Description
Priority (diprint)
Priority (lpr)
Priority (ipp)
IP TTL
IPP Port
SNMPv3
protocol
v1Trap
v2Trap
v3Trap
SNMPv3 Privacy
Compression
Port
TimeOut
Login TimeOut
IPv4
IPv6
213
4. Monitoring and Configuring the Printer
Item Description
Parallel
USB
LPR
Certificate
4 Verification
WS-MFP
Comments
Location
Presentation URL
MetadataVersion
UUID
User name
Domain name
EAP Type
Password
214
Understanding the Displayed Information
Item Description
Server cert
Intermediate CA
Server ID
Sub domain
215
4. Monitoring and Configuring the Printer
Message List
This is a list of messages that appear in the machine's system log. The system log can be viewed using the
“syslog” command.
Access to NetWare server <file server name> (In the print server mode) Login to the file server
denied. Either there is no account for this print server failed. Make sure that the print server is registered
on the NetWare server on password was incorrect. on the file server. If a password is specified for the
print server, delete it.
account is unavailable: encryption is impossible. Encryption is not possible and account is disabled.
This could be because:
• Security option is not installed.
• Encryption password has not been specified.
account is unavailable: same account name be User account is disabled. This could be because it
used. use the same account name as the administrator
account.
account is unavailable: The authentication User account is disabled. This could be because the
password is not set up. authentication password is not set, and only the
encryption account is set.
add_sess_IPv4: bad trap addr: <IPv4 address>, The IPv4 address (0.0.0.0.) is unavailable when the
community: <community name> community access type is TRAP. Specify the host
IPv4 address for the TRAP destination.
add_sess_IPv4: community <community name> The same community name already exists. Use
already defined. another community name.
add_sess_IPv6: bad trap addr: <IPv6 address>, The IPv6 address [::] is unavailable when the
community: <community name> community access type is TRAP. Specify the host
IPv6 address for the TRAP destination.
216
Message List
add_sess_IPv6: community <community name> The same community name already exists. Use
already defined. another community name.
add_sess_IPX: bad trap addr: <IPX address> The IPX address (00:00:00:00:00:00) is
community <community name> unavailable when the community access type is
TRAP. Specify the host IPX address for the TRAP
destination.
add_sess_IPX: community <community name> The same community name already exists. Use
already defined. another community name.
adjust time server <NTP server name> offset: xx sec. ncsd tells you the timing of the NTP server and
whether or not the time system clock is set.
4
Attach FileServer=<file server> Connection to the file server as the nearest server
has been established.
Attach to print queue <print queue name> (In the print server mode) Attached to the print
queue.
child process exec error! <process name> The network service failed to start. Turn the printer
off and then on. If this does not work, contact your
service or sales representative.
Connected DHCPv6 server <IPv6 address> The IP address was successfully received from the
DHCPv6 server.
connection from <IP address> A user logged in from the host <IP address>.
Could not attach to FileServer <error number> (In the remote printer mode) Connection to the file
server has not been established. The file server has
refused the connection. Check the file server
configuration.
Could not attach to PServer <print server> (In the remote printer mode) Connection to the print
server has not been established. The print server
has refused the connection. Check the print server
configuration.
217
4. Monitoring and Configuring the Printer
Current Interface Speed: <Ethernet I/F Speed> Speed of the Ethernet interface (10Mbps, 100
Mbps, or 1Gbps).
DHCPv6 server not found. The DHCPv6 server was not found. Make sure that
the DHCPv6 is on the network.
Duplicate IP=<IP address> (from<MAC address>). A conflicting IPv4 or IPv6 address was used. Each
IPv4 or IPv6 address must be unique.
Check the device address in [MAC address].
4 Established SPX Connection with PServer, (In the remote printer mode) Connection to the print
(RPSocket=<socket number>, server has been established.
connID=<connection ID>)
Exit pserver (In the print server mode) The print server function
is disabled because the necessary print server
settings have not been made.
IEEE 802.11 Card does NOT support WPA . A wireless card that does not support WPA is
installed. Install a wireless card that supports WPA.
IEEE 802.11 Card Firmware REV.<version> Displays the version number of the 802.11 card's
firmware.
IEEE 802.11 current channel <channel number> Displays the current channel number of the active
wireless card (in ad hoc and infrastructure mode).
IEEE 802.11 MAC Address = <MAC address> Displays the MAC address of the wireless interface.
IEEE 802.11 SSID <ssid> (AP MAC Address The MAC address and SSID of the access point are
<MAC address>) connected in infrastructure mode.
IEEE 802.11 <communication mode> mode Displays IEEE 802.11 communication mode.
(IKE phase-1) mismatched authentication type: This machine's <authentication type 1> in IKE phase
local=<authentication type 1> 1 does not match the communicating host's
remote=<authentication type 2> <authentication type 2>, Make sure this machine's
ISAKMP SA authentication type matches that of the
communicating host.
218
Message List
(IKE phase-1) mismatched encryption type: This machine's ISAKMP SA Oakley group
<encryption algorithm 1> remote=<encryption <encryption algorithm 1> in IKE phase 1 does not
algorithm 2> match the communicating host's ISAKMP SA
Oakley group < encryption algorithm 2>, Make
sure this machine's ISAKMP SA Oakley group
matches that of the communicating host.
(IKE phase-1) mismatched DH group: local=<DH This machine's ISAKMP SA Oakley group <DH
group number 1> remote=<DH group number 2> group number 1> in IKE phase 1 does not match
the communicating host's ISAKMP SA Oakley
group <DH group number 2>, Make sure this
machine's ISAKMP SA Oakley group matches that 4
of the communicating host.
(IKE phase-1) mismatched hash type: local=<Hash This machine's ISAKMP SA <Hash Algorithm 1> in
Algorithm 1> remote=<Hash Algorithm 2> IKE phase 1 does not match the communicating
host's ISAKMP SA <Hash Algorithm 2>, Make sure
this machine's ISAKMP SA Hash Algorithm matches
that of the communicating host.
IKE [% s] is disable, set PSK text The specified IKE entry invalid. Enter the PSK text.
< Interface > started with IP: < IP address > IP address (IPv4 or IPv6 address) has been set for
the interface and is operating.
job canceled. jobid=%d. The spooled job was canceled due to error or user
request.
Lease Time=<lease time>(sec), The resource lease time received from the DHCP
RenewTime=<renew time>(sec). server is displayed in [lease time] in seconds. The
renewal time is displayed in [renew time] in
seconds.
Login to fileserver <file server name> (<IPX|IP>), When the print server was online, the system
<NDS|BINDERY> logged in to <file server> in NDS or BINDERY
mode. The transfer protocol in use is also displayed.
Manual [% s ] is disable, set authentication key The specified manual SA entry could is invalid. Set
the authentication key.
Manual [% s ] is disable, set encryption key The specified manual SA entry could is invalid. Set
the authentication key.
219
4. Monitoring and Configuring the Printer
Name registration failed. name=<NetBIOS name> Name registration of <NetBIOS Name> failed.
Change to a different NetBIOS name.
Name registration success. WINS server=<WINS Name registration of <NetBIOS Name> to <WINS
server address> NetBIOS Name=<NetBIOS server address> was successful.
name>
npriter start. (NetWare) (In the remote printer mode) The NetWare service
4 has started.
Open log file <file name> (In the print server mode) The specified log file has
been opened.
Printer <printer name> has no queue (In the print server mode) The print queue is not
assigned to the printer. Using NWadmin, assign the
print queue to the printer, and then restart it.
Printer queue <print queue name> cannot be (In the print server mode) The print queue cannot
serviced by printer 0, <print server name> be established. Make sure that print queue exists
on the specified file server.
Print server <print server name> has no printer (In the print server mode) The printer is not assigned
to the print server. Using NWadmin, assign the
printer, and then restart it.
Print sessions full No more print jobs can be accepted. Wait a while
before sending any more print jobs.
pserver start. (NetWare) (In the print server mode) The NetWare service has
started.
Required file server (<file server name>) not found The required file server <file server name> could
not be found.
sap enable. saptype=<SAP type>, sapname=<SAP The SAP function was started. The SAP packet is
name> issued to advertise the service in the SAP table on
the NetWare server.
session_IPv4 <community name> not defined. The requested community name is not defined.
session_IPv6 <community name> not defined. The requested community name is not defined.
220
Message List
session_IPX <community name> not defined. The requested community name is not defined.
Set context to <NDS context name> The NDS context name <NDS context name> has
been set.
shutdown signal received. network service The network reboot process is starting.
rebooting...
Smbd start. (NetBIOS) SMBD (Server Message Block Daemon) has been
started.
SMTPC: failed to get smtp server ip-address. The SMTP server IP address could not be obtained.
This could be because: 4
• The specified DNS server could not be found.
• No connection to the network has been
established.
• The specified DNS server could not be found.
• An incorrect DNS server is specified.
• The specified SMTP server IP address could
not be found in the DNS server.
SMTPC: failed to connect smtp server. timeout. Connection to the SMTP server failed due to
timeout. This could be because the specified SMTP
server name is incorrect, or no connection to the
network has been established, or the network
configuration is incorrect, so there is no response
from the SMTP server. Check the SMTP server
name, or the network connection and
configuration.
SMTPC: refused connect by smtp server. Connection to the SMTP server is denied. This could
be because server other than the SMTP server has
been specified, or the specified SMTP server port
number is incorrect. Check the SMTP server name,
port number, or the SMTP server port number.
SMTPC: no smtp server. connection close. Connection to the SMTP server failed due to no
response from SMTP. This could be because a
server other than the SMTP server has been
specified, or the specified SMTP server port number
221
4. Monitoring and Configuring the Printer
SMTPC: failed to connect smtp server. Connection to the SMTP server failed. This could be
because no connection to the network has been
established, or the network configuration is
incorrect, so there is no response from the SMTP
server, or the specified SMTP server name is
incorrect, or the specified SMTP server IP address
could not be found in the DNS server, or a server
other than the SMTP server has been specified, or
4 the specified SMTP server port number is incorrect.
Check the DNS Server's IP address and SMTP
server's IP address, or the SMTP server name and
SMTP port number, or the SMTP server's SMTP port
number, or the network connection and
configuration.
SMTPC: username or password wasn't correct. Connection to the SMTP server failed, because the
[response code] (information) specified SMTP user name is incorrect, or the
specified SMTP password is incorrect. Check the
SMTP user name and password.
Snmp over IPv4 is ready Communication over IPv4 with snmp is available.
Snmp over IPv6 is ready. Communication over IPv6 with snmp is available.
Snmp over IPX is ready. Communication over IPX with snmp is available.
The print server received error <error number> Login to the file server failed when the print server
during attempt to log in to the network. Access to was online. The print server is not registered or a
the network was denied. Verify that the print server password is specified. Register the print server
name and password are correct. without specifying a password.
trap account is unavailable. v3Trap cannot be sent. This could be because the
Trap destination account is different from the
account specified by the printer.
Updated (option name)(value) via DHCPv6 Server The parameter obtained from the DHCP server has
been updated.
222
Message List
WINS name registration: No response to server There was no response from the WINS server.
(WINS server address) Check that the correct WINS server address is
entered. Also, check that the WINS server is
functioning properly.
WINS wrong scope ID=<scope ID> The scope ID is invalid. Use a valid scope ID.
write error occurred. (diskfull) A “diskfull” error occurred while the machine was
writing to the spool file. Wait for the current print
job to finish, When it finishes, more HDD space will
be available. Only pages that were spooled when
the error occurred will be printed. 4
write error occurred. (fatal) A fatal error occurred while the printer was writing
to the spool file. Turn off the power of the printer,
and then turn it on again. If the error recurs, contact
your service representative. The print job that was
being spooled when the error occurred will not be
printed.
#[nfa (process ID)] <time date> + Failed to send An error occurred while trying to send a log file to
logos to a log collection server <IP address>. both the primary and secondary log collection
servers.
#[nfa (process ID)] <time date> + Failed to send 60 minutes has passed since the last log entry.
logs to a collection server <IP address> n time(s) in During that time, an error occurred while trying to
1 hour. send the log file to both the primary and secondary
log collection servers.
• For details about UNIX commands and parameters, see UNIX Supplement.
223
4. Monitoring and Configuring the Printer
224
5. Registering Addresses and Users for
Facsimile/Scanner Functions
This chapter describes how to register destinations and users in the Address Book. For details on how to
access System Settings, see "Accessing System Settings ".
Address Book
This section describes Address Book settings.
Registering information such as the names of users and their e-mail addresses in the Address Book allows
you to manage them easily.
• Address Book data is stored on the hard disk. It can be lost if there is some kind of hard disk failure.
• The manufacturer shall not be held responsible for any damages resulting in data loss.
5
You can register and manage the following items in the Address Book:
Name
You can register the name of the user and the key display. This is the basic information required for
managing users of the machine.
To register a fax number or e-mail address in the address book, you must register information such
as the user name and destination name in advance.
225
5. Registering Addresses and Users for Facsimile/Scanner Functions
Fax Settings
You can register fax numbers, line, fax header and select label insertion.
When using IP-Fax, you can register the IP-Fax destination and select the protocol.
E-mail Settings
5 You can register e-mail destinations in the Address Book.
• FTP
• NCP
226
Address Book
Register Group to
You can put registered e-mail and folder destinations into a group for easier management.
• You can also use Web Image Monitor to register names in the Address Book. With
SmartDeviceMonitor for Admin, you can register multiple names at the same time. For details about 5
using Web Image Monitor, see Web Image Monitor Help.
• Using Address Management Tool in SmartDeviceMonitor for Admin, you can backup Address Book
data. We recommend backing up data when using the Address Book. For operating instructions, see
SmartDeviceMonitor for Admin Help.
By registering a name and key display beforehand, you can specify e-mail and folder destinations simply
by selecting the name key.
Register a fax number in the Address Book so you can specify it only by selecting the fax destination, shown
on the fax initial display when sending a fax. When label insertion is set to "On", the receiver's name is
printed on the fax message when it is received at the other end.
By registering IP-Fax destinations in the Address Book, you can specify a destination simply by selecting it
from the destinations that appear in the initial fax display. Registered IP-Fax numbers can be used and
printed as sender's IP-Fax numbers.
227
5. Registering Addresses and Users for Facsimile/Scanner Functions
By registering e-mail addresses in the Address Book, you can specify e-mail destinations simply by selecting
them from the fax initial display when sending a document by Internet fax or e-mail.
You can also specify an e-mail address by selecting the destination shown on the initial scanner display
when sending a document using the scanner function. A registered e-mail address can be used as the
sender's address, and the sender's addresses are automatically entered in the "From" field of an e-mail
header.
5 After registering the path name, user name and password, you can connect to a shared folder simply by
selecting the destination shown on the initial facsimile display whenever sending files using the facsimile
function to a shared folder. You can also connect to a shared folder by selecting the destination shown on
the initial scanner display whenever sending files using the scanner function.
To share the folder using Windows, select the SMB protocol.
To register the folder to the FTP server, select the FTP protocol.
To register the folder to the NetWare server, select the NCP protocol.
After registering a protection code, you can specify the object of protection to prevent an e-mail destination
from being used without permission.
You can prevent unauthorized access to registered folders.
Register user codes to limit users to the following functions and check their use of each function:
• Copier
• Facsimile
228
Address Book
• Printer
• Scanner
229
5. Registering Addresses and Users for Facsimile/Scanner Functions
Registering Names
Register user information including their names.
The user name is useful for selecting a destination when sending faxes.
You can register up to 150 names.
Registering Names
3. Select [Administrator Tools] using [ ] and [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] and [ ], and then press the [OK] key.
5. Select [Program/Change] using [ ] and [ ], and then press the [OK] key.
230
Registering Names
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
When you register a new Reg. No., currently available numbers are automatically displayed.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
7. Enter the name, and then press the [OK] key.
For the user name, up to 20 characters are usable.
5
8. Press the [OK] key.
231
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select [Administrator Tools] using [ ] and [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] and [ ], and then press the [OK] key.
5. Select [Program/Change] using [ ] and [ ], and then press the [OK] key.
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
If you do not wish to change the registration number, proceed to the next step.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, registration number, user code, fax destination, E-mail address,
folder name.
7. Enter the new name, and then press the [OK] key.
232
Registering Names
3. Select [Administrator Tools] using [ ] and [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] and [ ], and then press the [OK] key.
233
5. Registering Addresses and Users for Facsimile/Scanner Functions
5. Select [Delete] using [ ] and [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001- 016 by pressing the Quick Dial key.
5 Press [Search] to search by name, destination list, registration number, user code, fax number.
7. Press [Yes].
234
Authentication Information
Authentication Information
Following describes the procedure for authenticating a user code.
• The functions associated with each user code are the same. If you change or delete user codes,
management data and limits associated with that code become invalid.
Register user codes to limit users to the following functions and check their use of each function:
• Copier
• Facsimile
• Printer
• Scanner
235
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
236
Authentication Information
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [User Code] using [ ] or [ ], and then press the [OK] key.
11. Enter the user code using the number keys, and then press the [OK] key.
If you have entered a wrong code, press the [Clear/Stop] key and then enter the correct code again.
You can use up to eight digits for specifying the user code.
12. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.
13. Select the function you want to set the user code for using [ ], and then press the [OK] key.
237
5. Registering Addresses and Users for Facsimile/Scanner Functions
• Even if you change a user code, the counter value will not be cleared.
238
Authentication Information
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001- 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
239
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [User Code] using [ ] or [ ], and then press the [OK] key.
11. Enter the new user code using the number keys, and then Press the [OK] key.
12. Select permit Functions on Auth. using [ ] or [ ], and then press the [OK] key.
13. Check the registered function you want to change the user code for, and then press the [OK]
key.
To select the check box, use [ ]. To clear the check box, use [ ].
240
Authentication Information
• To change the name, key display and title, see "Registering Name".
241
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys, and then press the
[OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
242
Authentication Information
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [User Code] using [ ] or [ ], and then press the [OK] key.
11. Press the [Clear/Stop] key to the user code, and then press the [OK] key.
243
5. Registering Addresses and Users for Facsimile/Scanner Functions
• To delete a name from the Address Book entirely, see "Registering Name".
This section describes how to display the counter for each user.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Press [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.
244
Authentication Information
6. Select the function you want to display the counter for using [ ] or [ ], and then press the
[OK] key.
This section describes how to display the counter for each user.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Press [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.
245
5. Registering Addresses and Users for Facsimile/Scanner Functions
6. Select [Per User] using [ ] or [ ], and then press the [OK] key.
7. Select the method of user selection using [ ] or [ ], and then press the [OK] key.
If you select Display Destination List in step 7, confirm the user code using [ ] and then press the [OK]
key.
9. Select the function you want to print the counter for using [ ] or [ ], then confirm it by
pressing [ ], and then press the [OK] key.
246
Authentication Information
This section describes how to print the counter for all users.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.
247
5. Registering Addresses and Users for Facsimile/Scanner Functions
6. Select [All Users] using [ ] or [ ], and then press the [OK] key.
7. Select the function you want to print the counter for using [ ] or [ ], and then confirm it by
pressing [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
248
Authentication Information
4. Select [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.
6. Select [Per User] using [ ] or [ ], and then press the [OK] key.
7. Select the method of user selection using [ ] or [ ], and then press the [OK] key.
If you select Display Destination List in step 7, confirm the user code using [ ] and then press the [OK]
key.
249
5. Registering Addresses and Users for Facsimile/Scanner Functions
9. Select the function you want to clear the counter for using [ ] or [ ], then confirm it by
pressing [ ], and then press the [OK] key.
11. If you want to clear the counter for all users, select [All Users] using [ ] or [ ], and then
5 press the [OK] key.
12. Select the function you want to clear the counter for using [ ] or [ ], then confirm it by
pressing [ ], and then press the [OK] key.
250
Fax Destination
Fax Destination
This section describes the procedure for registering, changing, and deleting Fax Destinations.
Register a fax destination so you do not need to enter fax numbers each time, and can send documents
that have been scanned in using the facsimile function.
• It is easy to select the fax destination if you register "Name" for the fax destination.
• You can register fax destinations as a group.
• You can register fax destinations by selecting them from redial function.
• Registered Fax numbers can be used as sender's Fax numbers.
There are two types of fax destination, as shown below:
• Fax Destination
Select this to send the fax over the telephone network.
• IP-Fax Destination 5
Select this to send the fax to a machine on a TCP/IP network.
You cannot send the fax to a machine on another network if that network is behind a firewall.
You can program the following items in a fax destination:
Fax number
Registers the destination's fax number. You can enter a fax number using up to 128 digits. You must
include every digit in the number.
SUB Code
Registering a SUB Code allows you to use Confidential Transmission to send messages to the other
fax machines which support a similar function called "SUB Code". See "SUB Code", Facsimile
Reference.
SEP Code
Registering a SEP Code allows you to use Polling Reception to receive faxes from the other fax
machines which support Polling Reception. See "SEP Code", Facsimile Reference.
International TX mode
When setting the International TX mode to [On], the machine transmits more carefully by lowering
transmission speed. However, communication times increase.
Label insertion
Use label insertion to print information such as the destination name on the sheet printed out at the
destination.
Data is printed as follows:
• Destination Name
251
5. Registering Addresses and Users for Facsimile/Scanner Functions
The destination name specified in [Fax Destination] is printed with "To" before it at the top of the
sheet.
You can program the following items in an IP-Fax Destination:
IP-Fax
Register the IP-Fax destination. You can register the name using up to 128 characters. You must make
this setting when using IP-Fax.
This setting only works if the IP-Fax function has been selected.
SUB Code
Registering a SUB Code allows you to use Confidential Transmission to send messages to the other
fax machines which support a similar function called "SUB Code". See "SUB Code", Facsimile
Reference.
SEP Code
Registering a SEP Code allows you to use Polling Reception to receive faxes from the other fax
5 machines which support Polling Reception. See "SEP Code", Facsimile Reference.
Select Protocol
Select the protocol for the IP-Fax transmission.
This setting only works if the IP-Fax function has been selected.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
252
Fax Destination
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
5
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
253
5. Registering Addresses and Users for Facsimile/Scanner Functions
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
10. Enter the fax number using the number keys, and then press the [OK] key.
11. Specify optional settings such as "SUB Code", "SEP Code", "International TX Mode", and
"Label Insertion".
5 12. Press [End].
• After entering a fax number, be sure to press the [OK] key. If you press the [Escape] key without
pressing the [OK] key, the entered number is not registered.
• To register the name, see "Registering Names".
• When a group is registered, you can also add this fax destination to the group. For details about
registering groups, see "Registering Names to a Group".
254
Fax Destination
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
255
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
256
Fax Destination
1. Press [Details].
2. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.
3. Select [Register as] using [ ] or [ ], and then press the [OK] key.
4. Select [Sender Only] using [ ] or [ ], and then press the [OK] key.
6. Press [End].
257
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Enter the new fax number using the number keys, and then press the [OK] key.
1. Press [Option].
5
2. Select [SUB Code] using [ ] or [ ], and then press the [OK] key.
3. Enter the SUB Code using the number keys, and then press the [OK] key.
4. Enter the password using the number keys and then press the [OK] key.
258
Fax Destination
5. Press [Exit].
1. Press [Option].
5
2. Select [SEP Code] using [ ] or [ ], and then press the [OK] key.
3. Enter the SUB Code using the number keys, and then press the [OK] key.
4. Enter the password using the number keys and then press the [OK] key.
5. Press [Exit].
259
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Press [Option].
2. Select [International TX Mode] using [ ] or [ ], and then press the [OK] key.
5
3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
4. Press [Exit].
1. Press [Option].
260
Fax Destination
2. Select [Label Insertion] using [ ] or [ ], and then press the [OK] key.
3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
4. Press [Exit].
1. Press [Tone].
261
5. Registering Addresses and Users for Facsimile/Scanner Functions
• If you delete a destination that is a specified delivery destination, messages to its registered Personal
Box, for example, cannot be delivered. Be sure to check the settings in the fax function before deleting
any destinations.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
262
Fax Destination
8. Press [Details].
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
10. Press the [Clear/Stop] key to delete the fax number, and then press the [OK] key.
263
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
264
Fax Destination
8. Press [Details].
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
11. Select the protocol using [ ] or [ ], and then press the [OK] key.
12. Enter the IP-Fax destination, and then press the [OK] key.
265
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
266
Fax Destination
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
5
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
267
5. Registering Addresses and Users for Facsimile/Scanner Functions
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
• To change the name, key display and title, see "Registering Names".
1. Press [IP].
2. Select the protocol using [ ] or [ ], and then press the [OK] key.
268
Fax Destination
3. Enter the new IP-Fax destination and then press the [OK] key.
1. Press [Option].
5
2. Select [SUB Code] using [ ] or [ ], and then press the [OK] key.
3. Enter the SUB Code using the number keys, and then press the [OK] key.
4. Enter the password using the number keys and then press the [OK] key.
5. Press [Exit].
269
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Press [Option].
2. Select [SEP Code] using [ ] or [ ], and then press the [OK] key.
5
3. Enter the SUB Code using the number keys, and then press the [OK] key.
4. Enter the password using the number keys and then press the [OK] key.
5. Press [Exit].
270
Fax Destination
1. Press [Option].
2. Select [Label Insertion] using [ ] or [ ], and then press the [OK] key.
3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
4. Press [Exit].
271
5. Registering Addresses and Users for Facsimile/Scanner Functions
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
272
Fax Destination
8. Press [Details].
9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.
11. Press the [Clear/Stop] key to delete the IP-Fax destination, then press the [OK] key twice.
12. Press [End].
273
5. Registering Addresses and Users for Facsimile/Scanner Functions
E-mail Destination
This section describes the procedure for registering, changing, and deleting E-mail Destination.
Register e-mail destinations so you do not need to enter an e-mail address every time, and can send scan
files from scanner or fax function by e-mail.
• It is easy to select the e-mail destination if you register "User (Destination) Name" as the e-mail
destination.
• You can register e-mail destinations as a group.
• You can use the e-mail address as the sender's address when sending scan files in scanner mode. If
you want to do this, set a protection code on the sender address to prevent unauthorized access.
• You can select an e-mail address from an LDAP server, and then register it in the Address Book. See
• When using a e-mail destination as the sender, you must register the user code previously.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
274
E-mail Destination
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
5
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
275
5. Registering Addresses and Users for Facsimile/Scanner Functions
9. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.
10. Enter the e-mail address using the number keys and the Quick Dial keys, and then press the
[OK] key.
11. Select [E-mail/Internet Fax Dest.] or [Internet Fax Dest. only] using [ ] or [ ], and then press
5 the [OK] key.
12. Select [On] or [Off] to specify whether or not SMTP server is to be used using [ ] or [ ], and
then press the [OK] key.
276
E-mail Destination
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
5
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
277
5. Registering Addresses and Users for Facsimile/Scanner Functions
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
5
9. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.
10. Enter the new e-mail address using the number keys and the Quick Dial keys, and then press
the [OK] key.
11. Select [E-mail/Internet Fax Dest.] or [Internet Fax Dest. only] using [ ] or [ ], and then press
the [OK] key.
278
E-mail Destination
12. Select [On] or [Off] to specify whether or not SMTP server is to be used using [ ] or [ ], and
then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
279
5. Registering Addresses and Users for Facsimile/Scanner Functions
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
5
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
280
E-mail Destination
9. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.
10. Press the [Clear/Stop] key to delete the mail address, then press the [OK] key.
281
5. Registering Addresses and Users for Facsimile/Scanner Functions
Registering Folders
This section describes the procedure for registering, changing, and deleting folders.
By registering a shared folder, you can send scan files or received fax documents to it directly.
There are three types of protocol you can use:
• SMB
For sending files to shared Windows folders.
• FTP
Use when sending files to an FTP server.
• NCP
Use when sending files to a NetWare server.
5 • For details about protocols, server names, and folder levels, consult your network administrator.
• You can prevent unauthorized users from accessing folders from the machine. See "Registering a
Protection Code".
• You can only select either SMB, FTP, or NCP. If you change protocol after finishing your settings, all
previous entries are cleared.
282
Registering Folders
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
283
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [Folder Authentication] using [ ] or [ ], and then press the [OK] key.
11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].
12. Enter the login user name, and then press the [OK] key.
284
Registering Folders
14. Enter the password, and then press the [OK] key.
15. Enter the password again to confirm, and then press the [OK] key.
18. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
19. Select [SMB] using [ ] or [ ], and then press the [OK] key.
285
5. Registering Addresses and Users for Facsimile/Scanner Functions
20. Select [Manual Entry] or [Browse Network] using [ ] or [ ], and then press the [OK] key.
To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
21. Press [Com.Test] to check the path is set correctly.
286
Registering Folders
1. Select [Manual Entry] using [ ] or [ ], and then press the [OK] key. 5
If the format of the entered path is not correct, a message appears. Press [Exit], and then enter the
path again.
287
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Select [Browse Network] using [ ] or [ ], and then press the [OK] key.
2. Select a work group using the scroll keys, and then press the [OK] key.
The client computers sharing the same network as the machine appear.
Network display only lists client computers you are authorized to access.
5 3. Select a client computer using the scroll keys, and then press the [OK] key.
Shared folders under it appear.
288
Registering Folders
If you have not specified folder authentication, or if an incorrect user name or password has been entered
for folder authentication, the login screen appears.
1. Enter the login user name, and then press the [OK] key.
Enter the login user name specified for folder authentication.
5
The path to the selected folder appears.
If a message appears, press [Exit], and then enter the login user name and password again.
This section describes how to change settings of the registered SMB folder.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
289
5. Registering Addresses and Users for Facsimile/Scanner Functions
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
5
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
290
Registering Folders
9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
10. Select [SMB] using [ ] or [ ], and then press the [OK] key.
11. Select [Manual Entry] or [Browse Network] using [ ] or [ ], and then press the [OK] key.
To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
12. Specify the folder.
291
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Select [FTP] or [NCP] using [ ] or [ ], and then press the [OK] key.
292
Registering Folders
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
293
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
10. Select the protocol which is not currently selected using [ ] or [ ], and then press the [OK]
key.
294
Registering Folders
5
Registering an FTP Folder
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
295
5. Registering Addresses and Users for Facsimile/Scanner Functions
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
5 Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
296
Registering Folders
10. Select [Folder Authentication] using [ ] or [ ], and then press the [OK] key.
11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].
12. Enter the login user name, and then press the [OK] key.
14. Enter the password, and then press the [OK] key.
15. Enter the password again to confirm, and then press the [OK] key.
297
5. Registering Addresses and Users for Facsimile/Scanner Functions
18. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
19. Select [FTP] using [ ] or [ ], and then press the [OK] key.
20. Enter the server name, and then press the [OK] key.
21. If you want to change the port number, enter the new port number, and then press the [OK]
key.
Otherwise, just press the [OK] key.
298
Registering Folders
22. Enter the path, and then press the [OK] key.
299
5. Registering Addresses and Users for Facsimile/Scanner Functions
5
Changing an FTP Folder
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
300
Registering Folders
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
301
5. Registering Addresses and Users for Facsimile/Scanner Functions
10. Select [FTP] using [ ] or [ ], and then press the [OK] key.
11. To change the server name, enter the new server name, and then press the [OK] key.
Otherwise, just press the [OK] key.
12. To change the port number, enter the new port number, and then press the [OK] key.
5 Otherwise, just press the [OK] key.
13. To change the path, enter the new path, and then press the [OK] key.
Otherwise, just press the [OK] key.
302
Registering Folders
1. Select [SMB] or [NCP] using [ ] or [ ], and then press the [OK] key.
303
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
304
Registering Folders
8. Press [Details].
9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
10. Select the protocol which is not currently selected using [ ] or [ ], and then press the [OK]
key.
305
5. Registering Addresses and Users for Facsimile/Scanner Functions
5
Registering an NCP Folder
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
306
Registering Folders
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
307
5. Registering Addresses and Users for Facsimile/Scanner Functions
10. Select [Folder Authentication] using [ ] or [ ], and then press the [OK] key.
11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].
12. Enter the login user name, and then press the [OK] key.
14. Enter the password, and then press the [OK] key.
15. Enter the password again to confirm, and then press the [OK] key.
308
Registering Folders
18. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
19. Select [NCP] using [ ] or [ ], and then press the [OK] key.
20. Select the connection type using [ ] or [ ], and then press the [OK] key.
If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a
NetWare server, press [Bindery].
21. Select Manual Entry or Browse Network to specify the path entry method using [ ] or [ ],
and then press the [OK] key.
309
5. Registering Addresses and Users for Facsimile/Scanner Functions
To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
22. Press [Com.Test] to check the path is set correctly.
310
Registering Folders
• When [Do not Specify] is selected, the NCP User Name and NCP Password that you have specified
in Default User Name/Password (Send) of File Transfer settings applies.
• If User Authentication is specified, contact your administrator.
1. Select [Manual Entry] using [ ] or [ ], and then press the [OK] key.
• If you set "Connection Type" to [NDS], and if the NDS tree name is "tree", the name of the context
including the volume is "context", the volume name is "volume" and the folder name is "folder", then
the path will be "\\tree\volume. context\folder".
• If you set "Connection Type" to [Bindery], and if the NetWare server name is "server", the volume
name is "volume" and the folder name is "folder", then the path will be "\\server\volume\folder".
• You can enter a path using up to 256 characters.
• If the connection test fails, check the settings, and then try again.
311
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Select [Browse Network] using [ ] or [ ], and then press the [OK] key.
2. If you have set "Connection Type" to [NDS], a list of items in the NDS tree appears. If you
have set "Connection Type" to [Bindery], a list of items on the NetWare server appears.
3. Search for the destination folder in the NDS tree or NetWare server, and then press [Apply].
5
• Only the folders you are allowed to access appear in [Browse Network].
• If the languages used on the machine and the destination you want to view differ, the items in the list
may not appear correctly.
• Up to 100 items can be displayed in the list.
312
Registering Folders
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
313
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
10. Select [NCP] using [ ] or [ ], and then press the [OK] key.
11. Select the connection type using [ ] or [ ], and then press the [OK] key.
If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a
NetWare server, press [Bindery].
12. Select [Manual Entry] or [Browse Network] to specify the path entry method using [ ] or
[ ], and then press the [OK] key.
314
Registering Folders
To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
13. Specify the folder.
315
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Select [SMB] or [FTP] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
316
Registering Folders
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
5
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
317
5. Registering Addresses and Users for Facsimile/Scanner Functions
9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.
10. Select the protocol which is not currently selected using [ ] or [ ], and then press the [OK]
key.
318
Registering Names to a Group
• When using Scan to Folder function, you cannot send scan files to a group with over 10 folders
registered.
• The maximum number of destinations registerable to a group is 100.
• You can set a protection code to prevent unauthorized access to the folders registered in a group.
For details, see "Registering a Protection Code". 5
• p.230 "Registering Names"
Registering a Group
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
319
5. Registering Addresses and Users for Facsimile/Scanner Functions
4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
5
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
7. Enter the group name, and then press the [OK] key.
320
Registering Names to a Group
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
5
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
321
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.
10. Select the group name to which you want to register using [ ], and then press the [OK] key.
322
Registering Names to a Group
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number of the group that you want to put into another group using
the number keys or the Quick Dial keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.
7. Press the [OK] key.
323
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.
10. Select the group name to which you want to register using [ ] or [ ], and then press the
[OK] key.
5
324
Registering Names to a Group
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to display using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.
7. Press the [OK] key.
325
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Programd. User/Group] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
326
Registering Names to a Group
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.
327
5. Registering Addresses and Users for Facsimile/Scanner Functions
10. Select the group name from which you want to delete using [ ] or [ ], and then press the
[OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
328
Registering Names to a Group
6. Enter the registration number of the group that you want to delete from using the number
keys or the Quick Dial keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number. 5
7. Press the [OK] key.
8. Press [Details].
9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.
329
5. Registering Addresses and Users for Facsimile/Scanner Functions
10. Select the group you want to delete using [ ] or [ ], then confirm it by pressing [ ], and
then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
330
Registering Names to a Group
6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number. 5
7. Enter the new group name using the number keys and the Quick Dial keys, and then press
the [OK] key.
9. Enter the new registration number using the number keys or the Quick Dial keys, and then
press the [OK] key.
331
5. Registering Addresses and Users for Facsimile/Scanner Functions
Deleting a Group
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.
332
Registering Names to a Group
7. Press [Yes].
333
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
334
Registering a Protection Code
6. Enter the registration number you want to protect using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.
335
5. Registering Addresses and Users for Facsimile/Scanner Functions
10. Select [Register as] using [ ] or [ ], and then press the [OK] key.
11. Select [Destination Only], [Sender Only] or [Dest. & Sender] using [ ] or [ ], and then press
the [OK] key.
12. Select [Dest.Protect Obj.] using [ ] or [ ], and then press the [OK] key.
5
13. Select [Folder] or [Sender] using [ ] or [ ], and then press the [OK] key.
If you select [Destination Only] in [Register as], only [Folder] can be selected.
If you select [Sender Only] in [Register as], only [Sender] can be selected.
14. Select [Protect] or [Do not protect] using [ ] or [ ], and then press the [OK] key.
[Protect] or [Do not protect] can be selected for both [Folder] and [Sender] at the same time.
15. Press the [Escape] key.
336
Registering a Protection Code
16. Select [Dest.Protect Code] using [ ] or [ ], and then press the [OK] key.
17. Enter a protection code using the number keys, and then press the [OK] key.
• Specify a protection code of up to eight digits. You can also specify "Protection" without specifying a
protection code.
337
5. Registering Addresses and Users for Facsimile/Scanner Functions
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number of group you want to protect using the number keys or the
Quick Dial keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.
7. Press the [OK] key.
338
Registering a Protection Code
8. Press [Details].
9. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.
10. Select [Folder Protect] using [ ] or [ ], and then press the [OK] key.
11. Select [On] using [ ] or [ ], and then press the [OK] key.
12. Select [Dest.Protect Code] using [ ] or [ ], and then press the [OK] key.
13. Enter a protection code using the number keys, and then press the [OK] key.
339
5. Registering Addresses and Users for Facsimile/Scanner Functions
5 • Specify a protection code of up to eight digits. You can also specify "Protection" without specifying a
protection code.
340
Registering SMTP and LDAP Authentication
SMTP Authentication
• When [Do not Specify] is selected for SMTP Authentication the User Name and Password that you
have specified in SMTP Authentication of File Transfer settings applies. For details, see "File Transfer".
5
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
341
5. Registering Addresses and Users for Facsimile/Scanner Functions
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
5
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [SMTP Authentication] using [ ] or [ ], and then press the [OK] key.
342
Registering SMTP and LDAP Authentication
11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].
12. Enter the login user name, and then press the [OK] key.
14. Enter the password, and then press the [OK] key.
15. Enter the password again to confirm, and then press the [OK] key.
343
5. Registering Addresses and Users for Facsimile/Scanner Functions
LDAP Authentication
• When [Do not Specify] is selected for LDAP Authentication, the User Name and Password that you
have specified in Program/Change LDAP Server of Administrator Tools settings applies. For details,
see "Programming the LDAP server".
344
Registering SMTP and LDAP Authentication
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.
345
5. Registering Addresses and Users for Facsimile/Scanner Functions
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [LDAP Authentication] using [ ] or [ ], and then press the [OK] key.
11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].
12. Enter the login user name, and then press the [OK] key.
346
Registering SMTP and LDAP Authentication
14. Enter the password, and then press the [OK] key.
15. Enter the password again to confirm, and then press the [OK] key.
347
5. Registering Addresses and Users for Facsimile/Scanner Functions
Searching
This section describes explains how to search for a user name or destination registration registered in the
address book.
You can search for the user information stored in [Address Book Management] under [Administrator Tools]
in [System Settings] by displaying a list. Alternatively, you can search by name, registration number, user
code, or fax number.
For details, about accessing Address Book Management, see “Registering Names”.
Searching by Name
5 Search the address book using a destination or user name.
1. Press [Search].
2. Select [Search by Name] using [ ] or [ ], and then press the [OK] key.
3. Enter the name you want to search for, and then press the [OK] key. You can also search
by entering part of the name.
348
Searching
5
• For details about entering text, see “Entering Text”, About This Machine.
Search the address book by displaying a list of registered user names and destinations.
1. Press [Search].
2. Select [Display List] using [ ] or [ ], and then press the [OK] key.
The list of registered user names or destination names appears.
349
5. Registering Addresses and Users for Facsimile/Scanner Functions
3. Select the destination using [ ] or [ ], then confirm it by pressing [ ], and then press the
[OK] key.
• For details about entering text, see “Entering Text”, About This Machine.
Search the address book using the registration number of a user destination.
5 1. Press [Search].
2. Select [Search by Registration No.] using [ ] or [ ], and then press the [OK] key.
3. Enter the registration number you want to search using the number keys, and then press the
[OK] key.
4. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.
350
Searching
1. Press [Search].
2. Select [Search by User Code] using [ ] or [ ], and then press the [OK] key.
5
3. Enter the user code you want to search using the number keys, and then press the [OK] key.
4. Press the [OK] key.
The search results appear.
5. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.
351
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Press [Search].
2. Select [Search Fax Destination] using [ ] or [ ], and then press the [OK] key.
3. Enter the fax number you want to search using the number keys, and then press the [OK]
key.
5 To search by IP-Fax number, press [IP], enter the IP-Fax number, and then press the [OK] key.
352
Searching
1. Press [Search].
2. Select [Search by E-mail Address] using [ ] or [ ], and then press the [OK] key.
3. Enter the e-mail address you want to search for, and then press the [OK] key.
You can also search by entering part of the e-mail address.
5
353
5. Registering Addresses and Users for Facsimile/Scanner Functions
1. Press [Search].
2. Select [Search by Folder Name] using [ ] or [ ], and then press the [OK] key.
3. Enter the destination folder name, and then press the [OK] key.
You can also search by entering part of the destination folder name.
5
354
6. Special Operations under Windows
This chapter describes how to print files directly from Windows.
Setup
When a host name is defined, you can specify a printer by host name instead of IP address. The host names
vary depending on the network environment.
355
6. Special Operations under Windows
In other cases
Add the IP address and host name of the network printer to the hosts file on the computer used for printing.
Methods of addition vary depending on operating systems.
1. Open the hosts file using memo pad files, for instance.
The hosts file is in the following folder:
\WINNT\SYSTEM32\DRIVERS\ETC\HOSTS
“\WINNT” is the directory of the installation destination for Windows 2000/XP, and Windows
Server 2003/2003 R2/2008.
2. Add an IPv4 or IPv6address and host name to the hosts file using the following format:
192.168.15.16 host # NP
“192.168.15.16” is the IPv4 address, “host” is the printer's host name, and “#NP” is replaced by
6 comments. Insert a space or tab between “192.168.15.16” and “host”, between “host” and “#NP”
respectively, using one line for this format.
2001:DB::100 host # NP
“2001:DB::100” is the IPv6 address, “host” is the printer's host name, and “#NP” is replaced by
comments. Insert a space or tab between “2001:DB::100” and “host”, between “host” and “#NP”
respectively, using one line for this format.
3. Save the file.
• When using a host name under Windows Server 2003/2003 R2/2008, or Windows Vista with
IPv6 protocol, perform host name resolution using an external DNS server. The host file cannot be
used.
Printing Commands
The following explains printing operations using the “lpr”, “rcp”, “ftp” and “sftp” commands.
Enter commands using the command prompt window. The location of the command prompts varies
depending on operating systems:
• Windows 2000
[Start] - [Programs] - [Accessories] - [Command Prompt]
• Windows XP/Vista, Windows Server 2003/2003 R2/2008
[Start] - [All Programs] - [Accessories] - [Command Prompt]
356
Printing Files Directly from Windows
• Match the data format of the file to be printed with the emulation mode of the printer.
• If the message "print requests full" appears, no print jobs can be accepted. Try again when sessions
end. For each command, the amount of possible sessions is indicated as follows:
• lpr: 5(When the spool printing function is available: 10)
• rcp, rsh: 5
• ftp: 3
• sftp: 3
• Enter the file name in a format including the path from the directory executing commands.
lpr
When specifying a printer by IP address
c:> lpr -Sprinter's IP address [-Poption] [-ol] \path name\file name
When using a host name instead of an IP address
c:> lpr -Sprinter's host name [-Poption] [-ol] \path name\file name
6
When printing a binary file, add the “-ol” option (lowercase O, and lowercase L).
When using a printer with the host name “host” to print a PostScript file named “file 1” located in the
“C:\PRINT” directory, the command line is as follows:
c:> lpr -Shost -Pfiletype=RPS -ol C:\PRINT\file1
Printing from the virtual printer
c:> lpr -S “printer's IP address” -P[virtual printer name] [-ol] \path name\file
name
• For details about the virtual printer configuration, see “Using the Virtual Printer”, Printer Reference.
rcp
First, register the printer's host name in the hosts file.
c:> rcp [-b] \path name\file name [path name\file name...] printer's host name:
[option]
In file names, “*” and “?” can be used as wild cards.
When printing a binary file, add the “-b” option.
When using a printer with the host name “host” to print a PostScript file named “file 1” or “file 2” located
in the “C:\PRINT” directory, the command line is as follows:
c:> rcp -b C:\PRINT\file1 C:\PRINT\file2 host:filetype=RPS
357
6. Special Operations under Windows
• For details about the virtual printer configuration, see “Using the Virtual Printer”, Printer Reference.
ftp / sftp
Use the “put” or “mput” command according to the number of files to be printed.
When one file is printed
ftp> put \path name\file name [option]
Printing from the virtual printer
ftp> put \path name\file name [virtual printer name]
When multiple files are printed
ftp> mput \path name\file name [\path name\file name...] [option]
6 Follow the procedure below to print using the “ftp” command.
1. Formulate the printer's IP address or the host name of the hosts file printer as an argument
and use the “ftp” command.
% ftp “printer's IP address”
2. Enter the user name and password, and then press the [Enter] key.
For details about the user name and password, consult your network administrator.
User:
Password:
When user authentication is set, enter a login user name and password.
3. When printing a binary file, set the file mode to binary.
ftp> bin
When printing a binary file in ASCII mode, print may not come out correctly.
4. Specify files to be printed.
The following shows the examples of printing a PostScript file named “file 1” in the “C:\PRINT”
directory and printing file 1 and file 2.
ftp> put C:\PRINT\file1 filetype=RPS
ftp> mput C:\PRINT\file1 C:\PRINT\file2
5. Quit ftp.
ftp> bye
358
Printing Files Directly from Windows
• “=”, “,”, “_”, and “;” cannot be used for filenames. File names will be read as option strings.
• If you are using ftp, you cannot specify an option using the “mput” command.
• If you are using ftp, you cannot specify an option using the “pwd” command.
• If you are using sftp, you cannot specify an option using the “cd” command.
• If you are using sftp, you cannot specify an option using the “pwd” command.
• To use sftp, you must create an open key for ssh communication. Use Web Image Monitor to create
an open key. For details, see Web Image Monitor help.
• If personal authentication (Basic, Windows, LDAP, or Integrated Server Authentication) is enabled,
only authenticated users (users authenticated by login user name and password) can log on.
• For “mput” command, “*” and “?” can be used as wild cards in file names.
• When printing a binary file in ASCII mode, print may not come out correctly.
• For details about login user name and password, see Security Reference, which is the administrator's
manual.
• For details about the virtual printer configuration, see “Using the Virtual Printer”, Printer Reference.
6
359
6. Special Operations under Windows
360
7. Appendix
Operating Environment
Limitations
361
7. Appendix
362
Using DHCP
Using DHCP
You can use the printer in a DHCP environment. You can also register the printer NetBIOS name on a
WINS server when it is running.
• Printers that register the printer NetBIOS name on a WINS server must be configured for the WINS
server.
• Supported DHCP servers are Microsoft DHCP Server included with Windows 2000 Server, and
Windows Server 2003/2003 R2, and Windows Server 2008, and the DHCP server included with
NetWare and UNIX.
• If you do not use the WINS server, reserve the printer's IP address in the DHCP server so the same IP
address is assigned every time.
• To use the WINS server, change the WINS server setting to “active” using the control panel.
• Using the WINS server, you can configure the host name via the remote network printer port.
• DHCP relay-agent is not supported. If you use DHCP relay-agent on a network via ISDN, it will result
in increased line charges. This is because your computer connects to the ISDN line whenever a packet
is transferred from the printer.
• If there is more than one DHCP server, use the same setting for all servers. The machine operates using
data from the DHCP server that responds first.
• DHCP servers can operate in an IPv6 environment, but they cannot be configured to allocate IPv6 7
addresses or obtain host names.
Using AutoNet
If the printer IPv4 address is not automatically assigned by the DHCP server, a temporary IP address starting
with 169.254 and not used on the network can be automatically selected by the printer.
• The IP address assigned by the DHCP server is given priority over that selected by AutoNet.
• You can confirm the current IPv4 address on the configuration page.
• When AutoNet is running, the NetBIOS name is not registered on the WINS server.
• The machine cannot communicate with devices that do not have the AutoNet function. However, this
machine can communicate with Macintosh computers running Mac OS X 10.2.3. or higher.
363
7. Appendix
• The WINS server is supported with Windows 2000 Servers WINS Manager.
• For details about the WINS server settings, see Windows Help.
• If there is no reply from the WINS server, the NetBIOS name is registered by broadcast.
• The NetBIOS name can be entered using up to 13 alphanumeric characters.
Using telnet
364
Configuring the WINS Server
365
7. Appendix
Updating
Updating procedure varies depending on whether the printer IP address is static or acquired by DHCP.
7 However, if CNAME (PRNXXXXXX) overlaps with the host name, CNAME will not be registered.
For DHCPv4 settings
As a substitute for the printer, the DHCP server updates the record, and one of the following occurs:
• When the printer acquires the IP address from the DHCP server, the DHCP server updates the A
and PTR records.
• When the printer acquires the IP address from the DHCP server, the printer updates the A record,
and the DHCP server updates the PTR record.
If the A record is registered, CNAME is also registered. CNAMEs that can be registered are as follows:
• Ethernet and IEEE 802.11
RNPXXXXXX (XXXXXX represents the last 3 hexadecimal bytes of the MAC address)
For IPv6 settings
This machine updates the AAAA record and PTR record.
It also updates CNAME when the AAAA record is updated.
When a stateless address is newly set, it is automatically registered on the DNS server also.
• When the dynamic DNS function is not used, records managed by the DNS server must be updated
manually, if the printer's IP address is changed.
• To update the record using the printer, the DNS server has to have one of the following:
366
Using the Dynamic DNS Function
As a substitute for the printer, DHCP servers capable of updating the A record and PTR record are as
follows:
• Microsoft DHCP servers with standard Windows 2000 Server (Service Pack 3 or higher versions)/
Windows Server 2003/2003 R2/2008 features
• ISC DHCP 3.0 or higher
• DHCP server with standard NetWare 5 features
367
7. Appendix
368
Precautions
Precautions
Please pay attention to the following when using the network interface board. When configuration is
necessary, follow the appropriate procedures below.
• The MAC address of the filtering printer is printed on the printer configuration page.
• For more information about configuring the printer if the router cannot be configured, see the following 7
instructions.
1. Following the setup method described earlier in this manual, configure the file server.
2. Set the frame type for NetWare environment.
• For more information about selecting a frame type, see “Interface Settings”.
1. When not printing, the network interface board sends packets over the network. Set
NetWare to “inactive”.
369
7. Appendix
• If the machine is set up to connect to the delivery server via a dial-up router, the router will dial and
go online whenever a connection to the delivery server is made. Telephone charges may be incurred.
When connected to a computer that uses dial-up access
7 • Do not install the ScanRouter delivery software on a computer which uses dial-up access.
• When using the ScanRouter delivery software, DeskTopBinder, Auto Document Link, or a TWAIN
driver on a computer with dial-up access, a dial-up connection may be performed when
connecting to the delivery server and other equipment, depending on the setup. If the computer
is set up to connect to the Internet automatically, the confirmation dialog box will not appear,
and telephone charges may be incurred without your being aware of it. To prevent unnecessary
connections, the computer should be set up so the confirmation dialog box always appears
before establishing a connection. Do not make unnecessary connections when using the above
listed software.
NetWare Printing
Form feed
You should not configure form feed on NetWare. Form feed is controlled by the printer driver on Windows.
If NetWare form feed is configured, the printer might not work properly. If you want to change form feed
settings, always configure them using Windows.
370
Precautions
• Under Windows 2000/XP and Windows Server 2003/2003 R2/2008, clear the [Form feed] check
box on the [NetWare Settings] tab in the printer properties dialog box.
Banner page
You should not configure a banner page on NetWare. If you want to change the banner page setting,
always configure it using Windows.
• Under Windows 2000/XP and Windows Server 2003/2003 R2/2008, clear the [Enable banner]
check box on the [NetWare Settings] tab in the printer properties dialog box.
371
7. Appendix
• For more information about access point radio wave conditions, refer to the access point manual.
372
Configuring IEEE 802.1X
• To set IEEE 802.1X, you must enable SSL. For details about setting SSL configuration, see “Protection
Using Encryption”, Security Reference.
• To set IEEE 802.1X, you must use Web Image Monitor.
373
7. Appendix
7 11. Using a text editor, open the CA signified certificate downloaded in step 9, and then copy
over all the text.
12. In the [Install Certificate] window, paste all the text copied into the CA signified certificate.
13. Click [OK].
14. “Updating...” appears. Wait for about one or two minutes, and then click [OK].
15. Check that the “Device Certificate” shows “Installed”.
16. Click [Certificate 2] on “Certification”, and then click [OK].
17. Click [Logout].
18. Quit Web Image Monitor.
• If you request two certificates simultaneously, the certificate authority might not display either
certificate. Click [Cancel Request] to cancel the request.
• You can select [Certificate 1-4] in the “Device Certificate” window. Note that if you select [Certificate
1] in the “Device Certificate” window, you must select “Certificate 1” in the “IEEE 802.1X (WPA/
WPA2)” drop down menu in the “Certification” window.
• Click [Cancel Request] to cancel the request for the server certificate.
• If “Not found” appears after clicking [OK] in steps 6 and 14, wait one or two minutes, and then click
[Refresh].
374
Configuring IEEE 802.1X
375
7. Appendix
7. Click [OK].
8. Click [Configuration], and then click [Interface Settings] in the “Interface” area.
9. Select [Active] in “Ethernet Security”.
10. Click [OK].
11. Click [Logout].
12. Quit the Web Image Monitor.
• If there is a problem with settings, you might not be able to communicate with the printer. To identify
the problem, print a network summary.
• If you cannot identify the problem, reset the printer interface to normal, and then repeat the procedure
from the beginning.
376
Configuring IEEE 802.1X
• If there is a problem with settings, you might not be able to communicate with the printer. To identify
the problem, print a network summary.
• If you cannot identify the problem, reset the printer interface to normal, and then repeat the procedure
from the beginning.
377
7. Appendix
Specifications
Interface 1000BASE-T, 100BASE-TX, 10BASE-T, IEEE
802.11 a/b/g
LPR
RSH
RCP
DIPRINT
FTP
IPP
IPP-SSL
7 RHPP
IPX/SPX (NetWare)
AppleTalk
SMB
WSD (Printer)
SMTP
SMTP-C
POP3
IMAP4
FTP
FTP-C
378
Specifications
SMTP
SMTP-C
POP3
SMB
NCP
WSD (Scanner)
RSH
RCP
FTP
FTP-C
SNMP
SNMP-C
7
HTTP
HTTPS
TELNET (mshell)
NBT
DHCP
DNS
DNS-C
LDAP
To use IPP and SMB, use the SmartDeviceMonitor for Client port.
To use IPP under Windows XP/Vista, Windows Server 2003/2003 R2/2008, use the Standard IPP port.
To use IPP under Windows 2000, use SmartDeviceMonitor for Client.
AppleTalk can be used when the PostScript 3 module is installed.
Under Windows Vista, or Windows Server 2008, WSD (Printer), WSD (Scanner), uses the WSD Port.
Only the rsh/rcp commands in Unix OS standard command set are supported.
379
7. Appendix
Copyrights
expat
• The software including controller, etc. (hereinafter "software") installed on this product uses the expat
under the conditions mentioned below.
• The product manufacturer provides warranty and support to the software of the product including the
expat, and the product manufacturer makes the initial developer and copyright holder of the expat,
free from these obligations.
• Information relating to the expat is available at:
http://expat.sourceforge.net/
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Centre, Ltd. and Clark Cooper.
Copyright (c) 2001, 2002 Expat maintainers.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software,
and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
7 The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
NetBSD
380
Copyrights
Copyright (c) 1999, 2000 The NetBSD Foundation, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment:
This product includes software developed by The NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 7
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
2. Authors Name List
All product names mentioned herein are trademarks of their respective owners.
The following notices are required to satisfy the license terms of the software that we have mentioned in
this document:
• This product includes software developed by the University of California, Berkeley and its contributors.
• This product includes software developed by Jonathan R. Stone for the NetBSD Project.
• This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
• This product includes software developed by Manuel Bouyer.
• This product includes software developed by Charles Hannum.
• This product includes software developed by Charles M. Hannum.
• This product includes software developed by Christopher G. Demetriou.
• This product includes software developed by TooLs GmbH.
• This product includes software developed by Terrence R. Lambert.
• This product includes software developed by Adam Glass and Charles Hannum.
• This product includes software developed by Theo de Raadt.
381
7. Appendix
• This product includes software developed by Jonathan Stone and Jason R. Thorpe for the NetBSD
Project.
• This product includes software developed by the University of California, Lawrence Berkeley
Laboratory and its contributors.
• This product includes software developed by Christos Zoulas.
• This product includes software developed by Christopher G. Demetriou for the NetBSD Project.
• This product includes software developed by Paul Kranenburg.
• This product includes software developed by Adam Glass.
• This product includes software developed by Jonathan Stone.
• This product includes software developed by Jonathan Stone for the NetBSD Project.
• This product includes software developed by Winning Strategies, Inc.
• This product includes software developed by Frank van der Linden for the NetBSD Project.
• This product includes software developed for the NetBSD Project by Frank van der Linden.
• This product includes software developed for the NetBSD Project by Jason R. Thorpe.
• The software was developed by the University of California, Berkeley.
• This product includes software developed by Chris Provenzano, the University of California, Berkeley,
and contributors.
7
Sablotron
Sablotron (Version 0.82) Copyright (c) 2000 Ginger Alliance Ltd. All Rights Reserved.
a) The application software installed on this product includes the Sablotron software Version 0.82
(hereinafter, "Sablotron 0.82"), with modifications made by the product manufacturer. The original code
of the Sablotron 0.82 is provided by Ginger Alliance Ltd., the initial developer, and the modified code of
the Sablotron 0.82 has been derived from such original code provided by Ginger Alliance Ltd.
b) The product manufacturer provides warranty and support to the application software of this product
including the Sablotron 0.82 as modified, and the product manufacturer makes Ginger Alliance Ltd., the
initial developer of the Sablotron 0.82, free from these obligations.
c) The Sablotron 0.82 and the modifications thereof are made available under the terms of Mozilla Public
License Version 1.1 (hereinafter, "MPL 1.1"), and the application software of this product constitutes the
"Larger Work" as defined in MPL 1.1. The application software of this product except for the Sablotron
0.82 as modified is licensed by the product manufacturer under separate agreement (s).
d) The source code of the modified code of the Sablotron 0.82 is available at: http://support-
download.com/services/device/sablot/notice082.html
e) The source code of the Sablotron software is available at: http://www.gingerall.com
f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html
382
Copyrights
JPEG LIBRARY
The software installed on this product is based in part on the work of the Independent JPEG Group.
SASL
CMU libsasl
Tim Martin
Rob Earhart
Rob Siemborski
Copyright (c) 2001 Carnegie Mellon University. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. The name "Carnegie Mellon University" must not be used to endorse or promote products derived
from this software without prior written permission.
7
For permission or any other legal details, please contact:
Office of Technology Transfer
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh, PA 15213-3890
(412) 268-4387, fax: (412) 268-7395
tech-transfer@andrew.cmu.edu
4. Redistributions of any form whatsoever must retain the following acknowledgment: "This product
includes software developed by Computing Services at Carnegie Mellon University (http://
www.cmu.edu/computing/)."
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL
DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
383
7. Appendix
MD4
Copyright (c) 1990-2, RSA Data Security, Inc. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc.
MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as "derived
from the RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing
the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or
the suitability of this software for any particular purpose. It is provided "as is" without express or implied
warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
MD5
Copyright (c) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc.
MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.
7 License is also granted to make and use derivative works provided that such works are identified as "derived
from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing
the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or
the suitability of this software for any particular purpose. It is provided "as is" without express or implied
warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
Samba(Ver 3.0.4)
For SMB transmission, this machine uses Samba ver 3.0.4 (hereinafter referred to as Samba 3.0.4).
Copyright (c) Andrew Tridgell 1994-1998.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General
Public License as published by the Free Software Foundation; either version 2 of the License, or (at your
option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675
Mass Ave, Cambridge, MA 02139, USA.
384
Copyrights
• The source code for SMB transmission by this machine can be downloaded from the following website:
• http://support-download.com/services/scbs
RSA BSAFE®
• This product includes RSA BSAFE(c) cryptographic or security protocol software from RSA Security
Inc.
• RSA and BSAFE are registered trademarks of RSA Security Inc. in the United States and/or other
countries. 7
• RSA Security Inc. All rights reserved.
Open SSL
385
7. Appendix
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their
names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://
www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product
includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
7 This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation
was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared
to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc.,
code; not just the SSL code. The SSL documentation included with this distribution is covered by the same
copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If
this package is used in a product, Eric Young should be given attribution as the author of the parts of the
library used. This can be in the form of a textual message at program startup or in documentation (online
or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement: "This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used
are not cryptographic related :-).
386
Copyrights
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application
code) you must include an acknowledgement: "This product includes software written by Tim Hudson
(tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be
changed. i.e. this code cannot simply be copied and put under another distribution licence.
[including the GNU Public Licence.]
Open SSH
The licences which components of this software fall under are as follows. First, we will summarize and say 7
that all components are under a BSD licence, or a licence more free than that.
OpenSSH contains no GPL code.
1)
Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland All rights reserved
As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any
derived versions of this software must be clearly marked as such, and if the derived work is incompatible
with the protocol description in the RFC file, it must be called by a name other than "ssh" or "Secure Shell".
[Tatu continues]
However, I am not implying to give any licenses to any patents or copyrights held by third parties, and the
software includes parts that are not under my direct control. As far as I know, all included source code is
used in accordance with the relevant license agreements and can be used freely for any purpose (the GNU
license being the most restrictive); see below for details.
[However, none of that term is relevant at this point in time. All of these restrictively licenced software
components which he talks about have been removed from OpenSSH, i.e.,
- RSA is no longer included, found in the OpenSSL library
- IDEA is no longer included, its use is deprecated
- DES is now external, in the OpenSSL library
- GMP is no longer used, and instead we call BN code from OpenSSL
387
7. Appendix
388
Copyrights
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES ARE
DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE
OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com>
<http://www.core-sdi.com>
3)
One component of the ssh source code is under a 3-clause BSD license, held by the University of California,
since we pulled these parts from original Berkeley code.
Copyright (c) 1983, 1990, 1992, 1993, 1995
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission. 7
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
4)
Remaining components of the software are provided under a standard 2-term BSD licence with the
following names as copyright holders:
Markus Friedl
Theo de Raadt
Niels Provos
Dug Song
Kevin Steves
389
7. Appendix
Daniel Kouril
Wesley Griffin
Per Allansson
Jason Downs
Solar Designer
Todd C. Miller
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
7 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
5)
Portable OpenSSH contains the following additional licenses:
c) Compatibility code (openbsd-compat)
Apart from the previously mentioned licenses, various pieces of code in the openbsd-compat/ subdirectory
are licensed as follows:
Some code is licensed under a 3-term BSD license, to the following copyright holders:
Todd C. Miller
Theo de Raadt
Damien Miller
Eric P. Allman
The Regents of the University of California
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
390
Copyrights
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Open LDAP
391
7. Appendix
The names of the authors and copyright holders must not be used in advertising or otherwise to promote
the sale, use or other dealing in this Software without specific, written prior permission. Title to copyright
in this Software shall at all times remain with copyright holders.
OpenLDAP is a registered trademark of the OpenLDAP Foundation.
Copyright (c) 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights
Reserved. Permission to copy and distribute verbatim copies of this document is granted.
Heimdal
Copyright (c) 1997-2005 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm,
Sweden). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote
7 products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
392
Trademarks
Trademarks
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or countries.
Apple, AppleTalk, Bonjour, EtherTalk, Macintosh, Mac OS, Mac OS X, and TrueType are registered
trademarks of Apple Inc, registered in the U.S. and other countries.
Citrix® and MetaFrame® are registered trademarks of Citrix Systems, Inc.
IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States
or other countries.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Monotype is a registered trademark of Monotype Imaging Inc.
NetWare, IPX, IPX/SPX are either registered trademarks or trademarks of Novell, Inc.
PCL® is a registered trademark of Hewlett-Packard Company.
UNIX is a registered trademark in the United States and other countries, licensed exclusively through, X/
Open Company Limited.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all right to those marks.
7
The proper names of the Windows operating systems are as follows:
*The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
*The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
*The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
393
7. Appendix
394
INDEX
A Deleting a fax destination...................................261
Deleting a group.................................................332
Account for e-mail notification...........................151
Deleting a group within another group.............328
Ad-hoc Channel....................................................33
Deleting a registered IP-Fax destination...........271
Adding a group to another group.....................322
Deleting a registered name................................233
Address book......................................................225
Deleting a user code...........................................241
Address Book
Deleting an e-mail destination...........................279
Print List...............................................................................41
Deleting an FTP folder.........................................304
Address Book Management.................................40
Deleting an NCP folder......................................316
Admin. E-mail Address..........................................38
Deleting an SMB registered folder....................293
Administrator Authentication Management........43
Delivery Option.....................................................36
Administrator mode............................................. 120
DHCP...................................................................363
Administrator Tools................................................40
DHCPv6...............................................................363
AOF........................................................................44
Dial-up router......................................................369
Authentication information..................................235
Direct printing......................................................355
Auto Logout Timer.................................................27
Display Contrast....................................................22
Auto Off Timer.......................................................26
Display panel.........................................................16
Auto Specify Sender Name..................................39
Display/Clear/Print Counter Per User................42
AutoNet................................................................363
Display/Print Counter...........................................42
B Displayed information.........................................204
Bidirectional Communication...............................32 Displaying names registered in a group...........324
Displaying the counter for each user.................244
C
DNS Configuration...............................................29
Changing a fax destination................................254 Domain Name.......................................................29
Changing a group name....................................330 Dynamic DNS......................................................366
Changing a Registered IP-Fax destination........266
E
Changing a registered name.............................231
Changing a user code........................................238 E-mail
ethernet...............................................................................76
Changing an e-mail destination.........................277
wireless LAN......................................................................77
Changing an FTP folder......................................300
E-mail Communication Port..................................38
Changing an NCP registered folder..................312
E-mail destination................................................274
Changing an SMB folder...................................289
E-mail Reception Interval......................................38
Clearing the number of prints.............................248
E-mail Storage in Server.......................................39
Communication Mode..........................................33
Effective Protocol...................................................29
Connecting the telephone line...........................101
Energy Saver Timer...............................................26
Connecting to the interfaces.................................61
Enhanced Ext. Charge Unit..................................43
Copier Auto Reset Timer.......................................26
etherconfig...........................................................168
Copy Count Display..............................................22
Ethernet interface...................................................62
Copyrights...........................................................380
Ethernet Speed......................................................30
D Extended Security..................................................43
DDNS Configuration.............................................29 External Charge Unit Mng....................................43
Default User Name/Password (send).................39 External telephone..............................................101
Delete All Logs.......................................................45
395
F IPsec........................................................................29
IPv4 Gateway Address.........................................28
Facsimile Auto Reset Timer...................................26
IPv6......................................................................172
Fax destination....................................................251
IPv6 Gateway Address.........................................28
Fax E-mail Account...............................................39
IPv6 Stateless Address Autoconfiguration...........28
Fax number..........................................................251
File Transfer............................................................36 K
Firmware Version...................................................44 Key Counter Management...................................43
Fixed USB Port.......................................................45 Key Repeat.............................................................23
Format of on-demand e-mail messages............154
L
ftp.......................................196, 202, 204, 216, 356
Function Priority.....................................................22 LAN Type...............................................................31
Function Reset Timer..............................................22 Laws and regulations............................................15
LDAP.......................................................................46
G changing............................................................................. 53
General Features...................................................21 deleting...............................................................................54
Gigabit ethernet interface.....................................63 programming.....................................................................46
396
N Permit SSL/TLS Communication...........................31
Ping Command......................................................31
Names of Major Items..........................................13
POP before SMTP..................................................37
NCP Delivery Protocol..........................................29
POP3/IMAP4 Settings.........................................37
NetWare..............................................................106
Preventing unauthorized user access to shared
banner page....................................................................371
folders from the machine....................................228
form feed..........................................................................370
Print I/F Setting List................................................34
printing.............................................................................370
Print job information
NetWare 3.x..............................................107, 111 ftp.....................................................................................204
NetWare 4.x..............................................108, 113 info...................................................................................204
NetWare 5......................................... 108, 109, 113 rcp....................................................................................204
NetWare 5.1.....................................108, 109, 113 rsh.....................................................................................204
NetWare 6......................................... 108, 109, 113 sftp....................................................................................204
NetWare 6.5.....................................108, 109, 113 Print log information
Network.................................................................28 ftp.....................................................................................204
prnlog...............................................................................204
Network delivery scanner
rcp....................................................................................204
ethernet...............................................................................83
rsh.....................................................................................204
wireless LAN......................................................................84
sftp....................................................................................204
Network interface board configuration............205
Print Priority............................................................22
Network Security Level...................................44, 45
Print server
Network settings
NetWare 4.x...................................................................108
file transfer..........................................................................98
NetWare 5......................................................................108
interface settings................................................................92
NetWare 5.1..................................................................108
Network TWAIN scanner NetWare 6......................................................................108
ethernet...............................................................................89
NetWare 6.5..................................................................108
wireless LAN......................................................................90
Print Server
Note.......................................................................13 NetWare 3.x...................................................................107
Notice..................................................................... 12 Printer Auto Reset Timer........................................27
NW Frame Type.................................................... 30 Printer Bypass Paper Size.....................................24
O Printer configuration
ftp.....................................................................................202
Optional handset................................................101
info...................................................................................202
P rcp....................................................................................202
rsh.....................................................................................202
Panel Key Sound...................................................22 sftp....................................................................................202
Paper Tray Priority
Printer server........................................................105
copier..................................................................................25
fax.......................................................................................25
Printer status
ftp.....................................................................................196
printer.................................................................................. 25
rcp....................................................................................196
Paper Type rsh.....................................................................................196
bypass tray.........................................................................24
sftp....................................................................................196
tray 1-3...............................................................................25
status................................................................................196
Parallel Communication Speed............................32
Printer Status
Parallel Interface....................................................32 lpr.....................................................................................196
Parallel Timing.......................................................32 Printer/LAN-Fax
Permit SNMPv3 Communication..........................31 ethernet...............................................................................69
397
wireless LAN......................................................................70 NetWare 4.x...................................................................113
Printing commands NetWare 5......................................................................113
ftp.....................................................................................356 NetWare 5.1..................................................................113
lpr.....................................................................................356 NetWare 6......................................................................113
rcp....................................................................................356 NetWare 6.5..................................................................113
sftp....................................................................................356 Removing a name from a group........................326
Printing the counter for all users.........................247 Restore Factory Defaults.......................................34
Printing the counter for each user.......................245 Restore IEEE 802.1X Authentication to Defaults.....
prnlog...................................................................204 ................................................................................31
Program/Change/Delete LDAP Server..............43 rsh...............................................196, 202, 204, 216
Program/Change/Delete Realm........................44 S
Program/Change/Delete User Text...................21
Scan to folder function
Pure IP environment ethernet...............................................................................80
NetWare 5......................................................................109
wireless LAN......................................................................81
NetWare 5.1..................................................................109
Scanner Auto Reset Timer.....................................27
NetWare 6......................................................................109
NetWare 6.5..................................................................109 Search
List.....................................................................................349
R Searching
e-mail address.................................................................352
rcp.....................................196, 202, 204, 216, 356
fax number.......................................................................351
Reading the display...............................................16
folder name.....................................................................353
Realm...................................................................... 56 name................................................................................348
changing............................................................................. 58
registration number.........................................................350
deleting...............................................................................58
user code.........................................................................351
programming.....................................................................56
Security Method....................................................33
Reception Protocol................................................37
Selection Signal Status..........................................32
Registering a fax destination..............................252
Sending e-mail by quick dial.............................228
Registering a Group............................................319
Sending fax by quick dial...................................227
Registering a protection code............................334
Sending scanned files to a shared folder directly...
Registering a protection code to a group user........ ..............................................................................228
..............................................................................337
Set Date..................................................................27
Registering a protection code to a single user........
..............................................................................334 Set Time..................................................................27
Registering a user code......................................235 sftp.....................................196, 202, 204, 216, 356
Registering an e-mail destination.......................274 Signal Control........................................................32
Registering an FTP folder....................................295 SmartDeviceMonitor for Admin.........................131
address information........................................................145
Registering an IP-Fax destination.......................264
comment..........................................................................143
Registering an NCP folder..................................306
Energy Saver Mode.......................................................141
Registering an SMB folder.................................282 exporting the information on about the number of pages
Registering folders...............................................282 printed..............................................................................137
Registering names...............................................230 fax journal........................................................................144
Registering names to a group............................319 installing...........................................................................132
locking the menus............................................................134
Remote maintenance..........................................156
machine status.................................................................142
Remote printer
name................................................................................143
NetWare 3.x...................................................................111
network interface board.................................................133
398
new users.........................................................................139 help..................................................................................168
number of sheets printed................................................136 hostname.........................................................................169
paper type.......................................................................135 ifconfig.............................................................................169
resetting the number of pages printed...........................137 info...................................................................................170
restricting functions..........................................................139 ipsec.................................................................................171
setting a password..........................................................141 logout...............................................................................172
spool print........................................................................145 lpr.....................................................................................172
User Information..............................................................135 netware............................................................................173
user management tool....................................................136 pathmtu............................................................................174
SmartDeviceMonitor for Client..........................147 prnlog...............................................................................175
IPP.....................................................................................148 rhpp..................................................................................175
machine status.................................................................148 route.................................................................................175
monitoring printers..........................................................147 set.....................................................................................177
SMB Computer Name..........................................30 show.................................................................................180
slp.....................................................................................180
SMB Work Group.................................................30
smb...................................................................................180
SMTP authentication...........................................341
snmp.................................................................................181
SMTP Authentication.............................................36 sntp...................................................................................184
SMTP Server..........................................................36 spoolsw............................................................................185
SNMP...................................................................195 ssdp..................................................................................186
SSID Setting...........................................................33 ssh.....................................................................................186
status.....................................................................196 status................................................................................187
Supported printer drivers....................................361 syslog...............................................................................187
upnp.................................................................................187
Symbol...................................................................13
web..................................................................................188
syslog...................................................................216
wiconfig...........................................................................189
System Auto Reset Timer.......................................26 wins..................................................................................192
System log information wsmfp...............................................................................193
ftp.....................................................................................216
Timer Settings.........................................................26
rcp....................................................................................216
To change the fax number..................................258
rsh.....................................................................................216
sftp....................................................................................216 To change the SEP code............................259, 270
syslog...............................................................................216 To change the SUB code...........................258, 269
To set label insertion...................................260, 270
T
To set the international TX mode........................260
telnet.....................................................................156 Top Page..............................................................118
8021x..............................................................................157 Trademarks..........................................................393
access..............................................................................158
Transfer Log Setting...............................................45
appletalk..........................................................................159
Tray Paper Settings................................................24
authfree............................................................................160
autonet.............................................................................160
Tray Paper Size.....................................................24
bonjour.............................................................................161 U
devicename.....................................................................163
dhcp.................................................................................163 USB interface.........................................................65
dhcp6...............................................................................164 User Authentication Management.......................42
diprint...............................................................................165 User tools...............................................................18
dns....................................................................................165 change the settings............................................................18
domainname...................................................................167 quit the settings...................................................................19
etherauth..........................................................................168 Using keys..............................................................16
399
V
Virtual printer.......................................................356
W
Warm-up Beeper..................................................22
Web Image Monitor...........................................117
administrator mode.........................................................120
auto e-mail notification...................................................153
e-mail notification............................................................150
guest mode......................................................................120
help..................................................................................129
log out..............................................................................120
login.................................................................................120
mail authentication..........................................................152
menu.................................................................................120
mode................................................................................120
on-demand e-mail notification.......................................154
setting items.....................................................................123
top page..........................................................................118
WINS Configuration.............................................29
WINS server........................................................364
telnet.................................................................................364
Web Image Monitor.......................................................364
Wireless LAN................................................33, 372
Wireless LAN interface
checking the signal............................................................68
connecting..........................................................................66
setup procedure.................................................................67
Wireless LAN Signal.............................................34
WSD scanner
ethernet...............................................................................86
wireless LAN......................................................................87
EN USA D069-6901
PostScript 3 Supplement
1 Windows Configuration
2 Mac OS Configuration
3 Using PostScript 3
4 Printer Utility for Mac
5 Appendix
6
7
8
9
10
11
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Note................................................................................................................................................................8
About IP Address............................................................................................................................................8
Laws and Regulations.........................................................................................................................................9
Legal Prohibition.............................................................................................................................................9
1. Windows Configuration
Using the DeskTop Binder-SmartDeviceMonitor for Client Port...................................................................11
Installing DeskTop Binder-SmartDeviceMonitor for Client.......................................................................11
Installing the PostScript 3 Printer Driver (Windows 2000 - TCP/IP).......................................................12
Installing the PostScript 3 Printer Driver (Windows 2000 - IPP)..............................................................13
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2 - TCP/IP)....
.......................................................................................................................................................................14
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2 - IPP)...........
.......................................................................................................................................................................16
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008 - TCP/IP)...............17
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008 - IPP).......................18
Changing the Port Settings DeskTop Binder-SmartDeviceMonitor for Client.........................................20
Using the Standard TCP/IP Port......................................................................................................................22
Installing the PostScript 3 Printer Driver (Windows 2000).......................................................................22
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............23
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................24
Using the LPR Port.............................................................................................................................................26
Installing the PostScript 3 Printer Driver (Windows 2000).......................................................................26
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............27
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................28
Using as the Windows Network Printer..........................................................................................................30
Installing the PostScript 3 Printer Driver (Windows 2000).......................................................................30
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............31
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................32
Using the WSD port.....................................................................................................................................33
1
Using as the NetWare Print Server / Remote Printer....................................................................................35
When using the PostScript 3 Printer Driver................................................................................................35
Installing the Printer Driver Using USB............................................................................................................36
Windows 2000 - USB.................................................................................................................................36
Windows XP, Windows Server 2003 / 2003 R2 - USB.........................................................................37
Windows Vista, Windows Server 2008 - USB.........................................................................................38
Troubleshooting for using USB...................................................................................................................39
Printing with Parallel Connection....................................................................................................................40
Installing the PostScript 3 printer driver (Windows 2000).......................................................................40
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............41
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................42
If a Message Appears during Installation......................................................................................................44
Making Option Settings for the Printer...........................................................................................................46
Setting Up the Printer Driver............................................................................................................................47
Windows 2000 - Accessing the Printer.....................................................................................................47
Windows XP, Windows Server 2003 / 2003 R2 - Accessing the Printer Properties...........................48
Windows Vista, Windows Server 2008 - Accessing the Printer Properties............................................50
2. Mac OS Configuration
Mac OS............................................................................................................................................................53
Installing the PostScript 3 Printer Driver and PPD File...............................................................................53
Setting Up PPD Files.....................................................................................................................................54
Setting Up Options......................................................................................................................................54
Installing Adobe Type Manager................................................................................................................55
Installing Screen fonts..................................................................................................................................55
Changing to EtherTalk.................................................................................................................................56
Mac OS X.........................................................................................................................................................57
Installing the PPD Files.................................................................................................................................57
Setting Up the PPD File................................................................................................................................57
Setting Up Options......................................................................................................................................58
Using USB Interface.....................................................................................................................................58
Using Bonjour (Rendezvous).......................................................................................................................59
Changing to EtherTalk.................................................................................................................................59
Configuring the Printer.....................................................................................................................................61
2
3. Using PostScript 3
Setting Up Options...........................................................................................................................................63
Printing a Document.........................................................................................................................................64
Job Type.......................................................................................................................................................64
User Code....................................................................................................................................................77
Paper Size....................................................................................................................................................78
Reduce/Enlarge..........................................................................................................................................78
Scale.............................................................................................................................................................79
Print On.........................................................................................................................................................79
Fit to Paper....................................................................................................................................................80
Input Slot.......................................................................................................................................................80
Orientation...................................................................................................................................................81
Rotate by 180 degrees...............................................................................................................................81
Copies...........................................................................................................................................................81
Orientation Override...................................................................................................................................82
Layout/Booklet............................................................................................................................................82
Page Order..................................................................................................................................................83
Draw Border.................................................................................................................................................83
Duplex Printing.............................................................................................................................................83
Collate..........................................................................................................................................................85
Reverse Order Print......................................................................................................................................85
Paper Type...................................................................................................................................................86
Watermark...................................................................................................................................................86
Watermark Text...........................................................................................................................................86
Watermark Font...........................................................................................................................................87
Watermark Size...........................................................................................................................................87
Watermark Angle........................................................................................................................................87
Watermark Style..........................................................................................................................................88
Dithering.......................................................................................................................................................88
Image Smoothing.........................................................................................................................................89
Print Mode....................................................................................................................................................90
4. Printer Utility for Mac
Installing Printer Utility for Mac.......................................................................................................................91
3
Starting Printer Utility for Mac.........................................................................................................................92
Mac OS........................................................................................................................................................92
Mac OS X.....................................................................................................................................................92
Printer Utility for Mac Functions.......................................................................................................................93
Downloading PS Fonts................................................................................................................................94
Displaying Printer's Fonts.............................................................................................................................94
Deleting Fonts...............................................................................................................................................95
Initializing the Printer Disk...........................................................................................................................95
Page Setup...................................................................................................................................................96
Printing Fonts Catalog..................................................................................................................................96
Printing Fonts Sample...................................................................................................................................96
Renaming the Printer....................................................................................................................................96
Restarting the Printer....................................................................................................................................97
Downloading PostScript Files......................................................................................................................97
Selecting the Zone.......................................................................................................................................98
Displaying the Printer Status........................................................................................................................99
Launching the Dialogue Console................................................................................................................99
5. Appendix
Trademarks.....................................................................................................................................................101
INDEX...........................................................................................................................................................103
4
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Printer Guide
• Quick Reference Fax Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
6
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
7
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
Note
About IP Address
In this manual, “IP address” covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.
8
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.
9
10
1. Windows Configuration
11
1. Windows Configuration
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
1 the auto play program to run.
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
12
Using the DeskTop Binder-SmartDeviceMonitor for Client Port
13. Specify whether or not to share the printer, and then click [Next >].
14. Specify whether or not to print a test page, and then click [Next >].
15. Click [Finish].
The printer driver installation starts. 1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
13
1. Windows Configuration
http://192.168.15.16/printer
https://192.168.15.16/printer
You can enter “http://machine's IP address or host name/ipp” as the printer's address.
1 If the address is “192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine.
11. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the
name of any existing port.
If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port
name.
12. Click [Detailed Settings] to configure proxy server, the IPP user name and other settings.
Specify the necessary settings, and then click [OK].
For information about the settings, see DeskTop Binder-SmartDeviceMonitor for Client Help.
13. Click [OK].
14. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
15. Change the printer name if you want, and then click [Next >].
16. Specify whether or not to share the printer, and then click [Next >].
17. Specify whether or not to print a test page, and then click [Next >].
18. Click [Finish].
The printer driver installation starts.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2 - TCP/IP)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.
14
Using the DeskTop Binder-SmartDeviceMonitor for Client Port
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
15
1. Windows Configuration
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2 - IPP)
1
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.
16
Using the DeskTop Binder-SmartDeviceMonitor for Client Port
11. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the
one of any existing port.
If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port
name.
12. Click [Detailed Settings] to make necessary settings.
1
For information about the settings, see DeskTop Binder-SmartDeviceMonitor for Client Help.
13. Click [OK].
14. Check that the name of the printer driver you want to install is selected, and then click [Next
>].
15. Change the name of the printer if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
16. Specify whether or not to share the printer, and then click [Next >].
17. Specify whether or not to print a test page, and then click [Next >].
18. Click [Finish].
The printer driver installation starts.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008
- TCP/IP)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• f your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.
17
1. Windows Configuration
1 Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Local printer attached to this computer.].
6. Click [Create a new port:].
7. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
8. Click [TCP/IP], and then click [Search].
A list of printers using TCP/IP appears.
9. Select the printer you want to use, and then click [OK].
Only printers that respond to a broadcast from the computer appear. To use a machine not listed
here, click [Specify Address], and then enter the IP address or host name of the machine.
10. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
11. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
12. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008
- IPP)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
18
Using the DeskTop Binder-SmartDeviceMonitor for Client Port
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.
1
1. Quit all applications currently running.
2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Local printer attached to this computer.].
6. Click [Create a new port:].
7. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
8. Click [IPP].
9. In the [Printer URL] box, enter “http://(machine's IP address or host name)/printer” as the
printer's address.
If the server authentication is issued, to enable SSL (a protocol for encrypted communication), enter
“https://(machine's IP address or host name)/printer” (Internet Explorer 5.01, or a higher version
must be installed).
(example IP address: 192.168.15.16)
http://192.168.15.16/printer
https://192.168.15.16/printer
You can enter “http://machine's IP address or host name/ipp” as the printer's address.
If the address is “192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine.
10. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the
one of any existing port.
If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port
name.
11. Click [Detailed Settings] to make necessary settings.
For information about the settings, see DeskTop Binder-SmartDeviceMonitor for Client Help.
12. Click [OK].
19
1. Windows Configuration
13. Check that the name of the printer driver you want to install is selected, and then click [Next
>].
14. Change the name of the printer if you want, and then click [Next >].
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Follow the procedure below to change the DeskTop Binder-SmartDeviceMonitor for Client settings, such
as TCP/IP timeout, recovery/parallel printing, and printer groups.
Windows 2000:
1. Open the [Printers and Faxes] window from the [Start] menu.
The [Printers and Faxes] window appears.
2. Click the icon of the printer you want to use. On the [File] menu, click [Properties].
The printer properties appears.
3. Click the [Port] tab, and then click [Configure Port].
The [Port Configuration] dialog box appears.
20
Using the DeskTop Binder-SmartDeviceMonitor for Client Port
• For information about these settings, see DeskTop Binder-SmartDevice-Monitor for Client Help. 1
Windows Vista, Windows Server 2008:
1. Open the [Printers] window from [Control Panel] on the [Start] menu.
The [Printers] window appears.
2. Right - click the icon of the printer you want to use, and then click the [Properties].
The printer properties appear.
3. Click the [Port] tab, and then click [Configure Port].
The [Port Configuration] dialog box appears.
• For TCP/IP, timeout setting can be configured.
• User, proxy, and timeout settings can be configured for IPP.
• For information about these settings, see DeskTop Binder-SmartDevice-Monitor for Client Help.
1. Start DeskTop Binder-SmartDeviceMonitor for Client, and then right-click the DeskTop
Binder-SmartDeviceMonitor for Client icon on the taskbar.
2. Click [Extended Features Settings], and then select the [Set Recovery/Parallel Printing for
each port] check box.
3. Click [OK] to close the [Extended Features Settings] dialog box.
21
1. Windows Configuration
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the DeskTop Binder-
SmartDeviceMonitor port.
22
Using the Standard TCP/IP Port
17. Specify whether or not to print a test page, and then click [Next >].
18. Click [Finish].
The printer driver installation starts.
1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the DeskTop Binder-
SmartDeviceMonitor port.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.
23
1. Windows Configuration
9. Click [Next >] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
10. Enter the printer name or IP address in the [Printer Name or IP Address] box.
The [Port Name] text box automatically obtains a port name. Change this name if necessary.
1 When screen for Device selection appears, select “RICOH NetworkPrinter Driver C Model”.
11. Click [Next >].
12. Click [Finish] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
13. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
14. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
15. Specify whether or not to print a test page, and then click [Next >].
16. Click [Finish].
The printer driver installation starts.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the DeskTop Binder-
SmartDeviceMonitor port.
24
Using the Standard TCP/IP Port
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
25
1. Windows Configuration
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
26
Using the LPR Port
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 1
2003 R2)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the LPR Port. Use the DeskTop Binder-SmartDeviceMonitor
port.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.
27
1. Windows Configuration
13. Specify whether or not to share the printer, and then click [Next >].
14. Specify whether or not to print a test page, and then click [Next >].
15. Click [Finish].
1 The printer driver installation starts.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the LPR Port. Use the DeskTop Binder-SmartDeviceMonitor
port.
28
Using the LPR Port
12. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens, 1
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
29
1. Windows Configuration
• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• If you print from a print server connected to the printer using the DeskTop Binder-
SmartDeviceMonitor port, the client cannot use Recovery Printing and Parallel Printing.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
30
Using as the Windows Network Printer
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2)
1
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• If you print from a print server connected to the printer using the DeskTop Binder-
SmartDeviceMonitor port, the client cannot use Recovery Printing and Parallel Printing.
• If you print with a Windows XP or Windows Server 2003 / 2003 R2 print server, DeskTop Binder-
SmartDeviceMonitor notification functions may not be possible for the client.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.
31
1. Windows Configuration
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
1 • Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• If you print from a print server connected to the printer using the DeskTop Binder-
SmartDeviceMonitor port, the client cannot use Recovery Printing and Parallel Printing.
• If you print with a Windows Vista or Windows Server 2008 print server, DeskTop Binder-
SmartDeviceMonitor notification functions may not be possible for the client.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.
32
Using as the Windows Network Printer
• The WSD Port can be used under Windows Vista or Windows Server 2008.
• To install under Windows Vista or Windows Server 2008, you must have an account that has Manage
Printers permission. Log on as an Administrator.
• If the machine is connected using the WSD port, bi-directional communication is not possible. For
details about bi-directional communication, see "Making Option Settings for the Printer".
• You can connect to the machine only if both the machine and computer are on the same network
segment, or "Network discovery" is enabled. For details, see Windows Help.
33
1. Windows Configuration
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• The port name that follows "WSD" uses random character strings. It cannot be changed freely.
• To stop the installation, click [Cancel] before the installation is complete. When re-installing the WSD
Port, right-click the machine's icon in the [Network] window, and then click [Uninstall].
34
Using as the NetWare Print Server / Remote Printer
1. In the [Printers] or [Printers and Faxes] window, open the printer properties.
2. Click the [Device Settings] tab.
3. Select a [No] on the [Send CTRL+D before job] and [Send CTRL+D after job], and then click
[OK].
4. Click [OK] to close the printer properties dialog box.
35
1. Windows Configuration
• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, plug and play is enabled, and the icon of the printer
connected to the “USB” port is added to the [Printers] window.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.
36
Installing the Printer Driver Using USB
• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, plug and play is enabled, and the icon of the printer
connected to the “USB” port is added to the [Printers] window.
The printer drivers can be installed from the CD-ROM provided with this machine.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.
37
1. Windows Configuration
5. Check the printer driver location, and then click [Next >].
6. Click [Continue].
7. Click [Finish].
1 If installation is successful, the icon of the printer connected to the “USB001” port is added to the
[Printers] window.
• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, plug and play is enabled, and the icon of the printer
connected to the “USB” port is added to the [Printers] window.
The printer drivers can be installed from the supplied CD-ROM provided with this machine.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
supplied CD-ROM.
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
38
Installing the Printer Driver Using USB
• When a printer driver meeting this printer is found on a network, a message prompting insertion of
the CD-ROM is not displayed.
• The number after “USB” varies depending on the number of printers connected.
1
Troubleshooting for using USB
Problems Solutions
• When using Windows 2000 / XP / Vista or Windows Server 2003 / 2003 R2 / 2008, an erroneous
device is displayed under [USB Controller] in the [Device Manager] dialog box.
39
1. Windows Configuration
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
40
Printing with Parallel Connection
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2)
1
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
41
1. Windows Configuration
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
1 Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.
42
Printing with Parallel Connection
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.
43
1. Windows Configuration
• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.
• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.
• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.
44
If a Message Appears during Installation
• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.
45
1. Windows Configuration
• Under Windows 2000 / XP / Vista and Windows Server 2003 / 2003 R2 / 2008, Manage Printers
permission is required to change the printer properties in the [Printers] folder. Log on as an
Administrators or Power Users group member.
• For details about making option settings for the printer, see Setting Up Options.
46
Setting Up the Printer Driver
• To change the printer default settings including option configuration settings, log on using an account
that has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.
• Settings you make here are used as the default settings for all applications.
• Do not make a setting for [Form to Tray Assignment].
• For details, see the printer driver Help.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.
47
1. Windows Configuration
• Settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.
1
Making printer settings from an application
You can make printer settings for a specific application.
To make printer settings for a specific application, open the [Printing Preferences] dialog box from that
application. The following explains how to make settings for the WordPad application provided with
Windows 2000.
• The procedure to open the [Printing Preferences] dialog box may vary depending on the application.
For details, see the manuals provided with the application you use.
• Any settings you make in the following procedure are valid for the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as defaults when printing from this application.
• For details, see the printer driver Help.
Windows XP, Windows Server 2003 / 2003 R2 - Accessing the Printer Properties
• To change the printer default settings including option configuration settings, log on using an account
that has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.
48
Setting Up the Printer Driver
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.
• Settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.
49
1. Windows Configuration
• The procedure to open the [Printing Preferences] dialog box may vary depending on the application.
For details, see the manuals provided with the application you use
1 • Any settings you make in the following procedure are valid for the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as defaults when printing from this application.
• For details, see the printer driver Help.
• To change the printer default settings including option configuration settings, log on using an account
that has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.
• Settings you make here are used as the default settings for all applications.
• Do not make a setting for [Form to Tray Assignment].
• For details, see the printer driver Help.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.
50
Setting Up the Printer Driver
• The procedure to open the [Printing Preferences] dialog box may vary depending on the application.
For details, see the manuals provided with the application you use
• Any settings you make in the following procedure are valid for the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as defaults when printing from this application.
• For details, see the printer driver Help.
51
1. Windows Configuration
52
2. Mac OS Configuration
Mac OS
This section explains how to configure a Mac OS to use EtherTalk and USB.
The following explains how to configure Mac OS 9.1. If you are not using Mac OS 9.1, see the manual 2
of the Mac OS you are using for details.
• The PostScript 3 printer driver is stored in the following folder on the CD-ROM.
Mac OS 8 and 9:PS Driver:(language):Disk1
It is necessary to install a printer driver and PostScript Printer Description (PPD) files to print from a Mac
OS.
Follow the procedure below to install a printer driver and a PPD file into a Mac OS using Mac OS 8.6 and
higher.
PPD Files
53
2. Mac OS Configuration
6. Drag the PPD file and the plugin file into [Printer Descriptions] in [Extensions] under [System
Folder].
7. Restart the Mac OS.
Setting Up Options
• If the option you want to select is not displayed, PPD files may not be set up correctly. To complete
the setup, check the name of the PPD file displayed in the dialog box.
54
Mac OS
• Quit all applications currently running before installation. Install ATM after you restart the computer.
• For details about installation, see the operating instructions in the ATM folder.
55
2. Mac OS Configuration
2
Changing to EtherTalk
• The procedures used to configure Mac OS may vary depending on the Mac OS version. The following
describes how to configure Mac OS 9.1. If you are using a different version of Mac OS, use the
following procedures as a reference and see the manuals for your Mac OS version.
• Confirm the Connection to the Printer with TCP/IP.
• For information about installing applications required for EtherTalk, see the Mac OS manuals.
56
Mac OS X
Mac OS X
This section explains how to configure a Mac OS X to use EtherTalk, USB and TCP/IP.
Follow the procedure below to configure Mac OS X 10.3.8. If you are not using Mac OS X 10.3.8, see
the manual of the Mac OS X you are using for details.
2
• For Mac OS X 10.1 or higher.
• The PPD files are stored in the following folder on the CD-ROM.
Mac OS X: MacOSX PPD Installer
Follow the procedure below to install a PPD file to print from Mac OS X.
• You need an administrator name and a password (phrase). For details, consult your network
administrator.
57
2. Mac OS Configuration
3. Select the printer, and then select its manufacturer from the [Printer Model:] pop-up menu.
Under Mac OS X 10.4 or later, you are using from the [Print Using] popup menu.
A list of printer types appears.
4. Select the PPD file for the model you are using, and then click [Add].
5. Quit Printer Setup Utility.
2
Setting Up Options
• If the option you want to select is not displayed, PPD files may not be set up correctly. To complete
the setup, check the name of the PPD file displayed in the dialog box.
58
Mac OS X
• When printing with a USB connection to a Macintosh computer, printer language does not change
automatically. Use the control panel on this printer to change printer language to [Auto Detect] or
[PS] before printing.
• USB2.0 can be used only with Mac OS X 10.3.3 or higher.
2
Using Bonjour (Rendezvous)
Follow the procedure below to print using Bonjour (Rendezvous) under Mac OS X 10.2.3 or higher.
Ethernet and wireless LAN connections can also be used.
• When printing with a Rendezvous connection to a Macintosh computer, printer language does not
change automatically. Use the control panel on this printer to change printer language to [Auto Detect]
or [PS] before printing.
Changing to EtherTalk
• You need an administrator name and a password (phrase). For details, consult your network
administrator.
59
2. Mac OS Configuration
2 • For information about installing applications required for EtherTalk, see the Mac OS manuals.
60
Configuring the Printer
61
2. Mac OS Configuration
62
3. Using PostScript 3
Setting Up Options
To use installed options correctly, first set up the printer driver. If the options are not recognized, you cannot
use them, even though they are physically installed. The procedure to set up a printer driver varies
depending on the operating system.
Windows
3
• If your system is Windows 2000, Windows XP Professional, Windows Vista, or Windows Server
2003 / 2003 R2 / 2008, changing printer driver settings requires Manage Printers permission.
Members of Administrators and Power Users groups have Manage Printers permission by
default. When you change printer driver settings, log on with an account that has Manage Printers
permission.
• If you are using Adobe PageMaker 6.0, 6.5, or 7.0, you have to set up options in the Adobe
PageMaker's print dialog box.
You can set up any of the options using the following tabs:
Windows 2000 / XP / Vista, Windows Server [Installable Options] on the [Device Settings]
2003 / 2003 R2 / 2008 tab.
• To set up options, access the printer driver from Windows. You cannot set up options if you
access the printer driver from an application.
Mac OS
• See, Making Option Settings for the Printer, Setting Up Options or Setting Up Options for the
installation method appropriate to your printing environment.
63
3. Using PostScript 3
Printing a Document
This documentation describes the specific printer functions and menus that are added by installing the PPD
file.
• If you are using Mac OS X 10.2.x or higher, the Job Type function can be used.
• “Mac OS X” in the tables below refers to Mac OS X 10.2.3. Depending on the version, [Features x]
is displayed as [Set x] (x is a number). Make adjustments according to the version you use.
• Under Windows 2000 / XP / Vista and Windows Server 2003 / 2003 R2 / 2008, all the tab
names explained here indicate the icons displayed in the [Menu] area on the [Detailed Settings] tab.
• Some of the settings made on the [Detailed Settings] tab can be registered to One Click Preset List.
The settings registered in One Click Preset List can be modified from the [One Click Presets] tab also.
• For details about One Click Presets, see the printer driver Help.
Job Type
64
Printing a Document
Windows 2000 / XP / Vista, Windows Server [Job Type:] on the [Job Setup] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
• The “User ID” can contain to eight alphanumeric (a-z, A-Z, 0-9) characters. The “Password”
must be 4-8 digits.
• Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Locked Print, see Job Type.
Hold Print
Use this function to temporarily hold a file in the machine, and print it from the computer or the machine's
control panel later.
65
3. Using PostScript 3
Stored Print
Use this function to store a file in the machine, and then print it from the computer or the machine's
control panel later.
• The “User ID” can contain up to eight alphanumeric (a- z, A- Z, 0- 9) characters. The “Password”
must be 4-8 digits.
• The File Name can contain to 16 alphanumeric (a-z, A-Z, 0-9) characters.
• You can assign a password to a saved document, but password assignment is not mandatory.
3 • Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Stored Print, see Job Type.
Store and Print
Use this function to print the file at once and also store the file in the printer.
• The “User ID” can contain up to eight alphanumeric (a- z, A- Z, 0- 9) characters. The “Password”
must be 4-8 digits.
• The “File Name” can contain to 16 alphanumeric (a-z, A-Z, 0-9) characters.
• You can assign a password to a saved document, but password assignment is not mandatory.
• Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Stored Print, see Job Type.
66
Printing a Document
6. In the User ID: box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9) characters.
The user ID associates the user with his / her jobs.
7. Click [OK] to close the [Job Type Details] dialog box.
8. Click [OK] to close the printer properties dialog box.
If you are using Windows 2000, perform the following steps.
9. Set the number of copies to two or more, and then start the printing from the application's
[Print] dialog box.
The sample print job is sent to the machine, and one set is printed.
10. Check the printed output to make sure the settings are correct.
3
If the settings are correct, perform the following steps to print the remaining sets.
If you want to delete a saved job, see Job Type.
11. On the machine's control panel, press the [Printer] key to display the printer screen.
12. Press [Prt.Jobs].
13. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
14. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A list of print files stored in the machine appears.
15. Enter the new number of sets using the number keys, and then press [Print].
If you do not want to change the set quantity, perform the following steps.
You can enter up to 999 sets.
Press [Escape] key to correct any entry mistakes.
When multiple files are selected without setting a quantity, 1 page less than the minimum number of
all settings is applied.
67
3. Using PostScript 3
Mac OS / Mac OS X
68
Printing a Document
1. On the machine's control panel, press the [Printer] key to display the printer screen.
2. Press [Prt.Jobs].
A list of print files stored in the machine appears.
3. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
4. Select the file you want to print using the [ ] or [ ] key, and then press [Delete]. 3
A confirmation screen appears.
5. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].
69
3. Using PostScript 3
3 12. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of locked print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
13. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
The password screen appears.
14. Enter the password using the number keys, and then press [OK] key.
The print confirmation screen appears.
A confirmation screen will appear if the password is not entered correctly. Press [Clear] to enter the
password again.
If you forget your password, contact your administrator for help.
15. Press [Print].
The locked file is printed.
• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• If the application has a collate option, make sure it is not selected before sending a print job. The
printer driver automatically collates Locked Print jobs by default. If the collate option is selected in the
application's [Print] dialog box, there may be more prints than required.
Mac OS / Mac OS X
70
Printing a Document
• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
1. On the machine's control panel, press the [Printer] key to display the printer screen.
2. Press [Prt.Jobs].
A list of print files stored in the machine appears.
3. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
4. Select the file you want to print using the [ ] or [ ] key, and then press [Delete].
A confirmation screen appears.
71
3. Using PostScript 3
5. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].
72
Printing a Document
13. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A confirmation screen appears.
14. Press [Print].
The hold print file is printed.
• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• When printing finishes, the stored file is deleted.
• If the application has a collate option, make sure it is not selected before sending a print job. The
printer driver automatically collates Hold Print files by default. If a collate option is selected from the
3
application's Print dialog box, there may be more prints than required.
Mac OS / Mac OS X
73
3. Using PostScript 3
• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• When printing is completed, the stored file is deleted.
1. On the machine's control panel, press the [Printer] key to display the printer screen.
3 2. Press [Prt.Jobs].
A list of print files stored in the machine appears.
3. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
4. Select the file you want to print using the [ ] or [ ] key, and then press [Delete].
A confirmation screen appears.
5. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].
74
Printing a Document
• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• Stored Print files sent to the machine are not deleted unless you delete them in the machine or select
[Auto Delete Stored Jobs] (see “System”, Printer Reference). Foe details, see Job Type.
75
3. Using PostScript 3
• If the application has a collate option, make sure it is not selected before sending a print job. The
printer driver automatically collate Stored Print files by default. If a collate option is selected from the
application's Print dialog box, there may be more prints than required.
Mac OS / Mac OS X
3 3. On the [Job Type:] pop-up menu, click [Stored Print] or [Store and Print].
• [Stored Print]
Stores the file in the printer and print it later using the control panel.
• [Store and Print]
Prints the file at once and also stores the file in the printer.
4. In the [User ID:] box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters, and then enter a 4-8 digit password in the [Password:] box. [File Name] can
also be set.
The user ID associates the user with his / her jobs.
You can assign a password to a saved document, but password assignment is not mandatory.
The password must be entered when printing or deleting.
5. After making the necessary settings, click [Print].
The document file is saved in the machine.
To print the document, perform the following steps.
To delete the document, see Job Type.
6. On the machine's control panel, press the [Printer] key to display the printer screen.
7. Press [Prt.Jobs].
A list of print files stored in the machine appears.
8. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of stored print files stored in the machine appears.
You can print files also by pressing [User ID].
9. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A confirmation screen appears.
If you have already set a password, proceed to the following step.
10. Enter a password using the number keys on the password screen, and then press [OK].
A confirmation screen will appear if the password is not entered correctly. Press [OK] to enter the
password again.
76
Printing a Document
If you have not set the password, proceed to the following step.
11. Enter the number of copies to print, and then press [Print].
The stored file is printed.
• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• Stored Print files sent to the machine is not deleted unless you delete them in the machine or select
[Auto Delete Stored Jobs] (see “System”, Printer Reference). For details, see Job Type.
3
Deleting a Stored Print File
If a printed document is not as required, you can delete the Stored Print file.
1. On the machine's control panel, press the [Printer] key to display the printer screen.
1. Press [Prt.Jobs].
A list of print files stored in the machine appears.
2. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
3. Select the file you want to print using the [ ] or [ ] key, and then press [Delete].
A confirmation screen appears.
4. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].
• If you have already set a password in the printer driver, enter it to delete.
User Code
77
3. Using PostScript 3
Paper Size
Windows 2000 / XP / Vista, Windows Server [Paper Size:] on [Basic] tab in the Printing
2003 / 2003 R2 / 2008 Preference dialog box.
• For details about the paper sizes supported by this machine, see General Setting Guide.
Reduce/Enlarge
Windows 2000 / XP / Vista, Windows Server [Reduce/Enlarge] on [Basic] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
78
Printing a Document
Scale
Print document by scaling with a specified magnification ratio.
Scale To Fit
Print document by scaling to fit on a specified paper size.
Scale 3
Specify the ratio to reduce/enlarge the print size of document.
The following table shows the tabs or menus where you can select this function.
Windows 2000 / XP / Vista, Windows Server [Scale] on [Basic] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.
• Under Windows 2000 / XP / Vista or Windows Server 2003 / 2003 R2 / 2008, [Zoom] must be
selected for [Reduce/Enlarge] to specify this item.
Print On
Windows 2000 / XP / Vista, Windows Server [Print On] on [Basic] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.
79
3. Using PostScript 3
Fit to Paper
When the size of the document and paper size differ, set whether or not to print according to paper size.
Windows 2000 / XP / Vista, Windows Server [Fit to Paper] on [Paper] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
3 Mac OS X
[Fit to Paper] on the [Features x] tab on [Printer
Features] in the print dialog box.
Prompt User
Print is performed with the size of document to be printed unchanged.
Nearest Size and Scale
If the paper size is smaller than the selected paper size, the driver reduces the print size.
If the paper size is larger than the size of document to be printed, print is not to fit the paper size.
Nearest Size and Crop
When the paper size is smaller than the size of document to be printed, print is adjusted to meet the
paper size.
Input Slot
Windows 2000 / XP / Vista, Windows Server [Input Tray:] on [Paper] tab in the Printing
2003 / 2003 R2 / 2008 Preference dialog box.
80
Printing a Document
Orientation
Windows 2000 / XP / Vista, Windows Server [Orientation:] on [Basic] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
• If you are using a Mac OS or Mac OS X, click to select the button that means “Landscape” or “Portrait”.
• Under Mac OS, "Rotated Landscape" cannot be selected.
Windows 2000 / XP / Vista, Windows Server [Rotate by 180 degrees] on [Basic] tab in the
2003 / 2003 R2 / 2008 Printing Preference dialog box.
Copies
81
3. Using PostScript 3
Windows 2000 / XP / Vista, Windows Server [Copies:] on [Basic] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.
3 Orientation Override
Windows 2000 / XP / Vista, Windows Server [Orientation Override] on [Finishing] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.
Layout/Booklet
Windows 2000 / XP / Vista, Windows Server [Pages per Sheet:] on [Edit] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
82
Printing a Document
Page Order
Windows 2000 / XP / Vista, Windows Server [Pages per sheet layout:] on [Edit] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
Draw Border
Windows 2000 / XP / Vista, Windows Server [Draw Border] on [Edit] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
Duplex Printing
• To use this function, the optional duplex unit must be installed on the machine.
The following table shows the tabs or menus where you can select this function.
Windows 2000 / XP / Vista, Windows Server [Duplex] on the [Edit] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.
83
3. Using PostScript 3
• 10.3 or higher
The [Two Sided Printing] check box on
[Layout] in the print dialog box.
Mac OS X
• Other Mac OS X
The [Print on both Sides] check box on
The following items may vary depending on the operating system you are using.
• If you are using a Mac OS, click to select the button that means “Flip on Long Edge” or “Flip on Short
Edge”.
Mac OS X
The following functions are selectable under Mac OS X 10.3 or higher (for Mac OS X 10.2 or earlier, see
Windows 2000 / XP, Windows Server 2003 / 2003 R2, Mac OS in Duplex Printing)
Off
Disables Duplex Printing.
Long-Edge Binding
Prints output so that you can open it to the long edge when bound along the long edge.
Short-Edge Binding
Prints output so that you can open it to the short edge when bound along the short edge.
84
Printing a Document
Collate
Select whether to enable collation. With this feature, the machine can efficiently print collated sets of
multiple-page documents.
• To use this function, a memory unit of at least 192 MB or hard disk drive must be installed on the
machine.
• If you are using Mac OS or Mac OS X, make sure that the following check boxes have not been
selected. 3
• Mac OS
The [Collate] check box in the print dialog box.
• Mac OS X
The [Collate] check box on [Copies & Pages] in the printer dialog box.
The following table shows the tabs or menus where you can select this function.
Windows 2000 / XP / Vista, Windows Server [Page Output Order] on [Finishing] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.
85
3. Using PostScript 3
Paper Type
Windows 2000 / XP / Vista, Windows Server [Paper Type] on [Paper] tab in the Printing
2003 / 2003 R2 / 2008 Preference dialog box.
• For details about the media type supported by this machine, see General Setting Guide.
Watermark
Windows 2000 / XP / Vista, Windows Server [Watermark] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.
Watermark Text
Windows 2000 / XP / Vista, Windows Server [Watermark Text] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
86
Printing a Document
• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.
Watermark Font
• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.
Watermark Size
Windows 2000 / XP / Vista, Windows Server [Watermark Size] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.
Watermark Angle
Windows 2000 / XP / Vista, Windows Server [Watermark Angle] on the [Effects] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.
87
3. Using PostScript 3
• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.
Watermark Style
3
Select the Watermark style.
Windows 2000 / XP / Vista, Windows Server [Watermark Style] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.
Dithering
Windows 2000 / XP / Vista, Windows Server [Dithering] on [Print Quality] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
88
Printing a Document
Photographic
Performs dithering using an appropriate pattern for photographs.
Text
Performs dithering using an appropriate pattern for text.
User Setting
Use this setting to print images set in half tone in your application.
Image Smoothing 3
Select the image smoothing type.
The following table shows the tabs or menus where you can select this function.
Windows 2000 / XP / Vista, Windows Server [Image Smoothing] on [Print Quality] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.
89
3. Using PostScript 3
Print Mode
Windows 2000 / XP / Vista, Windows Server [Print Mode:] on [Print Quality] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.
90
4. Printer Utility for Mac
• If a Macintosh and printer are connected by USB, you cannot use Printer Utility for Mac.
• Printer Utility for Mac is included on the CD-ROM labeled “Printer Drivers and Utilities”.
• Printer Utility for Mac requires Mac OS 8.1 or higher. (Mac OS X Classic environment is supported.)
• Printer Utility for Mac cannot use Mac OS X (native mode).
91
4. Printer Utility for Mac
Mac OS
• Before starting Printer Utility for Mac, make sure the printer is selected in [Chooser] on the Apple
menu.
Mac OS X
92
Printer Utility for Mac Functions
93
4. Printer Utility for Mac
Downloading PS Fonts
You can download the PS fonts to the printer's memory or hard disk drive.
• The following procedures to download the fonts assume that you are a system administrator. If you
are not, be sure to consult your system administrator.
• If the printer restarts, all the printer settings return to their defaults.
• Confirm that a Mac OS and the printer are connected with AppleTalk.
• During the download, do not turn off the power switch, operate the panel or open or close the cover.
You can display the available fonts currently downloaded to the printer. Fonts in the printer's memory and
hard disk drive can be displayed.
94
Printer Utility for Mac Functions
Deleting Fonts
You can delete fonts from the printer's memory or hard disk drive.
When initializing the printer's hard disk drive, all the fonts downloaded to the printer's hard disk drive are
deleted. Before initializing, be sure to check the fonts on the hard disk drive.
• When initializing the printer's hard disk drive from the operation panel, all of the data on the printer's
hard disk drive is deleted. Before initializing, be sure to check the data on the hard disk drive.
• Do not turn off the power switch until initializing is completed, otherwise the hard disk drive might be
damaged.
95
4. Printer Utility for Mac
Page Setup
You can set the paper size on which to print “Print Fonts Catalogue” and “Prints Fonts Sample”.
You can print samples of fonts downloaded to the hard disk drive or memory.
You can change the printer name displayed under AppleTalk. If you connect several printers on the network,
assign different names so you can identify them. If several printers have the same name, a digit appears
next to the printer name in [Chooser].
Mac OS
96
Printer Utility for Mac Functions
3. Click [Rename].
The printer name is changed.
4. Click [OK].
5. On the Apple menu, click [Chooser].
6. Click the [AdobePS] icon.
7. Select the printer whose name you changed, and then close the [Chooser] dialog box.
If there are several AppleTalk zones, select the zone the machine belongs to.
Mac OS X
97
4. Printer Utility for Mac
You can change the zone to which the printer belongs under AppleTalk.
4 Mac OS
Mac OS X
98
Printer Utility for Mac Functions
7. In the [Available Printers:] list, select the model of printer in use, and then click [Choose].
You can display and confirm the current status of the printer.
You can create and edit a PostScript file for printing, and then download it to the printer.
99
4. Printer Utility for Mac
100
5. Appendix
Trademarks
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, Adobe Type Manager, PageMaker, PostScript, and Reader are either
registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other
countries.
Apple, AppleTalk, Bonjour, EtherTalk, Macintosh, Mac OS, and TrueType are registered trademarks of
Apple Inc., registered in the United States and other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows: 5
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows® Vista Ultimate
Microsoft® Windows® Vista Business
Microsoft® Windows® Vista Home Premium
Microsoft® Windows® Vista Home Basic
Microsoft® Windows® Vista Enterprise
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
101
5. Appendix
102
INDEX
A Windows network printer..................................................30
WSD...................................................................................33
About This Machine.................................................5 Installing Adobe Type Manager
Add printer.............................................................44 Mac OS..............................................................................55
F M
103
Printer Reference......................................................5 Watermark angle..................................................87
Printer Utility for Mac...............................91, 96, 98 Watermark font.....................................................87
Functions.............................................................................93 Watermark size.....................................................87
Installing..............................................................................91 Watermark style....................................................88
Starting................................................................................92
Watermark text......................................................86
Printing fonts catalog.............................................96 Windows 2000
Printing fonts sample..............................................96 printer properties, PostScript 3.........................................47
R Windows Server 2003
printer properties, PostScript 3.........................................48
Reduce/enlarge....................................................78
Windows Vista
Renaming the printer.............................................96 printer properties, PostScript 3.........................................50
Restarting the printer.............................................97 Windows XP
Reverse order print................................................85 printer properties, PostScript 3.........................................48
Rotate by 180 degrees.........................................81
S
Sample print...........................................................66
Scale.......................................................................79
Scanner Reference..................................................5
Security Reference...................................................5
Selecting the zone.................................................98
Setting up options..................................................63
Mac OS..............................................................................54
Mac OS X...........................................................................58
Setting up PPD files
Mac OS..............................................................................54
Setting up the PPD file
Mac OS X...........................................................................57
Store and print.......................................................74
Stored print............................................................74
Symbols....................................................................8
T
Trademarks..........................................................101
Trouble Shooting.....................................................5
Troubleshooting for using USB.............................39
U
User code...............................................................77
Using bonjour
Mac OS X...........................................................................59
Using USB interface
Mac OS X...........................................................................58
W
Watermark.............................................................86
D468-6800
USA
AE
GB
GB
AE
EN
Operating Instructions
Security Reference
1 Getting Started
2 Configuring Administrator Authentication
3 Configuring User Authentication
4 Protecting Data from Information Leaks
5 Securing Information Sent over the Network or Stored on Hard Disk
6 Managing Access to the Machine
7 Enhanced Network Security
8 Specifying the Extended Security Functions
9 Troubleshooting
10 Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................7
Notice..................................................................................................................................................................9
Important.........................................................................................................................................................9
How to Read This Manual...............................................................................................................................10
Symbols........................................................................................................................................................10
Display..........................................................................................................................................................10
IP Address.....................................................................................................................................................11
Note..............................................................................................................................................................11
Laws and Regulations......................................................................................................................................12
Legal Prohibition..........................................................................................................................................12
1. Getting Started
Before Using the Security Functions................................................................................................................13
Setting Up the Machine...................................................................................................................................14
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Security Measures Provided by this Machine................................................................................................18
Using Authentication and Managing Users...............................................................................................18
Ensuring Information Security.....................................................................................................................18
Limiting and Controlling Access..................................................................................................................20
Enhancing Network Security......................................................................................................................20
2. Configuring Administrator Authentication
Administrators...................................................................................................................................................21
User Administrator.......................................................................................................................................21
Machine Administrator................................................................................................................................22
Network Administrator................................................................................................................................22
File Administrator.........................................................................................................................................22
Supervisor.....................................................................................................................................................22
About Administrator Authentication................................................................................................................23
Enabling Administrator Authentication...........................................................................................................25
Specifying Administrator Privileges............................................................................................................25
Registering the Administrator......................................................................................................................27
Logging on Using Administrator Authentication........................................................................................32
Logging off Using Administrator Authentication........................................................................................33
1
Changing the Administrator........................................................................................................................33
Using Web Image Monitor to Configure Administrator Authentication..................................................35
3. Configuring User Authentication
Users..................................................................................................................................................................37
About User Authentication...............................................................................................................................38
Configuring User Authentication.....................................................................................................................39
Enabling User Authentication..........................................................................................................................41
User Code Authentication...............................................................................................................................42
Specifying User Code Authentication........................................................................................................42
Basic Authentication.........................................................................................................................................48
Specifying Basic Authentication..................................................................................................................48
Authentication Information Stored in the Address Book...........................................................................53
Specifying Login User Names and Passwords..........................................................................................53
Specifying Login Details..............................................................................................................................56
Windows Authentication.................................................................................................................................60
Specifying Windows Authentication..........................................................................................................61
Installing Internet Information Services (IIS) and Certificate Services......................................................67
Creating the Server Certificate...................................................................................................................67
If the fax number cannot be obtained........................................................................................................68
Installing the Device Certificate (Issued by a Certificate Authority).........................................................68
LDAP Authentication.........................................................................................................................................70
Specifying LDAP Authentication.................................................................................................................71
Integration Server Authentication....................................................................................................................78
Specifying Integration Server Authentication............................................................................................78
Printer Job Authentication................................................................................................................................87
If User Authentication is Specified..................................................................................................................90
If User Code Authentication is Specified....................................................................................................90
If Basic, Windows, LDAP or Integration Server Authentication is Specified...........................................91
User Lockout Function..................................................................................................................................93
Auto Logout..................................................................................................................................................95
Authentication Using an External Device.......................................................................................................97
4. Protecting Data from Information Leaks
Printing a Confidential Document...................................................................................................................99
2
Specifying Locked Print File.........................................................................................................................99
Printing a Locked Print File........................................................................................................................100
Deleting Locked Print Files........................................................................................................................101
Changing the Password of a Locked Print File........................................................................................102
Unlocking a Locked Print File....................................................................................................................104
5. Securing Information Sent over the Network or Stored on Hard Disk
Preventing Information Leakage Due to Unauthorized Transmission........................................................107
Restricting Destinations..............................................................................................................................107
Using S/MIME to Protect E-mail Transmission............................................................................................110
E-mail Encryption.......................................................................................................................................110
Attaching an Electronic Signature............................................................................................................112
Protecting the Address Book.........................................................................................................................118
Configuring Address Book Access Permissions......................................................................................118
Encrypting Data in the Address Book......................................................................................................120
Encrypting Data on the Hard Disk................................................................................................................124
Enabling the Encryption Settings..............................................................................................................124
Printing the Encryption Key.......................................................................................................................126
Updating the Encryption Key....................................................................................................................127
Canceling Data Encryption......................................................................................................................129
Deleting Data on the Hard Disk....................................................................................................................132
Auto Erase Memory..................................................................................................................................132
Erase All Memory......................................................................................................................................136
6. Managing Access to the Machine
Preventing Changes to Machine Settings....................................................................................................141
Menu Protect..................................................................................................................................................143
Specifying Menu Protect...........................................................................................................................143
Limiting Available Functions..........................................................................................................................147
Specifying Which Functions are Available.............................................................................................147
Managing Log Files.......................................................................................................................................150
Using the Control Panel to Specify Log File Settings..............................................................................150
Using Web SmartDeviceMonitor to Manage Log Files.........................................................................153
Using Web Image Monitor to Manage Log Files...................................................................................153
Logs that can be Managed Using Web Image Monitor........................................................................157
3
7. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................163
Access Control...........................................................................................................................................163
Enabling and Disabling Protocols............................................................................................................164
Specifying Network Security Level..........................................................................................................172
Encrypting Transmitted Passwords...............................................................................................................176
Specifying a Driver Encryption Key.........................................................................................................176
Specifying a Group Password for PDF Files............................................................................................178
Specifying an IPP Authentication Password............................................................................................179
Protection Using Encryption..........................................................................................................................181
SSL (Secure Sockets Layer) Encryption....................................................................................................181
User Settings for SSL (Secure Sockets Layer)..........................................................................................186
Setting the SSL/TLS Encryption Mode.....................................................................................................186
SNMPv3 Encryption.................................................................................................................................188
Transmission Using IPsec...............................................................................................................................190
Encryption and Authentication by IPsec..................................................................................................190
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................191
IPsec Settings.............................................................................................................................................192
Encryption Key Auto Exchange Settings Configuration Flow................................................................200
Encryption Key Manual Settings Configuration Flow.............................................................................205
telnet Setting Commands..........................................................................................................................206
Authentication by telnet.................................................................................................................................214
"authfree" Command.................................................................................................................................214
Authentication by IEEE802.1X.....................................................................................................................215
8. Specifying the Extended Security Functions
Specifying the Extended Security Functions................................................................................................217
Changing the Extended Security Functions.............................................................................................217
Extended Security Settings........................................................................................................................218
Other Security Functions...............................................................................................................................223
Fax Function...............................................................................................................................................223
Scanner Function.......................................................................................................................................224
Limiting Machine Operations to Customers Only.......................................................................................225
Settings.......................................................................................................................................................225
4
Additional Information for Enhanced Security............................................................................................228
Settings you can Configure Using the Control Panel..............................................................................228
Settings you can Configure Using Web Image Monitor........................................................................230
Settings you can Configure when IPsec is Available/Unavailable......................................................231
9. Troubleshooting
If Authentication Fails.....................................................................................................................................235
If a Message is Displayed........................................................................................................................235
If the Machine Cannot Be Operated.......................................................................................................237
10. Appendix
Supervisor Operations..................................................................................................................................241
Logging on as the Supervisor...................................................................................................................241
Logging off as the Supervisor...................................................................................................................242
Changing the Supervisor..........................................................................................................................242
Resetting the Administrator's Password....................................................................................................245
Machine Administrator Settings....................................................................................................................248
System Settings..........................................................................................................................................248
Copier Features.........................................................................................................................................250
Fax Features...............................................................................................................................................250
Printer Features..........................................................................................................................................251
Scanner Features.......................................................................................................................................252
Settings via Web Image Monitor.............................................................................................................253
Settings via SmartDeviceMonitor for Admin...........................................................................................257
Network Administrator Settings....................................................................................................................258
System Settings..........................................................................................................................................258
Fax Features...............................................................................................................................................259
Printer Features..........................................................................................................................................259
Scanner Features.......................................................................................................................................259
Settings via Web Image Monitor.............................................................................................................260
Settings via SmartDeviceMonitor for Admin...........................................................................................262
File Administrator Settings.............................................................................................................................263
System Settings..........................................................................................................................................263
Fax Features...............................................................................................................................................263
Printer Features..........................................................................................................................................263
5
Settings via Web Image Monitor.............................................................................................................264
User Administrator Settings...........................................................................................................................265
System Settings..........................................................................................................................................265
Settings via Web Image Monitor.............................................................................................................265
Settings via SmartDeviceMonitor for Admin...........................................................................................266
The Privilege for User Account Settings in the Address Book.....................................................................267
User Settings - Control Panel Settings..........................................................................................................270
Copier Features..............................................................................................................................................271
Printer Features...............................................................................................................................................272
Scanner Features...........................................................................................................................................276
Fax Features...................................................................................................................................................278
System Settings...............................................................................................................................................281
User Settings - Web Image Monitor Settings..............................................................................................287
Device Settings...............................................................................................................................................288
Printer..............................................................................................................................................................294
Scanner...........................................................................................................................................................300
Fax..................................................................................................................................................................302
Interface..........................................................................................................................................................305
Network..........................................................................................................................................................307
Webpage.......................................................................................................................................................311
Functions That Require Options....................................................................................................................312
Trademarks.....................................................................................................................................................313
INDEX...........................................................................................................................................................315
6
Security Reference
This manual is for administrators of the machine. It explains security functions that you can use to
prevent unauthorized use of the machine, data tampering, or information leakage. Be sure to read
this manual when setting the enhanced security functions, or user and administrator authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• Unix Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
8
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
9
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
Display
The display panel shows machine status, error messages, and function menus.
When you select or specify an item on the display panel, it is highlighted like .
The copy display is set as the default screen when the machine is turned on.
10
Reading the Display and Using Keys
1 2 3 BRE001S
1. Selection keys
Correspond to items at the bottom line on the display.
• When the instruction "press [IP Add.]" appears in this manual, press the left selection key.
• When the instruction "press [Subnet M]" appears in this manual, press the center selection key.
• When the instruction "press [Mac Add.]" appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.
3. [OK] key
Press to set a selected item or entered numeric value.
4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ][ ][ ], or [ ] key appears in this manual, press the scroll key of the same direction.
IP Address
In this manual, "IP address" covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.
Note
11
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
12
1. Getting Started
This chapter describes the machine's security features and how to specify initial security settings.
1
Before Using the Security Functions
• If the security settings are not specified, the machine may be damaged by malicious attackers.
1. To prevent this machine being stolen or willfully damaged, etc., install it in a secure location.
2. Purchasers of this machine must make sure that people who use it do so appropriately, in accordance
with operations determined by the machine administrator and supervisor. If the administrator or
supervisor does not make the required security settings, there is a risk of security breaches by users.
3. Before setting this machine's security features and to ensure appropriate operation by users,
administrators must read the Security Reference completely and thoroughly, paying particular
attention to the section entitled "Before Using the Security Functions".
4. Administrators must inform users regarding proper usage of the security functions.
5. Administrators should routinely examine the machine's logs to check for irregular and unusual events.
6. If this machine is connected to a network, its environment must be protected by a firewall or similar.
7. For protection of data during the communication stage, apply the machine's communication security
functions and connect it to devices that support security functions such as encrypted communication.
13
1. Getting Started
BQP002S
3. Press [System Settings] using [ ] or [ ], and then press the [OK] key.
4. Press [Interface Settings] using [ ] or [ ], and then press the [OK] key.
14
Setting Up the Machine
8. Start Web Image Monitor, and then log on to the machine as the administrator.
For details about logging on to Web Image Monitor as an administrator, see "Using Web Image
Monitor to Configure Administrator Authentication".
9. Install the device certificate. 1
For information on how to install the device certificate, see "Protection Using Encryption".
10. Enable secure sockets layer (SSL).
11. Enter the administrator's user name and password.
For details about specifying the administrator user name and password, see "Registering the
Administrator".
The administrator's default account (user name: "admin"; password: blank) is unencrypted between
steps 7 to 10. If acquired during this time, this account information could be used to gain unauthorized
access to the machine over the network.
If you consider this risky, we recommend that you specify a temporary administrator password for
accessing Web Image Monitor for the first time, before connecting to the network in step 7.
We recommend you change the supervisor's password also. For details about changing the
supervisor's user name and password, see "Changing the Supervisor".
15
1. Getting Started
Enhanced Security
This machine's security functions can be enhanced by managing the machine and its users using the
1 improved authentication functions.
By specifying access limits for the machine's functions and the documents and data stored in the machine,
information leaks and unauthorized access can be prevented.
Data encryption also prevents unauthorized data access and tampering via the network.
The machine also automatically checks the configuration and supplier of the firmware each time the main
power is switched on and whenever firmware is installed.
Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To enable authentication,
information about both administrators and users must be registered in order to authenticate users via
their login user names and passwords.
Four types of administrators manage specific areas of machine usage, such as settings and user
registration.
Access limits for each user are specified by the administrator responsible for user access to machine
functions and documents and data stored in the machine.
For details about the administrator, see "Administrators".
For details about the user, see "Users".
Encryption Technology
This machine can establish secure communication paths by encrypting transmitted data and
passwords.
• p.21 "Administrators"
• p.37 "Users"
16
Glossary
Glossary
Administrator
There are four types of administrators according to administrative function: machine administrator, 1
network administrator, file administrator, and user administrator. We recommend a different person
for each administrator role.
In this way, you can spread the workload and limit unauthorized operation by a single administrator.
Basically, administrators make machine settings and manage the machine; but they cannot perform
normal operations, such as copying and printing.
User
A user performs normal operations on the machine, such as copying and printing.
Registered User
Users with personal information registered in the Address Book who have a login password and user
name.
Administrator Authentication
Administrators are authenticated by their login user name and login password, supplied by the
administrator, when specifying the machine's settings or accessing the machine over the network.
User Authentication
Users are authenticated by a login user name and login password, supplied by the user, when
specifying the machine's settings or accessing the machine over the network.
The user's login user name and password, as well as such personal information items as facsimile
number and e-mail address, are stored in the machine's Address Book. Personal information can be
obtained from the Windows domain controller (Windows authentication), LDAP Server (LDAP
authentication), or Integration Server (Integration Server authentication) connected to the machine
via the network. The "Integration Server" is the computer on which Authentication Manager is installed.
Login
This action is required for administrator authentication and user authentication. Enter your login user
name and login password on the machine's control panel. A login user name and login password
may also be required when accessing the machine over the network or using such utilities as Web
Image Monitor and SmartDeviceMonitor for Admin.
Logout
This action is required with administrator and user authentication. This action is required when you
have finished using the machine or changing the settings.
17
1. Getting Started
Enabling Authentication
To control administrators' and users' access to the machine, perform administrator authentication and
user authentication using login user names and login passwords. To perform authentication, the
authentication function must be enabled. For details about authentication settings, see "Configuring
User Authentication".
Specifying Authentication Information to Log on
Users are managed using the personal information managed in the machine's Address Book.
By enabling user authentication, you can allow only people registered in the Address Book to use the
machine. Users can be managed in the Address Book by the user administrator. For information on
specifying information to log on, see "Basic Authentication".
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By
making this setting, you can limit the functions available to users. For information on how to specify
which functions are available, see "Limiting Available Functions".
18
Security Measures Provided by this Machine
19
1. Getting Started
1 The machine settings that can be modified depend on the type of administrator account.
Register the administrators so that users cannot change the administrator settings. For details about
preventing modification of machine settings, see "Preventing Changes to Machine Settings".
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access each of the machine's
functions. For details about limiting available functions for users and groups, see "Limiting Available
Functions".
20
2. Configuring Administrator
Authentication
This chapter explains what an administrator can do, how to register an administrator, how to specify
administrator authentication, and how to log on to and off from the machine as an administrator.
2
Administrators
Administrators manage user access to the machine and various other important functions and settings.
When an administrator controls access limitations and other settings, first select the machine's administrator
and enable the authentication function before using the machine. When the authentication function is
enabled, the login user name and login password are required in order to use the machine. There are four
types of administrators: machine administrator, network administrator, file administrator and user
administrator. Sharing administrator tasks eases the burden on individual administrators while also limiting
unauthorized operation by administrators. One person can act as more than one type of administrator.
You can also specify a supervisor who can change each administrator's password. Administrators cannot
use functions such as copying and printing. To use these functions, the administrator must be authenticated
as the user.
For instructions on registering the administrator, see "Registering the Administrator", and for instructions on
changing the administrator's password, see "Supervisor Operations". For details on Users, see "Users".
• If user authentication is not possible because of a problem with the hard disk or network, you can use
the machine by accessing it using administrator authentication and disabling user authentication. Do
this if, for instance, you need to use the machine urgently.
User Administrator
This is the administrator who manages personal information in the Address Book.
A user administrator can register/delete users in the Address Book or change users' personal information.
Users registered in the Address Book can also change and delete their own information.
If any of the users forget their password, the user administrator can delete it and create a new one, allowing
the user to access the machine again.
21
2. Configuring Administrator Authentication
Machine Administrator
This is the administrator who mainly manages the machine's default settings. You can set the machine so
that the default for each function can only be specified by the machine administrator. By making this setting,
you can prevent unauthorized people from changing the settings and allow the machine to be used securely
by its many users.
2
Network Administrator
This is the administrator who manages the network settings. You can set the machine so that network settings
such as the IP address and settings for sending and receiving e-mail can only be specified by the network
administrator.
By making this setting, you can prevent unauthorized users from changing the settings and disabling the
machine, and thus ensure correct network operation.
File Administrator
This is the administrator who manages files. The file administrator can carry out such tasks as deleting Locked
Print files and changing passwords.
Supervisor
The supervisor can delete an administrator's password and specify a new one. The supervisor cannot
specify defaults or use normal functions. However, if any of the administrators forget their password and
cannot access the machine, the supervisor can provide support.
22
About Administrator Authentication
BBC005S
1. User Administrator
This administrator manages personal information in the Address Book. You can register/delete users in the
Address Book or change users' personal information.
2. Machine Administrator
This administrator manages the machine's default settings. It is possible to enable only the machine administrator
to set log deletion and other defaults.
3. Network Administrator
This administrator manages the network settings. You can set the machine so that network settings such as the IP
address and settings for sending and receiving e-mail can be specified by the network administrator only.
4. File Administrator
This is the administrator who manages files. The file administrator can carry out such tasks as deleting Locked
Print files and changing passwords.
5. Authentication
Administrators must enter their login user name and password to be authenticated.
6. This machine
7. Administrators manage the machine's settings and access limits.
23
2. Configuring Administrator Authentication
• p.21 "Administrators"
24
Enabling Administrator Authentication
• Administrator authentication can also be specified via Web Image Monitor. For details, see Web
Image Monitor Help.
• You can specify User Code Authentication without specifying administrator authentication.
25
2. Configuring Administrator Authentication
• If you have enabled Administrator Authentication Management, make sure not to forget the
administrator login user name and login password. If an administrator login user name or login
password is forgotten, a new password must be specified using the supervisor's authority. For
instructions on registering the supervisor, see "Supervisor Operations".
• Be sure not to forget the supervisor login user name and login password. If you do forget them, a
2 service representative will have to return the machine to its default state. This will result in all data in
the machine being lost. Charges may also apply to the service call.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Press [Admin. Auth. Management] using [ ] or [ ], and then press the [OK] key.
26
Enabling Administrator Authentication
[Items] appears. 2
7. Select the settings to manage from [Items] using [ ], and then press the [OK] key.
If administrator authentication has been specified, we recommend only one person take each administrator
role.
The sharing of administrator tasks eases the burden on individual administrators while also limiting
unauthorized operation by a single administrator. You can register up to four login user names
(Administrators 1-4) to which you can grant administrator privileges.
Administrator authentication can also be specified via Web Image Monitor. For details, see Web Image
Monitor Help.
If administrator authentication has already been specified, log on using a registered administrator name
and password.
27
2. Configuring Administrator Authentication
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
28
Enabling Administrator Authentication
2
The box next to a selected item is checked. To deselect the item, press [ ].
8. Press the [OK] key.
9. Press [Exit].
10. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
11. Select the setting you want to specify, and then press the [OK] key.
12. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.
29
2. Configuring Administrator Authentication
13. Enter the login user name, and then press the [OK] key.
2 14. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
15. Enter the login password, and then press the [OK] key.
Follow the password policy to make the login password more secure.
For details about the password policy and how to specify it, see "Specifying the Extended Security
Functions".
16. If a password reentry screen appears, enter the login password, and then press the [OK]
key.
17. Select [Encryption Password] using [ ] or [ ], and then press the [OK] key.
30
Enabling Administrator Authentication
18. Enter the encryption password, and then press the [OK] key.
19. If a password reentry screen appears, enter the encryption password, and then press the 2
[OK] key.
• You can use up to 32 alphanumeric characters and symbols when registering login user names and
login passwords. Keep in mind that passwords are case-sensitive.
• User names cannot contain numbers only, a space, colon (:), or quotation mark ("), nor can they be
left blank.
• Do not use Japanese, Traditional Chinese, Simplified Chinese, or Hangul double-byte characters
when entering the login user name or password. If you use multi-byte characters when entering the
login user name or password, you cannot authenticate using Web Image Monitor.
31
2. Configuring Administrator Authentication
If administrator authentication has been specified, log on using an administrator's user name and password.
This section describes how to log on. When you log on with a user name that has multiple administrator
authorities, one of the authorities associated with that name is displayed.
3. Enter the login user name, and then press the [OK] key.
When you log on to the machine for the first time as the administrator, enter "admin".
4. Enter the login password, and then press the [OK] key.
If assigning the administrator for the first time, press the [OK] key without entering login password.
"Authenticating... Please wait." appears, followed by the screen for specifying the default. To log on
as an administrator, enter the administrator's login user name and login password.
• If you try to log on from an operating screen, "Privileges are required. Administrator-login is limited
to setting changes only." appears. Press the [User Tools/Counter] key to change the default.
• If user authentication has already been specified, a screen for authentication appears.
• If you log on using administrator authority, the name of the administrator logging on appears.
• If you log on using a login user name with the authority of more than one administrator, "Administrator"
appears.
32
Enabling Administrator Authentication
If administrator authentication has been specified, be sure to log off after completing settings. This section
explains how to log off after completing settings.
1. Press [Logout].
2. Press [Yes].
Change the administrator's login user name and login password. You can also assign administrator
authority to the login user names [Administrator 1] to [Administrator 4]. To combine the authorities of multiple
administrators, assign multiple administrators to a single administrator.
For example, to assign machine administrator authority and user administrator authority to [Administrator
1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
33
2. Configuring Administrator Authentication
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
2 4. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
The box next to a selected item is checked. To deselect the item, press [ ].
8. Press the [OK] key.
34
Enabling Administrator Authentication
9. Press [Exit].
10. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key. 2
11. Select the administrator you want to change settings using [ ] or [ ], and then press the
[OK] key, and re-enter the setting.
Using Web Image Monitor, you can log on to the machine and change the administrator settings. This
section describes how to access Web Image Monitor.
For details about Web Image Monitor, see Web Image Monitor Help.
35
2. Configuring Administrator Authentication
4. Enter the login name and password of an administrator, and then click [Login].
5. Make settings as desired.
• When logging on as an administrator use the login name and password of an administrator set in the
machine. The default login name is "admin" and the password is blank.
36
3. Configuring User Authentication
This chapter explains what a user can do, how to specify user authentication, and how to log on to and
off from the machine as a used.
Users
A user performs normal operations on the machine, such as copying and printing. Users are managed
using the personal information in the machine's Address Book, and can use only the functions they are
permitted to access by administrators. By enabling user authentication, you can allow only people 3
registered in the Address Book to use the machine. Users can be managed in the Address Book by the user
administrator. For details about administrator, see "Administrators". For details about registering users in
the Address Book, see "Administrator Tools", Network and System Settings Guide, SmartDeviceMonitor
for Admin Help, or Web Image Monitor Help.
• If user authentication is not possible because of a problem with the hard disk or network, you can use
the machine by accessing it using administrator authentication and disabling user authentication. Do
this if, for instance, you need to use the machine urgently.
• p.21 "Administrators"
37
3. Configuring User Authentication
BBC004S
1. User
A user performs normal operations on the machine, such as copying and printing.
2. Group
A group performs normal operations on the machine, such as copying and printing.
3. Unauthorized User
4. Authentication
Using a login user name and password, user authentication is performed.
5. This Machine
6. Access Limit
Using authentication, unauthorized users are prevented from accessing the machine.
7. Authorized users and groups can use only those functions permitted by the administrator.
38
Configuring User Authentication
39
3. Configuring User Authentication
40
Enabling User Authentication
3
• User Code authentication is used for authenticating on the basis of a user code, and Basic
authentication, Windows authentication, LDAP authentication, and Integration Server authentication
are used for authenticating individual users.
• You can specify User Code authentication without specifying administrator authentication.
• A user code account, that has no more than eight digits and is used for User Code authentication,
can be carried over and used as a login user name even after the authentication method has switched
from User Code authentication to Basic authentication, Windows authentication, LDAP authentication,
or Integration Server authentication. In this case, since the User Code authentication does not have
a password, the login password is set as blank.
• When authentication switches to an external authentication method (Windows authentication, LDAP
authentication, or Integration Server authentication), authentication will not occur, unless the external
authentication device has the carried over user code account previously registered. However, the
user code account will remain in the Address Book of the machine despite an authentication failure.
From a security perspective, when switching from User Code authentication to another authentication
method, we recommend that you delete accounts you are not going to use, or set up a login password.
For details about deleting accounts, see "Deleting a Registered Name", Network and System Settings
Guide. For details about changing passwords, see "Specifying Login User Names and Passwords".
• You cannot use more than one authentication method at the same time.
• User authentication can also be specified via Web Image Monitor. For details, see Web Image
Monitor Help.
41
3. Configuring User Authentication
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
42
User Code Authentication
7. Select which of the machine's functions you want to limit using [ ] or [ ], and then press the
[ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
The selected settings will be unavailable to users.
For details about limiting available functions for individuals or groups, see "Limiting Available
Functions".
8. Press the [OK] key.
9. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
43
3. Configuring User Authentication
3
Selecting Entire or Simple (All)
If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
To print under an environment that does not support authentication, select [Simple(All)] or [Simple
(Limitation)].
If you select [Simple(All)], you can print even with unauthenticated printer drivers or devices. Specify this
setting if you want to print with a printer driver or device that cannot be identified by the machine or if you
do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.
1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
44
User Code Authentication
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
45
3. Configuring User Authentication
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
46
User Code Authentication
47
3. Configuring User Authentication
Basic Authentication
Specify this authentication method when using the machine's Address Book to authenticate each user. Using
Basic authentication, you can not only manage the machine's available functions but also limit access to
the personal data in the Address Book. Under Basic authentication, the administrator must specify the
functions available to each user registered in the Address Book.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
48
Basic Authentication
7. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
The functions you select here become the default Basic Authentication settings that will be assigned
to all new users of the Address Book.
For details about specifying available functions for individuals or groups, see "Limiting Available
Functions".
8. Press the [OK] key.
9. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
49
3. Configuring User Authentication
1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
50
Basic Authentication
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
51
3. Configuring User Authentication
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
52
Basic Authentication
In [Address Book Management], specify the login user name and login password to be used for User
Authentication Management.
Login user names can contain up to 32 characters; passwords can contain up to 128 characters. Both user
names and passwords can contain alphanumeric characters and symbols. User names cannot contain
spaces, colons, or quotation marks, and cannot be blank.
53
3. Configuring User Authentication
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
7. Press the [OK] key.
8. Press [Details].
54
Basic Authentication
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [Login Authent.Info] using [ ] or [ ], and then press the [OK] key.
11. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.
12. Enter the login name, and then press the [OK] key.
13. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
14. Enter the login password, and then press the [OK] key.
55
3. Configuring User Authentication
15. Re-enter the login password, and then press the [OK] key.
The login user name and password specified in [Address Book Management] can be used as the login
information for "SMTP Authentication", "Folder Authentication" and "LDAP Authentication".
If you do not want to use the login user name and password specified in [Address Book Management] for
"SMTP Authentication", "Folder Authentication", or "LDAP Authentication", see "Address Book", Network
and System Settings Guide.
For details about specifying login user name and login password, see "Specifying Login User Names and
Passwords".
• When using [Use Auth. Info at Login] for "SMTP Authentication", "Folder Authentication" or "LDAP
Authentication", a user name other than "other", "admin", "supervisor" or "HIDE***" must be
specified. The symbol "***" represents any character.
• To use "Use Auth. Info at Login" for "SMTP Authentication", a login password up to 128 characters
in length must be specified.
56
Basic Authentication
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
7. Press the [OK] key.
57
3. Configuring User Authentication
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [LDAP Authentication] using [ ] or [ ], and then press the [OK] key.
11. Select [Use Auth. Info at Login] using [ ] or [ ], and then press the [OK] key.
For folder authentication, select [Use Auth. Info at Login] in "Folder Authentication".
For SMTP authentication, select [Use Auth. Info at Login] in "SMTP Authentication".
12. Press the [Escape] key.
58
Basic Authentication
59
3. Configuring User Authentication
Windows Authentication
Specify this authentication when using the Windows domain controller to authenticate users who have their
accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the
directory server. Under Windows authentication, you can specify the access limit for each group registered
in the directory server. The Address Book stored in the directory server can be registered to the machine,
enabling user authentication without first using the machine to register individual settings in the Address
Book. If you can obtain user information, the sender's address (From:) is fixed to prevent unauthorized
access when sending e-mails under the scanner function and forwarding received e-mails.
3 Windows authentication can be performed using one of two authentication methods: NTLM or Kerberos
authentication. The operational requirements for both methods are listed below.
Operational Requirements for NTLM authentication
To specify NTLM authentication, the following requirements must be met:
• This machine only supports NTLMv1 authentication.
• A domain controller has been set up in a designated domain.
• This function is supported by the operating systems listed below. To obtain user information when
running Active Directory, use LDAP. If SSL is being used, a version of Windows that supports TLS
v1, SSL v2, or SSL v3 is required.
• Windows 2000 Server
• Windows Server 2003/Windows Server 2003 R2
• Windows Server 2008
Operational Requirements for Kerberos authentication
To specify Kerberos authentication, the following requirements must be met:
• A domain controller must be set up in a designated domain.
• The operating system must be able to support KDC (Key Distribution Center). To obtain user
information when running Active Directory, use LDAP. If SSL is being used, a version of Windows
that supports TLSv1, SSLv2, or SSLv3 is required. Compatible operating systems are listed below.
• Windows 2000 Server
• Windows Server 2003/Windows Server 2003 R2
• Windows Server 2008
• During Windows Authentication, data registered in the directory server, such as the user's e-mail
address, is automatically registered in the machine. If user information on the server is changed,
information registered in the machine may be overwritten when authentication is performed.
• Users managed in other domains are subject to user authentication, but they cannot obtain items such
as e-mail addresses.
60
Windows Authentication
• If you have created a new user in the domain controller and selected "User must change password
at next logon", log on to the machine from the computer to change the password before logging on
from the machine's control panel.
• If the authenticating server only supports NTLM when Kerberos authentication is selected on the
machine, the authenticating method will automatically switch to NTLM.
• If Kerberos authentication and SSL encryption are set at the same time, e-mail addresses cannot be
obtained.
Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Admin. Auth. Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
61
3. Configuring User Authentication
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
8. Select [Realm Name] using [ ] or [ ], and then press the [OK] key.
62
Windows Authentication
9. Select the realm using [ ] or [ ], and then press the [OK] key.
10. Select [Domain Name] using [ ] or [ ], and then press the [OK] key.
12. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
63
3. Configuring User Authentication
1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.
3
2. Press [Exit].
• To automatically register user information such as fax numbers and e-mail addresses under Windows
authentication, it is recommended that communication between the machine and domain controller
be encrypted using SSL.
• Under Windows Authentication, you do not have to create a server certificate unless you want to
automatically register user information such as fax numbers and e-mail addresses using SSL.
64
Windows Authentication
If you select [Simple(Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.
3
Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface(Sim.)], proceed to step 5.
If you specify [USB(Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
65
3. Configuring User Authentication
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
66
Windows Authentication
• To automatically register user information such as fax numbers and e-mail addresses under Windows
authentication, it is recommended that communication between the machine and domain controller
be encrypted using SSL.
• Under Windows Authentication, you do not have to create a server certificate unless you want to
automatically register user information such as fax numbers and e-mail addresses using SSL.
After installing Internet Information Services (IIS) and Certificate services Windows components, create the
Server Certificate as follows:
67
3. Configuring User Authentication
If the fax number cannot be obtained during authentication, specify the setting as follows:
1. Start C:\WINNT\SYSTEM32\adminpak.
Setup Wizard starts.
2. Select [Install all of the Administrator Tools], and then click [Next].
3. On the "Start" menu, select [Run].
4. Enter "mmc", and then click [OK].
5. On the "Console", select [Add/Remove Snap-in].
6. Click [Add].
7. Select [Active Directory Schema], and then click [Add].
8. Select [Facsimile Telephone Number].
9. Right-click, and then click [Properties].
10. Select "Replicate this attribute", and then click [Apply].
68
Windows Authentication
69
3. Configuring User Authentication
LDAP Authentication
Specify this authentication method when using the LDAP server to authenticate users who have their accounts
on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server.
The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication
without first using the machine to register individual settings in the Address Book. When using LDAP
authentication, to prevent the password information being sent over the network unencrypted, it is
recommended that communication between the machine and LDAP server be encrypted using SSL. You
can specify on the LDAP server whether or not to enable SSL. To do this, you must create a server certificate
3 for the LDAP server.
Using Web Image Monitor, you can specify whether or not to check the reliability of the connecting SSL
server. For details about specifying LDAP authentication using Web Image Monitor, see Web Image
Monitor Help.
• During LDAP authentication, the data registered in the LDAP server is automatically registered in the
machine. If user information on the server is changed, information registered in the machine may be
overwritten when authentication is performed.
• Under LDAP authentication, you cannot specify access limits for groups registered in the LDAP server.
• Enter the user's login user name using up to 32 characters and login password using up to 128
characters.
• Do not use double-byte Japanese, Traditional Chinese, Simplified Chinese, or Hangul characters
when entering the login user name or password. If you use double-byte characters, you cannot
authenticate using Web Image Monitor.
Operational Requirements for LDAP Authentication
To specify LDAP authentication, the following requirements must be met:
• The network configuration must allow the machine to detect the presence of the LDAP server.
• When SSL is being used, TLSv1, SSLv2, or SSLv3 can function on the LDAP server.
• The LDAP server must be registered in the machine.
• When registering the LDAP server, the following setting must be specified.
• Server Name
• Search Base
• Port Number
• SSL Communication
• Authentication
Select either Kerberos, DIGEST, or Cleartext authentication.
• User Name
70
LDAP Authentication
You do not have to enter the user name if the LDAP server supports "Anonymous
Authentication".
• Password
You do not have to enter the password if the LDAP server supports "Anonymous
Authentication".
• When you select Cleartext authentication, LDAP Simplified authentication is enabled. Simplified
authentication can be performed with a user attribute (such as cn, or uid), instead of the DN.
• You can also prohibit blank passwords at login for simplified authentication. For details about LDAP 3
Simplified authentication, contact your sales representative.
• Under LDAP Authentication, if "Anonymous Authentication" in the LDAP server's settings is not set to
Prohibit, users who do not have an LDAP server account might still be able to gain access.
• If the LDAP server is configured using Windows Active Directory, "Anonymous Authentication" might
be available. If Windows authentication is available, we recommend you use it.
• The first time an unregistered user accesses the machine after LDAP authentication has been specified,
the user is registered in the machine and can use the functions available under "Available Functions"
during LDAP Authentication. To limit the available functions for each user, register each user and
corresponding "Available Functions" setting in the Address Book, or specify "Available Functions" for
each registered user. The "Available Functions" setting becomes effective when the user accesses the
machine subsequently.
• To enable Kerberos for LDAP authentication, a realm must be registered beforehand. The realm must
be programmed in capital letters. For details about registering a realm, see the "Programming the
LDAP Server", or "Programming the Realm", Network and System Settings Guide.
• The reference function is not available for SSL servers when a search for LDAP is in progress.
Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Admin. Auth. Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
71
3. Configuring User Authentication
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
7. Select the LDAP server to be used for LDAP authentication using [ ] or [ ], and then press
the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
72
LDAP Authentication
9. Select [Login Name Attribute] using [ ] or [ ], and then press the [OK] key.
10. Enter the login name attribute, and then press the [OK] key.
You can use the Login Name Attribute as a search criterion to obtain information about an
authenticated user. You can create a search filter based on the Login Name Attribute, select a user,
and then retrieve the user information from the LDAP server so it is transferred to the machine's address
book. The method for selecting the user name depends on the server environment. Check the server
environment and enter the user name accordingly.
11. Select [Unique Attribute] using [ ] or [ ], and then press the [OK] key.
12. Enter the unique attribute, and then press the [OK] key.
Specify Unique Attribute on the machine to match the user information in the LDAP server with that in
the machine. By doing this, if the Unique Attribute of a user registered in the LDAP server matches that
of a user registered in the machine, the two instances are treated as referring to the same user. You
can enter an attribute such as "serialNumber" or "uid". Additionally, you can enter "cn" or
73
3. Configuring User Authentication
"employeeNumber", provided it is unique. If you do not specify the Unique Attribute, an account with
the same user information but with a different login user name will be created in the machine.
13. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.
14. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
3 the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
LDAP Authentication will be applied to the selected functions. Users can use the selected functions
only.
15. Press the [OK] key.
16. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
74
LDAP Authentication
1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
75
3. Configuring User Authentication
If you select [Simple(Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.
3
Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface(Sim.)], proceed to step 5.
If you specify [USB(Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
76
LDAP Authentication
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
77
3. Configuring User Authentication
• During Integration Server Authentication, the data registered in the server is automatically registered
in the machine.
• If user information on the server is changed, information registered in the machine may be overwritten
when authentication is performed.
• The default administrator name for ScanRouter System or Web SmartDeviceMonitor, "Admin," differs
from the server, "admin".
Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Admin. Auth. Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
78
Integration Server Authentication
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
79
3. Configuring User Authentication
8. Select [Authentication Type] using [ ] or [ ], and then press the [OK] key.
9. Select the authentication system for external authentication using [ ] or [ ], and then press
the [OK] key.
11. Enter the domain name, and then press the [OK] key.
You cannot specify a domain name under an authentication system that does not support domain
login.
12. Select [Obtain URL] using [ ] or [ ], and then press the [OK] key.
The machine obtains the URL of the server specified in "Server Name".
If "Server Name" or the setting for enabling SSL is changed after obtaining the URL, the "URL" will be
not obtained.
If you set "Authentication Type" to "Windows", you can use the global group.
If you set "Authentication Type" to "Notes", you can use the Notes group.
80
Integration Server Authentication
If you set "Authentication Type" to "Basic (Integration Server)", you can use the groups created using
the Authentication Manager.
13. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
14. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.
3
15. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.
16. Enter the group name, and then press the [OK] key.
17. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
Authentication will be applied to the selected functions.
Users can use the selected functions only.
For details about specifying available functions for individuals or groups, see "Limiting Available
Functions".
81
3. Configuring User Authentication
18. Press the [OK] key, and then press the [Escape] key twice.
19. Select [SSL] using [ ] or [ ], and then press the [OK] key.
20. Select [On] using [ ] or [ ], and then press the [OK] key.
To not use secure sockets layer (SSL) for authentication, press [Off].
21. Press [Exit].
22. Select [Integration Svr. Auth.] using [ ] or [ ], and then press [Details].
23. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
82
Integration Server Authentication
1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
83
3. Configuring User Authentication
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
84
Integration Server Authentication
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
85
3. Configuring User Authentication
86
Printer Job Authentication
[Simple [Simple
[Printer Job Authentication] [Entire] [Entire]
(All)] (All)]
87
3. Configuring User Authentication
Settings: Disabled
• [Simple(All)]
The machine authenticates printer jobs and remote settings that have authentication information,
and cancels the jobs and settings that fail authentication.
Printer jobs and settings without authentication information are performed without being
authenticated.
• [Simple(Limitation)]
You can specify the range to apply [Simple(Limitation)] to by specifying [Parallel Interface(Sim.)],
3 [USB(Sim.)], and the client's IPv4 address.
Printer Job Types
1. In the PCL printer driver dialog box, the "User Authentication" and "Encrypt" check boxes are
selected. Personal authentication information is added to the printer job. The printer driver applies
advanced encryption to the login passwords. The printer driver encryption key enables driver
encryption and prevents the login password from being stolen.
For details about prohibiting the use of simple encryption using "Simple Encryption", see
"Specifying the Extended Security Functions".
2. In the PCL printer driver dialog box, the "User Authentication" and "Encrypt" check boxes are
selected. Personal authentication information is added to the printer job. The printer driver applies
simple encryption to login passwords.
For details about turning off "Simple Encryption" and allowing the use of simple encryption, see
"Specifying the Extended Security Functions".
3. In the PCL printer driver dialog box, the "User Authentication" check box is not selected. Personal
authentication information is added to the printer job and is disabled.
4. When using the PostScript 3 printer driver, the printer job contains user code information.
Personal authentication information is not added to the printer job but the user code information
is. This also applies to recovery/parallel printing using a PCL printer driver that does not support
authentication.
5. When using the PostScript 3 printer driver, the printer job does not contain user code information.
Neither personal authentication information nor user code information is added to the printer
job. This also applies to recovery/parallel printing using a PCL printer driver that does not support
authentication.
6. A printer job or PDF file is sent from a host computer without a printer driver and is printed via
LPR. Personal authentication information is not added to the printer job. The above is also true
for Mail to Print. For details about Mail to Print, see "Reception", Facsimile Reference.
7. A PDF file is printed via ftp. Personal authentication is performed using the user ID and password
used for logging on via ftp. However, the user ID and password are not encrypted.
88
Printer Job Authentication
89
3. Configuring User Authentication
• Consult the User Administrator about your login user name, password, and user code.
• For user code authentication, enter a number registered in the Address Book as [User Code].
• The Auto Logout Timer can only be used under Basic Authentication, Windows Authentication, LDAP
Authentication, or Integration Server Authentication.
1. Enter a user code (up to 8 digits), and then press the [OK] key.
90
If User Authentication is Specified
When the authentication is successful, a screen showing the corresponding function is displayed.
1. Press [Login].
2. Enter a login user name, and then press the [OK] key.
91
3. Configuring User Authentication
When the user is authenticated, the screen for the function you are using appears.
3. Press [Yes].
92
If User Authentication is Specified
2. Enter a login user name and password, and then click [Login].
• For user code authentication, enter a user code in "User Name", and then click [Login].
• Delete the cache memory in the Web Image Monitor after logging off.
3
If an incorrect password is entered several times, the User Lockout function prevents further login attempts
under the same user name. Even if the locked out user enters the correct password later, authentication will
fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor
disables the lockout.
To use the lockout function for user authentication, the authentication method must be set to Basic
authentication. Under other authentication methods, the lockout function protects supervisor and
administrator accounts only, not general user accounts.
Lockout setting items
The lockout function settings can be made using Web Image Monitor.
93
3. Configuring User Authentication
94
If User Authentication is Specified
Auto Logout
95
3. Configuring User Authentication
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Timer Settings] using [ ] or [ ], and then press the [OK] key.
4. Select [Auto Logout Timer] using [ ] or [ ], and then press the [OK] key.
6. Enter "60" to "999" (seconds) using the number keys, and then press the [OK] key.
• If a paper jam occurs or a print cartridge runs out of ink, the machine might not be able to perform
the Auto Logout function.
96
Authentication Using an External Device
97
3. Configuring User Authentication
98
4. Protecting Data from Information
Leaks
This chapter describes how to protect document data.
• To store files temporarily, select [Stored Print] in the printer driver. If you select [Stored Print (Shared)],
you can also share these files.
99
4. Protecting Data from Information Leaks
The password entered here lets you use the Locked Print function.
To print a Locked Print file, enter the same password on the control panel.
The password is encrypted during data transmission.
5. Click [OK].
A confirmation message appears.
6. Print the locked document.
To print a Locked Print file, you must be at the machine and print the file using the control panel.
4 To print Locked Print files, the password is required. If you do not enter the correct password, you cannot
print the files. The file administrator can change the user password if it is forgotten.
For details about logging on and logging off with user authentication, see "If User Authentication is
Specified".
This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.
3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].
Only Locked Print files belonging to the user who has logged on appear.
4. Select the Locked Print file using [ ] or [ ], and then press [Print].
100
Printing a Confidential Document
5. Enter the password for the stored file, and then press the [OK] key.
3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].
101
4. Protecting Data from Information Leaks
4. Select the Locked Print file using [ ] or [ ], and then press [Delete].
5. Enter the password for the stored file, and then press the [OK] key.
4 6. Press [Delete].
102
Printing a Confidential Document
3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].
4. Select the Locked Print file using [ ] or [ ], and then press [Change].
5. Enter the password for the stored file, and then press the [OK] key.
4
7. Enter the new password for the stored file, and then press the [OK] key.
8. If a password reentry screen appears, enter the login password, and then press the [OK]
key.
The password entry screen does not appear if the file administrator is logged on.
103
4. Protecting Data from Information Leaks
If you specify [On] for "Enhance File Protection", the file will be locked and become inaccessible if an
invalid password is entered ten times. This section explains how to unlock files.
"Enhance File Protection" is one of the extended security functions. For details about this and other extended
security functions, see "Specifying the Extended Security Functions".
Only the file administrator can unlock files. For details about logging on and logging off with administrator
authentication, see "Logging on Using Administrator Authentication", "Logging off Using Administrator
Authentication".
This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.
3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].
4. Select the Locked Print file using [ ] or [ ], and then press [Change].
5. Select [Unlock Files] using [ ] or [ ], and then press the [OK] key.
104
Printing a Confidential Document
6. Press [Unlock].
• You can use the same procedure to unlock stored print files also.
105
4. Protecting Data from Information Leaks
106
5. Securing Information Sent over the
Network or Stored on Hard Disk
This chapter describes how to protect information transmitted through the network or stored on the hard
disk from unauthorized viewing and modification.
Restricting Destinations
107
5. Securing Information Sent over the Network or Stored on Hard Disk
can enter destinations directly, but cannot use "Program" to register data in the Address Book on the scanner
screen.
When this setting is made, only the user administrator can change the Address Book. "Restrict Dest. Use
(Fax)", "Rstrct Dest. Use(Scanner)", "Rstrct Dest. Add.(Fax)", and "Rstrct Dest. Add.(Scanner)" are extended
security functions. For more information about these and the extended security functions, see "Specifying
the Extended Security Functions".
" Restricting Destinations" can also be specified using Web Image Monitor or SmartDeviceMonitor for
Admin. For details, see the Help for these applications.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
5. Select [Rstrct Dest. Use(Scanner)] using [ ] or [ ], and then press the [OK] key.
108
Preventing Information Leakage Due to Unauthorized Transmission
109
5. Securing Information Sent over the Network or Stored on Hard Disk
• To use S/MIME, you must first specify "Administrator's E-mail Address" in [System Settings].
• If an electronic signature is specified for an e-mail, the administrator's address appears in the "From"
field and the address of the user specified as "sender" appears in the "Reply To" field.
• When sending e-mail to users that support S/MIME and users that do not support S/MIME at the
same time, the e-mail is separated into encrypted and unencrypted groups and then sent.
• When using S/MIME, the e-mail size is larger than normal.
E-mail Encryption
To send encrypted e-mail using S/MIME, the user certificate must first be prepared using Web Image
Monitor and registered in the Address Book by the user administrator. Registering the certificate in the
Address Book specifies each user's public key. After installing the certificate, specify the encryption
algorithm using Web Image Monitor. The network administrator can specify the algorithm.
E-mail Encryption
1. Prepare the user certificate.
2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the
certificate is specified in the Address Book.)
3. Specify the encryption algorithm using Web Image Monitor.
110
Using S/MIME to Protect E-mail Transmission
• There are three types of user certificates that can be installed on this machine, "DER encoded binary
X.509", "Base 64 encoded X.509", and "PKCS #7 certificate".
• When installing a user certificate to the Address Book using Web Image Monitor, you might see an
error message if the certificate file contains more than one certificate. If this error message appears,
install the certificates one at a time.
111
5. Securing Information Sent over the Network or Stored on Hard Disk
To attach an electronic signature to sent e-mail, a device certificate must be installed in advance.
It is possible to use either a self-signed certificate created by the machine, or a certificate issued by a
certificate authority.
• To install an S/MIME device certificate, you must first register "Administrator's E-mail Address" in
[System Settings] as the e-mail address for the device certificate. Note that even if you will not be
using S/MIME, you must still specify an e-mail address for the S/MIME device certificate.
Electronic Signature
1. Install a device certificate on the machine. (The secret key on the certificate is configured on the
machine.)
2. Attach the electronic signature to an e-mail using the secret key provided by the device certificate.
3. Send the e-mail with the electronic signature attached to the user.
4. The receiver requests the public key and device certificate from the machine.
112
Using S/MIME to Protect E-mail Transmission
5. Using the public key, you can determine the authenticity of the attached electronic signature to
see if the message has been altered.
Configuration flow (self-signed certificate)
1. Creating and installing the device certificate.
Create and install the device certificate using Web Image Monitor.
2. Make certificate settings.
Make settings for the certificate to be used for S/MIME using Web Image Monitor.
3. Make electronic signature settings.
Make settings for the electronic signature using Web Image Monitor.
Configuration flow (certificate issued by a certificate authority)
1. Create the device certificate.
Create the device certificate using Web Image Monitor.
The application procedure for a created certificate depends on the certificate authority. Follow 5
the procedure specified by the certificate authority.
2. Install the device certificate.
Install the device certificate using Web Image Monitor.
3. Make certificate settings.
Make settings for the certificate to be used for S/MIME using Web Image Monitor.
4. Make electronic signature settings.
Make settings for the electronic signature using Web Image Monitor.
113
5. Securing Information Sent over the Network or Stored on Hard Disk
114
Using S/MIME to Protect E-mail Transmission
8. Click [OK].
"Requesting" appears for Certificate Status in the "Certificates" area.
9. Click [Logout].
10. Apply to the certificate authority for the device certificate.
The application procedure depends on the certificate authority. For details, contact the certificate
authority.
For application details, click the Web Image Monitor Details icon and use the information shown in
"Certificate Details".
• The issuing location may not be displayed if you request two certificates at the same time. When you
install a certificate, be sure to check the certificate destination and installation procedure.
• Using Web Image Monitor, you can create the contents of the device certificate but you cannot send
the certificate application.
• Click [Cancel Request] to cancel the request for the device certificate.
5
115
5. Securing Information Sent over the Network or Stored on Hard Disk
116
Using S/MIME to Protect E-mail Transmission
117
5. Securing Information Sent over the Network or Stored on Hard Disk
This can be specified by the registered user. Access permission can also be specified by a user granted
full control or the user administrator.
You can specify who is allowed to access the data in the Address Book.
By making this setting, you can prevent the data in the Address Book being used by unregistered users.
5 For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Press [Address Book Management] using [ ] or [ ], and then press the [OK] key.
118
Protecting the Address Book
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination. 5
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.
10. Select [Dest.Protect:Permissions] using [ ] or [ ], and then press the [OK] key.
119
5. Securing Information Sent over the Network or Stored on Hard Disk
14. Select the permission, and then press the [OK] key.
Select the permission, from [Read-only], [Edit], [Edit/Delete], or [Full Control].
To register multiple users, repeat steps 12 to 14.
120
Protecting the Address Book
You can encrypt the data in the Address Book using the extended security function, "Encrypt Address Book".
For details about this and other extended security functions, see "Specifying the Extended Security
Functions".
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
5. Select [Encrypt Address Book] using [ ] or [ ], and then press the [OK] key.
6. Select the setting you want to change using [ ] or [ ], and then press [Enc.Key].
121
5. Securing Information Sent over the Network or Stored on Hard Disk
7. Enter the encryption key, and then press the [OK] key.
Do not switch the main power off during encryption, as doing so may corrupt the data.
Encrypting the data in the Address Book may take a long time.
The time it takes to encrypt the data in the Address Book depends on the number of registered users.
The machine cannot be used during encryption.
Normally, once encryption is complete, [Exit] appears.
If you press [Stop] during encryption, the data is not encrypted.
If you press [Stop] during decryption, the data stays encrypted.
11. Press [Exit].
122
Protecting the Address Book
• If you register additional users after encrypting the data in the Address Book, those users are also
encrypted.
123
5. Securing Information Sent over the Network or Stored on Hard Disk
Use the following procedure to enable the encryption settings at initial set up, or after encryption settings
have been canceled and settings must be made again.
• The encryption key is required for data recovery if the machine malfunctions. Be sure to store the
encryption key safely for retrieving backup data.
• Encryption begins after you have completed the control panel procedure and rebooted the machine.
If there is unencrypted data on the hard disk that must be both transferred and encrypted, rebooting
will take about three hours. If there is encrypted data on the hard disk that must be re-encrypted,
rebooting will take about five hours. If both the erase-by-overwrite function and the encryption function
124
Encrypting Data on the Hard Disk
are specified, encryption begins after the data that is stored on the hard disk has been overwritten
and the machine has been rebooted.
• If you want to specify encryption of unencrypted data with erase-by-overwrite, select [Random
Numbers] as the overwrite method, and set the number of overwrites to "3". The entire process will
take about five hours. If you specify re-encryption of encrypted data, the entire process will take about
seven hours.
• Rebooting will be faster if there is no data to carry over to the hard disk and if encryption is set to
[Format], even if all the data on the hard disk is formatted. Before you perform encryption, we
recommend you back up important data such as the Address Book.
5
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.
125
5. Securing Information Sent over the Network or Stored on Hard Disk
6. Select the data to be carried over to the hard disk and not be reset.
To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings
data, select [File Sys]. To reset all of the data, select [Format].
7. Press [Print].
9. Press [Exit].
Use the following procedure to print the key again if it has been lost or misplaced.
• The encryption key is required for data recovery if the machine malfunctions. Be sure to store the
encryption key safely for retrieving backup data.
126
Encrypting Data on the Hard Disk
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.
5
5. Select [Print Encryption Key] using [ ] or [ ], and then press the [OK] key.
6. Press [Print].
You can update the encryption key and create a new key. Updates are possible when the machine is
functioning normally.
127
5. Securing Information Sent over the Network or Stored on Hard Disk
• The encryption key is required for recovery if the machine malfunctions. Be sure to store the encryption
key safely for retrieving backup data.
• When the encryption key is updated, encryption is performed using the new key. After completing
the procedure on the machine's control panel, turn off the power and restart the machine to enable
the new settings. Restarting can be slow when there is data to be carried over to the hard disk.
5 3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.
5. Select [Update Encryption Key] using [ ] or [ ], and then press the [OK] key.
6. Select the data to be carried over to the hard disk and not be reset.
To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings
data, select [File Sys]. To reset all of the data, select [Format].
128
Encrypting Data on the Hard Disk
7. Press [Print].
9. Press [Exit].
5
Use the following procedure to cancel the encryption settings when encryption is no longer necessary.
• After completing this procedure on the machine's control panel, turn off the power and restart the
machine to enable the new settings. Restarting can be slow when there is data to be carried over to
the hard disk.
• Before disposing of a hard disk, note that even if [Format] is selected and encryption is canceled,
data stored on the hard disk is not erased.
129
5. Securing Information Sent over the Network or Stored on Hard Disk
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.
5. Select [Cancel Encryption] using [ ] or [ ], and then press the [OK] key.
6. Select the data to be carried over to the hard disk and not be reset.
To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings
data, select [File Sys]. To reset all of the data, select [Format].
7. Press [Continue].
130
Encrypting Data on the Hard Disk
8. Press [Exit].
131
5. Securing Information Sent over the Network or Stored on Hard Disk
A document scanned in copier, or scanner mode, or print data sent from a printer driver is temporarily
stored on the machine's hard disk. Even after the job is completed, it remains in the hard disk as temporary
5 data. Auto Erase Memory erases the temporary data on the hard disk by writing over it.
Overwriting starts automatically once the job is completed.
The copier, fax, and printer functions take priority over the Auto Erase Memory function. If a copy, fax or
print job is in progress, overwriting will only be done after the job is completed.
Methods of Overwriting
You can select a method of overwriting from the following:
• NSA
Temporary data is overwritten twice with random numbers and once with zeros.
• DoD
Temporary data is overwritten with a fixed value, the fixed value's complement, and random numbers.
It is then verified.
• Random Numbers
Temporary data is overwritten multiple times with random numbers. The number of overwrites can be
selected from 1 to 9. The default is 3 times.
132
Deleting Data on the Hard Disk
• When Auto Erase Memory is set to "On", temporary data that remained on the hard disk when Auto
Erase Memory was "Off" might not be overwritten.
5
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Auto Erase Memory Setting] using [ ] or [ ], and then press the [OK] key.
Select the method of erasing the data from [NSA], [DoD], or [Random Numbers].
If you select [Random Numbers], proceed to step 6.
If you select [NSA] proceed to step 8.
If you select [DoD], proceed to step 9.
For details about the methods of overwriting, see "Methods of Overwriting".
133
5. Securing Information Sent over the Network or Stored on Hard Disk
6. Select [Random Numbers] using [ ] or [ ], and then press the [OK] key.
7. Enter the number of times that you want to overwrite using the number keys, and then press
the [OK] key.
• If the main power switch is turned to [Off] before Auto Erase Memory is completed, overwriting will
stop and data will be left on the hard disk.
• Do not stop the overwrite mid-process. Doing so will damage the hard disk.
• Should the main power switch be turned to [Off] before Auto Erase Memory is completed, overwriting
will continue once the main power switch is turned back to [On].
• If an error occurs before overwriting is completed, turn off the main power. Turn it on, and then repeat
from step 1.
• If you specify to both overwrite and encrypt the data, the data will all be encrypted.
134
Deleting Data on the Hard Disk
135
5. Securing Information Sent over the Network or Stored on Hard Disk
Data sent or received via facsimile, as well as fax numbers, will not be overwritten by Auto Erase
Memory
Data Not Overwritten by Auto Erase Memory
• Information registered in the Address Book
Data stored in the Address Book can be encrypted for security. For details, see "Protecting the
Address Book".
• Counters stored under each user code
• Image overlay data
Image overlay data is overwritten after it is deleted.
This can be specified by the machine administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of
your machine.
• If you select "Erase All Memory", the following are also deleted: user codes, counters under each
user code, user stamps, data stored in the Address Book, printer fonts downloaded by users,
applications using Embedded Software Architecture, SSL server certificates, and the machine's
network settings.
• If the main power switch is turned to [Off] before Erase All Memory is completed, overwriting will be
stopped and data will be left on the hard disk.
• Do not stop the overwrite mid-process. Doing so will damage the hard disk.
• Before erasing the hard disk, you can back up user codes, counters for each user code, and Address
Book data using SmartDeviceMonitor for Admin. For details, see SmartDeviceMonitor for Admin
Help.
• Other than pausing, no operations are possible during the "Erase All Memory" process. If [Random
Numbers] is specified and the number of overwrites set to "3", the erase process will take about two
hours.
136
Deleting Data on the Hard Disk
4. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
5
5. Select [Erase All Memory] using [ ] or [ ], and then press the [OK] key.
137
5. Securing Information Sent over the Network or Stored on Hard Disk
8. Enter the number of times that you want to overwrite using the number keys, and then press
the [OK] key.
10. Select [DoD] using [ ] or [ ], and then press the [OK] key.
5
12. When overwriting is completed, press [Exit], and then turn off the power.
• Should the main power switch be turned to [Off] before Erase All Memory is completed, overwriting
will continue once the main power switch is turned back to [On].
• If you specify to both overwrite and encrypt the data, the data will all be encrypted.
• If an error occurs before overwriting is completed, turn off the main power. Turn it on again, and then
repeat from step 2.
138
Deleting Data on the Hard Disk
139
5. Securing Information Sent over the Network or Stored on Hard Disk
140
6. Managing Access to the Machine
This chapter describes how to prevent unauthorized access to and modification of the machine's settings.
141
6. Managing Access to the Machine
For a list of settings that users can specify according to the Menu Protect level, see "User Settings -
Control Panel Settings", "User Settings - Web Image Monitor Settings".
• p.21 "Administrators"
• p.27 "Registering the Administrator"
• p.265 "User Administrator Settings"
• p.248 "Machine Administrator Settings"
• p.258 "Network Administrator Settings"
• p.263 "File Administrator Settings"
• p.270 "User Settings - Control Panel Settings"
• p.287 "User Settings - Web Image Monitor Settings"
142
Menu Protect
Menu Protect
The administrator can also limit users' access permission to the machine's settings. The machine's "System
Settings" menu and the printer's regular menus can be locked so they cannot be changed. This function is
also effective when management is not based on user authentication. For a list of settings that users can
specify according to the Menu Protect level, see "User Settings - Control Panel Settings", or "User Settings
- Web Image Monitor Settings".
This can be specified by the machine administrator. You can set menu protect to [Off], [Level 1], or [Level
2]. If you set it to [Off], no menu protect limitation is applied. To limit access to the fullest extent, select [Level
2].
6
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
Copy Function
To specify "Menu Protect" in "Copier Features", set "Machine Management" to [On] in "Admin. Auth.
Management" in "Administrator Tools" in "System Settings".
143
6. Managing Access to the Machine
3. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.
4. Select the menu protect level using [ ] or [ ], and then press the [OK] key.
Fax Function
To specify "Menu Protect" in "Fax Features", set "Machine Management" to [On] in "Admin. Auth.
6 Management" in "Administrator Tools" in "System Settings".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.
144
Menu Protect
5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.
Printer Function
To specify "Menu Protect" in "Printer Features", set "Machine Management" to [On] in "Admin. Auth.
Management" in "Administrator Tools" in "System Settings".
4. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.
5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.
145
6. Managing Access to the Machine
Scanner Function
To specify "Menu Protect" in "Scanner Features", set "Machine Management" to [On] in "Admin. Auth.
Management" in "Administrator Tools" in "System Settings".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.
146
Limiting Available Functions
This can be specified by the user administrator. Specify the functions available to registered users. By making
this setting, you can limit the functions available to users.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
147
6. Managing Access to the Machine
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.
11. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
148
Limiting Available Functions
The box next to a selected item is checked. To deselect the item, press [ ].
12. Press the [OK] key.
149
6. Managing Access to the Machine
You can specify settings such as whether or not to transfer logs to Web SmartDeviceMonitor and whether
or not to delete all logs.
150
Managing Log Files
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Transfer Log Setting] using [ ] or [ ], and then press the [OK] key.
6
5. Press the [OK] key.
151
6. Managing Access to the Machine
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Delete All Logs] using [ ] or [ ], and then press the [OK] key.
6
5. Press [Yes].
6. Press [Exit].
152
Managing Log Files
For details about using Web SmartDeviceMonitor to manage Log Files, see the manual supplied with the
Using Web SmartDeviceMonitor.
This can be specified by the machine administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
You can specify the types of log to store in the machine and the log collection level. You can also encrypt,
bulk delete, or download log files.
6
Specify Log Collect Settings
Specify collection log settings. The collection log levels are listed below.
Job Log Collect Level
Level 1
User Settings
Access Log Collect Level
Level 1
Level 2
User Settings
153
6. Managing Access to the Machine
5. Select Collect Job Logs to specify Job Log settings, or select Collect Access Logs to specify
Access Log settings, and then select [Active].
6. Specify the recording levels for either Job Log Collect Level or Access Log Collect Level.
The settings shown for "Job Log Collect Level" or "Access Log Collect Level" vary depending on the
collection level selected.
If you change the setting in the list, the setting for Job Log Collect Level or Access Log Collect Level
automatically changes to [User Settings].
7. Click [OK].
Changes are also reflected in related log settings.
8. Click [Logout].
• The greater the Access Log Collect setting value, the more logs are collected.
6 Use the following procedure to disable log transfer to Web SmartDeviceMonitor. Note that you can change
the log transfer setting to [Inactive] only if it is already set to [Active].
154
Managing Log Files
• In order to enable encryption, either Collect Job Logs or Collect Access Logs, or both must be set to
[Active].
6
• If the data stored in the machine has been encrypted with the optional HDD Encryption Unit, the log
files will still be encrypted, regardless of this setting.
155
6. Managing Access to the Machine
• On this page, "Delete All Logs" does not appear if either Collect Job Logs or Collect Access Logs are
not set to [Active].
Downloading Logs
Use the following procedure to convert the logs stored in the machine into a CSV file for simultaneous batch
download.
6 3. Click [Login].
Log on using an administrator's user name and password.
4. Click [Configuration], and then click [Download Logs] under "Device Settings".
5. Click [Download].
6. Specify the folder in which you want to save the file.
7. Click [OK].
8. Click [Logout].
• Downloaded logs contain data recorded up till the time you click the [Download] button. Any logs
recorded after the [Download] button is clicked will not be downloaded.
• Downloading is slower if the number of logs is large.
• If an error occurs while the CSV file is downloading or being created, the download is cancelled and
details of the error are included at the end of the file.
• For details about saving CSV log files, see your browser's Help.
• Depending on the configuration of your computer, some applications might not be able to display
the downloaded CSV files.
• To collect logs, set "Collect Job Logs" and "Collect Access Logs" to Active. For details about setting,
see Web Image Monitor Help.
• For details about the items contained in the logs, see "Attributes of Logs you Can Download".
156
Managing Log Files
This section details the information items contained in the logs that are created for retrieval by Web Image
Monitor.
Printer: Locked Print Details of Unprinted Locked Print files stored on the machine.
(Incomplete)
Printer: Locked Print Details of Locked Print files stored on the machine and printed
from Web Image Monitor or the control panel.
Printer: Sample Print Details of Unprinted Sample Print files stored on the machine.
(Incomplete)
Printer: Sample Print Details of Sample Print files stored on the machine and printed
from Web Image Monitor or the control panel.
Printer: Hold Print (Incomplete) Details of Unprinted Hold Print files stored on the machine.
Printer: Hold Print Details of Hold Print files stored on the machine and printed from
Web Image Monitor or the control panel.
Printer: Stored Print Details of Stored Print files stored on the machine.
157
6. Managing Access to the Machine
Printer: Store and Normal Print Details of Stored Print files that were printed at the time of storage
(when "Job Type" was set to [Store and Normal Print] in printer
properties).
Printer: Stored File Printing Details of Stored Print files printed from the control panel or Web
Image Monitor.
Result Report Printing/E-mailing Details of sent e-mail notifications and printouts of reports such
as the Communication Result Report and Error Report.
Scanner: TWAIN Driver Details of stored scan files that were sent using Network TWAIN
Scanning Scanner.
Fax: Stored File Printing Details of printing of fax files waiting be sent.
158
Managing Log Files
Log Collection Item Change Details of changes to job log collection levels, access log
collection levels, and types of log collected.
Firmware: Structure Change Details of structure changes that occurred when an SD card was
inserted or removed, or when an unsupported SD card was
inserted.
Firmware: Structure Details of checks for changes to firmware module structure made
at times such as when the machine was switched on.
Machine Data Encryption Key Details of changes made to encryption keys using the Machine
6
Change Data Encryption setting.
Firmware: Invalid Details of checks for firmware validity made at times such as
when the machine was switched on.
File Access Privilege Change Details of changes made to access privileges for stored files.
• If [Job Log Collect Level] is set to [Level 1], all job logs are collected.
• If [Access Log Collect Level] is set to [Level 1], the following information items are recorded in the
access log:
• HDD Format
• All Logs Deletion
• Log Setting Change
159
6. Managing Access to the Machine
Item Content
Log Type Details of the log type. Access logs are classified under "Access Log
6 Type". For details about the information items contained in each type
of log, see "Logs that can be Collected".
User Code/User Name User code or user name of the user who performed the operation.
Item Content
Source Type of the job log source. "Scan File" indicates a scan file;
"Stored File" indicates a stored file; "Received File" indicates a
stored file; "Printer" indicates a printer driver job; "Report"
indicates a printed report.
Start Date/Time Dates and times "Scan File", "Received File" and "Printer"
operations started.
160
Managing Log Files
Item Content
End Date/Time Dates and times "Scan File", "Received File" and "Report"
operations ended.
Target Type of the job target. "Print" indicates a print file; "Store"
indicates a stored file; "Send" indicates a sent file.
Start Date/Time Dates and times "Print", "Store", and "Send" operations started.
End Date/Time Dates and times "Print", "Store", and "Send" operations ended.
Stored File Name If the Target Type is "Store", the file name of the stored file is
recorded.
Item Content
Authentication Server The name of the authentication server accessed last (Windows/
LDAP Authentication only).
No. of Authentication Server The number of authentication server switches due to server failure
Switches (LDAP Authentication only).
Target User Entry ID Entry ID of the user whose data was accessed.
Target User Code/User Name User code or user name of the user whose data was accessed.
If the administrator's data was accessed, the administrator's user
name is logged.
161
6. Managing Access to the Machine
Item Content
User Lockout Policy The mode of operation access. "Lockout" indicates activation of
password lockout; "Release" indicates deactivation of password
lockout.
File Location Region of all file deletion. "Fax Memory" is recorded if all files
in the memory are deleted.
162
7. Enhanced Network Security
This chapter describes how to increase security over the network using the machine's functions.
Access Control
This can be specified by the network administrator using Web Image Monitor. For details, see Web Image
Monitor Help.
The machine can control TCP/IP access.
Limit the IP addresses from which access is possible by specifying the access control range.
For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC
addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
7
• Using access control, you can limit access involving LPR, RCP/RSH, FTP, SSH/SFTP, Bonjour, SMB,
WSD (Device), WSD (Printer), WSD (Scanner), IPP, DIPRINT, RHPP, Web Image Monitor,
SmartDeviceMonitor for Client or DeskTopBinder. You cannot limit the monitoring of
SmartDeviceMonitor for Client. You cannot limit access involving telnet, or SmartDeviceMonitor for
Admin, when using the SNMPv1 monitoring.
163
7. Enhanced Network Security
6. Click [OK].
Access control is set.
7. Click [Logout].
• Control Panel
• Web Image Monitor
• telnet All applications that
IPv6 - • SmartDeviceMonitor operate over IPv6
for Admin cannot be used.
• Web
SmartDeviceMonitor
• Control Panel
Encrypted transmission
IPsec - • Web Image Monitor
using IPsec is disabled.
• telnet
164
Preventing Unauthorized Access
• Control Panel
• Web Image Monitor Internet Fax or e-mail
TCP:25 notification functions
SMTP • SmartDeviceMonitor that require SMTP
(variable) for Admin reception cannot be
• Web used.
SmartDeviceMonitor
165
7. Enhanced Network Security
• Control Panel
• Web Image Monitor
• telnet
SMB printing functions
SMB TCP:139 • SmartDeviceMonitor cannot be used.
for Admin
• Web
SmartDeviceMonitor
7 SMB printing functions
UDP:137 via TCP/IP, as well as
NBT • telnet NetBIOS designated
UDP:138 functions on the WINS
server cannot be used.
166
Preventing Unauthorized Access
167
7. Enhanced Network Security
TCP:1720 (H.323)
UDP:1719
(Gatekeeper) • Control Panel
TCP/UDP:5060 • Web Image Monitor IP-Fax connecting
(SIP) • SmartDeviceMonitor functions using H.323,
IP-Fax
TCP:5000 (H.245) for Admin SIP and T.38 cannot be
used.
UDP:5004, 5005 • Web
(Voice) SmartDeviceMonitor
TCP/UDP:49152 (T.
38)
7
• Web Image Monitor Device discovery using
SSDP UDP:1900 UPnP from Windows
• telnet cannot be used.
168
Preventing Unauthorized Access
• Control Panel
• Web Image Monitor
Cannot print with
• telnet NetWare.
NetWare (IPX/SPX) • SmartDeviceMonitor SNMP over IPX cannot
for Admin be used.
• Web
SmartDeviceMonitor
• Control Panel
Cannot print with
AppleTalk (PAP) • Web Image Monitor
AppleTalk.
• telnet
169
7. Enhanced Network Security
• "Restrict Display of User Information" is one of the Extended Security features. For details about making
this setting, see "Specifying the Extended Security Functions".
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
170
Preventing Unauthorized Access
5. Select [Effective Protocol] using [ ] or [ ], and then press the [OK] key.
6. Select the protocol you want to specify, and then press the [OK] key.
171
7. Enhanced Network Security
• To disable SMTP from Web Image Monitor, specify a protocol other than SMTP as the mail receiving
protocol. See Web Image Monitor help for instructions to configure this setting.
• For details about how to configure telnet, see "Using telnet", Network and System Settings Guide. For
details about how to configure SmartDeviceMonitor for Admin, see SmartDeviceMonitor for Admin
help. For details about how to configure Web SmartDeviceMonitor, see the Web
SmartDeviceMonitor user manual.
This can be specified by the network administrator. This setting lets you change the security level to limit
unauthorized access. You can make network security level settings on the control panel, as well as Web
Image Monitor. However, the protocols that can be specified differ.
Set the security level to [Level 0], [Level 1], or [Level 2].
Select [Level 2] for maximum security to protect confidential information. Make this setting when it is
necessary to protect confidential information from outside threats.
Select [Level 1] for moderate security to protect important information. Use this setting if the machine is
connected to the office local area network (LAN).
7 Select [Level 0] for easy use of all the features. Use this setting when you have no information that needs
to be protected from outside threats.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
172
Preventing Unauthorized Access
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Network Security Level] using [ ] or [ ], and then press the [OK] key.
5. Select the network security level using [ ] or [ ], and then press the [OK] key.
173
7. Enhanced Network Security
174
Preventing Unauthorized Access
Tab Name:NetWare
Tab Name:AppleTalk
Tab Name:SNMP
175
7. Enhanced Network Security
176
Encrypting Transmitted Passwords
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
5. Select [Driver Encryption Key] using [ ] or [ ], and then press the [OK] key.
"Driver Encryption Key" is one of the extended security functions. For details about this and other
security functions, see "Specifying the Extended Security Functions". 7
6. Enter the driver encryption key, and then press the [OK] key.
177
7. Enhanced Network Security
7
3. Select [PDF Menu] using [ ] or [ ], and then press the [OK] key.
4. Select [PDF Group Password] using [ ] or [ ], and then press the [OK] key.
5. Enter the new PDF Group password, and then press the [OK] key.
178
Encrypting Transmitted Passwords
6. Re-enter the PDF Group password, and then press the [OK] key.
• The machine administrator must give users the group password for PDF files that are already registered
on the machine. The users can then register it in DeskTopBinder on their computers. For details, see
DeskTopBinder Help.
• Be sure to enter the same character string as that specified on the machine for the group password
for PDF files.
• The group password for PDF files can also be specified using Web Image Monitor. For details, see
Web Image Monitor Help.
179
7. Enhanced Network Security
• When using the IPP port under Windows XP or Windows Server 2003/Windows Server 2003 R2,
you can use the operating system's standard IPP port.
180
Protection Using Encryption
BBC003S
1. To access the machine from a user's computer, request the SSL device certificate and public key.
181
7. Enhanced Network Security
2. The device certificate and public key are sent from the machine to the user's computer.
3. Create a shared key from the user's computer, and then encrypt it using the public key.
4. The encrypted shared key is sent to the machine.
5. The encrypted shared key is decrypted in the machine using the private key.
6. Transmit the encrypted data using the shared key, and the data is then decrypted at the machine to
attain secure transmission.
Configuration flow (self-signed certificate)
1. Creating and installing the device certificate
Install the device certificate using Web Image Monitor.
2. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.
Configuration flow (certificate issued by a certificate authority)
1. Creating the device certificate
Create the device certificate using Web Image Monitor.
The application procedure after creating the certificate depends on the certificate authority.
Follow the procedure specified by the certificate authority.
2. Installing the device certificate
7 Install the device certificate using Web Image Monitor.
3. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.
• To confirm whether SSL configuration is enabled, enter "https://(the machine's IP address or host
name)/" in your Web browser's address bar to access this machine. If the "The page cannot be
displayed" message appears, check the configuration because the current SSL configuration is invalid.
• If you enable SSL for IPP (printer functions), sent data is encrypted, preventing it from being intercepted,
analyzed, or tampered with.
182
Protection Using Encryption
183
7. Enhanced Network Security
• The issuing location may not be displayed if you request two certificates at the same time. When you
install a certificate, be sure to check the certificate destination and installation procedure.
• Using Web Image Monitor, you can create the contents of the device certificate but you cannot send
7 the certificate application.
• Click [Cancel Request] to cancel the request for the device certificate.
184
Protection Using Encryption
Enabling SSL
After installing the device certificate in the machine, enable the SSL setting.
This procedure is used for a self-signed certificate or a certificate issued by a certificate authority.
• If you set "Permit SSL/TLS Communication" to [Ciphertext Only], enter " https://(the machine's IP
address or host name)/" to access the machine.
185
7. Enhanced Network Security
If you have installed a device certificate using a self-signed certificate and enabled Secure Sockets Layer
(SSL), a warning message appears whenever you access the machine using Web Image Monitor or IPP.
To stop this message appearing, install the certificate using the procedure for your particular browser. If
you are the network administrator, tell your users they must install the certificate to stop the warning message
appearing.
• Take the appropriate steps when you receive a user's inquiry concerning problems such as an expired
certificate.
• For details about how to install the certificate and about where to store the certificate when accessing
the machine using IPP, see Web Image Monitor Help.
• If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store
location with the certificate authority.
By specifying the SSL/TLS encrypted communication mode, you can change the security level.
7 Encrypted Communication Mode
Using the encrypted communication mode, you can specify encrypted communication.
186
Protection Using Encryption
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
7
5. Select [Permit SSL/TLS Comm.] using [ ] or [ ], and then press the [OK] key.
6. Select the encrypted communication mode using [ ] or [ ], and then press the [OK] key.
187
7. Enhanced Network Security
• The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For
details, see Web Image Monitor Help.
SNMPv3 Encryption
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
188
Protection Using Encryption
5. Select [Permit SNMPv3 Communictn.] using [ ] or [ ], and then press the [OK] key.
6. Select [Encryption Only] using [ ] or [ ], and then press the [OK] key.
• To use SmartDeviceMonitor for Admin for encrypting the data for specifying settings, you need to
specify the network administrator's [Encryption Password] setting and [Encryption Key] in [SNMP
Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit
SNMPv3 Communictn.] on the machine. For details about specifying [Encryption Key] in
SmartDeviceMonitor for Admin, see SmartDeviceMonitor for Admin Help.
• If network administrator's [Encryption Password] setting is not specified, the data for transmission may 7
not be encrypted or sent. For details about specifying the network administrator's [Encryption
Password] setting, see "Registering the Administrator".
189
7. Enhanced Network Security
• When "Inactive" is specified for "Exclude HTTPS Communication", access to Web Image Monitor can
be lost if the key settings are improperly configured. In order to prevent this, you can specify IPsec to
exclude HTTPS Communication by selecting "Active". When you want to include HTTPS transmission,
we recommend that you select "Inactive" for "Exclude HTTPS Communication" after confirming that
IPsec is properly configured. When "Active" is selected for "Exclude HTTPS Communication", even
though HTTPS transmission is not targeted by IPsec, Web Image Monitor might become unusable
when TCP is targeted by IPsec from the computer side. If you cannot access Web Image Monitor due
to IPsec configuration problems, disable IPsec in System Settings on the control panel, and then access
Web Image Monitor. For details about enabling and disabling IPsec using the control panel, see
7 "System Settings", Network and System Settings Guide.
• IPsec is not applied to data obtained through DHCP, DNS, or WINS.
• IPsec compatible operating systems are Windows XP SP2, Windows Vista, Mac OSX 10.4 and later,
RedHat Linux Enterprise WS 4.0, and Solaris 10. However, some setting items are not supported
depending on the operating system. Make sure the IPsec settings you specify are consistent with the
operating system's IPsec settings.
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data, and
the authentication function, which verifies the sender of the data and the data's integrity. This machine's
IPsec function supports two security protocols: the ESP protocol, which enables both of the IPsec functions
at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
190
Transmission Using IPsec
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH Protocol
The AH protocol provides secure transmission through authentication of packets only, including
headers.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH Protocol + ESP Protocol
When combined, the ESP and AH protocols provide secure transmission through both encryption and
authentication. These protocols provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
7
• Some operating systems use the term "Compliance" in place of "Authentication".
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings
This machine provides two key setting methods: manual and auto exchange. Using either of these methods,
agreements such as the IPsec algorithm and key must be specified for both sender and receiver. Such
agreements form what is known as an SA (Security Association). IPsec communication is possible only if
the receiver's and sender's SA settings are identical.
If you use the auto exchange method to specify the encryption key, the SA settings are auto configured on
both parties' machines. However, before setting the IPsec SA, the ISAKMP SA (Phase 1) settings are auto
configured. After this, the IPsec SA (Phase 2) settings, which allow actual IPsec transmission, are auto
configured.
Also, for further security, the SA can be periodically auto updated by applying a validity period (time limit)
for its settings. This machine only supports IKEv1 for encryption key auto exchange.
If you specify the encryption key manually, the SA settings must be shared and specified identically by both
parties. To preserve the security of your SA settings, we recommend that they are not exchanged over a
network.
Note that for both the manual and auto method of encryption key specification, multiple settings can be
configured in the SA.
191
7. Enhanced Network Security
IPsec Settings
IPsec settings for this machine can be made on Web Image Monitor. The following table explains individual
setting items.
Encryption Key Auto Exchange / Manual Settings - Shared Settings
• Active
Specify whether to enable
• Inactive
Encryption Key Manual Encryption Key Manual
Settings Settings, or use Encryption Key Specify "Active" if you want to
Auto Exchange Settings only. use "Encryption Key Manual
Exchange Settings".
192
Transmission Using IPsec
Select this level if you want to encrypt the data packets as well as
authenticate the transmission partner and prevent unauthorized
Authentication and Low Level
packet tampering. Packet encryption helps prevent
Encryption
eavesdropping attacks. This level provides less security than
"Authentication and High Level Encryption".
Select this level if you want to encrypt the data packets as well as
authenticate the transmission partner and prevent unauthorized
Authentication and High Level
packet tampering. Packet encryption helps prevent
Encryption
eavesdropping attacks. This level provides higher security than
"Authentication and Low Level Encryption".
The following table lists the settings that are automatically configured according to the security level. 7
Authentication and Low Authentication and High
Setting Authentication Only
Level Encryption Level Encryption
Encapsulation
Transport Transport Transport
Mode
IPsec Requirement
Use When Possible Use When Possible Always Require
Level
Authentication
PSK PSK PSK
Method
Phase 1 Hash
MD5 SHA1 SHA1
Algorithm
Phase 1 Encryption
DES 3DES 3DES
Algorithm
Phase 1 Diffie-
2 2 2
Hellman Group
193
7. Enhanced Network Security
Phase 2 Security
AH ESP ESP
Protocol
Phase 2
HMAC-MD5-96/ HMAC-MD5-96/
Authentication HMAC-SHA1-96
HMAC-SHA1-96 HMAC-SHA1-96
Algorithm
DES/3DES/
Phase 2 Encryption Cleartext (NULL 3DES/AES-128/
AES-128/AES-192/
Algorithm encryption) AES-192/AES-256
AES-256
• Inactive
Specify the address type for • IPv4
Address Type which IPsec transmission is • IPv6
used.
• IPv4/IPv6 (Default
Settings only)
194
Transmission Using IPsec
• apply
Security Policy Specify how IPsec is handled. • bypass
• discarded
• Transport
• Tunnel
(Tunnel beginning address -
Tunnel ending address)
Specify the encapsulation
If you specify "Tunnel", you
Encapsulation Mode mode.
must then specify the "Tunnel
(auto setting) End Points", which are the
beginning and ending IP 7
addresses. Set the same
address for the beginning point
as you set in "Local Address".
(auto setting)
• PSK
• Certificate
195
7. Enhanced Network Security
196
Transmission Using IPsec
• Cleartext (NULL
encryption)
Phase 2 Specify the encryption • DES
algorithm to be used in phase
Encryption Algorithm • 3DES
2.
Permissions • AES-128
(auto setting)
• AES-192
• AES-256
Phase 2 Specify the time period for Specify a period (in seconds)
which the SA settings in phase from 300 (5min.) to 172800
Validity Period 2 are valid. (48 hrs.).
• Inactive
Specify the address type for • IPv4
Address Type which IPsec transmission is • IPv6
used.
• IPv4/IPv6 (Default
Settings only)
197
7. Enhanced Network Security
• Transport
• Tunnel
(Tunnel beginning address -
Tunnel ending address)
If you select "Tunnel", set the
Encapsulation Mode Select the encapsulation mode.
"Tunnel End Point", the
beginning and ending IP
addresses. In "Tunnel End
Point", set the same address for
the beginning point as you set
in "Local Address".
7 Specify the same value as your
Any number between 256 and
SPI (Output) transmission partner's SPI input
4095
value.
198
Transmission Using IPsec
• Cleartext (NULL
encryption) 7
• DES
Specify the encryption • 3DES
Encryption Algorithm
algorithm.
• AES-128
• AES-192
• AES-256
199
7. Enhanced Network Security
7 characters
• AES-192, set 24
characters
• AES-256, set 32
characters
This section explains the procedure for specifying Encryption Key Auto Exchange Settings. This can be
specified by the network administrator.
200
Transmission Using IPsec
BBD004S
• To use a certificate to authenticate the transmission partner in encryption key auto exchange settings,
a device certificate must be installed. 7
• After configuring IPsec, you can use "Ping" command to check if the connection is established correctly.
However, you cannot use "Ping" command when ICMP is excluded from IPsec transmission on the
computer side. Also, because the response is slow during initial key exchange, it may take some time
to confirm that transmission has been established.
201
7. Enhanced Network Security
• To change the transmission partner authentication method for encryption key auto exchange settings
to "Certificate", you must first install and assign a certificate. For details about creating and installing
a device certificate, see "Using S/MIME to Protect E-mail Transmission".
202
Transmission Using IPsec
7. Click [OK].
8. Click [Logout].
1. On the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then
click [Administrative Tools].
2. Click [Local Security Policy].
3. Click [IP Security Policies on Local Computer].
4. In the "Action" menu, click [Create IP Security Policy].
The IP Security Policy Wizard appears.
5. Click [Next].
6. Enter a security policy name in "Name", and then click [Next].
7. Clear the "Activate the default response rule" check box, and then click [Next].
8. Select "Edit properties", and then click [Finish].
7
9. In the "General" tab, click [Advanced].
10. In "Authenticate and generate a new key after every" enter the same validity period (in
minutes) that is specified on the machine in Encryption Key Auto Exchange Settings Phase
1, and then click [Methods].
11. Confirm that the combination of hash algorithm (on Windows XP, "Integrity"), the encryption
algorithm (on Windows XP, "Encryption"), and the Diffie-Hellman group settings in "Security
method preference order" match the settings specified on the machine in Encryption Key
Auto Exchange Settings Phase 1.
12. If the settings are not displayed, click [Add].
13. Click [OK] twice.
14. Click [Add] in the "Rules" Tab.
The Security Rule Wizard appears.
15. Click [Next].
16. Select "This rule does not specify a tunnel", and then click [Next].
17. Select the type of network for IPsec, and then click [Next].
18. Select the "initial authentication method", and then click [Next].
203
7. Enhanced Network Security
19. If you select "Certificate" for authentication method in Encryption Key Auto Exchange
Settings on the machine, specify the device certificate. If you select PSK, enter the same PSK
text specified on the machine with the pre-shared key.
20. Click [Add] in the IP Filter List.
21. In [Name], enter an IP Filter name, and then click [Add].
The IP Filter Wizard appears.
22. Click [Next].
23. Select "My Address" in "Source Address", and then click [Next].
24. Select "A specific IP address" in "Destination Address", enter the machine's IP address, and
then click [Next].
25. Select the protocol type for IPsec, and then click [Next].
26. Click [Finish].
27. Click [OK].
28. Select the IP filter that was just created, and then click [Next].
29. Select the IPsec security filter, and then click [Edit].
30. Click [Add], select the "Custom" check box, and then click [Settings].
31. In "Integrity algorithm", select the authentication algorithm that was specified on the
7 machine in Encryption Key Auto Exchange Settings Phase 2.
32. In "Encryption algorithm", select the encryption algorithm that specified on the machine in
Encryption Key Auto Exchange Settings Phase 2.
33. In Session Key settings, select "Generate a new key every", and enter the validity period
(in seconds) that was specified on the machine in Encryption Key Auto Exchange Settings
Phase 2.
34. Click [OK] three times.
35. Click [Next].
36. Click [Finish].
37. Click [OK].
38. Click [Close].
The new IP security policy (IPsec settings) is specified.
39. Select the security policy that was just created, right click, and then click [Assign].
IPsec settings on the computer are enabled.
• To disable the computer's IPsec settings, select the security policy, right click, and then click [Un-
assign].
204
Transmission Using IPsec
• If you specify the "Authentication and High Level Encryption" security level in encryption key auto
exchange settings, also select the "Master key perfect forward secrecy (PFS)" check box in the Security
Filter Properties screen (which appears in step 29). If using PFS in Windows XP, the PFS group number
used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman group number (set in
step 11). Consequently, if you change the security level specified automatic settings on the machine
and "User Setting" appears, you must set the same the group number for "Phase 1 Diffie-Hellman
Group" and "Phase 2 PFS" on the machine to establish IPsec transmission.
This section explains the procedure for specifying encryption key manual settings. This can be specified by
the network administrator.
BBD003S
• Before transmission, SA information is shared and specified by the sender and receiver. To prevent
SA information leakage, we recommend that this exchange is not performed over the network.
• After configuring IPsec, you can use "Ping" command to check if the connection is established correctly.
However, you cannot use "Ping" command when ICMP is excluded from IPsec transmission. Also,
because the response is slow during initial key exchange, it may take some time to confirm that
transmission has been established.
205
7. Enhanced Network Security
7 10. Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS
communication.
11. Click [OK].
12. Click [Logout].
You can use telnet to confirm IPsec settings and make setting changes. This section explains telnet commands
for IPsec. To log on as an administrator using telnet, the default login user name is "admin", and the password
is blank. For details about logging on to telnet and telnet operations, see "Using telnet", Network and
System Settings Guide.
• If you are using a certificate as the authentication method in encryption key auto exchange settings
(IKE), install the certificate using Web Image Monitor. A certificate cannot be installed using telnet.
ipsec
To display IPsec related settings information, use the "ipsec" command.
206
Transmission Using IPsec
ipsec exclude
To display or specify protocols excluded by IPsec, use the "ipsec exclude" command.
Display current settings
msh> ipsec exclude
• Displays the protocols currently excluded from IPsec transmission.
Specify protocols to exclude
msh> ipsec exclude {https|dns|dhcp|wins|all} {on|off}
• Specify the protocol, and then enter [on] to exclude it, or [off] to include it for IPsec transmission.
Entering [all] specifies all protocols collectively.
ipsec manual
To display or specify the encryption key manual settings, use the "ipsec manual" command.
207
7. Enhanced Network Security
208
Transmission Using IPsec
• If you have set the address type in the default setting to [any], you cannot use [tunnel] in
encapsulation mode.
• Not specifying an encapsulation mode displays the current setting.
Tunnel end point setting
msh> ipsec manual {1|2|3|4|default} tunneladdar beginning IP address ending IP
address
• Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning
and ending IP address.
• Not specifying either the beginning or ending address displays the current settings.
Authentication algorithm and authentication key settings
msh> ipsec manual {1|2|3|4|default} auth {hmac-md5|hmac-sha1} authentication key
• Enter the separate setting number [1-4] or [default] and specify the authentication algorithm,
and then set the authentication key.
• If you are setting a hexadecimal number, attach 0x at the beginning.
• If you are setting an ASCII character string, enter it as is.
• Not specifying either the authentication algorithm or key displays the current setting. (The
authentication key is not displayed.)
Encryption algorithm and encryption key setting 7
msh> ipsec manual {1|2|3|4|default} encrypt {null|des|3des|aes128|aes192|aes256}
encryption key
• Enter the separate setting number [1-4] or [default], specify the encryption algorithm, and then
set the encryption key.
• If you are setting a hexadecimal number, attach 0x at the beginning. If you have set the encryption
algorithm to [null], enter an encryption key of arbitrary numbers 2-64 digits long.
• If you are setting an ASCII character string, enter it as is. If you have set the encryption algorithm
to [null], enter an encryption key of arbitrary numbers 1-32 digits long.
• Not specifying an encryption algorithm or key displays the current setting. (The encryption key
is not displayed.)
Reset setting values
msh> ipsec manual {1|2|3|4|default|all} clear
• Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying
[all] resets all of the settings, including default.
ipsec ike
To display or specify the encryption key auto exchange settings, use the "ipsec ike" command.
209
7. Enhanced Network Security
210
Transmission Using IPsec
211
7. Enhanced Network Security
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) hash
algorithm.
• To use MD5, enter [md5]. To use SHA1, enter [sha1].
• Not specifying the hash algorithm displays the current setting.
ISAKMP SA (phase 1) encryption algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 encrypt {des|3des}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
encryption algorithm.
• To use DES, enter [des]. To use 3DES, enter [3des].
• Not specifying an encryption algorithm displays the current setting.
ISAKMP SA (phase 1) Diffie-Hellman group setting
msh> ipsec ike {1|2|3|4|default} ph1 dhgroup {1|2|14}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) Diffie-
Hellman group number.
• Specify the group number to be used.
• Not specifying a group number displays the current setting.
ISAKMP SA (phase 1) validity period setting
7 msh> ipsec ike {1|2|3|4|default} ph1 lifetime validity period
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) validity
period.
• Enter the validity period (in seconds) from 300 to 172800.
• Not specifying a validity period displays the current setting.
IPsec SA (phase 2) authentication algorithm setting
msh> ipsec ike {1|2|3|4|default} ph2 auth {hmac-md5|hmac-sha1}
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2)
authentication algorithm.
• Separate multiple encryption algorithm entries with a comma (,). The current setting values are
displayed in order of highest priority.
• Not specifying an authentication algorithm displays the current setting.
IPsec SA (phase 2) encryption algorithm setting
msh> ipsec ike {1|2|3|4|default} ph2 encrypt {null|des|3des|aes128|aes192|
aes256}
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) encryption
algorithm.
212
Transmission Using IPsec
• Separate multiple encryption algorithm entries with a comma (,). The current setting values are
displayed in order of highest priority.
• Not specifying an encryption algorithm displays the current setting.
IPsec SA (phase 2) PFS setting
msh> ipsec ike {1|2|3|4|default} ph2 pfs {none|1|2|14}
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) Diffie-
Hellman group number.
• Specify the group number to be used.
• Not specifying a group number displays the current setting.
IPsec SA (phase 2) validity period setting
msh> ipsec ike {1|2|3|4|default} ph2 lifetime validity period
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) validity
period.
• Enter the validity period (in seconds) from 300 to 172800.
• Not specifying a validity period displays the current setting.
Reset setting values
msh> ipsec ike {1|2|3|4|default|all} clear
• Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying 7
[all] resets all of the settings, including default.
213
7. Enhanced Network Security
Authentication by telnet
This section explains Authentication by telnet. When using telnet, the default login name for administrator
login is "admin" and the password is blank. For details on how to login to telnet, see "Using telnet", Network
and System Settings Guide.
"authfree" Command
Use the "authfree" command to display and configure authentication exclusion control settings. If you use
the "authfree" command in telnet, you can exclude printer job authentication and specify an IP address
range. The authentication exclusion control display and setting methods are explained below.
View Settings
msh> authfree
If print job authentication exclusion is not specified, authentication exclusion control is not displayed.
IPv4 address settings
msh> authfree "ID" range_addr1 range_addr2
IPv6 address settings
• In both IPv4 and IPv6 environments, up to five access ranges can be registered and selected.
214
Authentication by IEEE802.1X
Authentication by IEEE802.1X
IEEE802.1X enables authentication in an Ethernet or wireless LAN environment. For details, see "Using
telnet", Network and System Settings Guide.
215
7. Enhanced Network Security
216
8. Specifying the Extended Security
Functions
This chapter describes the machine's extended security features and how to specify them.
To change the extended security functions, display the extended security screen as follows.
Administrators can change the extended security functions according to their role.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
This section describes how to Change the Extended Security Functions. 8
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
217
8. Specifying the Extended Security Functions
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
5. Press the setting you want to change using [ ] or [ ], and then press the [OK] key.
218
Specifying the Extended Security Functions
If [Rstrct Dest. Use(Scanner)] is set to [On], you can register fax numbers only.
If you have selected e-mail reception via SMTP, you cannot use "Restrict Dest. Use(Fax)" and "Rstrct
Dest. Use(Scanner)".
The destinations searched by "LDAP Search" can be used.
For details about preventing unauthorized transmission, see "Preventing Information Leakage Due to
Unauthorized Transmission".
• On
• Off
Rstrct Dest. Add.(Fax), Rstrct Dest. Add.(Scanner)
This can be specified by the user administrator.
When "Restrict Dest. Use(Fax)" is set to [Off], after entering a destination directly on the fax screen,
you can register it in the Address Book by pressing [Add Dest]. When "Rstrct Dest. Use(Scanner)" is
set to [Off], after entering a destination directly on the scanner screen, you can register it in the Address
Book by pressing [Add Dest].
If [On] is selected for this setting, [Add Dest] does not appear.
If you set "Rstrct Dest. Add.(Fax)" to [On], users can specify destinations directly on the fax screen,
but cannot use [Add Dest] to register data in the Address Book. If you set "Rstrct Dest. Add.(Scanner)"
to [On], users can specify destinations directly on the scanner screen, but cannot use [Add Dest] to
register data in the Address Book. When this setting is made, only the user administrator can change
the Address Book.
• On
8
• Off
Restrict User Info.Display
This can be specified if user authentication is specified. When the job history is checked using a network
connection for which authentication is not available, all personal information can be displayed as
"********". For example, when someone not authenticated as an administrator checks the job
history using SNMP in SmartDeviceMonitor for Admin, personal information can be displayed as
"********" so that users cannot be identified. Because information identifying registered users
cannot be viewed, unauthorized users are prevented from obtaining information about the registered
files.
• On
• Off
Enhance File Protection
This can be specified by the file administrator. By specifying a password, you can limit operations
such as printing, deleting, and sending files, and can prevent unauthorized people from accessing
the files. However, it is still possible for the password to be cracked.
219
8. Specifying the Extended Security Functions
By specifying "Enhance File Protection", files are locked and so become inaccessible if an invalid
password is entered ten times. This can protect the files from unauthorized access attempts in which
a password is repeatedly guessed.
The locked files can only be unlocked by the file administrator. When "Enhance File Protection" is
specified, ( ) appears in the lower right corner of the screen.
When files are locked, you cannot select them even if the correct password is entered.
• On
• Off
Settings by SNMPv1 and v2
This can be specified by the network administrator. When the machine is accessed using the SNMPv1,
v2 protocol, authentication cannot be performed, allowing machine administrator settings such as
the paper setting to be changed. If you select [Prohibit], the setting can be viewed but not specified
with SNMPv1, v2.
• Prohibit
• Do not Prohibit
Simple Encryption
This can be specified by the network administrator. When a sophisticated encryption method cannot
be enabled, simple encryption will be applied. For example, when using User Management Tool and
Address Management in Smart Device Monitor for Admin to edit the Address Book, or
DeskTopBinder and ScanRouter delivery software and SSL/TLS cannot be enabled, make this setting
[Do not Restrict] to enable simple encryption. When SSL/TLS can be enabled, make this setting
8 [Restrict].
For details about specifying SSL/TLS, see "Setting the SSL / TSL Encryption Mode".
If you select [Restrict], specify the encryption setting using the printer driver.
• Restrict
• Do not Restrict
Transfer to Fax Receiver
This can be specified by the machine administrator.
If you use [Forwarding] under the fax function, files stored in the machine can be transferred or
delivered.
To prevent stored files being transferred by mistake, select [Prohibit] for this setting.
• Prohibit
• Do not Prohibit
If you select [Prohibit] for this setting, the following functions are disabled:
• Forwarding
• Delivery of Mail Received via SMTP
220
Specifying the Extended Security Functions
221
8. Specifying the Extended Security Functions
Communication via HTTPS for @Remote Service is disabled if you select [Prohibit].
• Prohibit
• Do not Prohibit
Update Firmware
This can be specified by the machine administrator.
Specify whether to allow firmware updates on the machine. Firmware update means having the service
representative update the firmware or updating the firmware via the network.
If you select [Prohibit], firmware on the machine cannot be updated.
If you select [Do not Prohibit], there are no restrictions on firmware updates.
• Prohibit
• Do not Prohibit
Change Firmware Structure
This can be specified by the machine administrator.
Specify whether to prevent changes in the machine's firmware structure. The Change Firmware
Structure function detects when the SD card is inserted, removed or replaced.
If you select [Prohibit], the machine stops during startup when a firmware structure change is detected
and a message requesting administrator login is displayed. After the machine administrator logs in,
the machine finishes startup with the updated firmware.
The administrator can confirm if the updated structure change is permissible or not by checking the
8 firmware version displayed on the control panel screen. If the firmware structure change is not
permissible, contact your service representative before logging on.
When Change Firmware Structure is set to [Prohibit], administrator authentication must be enabled.
After [Prohibit] is specified, turn off administrator authentication once, and the next time administrator
authentication is specified, the setting will return to the default, [Do not Prohibit].
If you select [Do not Prohibit], firmware structure change detection is disabled.
• Prohibit
• Do not Prohibit
222
Other Security Functions
Fax Function
223
8. Specifying the Extended Security Functions
Scanner Function
224
Limiting Machine Operations to Customers Only
Settings
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
225
8. Specifying the Extended Security Functions
4. Select [Service Mode Lock] using [ ] or [ ], and then press the [OK] key.
226
Limiting Machine Operations to Customers Only
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Service Mode Lock] using [ ] or [ ], and then press the [OK] key.
227
8. Specifying the Extended Security Functions
Use the control panel to configure the security settings shown in the following table.
Menu
System Settings
Administrator User Auth. Management Select [Basic Auth.], and then set "Printer Job
Tools Authentication" to [Entire].
See "Basic Authentication".
Administrator Admin. Auth. Select [On], and then select [General Features],
Tools Management / Machine [Tray Paper Settings], [Timer Settings], [Interface
Management Settings], [File Transfer], and [Administrator
Tools] for "Items".
See "Enabling Administrator Authentication".
Administrator Admin. Auth. Select [On], and then select [Interface Settings],
Tools Management / Network [File Transfer], and [Administrator Tools] for
Management "Items".
See "Enabling Administrator Authentication".
228
Additional Information for Enhanced Security
Administrator Machine Data Encryption Select [Encrypt], and then select [All Data] for
Tools "Carry over to HD All Data, File Sys only or
Format all.".
See "Encrypting Data on the Hard Disk".
Fax Features
Reception Stored Recpt.File User Set Select [Set], and then specify the recipient user
Settings or group.
See "Other Security Functions".
229
8. Specifying the Extended Security Functions
• For details about SNMP setting, see Web Image Monitor Help.
Security/User Lockout Release Timer Set to Active or Inactive. When setting to Active, set
Lockout Policy the Lockout release timer to 60 minutes or more.
See "User Lockout Function".
230
Additional Information for Enhanced Security
Security/User Lock Out User for When setting "Lockout Release Timer" to Active, set
Lockout Policy the Lockout release timer to 60 minutes or more.
See "User Lockout Function".
• For details about the collect log setting and SNMPv3 setting, see Web Image Monitor Help.
231
8. Specifying the Extended Security Functions
• You can set "Permit SSL/TLS Communication" using either Web Image Monitor or the machine's
control panel.
8 If IPsec is not available, configure the settings shown in the following table to enhance the security of the
data traveling on your network.
System Settings(Control panel)
Address User Certificate You must register the user certificate in order to
Book/E-mail use S/MIME.
232
Additional Information for Enhanced Security
233
8. Specifying the Extended Security Functions
234
9. Troubleshooting
This chapter describes what to do if the machine does not function properly.
If Authentication Fails
This section explains what to do if a user cannot operate the machine because of a problem related to user
authentication. Refer to this section if a user comes to you with such a problem.
If a Message is Displayed
This section explains how to deal with problems if a message appears on the screen during user
authentication.
The most common messages are explained. If some other message appears, deal with the problem
according to the information contained in the message.
"You do not have privileges to The authority to use the function • If this appears when trying
use this function." is not specified. to use a function: The
function is not specified in
the Address Book
management setting as
being available. The user
administrator must decide
whether to authorize use of 9
the function and then assign
the authority.
• If this appears when trying
to specify a default setting:
The administrator differs
depending on the default
settings you wish to specify.
Using the list of settings, the
administrator responsible
must decide whether to
authorize use of the
function.
235
9. Troubleshooting
"Failed to obtain URL." The machine cannot connect to Make sure the server's settings,
the server or cannot establish such as the IP address and host
communication. name, are specified correctly on
the machine. Make sure the host
name of the UA Server is
specified correctly.
"Failed to obtain URL." The machine is connected to the Make sure the UA service is
server, but the UA service is not specified correctly.
responding properly.
"Failed to obtain URL." SSL is not specified correctly on Specify SSL using Authentication
the server. Manager.
"Failed to obtain URL." Server authentication failed. Make sure server authentication
is specified correctly on the
machine.
"Authentication failed." The entered login user name or Ask the user administrator for the
login password is incorrect. correct login user name and login
password.
"Authentication failed." Cannot access the authentication A network or server error may
server when using Windows have occurred. Confirm the
Authentication, LDAP network in use with the LAN
Authentication, or Integration administrator.
Server Authentication.
236
If Authentication Fails
"Set User Management in Admin. User administrator privileges To specify Basic Authentication,
Auth. to On to use this setting." have not been enabled in Windows Authentication, LDAP
Administrator Authentication Authentication, or Integration
Management. Server Authentication, you must
first enable user administrator
privileges in Administrator
Authentication Management.
For details about authentication
settings, see "Configuring User
Authentication".
If the following conditions arise while users are operating the machine, provide the instructions on how to
deal with them.
Cannot perform the following: User authentication has been Confirm the user name and login
• Print with the printer driver rejected. name with the administrator of
Cannot perform the following: The encryption key specified in Specify the driver encryption key
• Print with the printer driver the driver does not match the registered in the machine.
machine's driver encryption key. See "Specifying a Driver
• Connect with the TWAIN
driver Encryption Key".
237
9. Troubleshooting
Cannot perform the following: The SNMPv3 account, Specify the account, password
• Print with the printer driver password, and encryption and the encryption algorithm of
algorithm do not match settings SNMPv3 registered in the
• Connect with the TWAIN
specified on this machine. machine using network
driver
connection tools.
Send or print with the LAN-Fax
driver
Cannot authenticate using the Another user is logging on to the Wait for the user to log off.
TWAIN driver. machine.
Cannot authenticate using the Authentication is taking time Make sure the LDAP server
TWAIN driver. because of operating conditions. setting is correct.
Make sure the network settings
are correct.
Cannot authenticate using the Authentication is not possible Wait until editing of the Address
TWAIN driver. while the machine is editing the Book data is complete.
Address Book data.
After starting "User Management "Simple Encryption" is not set Set "Simple Encryption" to [On].
Tool" or "Address Management correctly. Alternatively, "SSL/ Alternatively, enable "SSL/TLS",
Tool" in SmartDeviceMonitor for TLS" has been enabled although install the server certificate in the
Admin and entering the correct the required certificate is not machine, and then install the
login user name and password, installed in the computer. certificate in the computer.
Cannot access the machine using "Simple Encryption" is not set Set "Simple Encryption" to [On].
ScanRouter EX Professional V3 / correctly. Alternatively, "SSL/ Alternatively, enable "SSL/TLS",
ScanRouter EX Enterprise V2. TLS" has been enabled although install the server certificate in the
the required certificate is not machine, and then install the
installed in the computer. certificate in the computer.
See "Setting the SSL / TLS
Encryption Mode".
Cannot connect to the The ScanRouter delivery Update to the latest version of the
ScanRouter delivery software. software may not be supported ScanRouter delivery software.
by the machine.
238
If Authentication Fails
Cannot log off when using the The original has not been When the original has been
copying or scanner functions. scanned completely. scanned completely, press the
[ ] key, remove the original,
and then log off.
"Program" does not appear on "Rstrct Dest. Add.(Fax)" is set to Registration must be done by the
the fax or scanner screen for [Off] in "Restrict Dest. Use(Fax)" user administrator.
specifying destinations. under "Extended Security", so
only the user administrator can
register destinations in the
Address Book on the fax screen.
User authentication is enabled, User authentication may have Re-enable user authentication,
yet destinations specified using been disabled while [All Users] is and then enable [All Users] for
the machine do not appear. not specified. the destinations that did not 9
appear.
For details about enabling [All
Users], see "Protecting the
Address Book".
Cannot print when user User authentication may not be Specify user authentication in the
authentication has been specified in the printer driver. printer driver.
specified. For details, see the printer driver
Help.
239
9. Troubleshooting
If you try to interrupt a job while With this machine, you can log Only the user who executed a
copying or scanning, an off while copying or scanning. If copying or scanning job can
authentication screen appears. you try to interrupt copying or interrupt it. Wait until the job has
scanning after logging off, an completed or consult an
authentication screen appears. administrator or the user who
executed the job.
After you execute "Encrypt The hard disk may be faulty. Contact your service
Address Book", the "Exit" The file may be corrupt. representative.
message does not appear.
240
10. Appendix
Supervisor Operations
The supervisor can delete an administrator's password and specify a new one.
If any of the administrators forgets their password or if any of the administrators changes, the supervisor
can assign a new password. If logged on using the supervisor's user name and password, you cannot use
normal functions or specify defaults.
Log on as the supervisor only to change an administrator's password.
• The default login user name is "supervisor" and the login password is blank. We recommend changing
the login user name and login password.
• When registering login user names and login passwords, you can specify up to 32 alphanumeric
characters and symbols. Keep in mind that user names and passwords are case-sensitive.
• Be sure not to forget the supervisor login user name and login password. If you do forget them, a
service representative will to have to return the machine to its default state. This will result in all data
in the machine being lost and the service call may not be free of charge.
• You cannot specify the same login user name for the supervisor and the administrators.
• Using Web Image Monitor, you can log on as the supervisor and delete an administrator's password
or specify a new one.
If administrator authentication has been specified, log on using the supervisor login user name and login 10
password. This section describes how to log on.
241
10. Appendix
3. Enter a login user name, and then press the [OK] key.
When you assign the administrator for the first time, enter "supervisor".
4. Enter a login password, and then press the [OK] key.
When you assign the administrator for the first time, press the [OK] key without entering login
password.
If administrator authentication has been specified, be sure to log off after completing settings. This section
describes how to log off after completing settings.
1. Press [Logout].
10 2. Press [Yes].
This section describes how to change the supervisor's login name and password.
To do this, you must enable the user administrator's privileges through the settings under [Admin. Auth.
Management]. For details, see "Specifying Administrator Privileges".
242
Supervisor Operations
5. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
6. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
7. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
10
243
10. Appendix
9. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.
10. Enter the login user name, and then press the [OK] key.
11. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
12. Enter the login password, and then press the [OK] key.
13. If a password reentry screen appears, enter the login password, and then press the [OK]
key.
10
244
Supervisor Operations
5. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
10
6. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
245
10. Appendix
7. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
8. Select the administrator you wish to reset using [ ] or [ ], and then press the [OK] key.
9. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
10. Enter the login password, and then press the [OK] key.
11. If a password reentry screen appears, enter the login password, and then press the [OK]
key.
10
246
Supervisor Operations
10
247
10. Appendix
System Settings
248
Machine Administrator Settings
249
10. Appendix
• "Machine Data Encryption" are available only if the optional HDD Encryption Unit is installed.
• "Auto Erase Memory Setting" and the "Erase All Memory" setting are available only if the optional
Data Overwrite Security Unit is installed.
Copier Features
Fax Features
10 Reception Settings
The following settings can be specified.
• Switch Reception Mode
• RX Mode Auto Switch Time
• Authorized Reception
• Checkered Mark
• Center Mark
• Print Reception Time
• 2 Sided Print
• Reception File Setting
250
Machine Administrator Settings
E-mail Settings
The following settings can be specified.
• Internet Fax Setting
• SMTP RX File Delivery
Administrator Tools
The following settings can be specified.
• Print Journal
• Print TX Standby File List
• Communication Page Count
• Forwarding
• Folder TX Result Report
• Parameter Setting
• Program Special Sender
• Program Memory Lock ID
• G3 Analog Line
• Memory File Transfer
• Menu Protect
Printer Features
251
10. Appendix
• Memory Usage
• Duplex
• Copies
• Blank Page Print
• Edge Smoothing
• Toner Saving
• Printer Language
• Sub Paper Size
• Page Size
• Letterhead Setting
• Bypass Tray Setting Priority
• Edge to Edge Print
• Default Printer Lang.
• Tray Switching
• RAM Disk
• Extended Auto Tray Switching
Host Interface
All the settings can be specified.
PCL Menu
All the settings can be specified.
PS Menu
All the settings can be specified.
PDF Menu
10 All the settings can be specified.
• PS or PDF menu settings are available only if the optional PostScript 3 Unit is installed.
Scanner Features
252
Machine Administrator Settings
253
10. Appendix
• Date/Time
All the settings can be specified.
• Timer
All the settings can be specified.
• Logs
All the settings can be specified.
• E-mail
All the settings can be specified.
• Auto E-mail Notification
All the settings can be specified.
• On-demand E-mail Notification
All the settings can be specified.
• File Transfer
All the settings can be specified.
• User Authentication Management
All the settings can be specified.
• Administrator Authentication Management
Machine Administrator Authentication
Available Settings for Machine Administrator
• Program/Change Administrator
You can specify the following administrator settings for the machine administrator.
Login User Name
Login Password
10 Encryption Password
• LDAP Server
All the settings can be specified.
• Firmware Update
All the settings can be specified.
• Program/Change Realm
All the settings can be specified.
Printer
• Basic Settings
Print Error Report
254
Machine Administrator Settings
Auto Continue
Memory Overflow
Rotate by 180 Degrees
Print Compressed Data
Memory Usage
Duplex
Copies
Blank Page Print
Edge Smoothing
Toner Saving
Printer Language
Sub Paper Size
Page Size
Letterhead Setting
Bypass Tray Setting Priority
Edge to Edge Print
Default Printer Language
Tray Switching
List/Test Print Lock
Extended Auto Tray Switching
Virtual Printer
Host Interface
PCL Menu
PS Menu
10
PDF Menu
• Tray Parameters (PCL)
All the settings can be specified.
• Tray Parameters (PS)
All the settings can be specified.
• Virtual Printer Settings
All the settings can be specified.
• PDF Group Password
All the settings can be specified.
255
10. Appendix
256
Machine Administrator Settings
• The following settings are available only if the optional PostScript 3 Unit is installed: "PS Menu", "PDF
Menu", "Tray Parameters (PS)", "Virtual Printer Settings", "PDF Group Password", and "PDF Fixed
Password".
257
10. Appendix
System Settings
258
Network Administrator Settings
• Program/Change Admin.
Network Administrator
You can specify the user name and change the full-control user's authority.
• Extended Security
Driver Encryption Key
Settings by SNMP V1 and V2
Simple Encryption
• Network Security Level
• The "Wireless LAN" setting is available only if the wireless LAN interface is installed.
Fax Features
Printer Features
259
10. Appendix
260
Network Administrator Settings
261
10. Appendix
Security
• Network Security
All the settings can be specified.
• Access Control
All the settings can be specified.
• IPP Authentication
All the settings can be specified.
• SSL/TLS
All the settings can be specified.
• ssh
All the settings can be specified.
• Site Certificate
All the settings can be specified.
• Device Certificate
All the settings can be specified.
• IPsec
All the settings can be specified.
• IEEE 802.1X (WPA/WPA2)
All the settings can be specified.
• S/MIME
All the settings can be specified.
Webpage
All the settings can be specified.
10
• "Wireless LAN Settings" are available only if the wireless LAN interface is installed.
262
File Administrator Settings
System Settings
Fax Features
263
10. Appendix
10
264
User Administrator Settings
System Settings
265
10. Appendix
Groups to notify
• Administrator Authentication Management
User Administrator Authentication
Available Settings for User Administrator
• Program/Change Administrator
You can specify the following administrator settings for the user administrator.
Login User Name
Login Password
Encryption Password
Webpage
• Download Help File
10
266
The Privilege for User Account Settings in the Address Book
Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)
Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)
267
10. Appendix
Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)
*1 The password for "Login Password", "SMTP Authentication", or "LDAP Authentication" can be entered or
changed but not displayed.
Tab Name: Auth.Protect
Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)
Dest.Protect:Permissi
N/A N/A N/A R/W R/W R/W
ons
*2 The code for "Protection Code" can be entered or changed but not displayed.
Tab Name: Fax Settings
10 Read-
Edit
Edit /
Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)
International TX
N/A R/W R/W R/W R/W R/W
Mode
268
The Privilege for User Account Settings in the Address Book
Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)
E-mail/Internet Fax
N/A R/W R/W R/W R/W R/W
Dest.
Internet Fax Dest. only N/A R/W R/W R/W R/W R/W
Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)
10
269
10. Appendix
10
270
Copier Features
Copier Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
General Features
Orientation R/W R
Reproduction Ratio R R
Menu Protect R R
271
10. Appendix
Printer Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Normal Printer Screen
The "PS Config./Font Page" and the "PDF Config./Font Page" can be printed only if the optional
PostScript 3 Unit is installed.
System
272
Printer Features
Auto Continue R R
Memory Overflow R R
Memory Usage R R
Duplex R R
Copies R R
Edge Smoothing R R
Toner Saving R R
Printer Language R R
Letterhead Setting R R
Tray Switching R R
RAM Disk R R
273
10. Appendix
Host Interface
I/O Buffer R R
I/O Timeout R R
PCL Menu
Orientation R R
Form Lines R R
Font Source R R
Font Number R R
Point Size R R
Font Pitch R R
Symbol Set R R
Courier Font R R
Extend A4 Width R R
Append CR to LF R R
Resolution R R
10 RAM Disk R R
PS Menu
Job Timeout R R
Wait Timeout R R
Data Format R R
Resolution R R
274
Printer Features
PS menu settings are available only if the optional PostScript 3 Unit is installed.
PDF Menu
Resolution R R
PDF menu settings are available only if the optional PostScript 3 Unit is installed.
10
275
10. Appendix
Scanner Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Scan Settings
Original Setting R R
Send Settings
276
Scanner Features
Administrator Tools
Menu Protect R R
10
277
10. Appendix
Fax Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
General Settings/Adjust
Reception Settings
Authorized Reception R R
278
Fax Features
E-mail Settings
IP-Fax Settings
Enable H.323 R R
Enable SIP R R
H.323 Settings R R
SIP Settings R R
Gateway Settings R R
Administrator Tools
Forwarding R R
Parameter Settings R R
G3 Analog line R R
279
10. Appendix
Menu Protect R R
10
280
System Settings
System Settings
When administrator authentication is enabled, the administrator's configuration of Available Settings
determines which system settings are available to users.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
General Features
Not
Settings Specified
Specified
Not
Settings Specified
Specified
281
10. Appendix
Not
Settings Specified
Specified
Timer Settings
Not
Settings Specified
Specified
Interface Settings
Network
282
System Settings
Not
Settings Specified
Specified
IPsec R/W R
283
10. Appendix
If you set "Machine IPv4 Address", "DNS Configuration", "Domain Name", or "WINS Configuration"
to "Auto-Obtain (DHCP)", you can only display the settings.
Parallel Interface
"Parallel Interface" settings are available only if the optional IEEE 1284 interface unit is installed.
Wireless LAN
Not
Settings Specified
Specified
284
System Settings
Not
Settings Specified
Specified
The settings made for "Main Delivery Server IP Address" and "Sub Delivery Server IP Address" in
"Delivery Option" can only be displayed, not changed.
The passwords for "SMTP Authentication" and "Default User Name / PW (Send)" can be entered or
changed but not displayed.
Administrator Tools
285
10. Appendix
Firmware Version R R
The password for "Program / Change / Delete LDAP Server" can be entered or changed but not
displayed.
10
286
User Settings - Web Image Monitor Settings
10
287
10. Appendix
Device Settings
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
System
Not
Settings Specified
Specified
Paper
Not
Settings Specified
Specified
288
Device Settings
Not
Settings Specified
Specified
Date/Time
Not
Settings Specified
Specified
Timer
Not
Settings Specified
Specified
289
10. Appendix
Not
Settings Specified
Specified
Logs
Not
Settings Specified
Specified
Transfer Logs R R
Not
Settings Specified
Specified
290
Device Settings
Not
Settings Specified
Specified
291
10. Appendix
Not
Settings Specified
Specified
File Transfer
Not
Settings Specified
Specified
The passwords for "SMB Password", "FTP Password", and "NCP Password" can be entered or
changed but not displayed.
User Authentication Management
Not
Settings Specified
Specified
292
Device Settings
Not
Settings Specified
Specified
LDAP Server
Not
Settings Specified
Specified
293
10. Appendix
Printer
If you have enabled administrator authentication, the menu protection setting determines which functions
and settings are available.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Printer Basic Settings
System
Auto Continue R R
Memory Overflow R R
Memory Usage R R
Duplex R R
10 Copies R R
Edge Smoothing R R
Toner Saving R R
Printer Language R R
Letterhead Setting R R
294
Printer
Tray Switching R R
Virtual Printer R R
Host Interface
I/O Buffer R R
I/O Timeout R R
PCL Menu
Orientation R R
Form Lines R R
Font Source R R
Font Number R R
Point Size R R
10
Font Pitch R R
Symbol Set R R
Courier Font R R
Extend A4 Width R R
Append CR to LF R R
Resolution R R
PS Menu
295
10. Appendix
Job Timeout R R
Wait Timeout R R
Data Format R R
Resolution R R
PS menu settings are available only if the optional PostScript 3 Unit is installed.
PDF Menu
Resolution R R
PDF menu settings are available only if the optional PostScript 3 Unit is installed.
Virtual Printer Settings
System
10 Job Separation R R
Memory Usage R R
Duplex R R
Copies R R
Edge Smoothing R R
Toner Saving R R
296
Printer
Letterhead Setting R R
PCL Menu
Orientation R R
Form Lines R R
Font Source R R
Font Number R R
Point Size R R
Font Pitch R R
Symbol Set R R
Courier Font R R 10
Extend A4 Width R R
Append CR to LF R R
Resolution R R
PS Menu
Job Timeout R R
Wait Timeout R R
297
10. Appendix
Data Format R R
Resolution R R
PS menu settings are available only if the optional PostScript 3 Unit is installed.
PDF Menu
Resolution R R
PDF menu settings are available only if the optional PostScript 3 Unit is installed.
RHPP Settings
"PDF Temporary Password" settings are available only if the optional PostScript 3 Unit is installed.
PDF Group Password
298
Printer
"PDF Group Password" settings are available only if the optional PostScript 3 Unit is installed.
PDF Fixed Password
"PDF Fixed Password" settings are available only if the optional PostScript 3 Unit is installed.
10
299
10. Appendix
Scanner
If you have enabled administrator authentication, the menu protection setting determines which functions
and settings are available.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Scan Settings
Scan Size R R
Original Setting R R
10 Original Orientation Priority R R
300
Scanner
Send Settings
Administrator Tools
301
10. Appendix
Fax
If you have enabled administrator authentication, the menu protection setting determines which functions
and settings are available.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Fax General Settings
Administrator Tools
302
Fax
IP-Fax Settings
303
10. Appendix
Parameter Settings
304
Interface
Interface
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
Interface Settings
Not
Settings Specified
Specified
USB R/W R
Not
Settings
Specified
Specified 10
LAN Type R/W N/A
SSID R/W R
305
10. Appendix
Not
Settings Specified
Specified
WPA-PSK/WPA2-PSK R/W R
"Wireless LAN Settings" are available only if the Wireless LAN interface unit is installed.
10
306
Network
Network
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
IPv4
Not
Settings Specified
Specified
DHCP R/W R
DDNS R/W R 10
WINS R/W R
Scope ID R/W R
LPR R/W R
307
10. Appendix
Not
Settings Specified
Specified
RSH/RCP R/W R
DIPRINT R/W R
FTP R/W R
sftp R/W R
IPP R/W R
RHPP R/W R
IPv6
Not
Settings Specified
Specified
IPv6 R/W R
DHCPv6-lite R/W R
DDNS R/W R
LPR R/W R
RSH/RCP R/W R
308
Network
Not
Settings Specified
Specified
DIPRINT R/W R
FTP R/W R
sftp R/W R
IPP R/W R
RHPP R/W R
NetWare
Not
Settings Specified
Specified
NetWare R/W R
309
10. Appendix
AppleTalk
Not
Settings Specified
Specified
AppleTalk R/W R
SMB
Not
Settings Specified
Specified
SMB R/W R
Comment R/W R
Bonjour
Not
Settings Specified
Specified
Bonjour R/W R
10 Computer Name R/W R
Location R/W R
DIPRINT R/W R
LPR R/W R
IPP R/W R
310
Webpage
Webpage
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
Webpage
Not
Settings Specified
Specified
Language 1 R/W R
Language 2 R/W R
URL 1 R/W R
URL 2 R/W R
311
10. Appendix
10
312
Trademarks
Trademarks
Microsoft®, Windows®, Windows Server®, Windows Vista®, and Outlook® are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Netscape, and Netscape Messenger are either registered trademarks or trademarks of Netscape
Communications Corporation in the United States and/or other countries.
Lotus, and Lotus Notes are either registered trademarks or trademarks of IBM Corporation in the United
States and/or other countries.
Netware, IPX, IPX/SPX are either registered trademarks or trademarks of Novell, Inc.
UPnPTM is a trademark of the UPnPTM Implementers Corporation.
PCL® is a registered trademark of Hewlett-Packard Company.
Monotype is a registered trademark of Monotype Imaging, Inc.
Apple, AppleTalk, Bonjour, Macintosh, and Mac OS are trademarks of Apple Inc., registered in the U.S.
and other countries.
Solaris is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other
countries.
LINUX® is the registered trademark of Linus Torvalds in the U.S. and other countries.
RED HAT is a registered trademark of Red Hat, Inc.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
* The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional 10
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
* The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
* The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
313
10. Appendix
10
314
INDEX
A Encrypting the Data in the Address Book..........120
Encryption Key Auto Exchange / Manual Settings
Access Control.....................................................163 - Shared Settings.................................................192
Address Book Privileges.....................................267 Encryption Key Auto Exchange Security Level........
Administrator..........................................................17 ..............................................................................192
Administrator Authentication...................17, 23, 25 Encryption Key Auto Exchange Setting Items..........
..............................................................................194
Administrator Privileges......................................... 25
Encryption Key Auto Exchange Settings
AH Protocol.........................................................191 Configuration Flow.............................................200
AH Protocol + ESP Protocol................................191 Encryption Key Manual Settings Configuration
Authenticate Current Job....................................221 Flow......................................................................205
Authentication and Access Limits..........................16 Encryption Key Manual Settings Items..............197
Authentication by IEEE802.1X...........................215 Encryption Technology.........................................16
Authentication Using an External Device............97 Enhance File Protection....................................... 219
authfree................................................................214 Enhanced Security..............................................228
Auto Erase Memory............................................132 ESP Protocol.........................................................190
Auto Logout............................................................95 Extended Security Functions...............................217
Available Functions.............................................147
F
B
Fax........................................................................302
Basic Authentication..............................................48 Fax Features........................................................278
C File Administrator...................................................22
File Administrator Settings..................................263
Change Firmware Structure................................222
Full Control..........................................................267
Configuring Address Book Access Permissions.......
..............................................................................118 I
Configuring User Authentication..........................39 If User Authentication is Specified........................90
Copier Features...................................................271 Installing the Device Certificate (Issued by a
Creating the Device Certificate (Issued by a Certificate Authority)...........................................184
Certificate Authority)...........................................183 Integration Server Authentication......................... 78
D Interface...............................................................305
Device Settings....................................................288 IP Address..............................................................11
Disabling Log Transfer to Web IPsec.....................................................................190
SmartDeviceMonitor...........................................150 IPsec Settings.......................................................192
Display...................................................................10 IPsec telnet Setting Commands..........................206
Driver Encryption Key................................176, 218 L
E Laws and Regulations...........................................12
E-mail Encryption................................................110 LDAP Authentication..............................................70
Edit........................................................................267 LDAP Authentication - Operational Requirements
Edit / Delete........................................................267 for LDAP Authentication........................................70
Electronic Signature............................................112 Locked Print............................................................99
Enabling and Disabling Protocols......................164 Log off (Administrator)..........................................33
Enabling the Encryption Settings........................124 Log on (Administrator)..........................................32
Encrypt Address Book.........................................218 Login.......................................................................17
Encrypting Data on the Hard Disk.....................124 Logout.....................................................................17
315
M Security Measures.................................................18
Self-Signed Certificate........................................182
Machine Administrator.........................................22
Service Mode Lock.............................................225
Machine Administrator Settings.........................248
Setting Up the Machine........................................14
Menu Protect.......................................................141
Settings SNMPv1 and v2...................................220
Message..............................................................235
Simple Encryption...............................................220
N SNMPv3..............................................................188
Network...............................................................307 Specifying a Group Password for PDF Files..... 178
Network Administrator..........................................22 Specifying an IPP Authentication Password......179
Network Administrator Settings.........................258 Specifying Login Details........................................56
Network Security Level.......................................172 Specifying Menu Protect.....................................143
Note.......................................................................11 SSL........................................................................185
Notice.......................................................................9 SSL (Secure Sockets Layer)................................181
SSL/TLS Encryption.............................................186
O Supervisor......................................................22, 241
Operational Issues..............................................237 Symbols..................................................................10
Options................................................................312 System Settings....................................................281
P T
Password Policy...................................................221 telnet.....................................................................214
Preventing information leaks..............................223 Trademarks..........................................................313
Printer...................................................................294 Transfer to Fax Receiver.....................................220
Printer Features....................................................272 Transmitted Passwords........................................176
Printer Job Authentication.....................................87 Type of Administrator..........................................141
Printer Job Authentication Levels..........................87 U
Printer Job Types....................................................88
Printing the Encryption Key.................................126 Update Firmware................................................222
User..................................................................17, 37
R User Administrator...............................................267
Read-only............................................................267 User Administrator Settings................................265
Registered User.............................................17, 267 User Authentication..................................17, 38, 41
Registering the Administrator................................27 User Code Authentication.....................................42
Remote Diagns.(Fax)...........................................221 User Lockout Function...........................................93
Remote Service....................................................221 User Settings - Control Panel Settings................270
Restrict Adding User Dest...................................219 W
Restrict Use of Dest..............................................218
Restrict User Info.Display....................................219 Web Image Monitor Settings.............................287
Restricting Destinations.......................................107 Webpage............................................................311
Windows Authentication.......................................60
S Windows Authentication - Operational
S/MIME..............................................................110 Requirements for Kerberos Authentication..........60
Scanner................................................................300 Windows Authentication - Operational
Requirements for NTLM Authentication...............60
Scanner Features.................................................276
Security Functions..................................................13
EN USA D069-6951
UNIX Supplement
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be li-
able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper-
ating the machine.
Notes
This manual covers several different models, and therefore contains functions and settings that may
not be available for your model.
Functions and supported operating systems may differ from those of your model.
Trademarks
UNIX is a registered trademark of The Open Group.
PostScript is registered trademark of Adobe Systems, Incorporated.
Sun, SunOS and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S.
and other countries.
HP-UX and PCL are registered trademarks of Hewlett-Packard Company.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
RED HAT is a registered trademark of Red Hat, Inc.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
TABLE OF CONTENTS
How to Read This Manual .....................................................................................2
Symbols .....................................................................................................................2
1. UNIX Configuration
Before Setup...........................................................................................................3
Using the lp / lpr commands.......................................................................................3
Using the rsh / rcp / ftp commands ............................................................................3
Using the Installation Shell Script........................................................................ 4
Assigning the IP Address ...........................................................................................5
Executing the Installation Shell Script ........................................................................6
After Executing the Installation Shell Script ...............................................................8
Printing Method....................................................................................................14
Printing with lpr, lp....................................................................................................14
Printing with rsh, rcp, ftp........................................................................................... 15
Printer Status .......................................................................................................17
Viewing the Print Job Status with lpq and lpstat ......................................................17
Viewing the Printer Status with rsh and ftp ..............................................................17
Copying Information to a File ...................................................................................18
Specifying the Device Option .............................................................................19
Configuring the Device Option .................................................................................19
Printer Language...................................................................................................... 22
Text Printing .............................................................................................................22
Input Tray .................................................................................................................23
Paper Size................................................................................................................24
Paper Type...............................................................................................................25
Output Tray ..............................................................................................................26
Copies ......................................................................................................................26
Collating ...................................................................................................................27
Duplex Printing......................................................................................................... 27
Binding .....................................................................................................................28
Orientation................................................................................................................29
Image Direction ........................................................................................................29
Resolution ................................................................................................................30
Billing Code ..............................................................................................................30
User Code ................................................................................................................31
Symbol Set...............................................................................................................32
INDEX......................................................................................................... 34
1
How to Read This Manual
Symbols
This manual uses the following symbols:
Indicates points to pay attention to when using the machine, and explanations
of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure
to read these explanations.
This symbol is located at the end of sections. It indicates where you can find fur-
ther relevant information.
[]
Indicates the names of keys that appear on the machine’s display panel.
{}
Indicates the names of keys on the machine’s control panel.
2
1. UNIX Configuration
This section explains how to set up a network printer and check print status us-
ing UNIX.
Before Setup
Important
❒ To print from a UNIX workstation, use a file that the printer supports.
Setting up varies depending on the printing commands. Make sure to make set-
tings accordingly.
B Start printing.
See p.14 “Printing Method”.
3
UNIX Configuration
4
Using the Installation Shell Script
5
UNIX Configuration
1
the installation shell script and set up the workstation printing environment.
Important
❒ Before executing the installation shell script, the IP address, host name and
printer name are required.
❒ The following procedures use the sample IP address: 192.168.15.16; sample
host name: nphost; and sample printer name: np.
❒ Download the installation shell script from our Web site. Keep the installation
shell script as local folders.
A Move to the directory that has kept the installation shell script.
B Run the installation shell script.
# sh ./install
Insert a period and slash before the current directory.
C Enter a number to select the workstation operating system that you are us-
ing.
Network printer install shell
Select your workstation OS type
1.SunOS 4.x.x
2.Solaris 2.x, Solaris 7-9 (SunOS5.x)
3.HP-UX
4.UnixWare
5.Linux
6.OpenServer
7.Quit
Enter <1-7>:
2
If you select “7”, the installation shell script ends.
6
Using the Installation Shell Script
H Perform a test print to make sure that the settings are correct.
# lpr -Pnp file_name
# lp -d np file_name
Note
❒ SunOS, UnixWare, and OpenServer appear on the screen, but they are not
supported. Use Solaris, HP-UX, or Linux.
❒ The IP address will be added to the /etc/hosts file.
❒ The host name will be added to the /etc/hosts file.
❒ When printing with the lp command, use ( _ ) instead of ( = ) and ( ; ) in-
stead of ( , ) for operating systems that cannot use ( = ) and ( , ) such as So-
laris 2.5 or later.
Reference
For details about how to download the installation shell script, contact
your sales or service representative.
For details about lpr and lp, see p.14 “Printing Method”.
For details about the device option, see p.19 “Specifying the Device Op-
tion”.
7
UNIX Configuration
❖ Solaris, HP-UX
Delete the printer entry, and then execute the installation shell script again.
Select options during the setup process. To delete the printer entry, follow the
procedure below:
A Stop the scheduler.
# /usr/sbin/lpshut
B Delete the printer.
# /usr/sbin/lpadmin -x printer_name
C Restart the scheduler.
# /usr/lib/lpsched
8
Using the Installation Shell Script
Linux
9
UNIX Configuration
Note
❒ The /etc/printcap file is used to register the name and attributes of a print-
er. You must make an entry for the network printer in the /etc/printcap
file of all workstations using the network printer.
1 ❒ You must make an entry for each printer option when using the same
printer.
❒ Each entry is separated with colons into several fields. The syntax is to be-
gin each entry with a colon, followed by the entry, and then end with a co-
lon, a back slash, and then a return.
❒ The first line of the field is the name of the printer. You use this name when
logging on to a network printer from a workstation. You can define several
different names by separating each name with the “|” character.
❒ The second and following lines contain the printer's attributes. Attributes
are represented by two-character names referred to as capabilities. For de-
tails about capabilities, see the following table:
Capability Explanation Value required for the network
printer.
rm Host name of the printer. The host name that was registered
with the /etc/hosts file.
rp Optional specification. Select options for printing. For de-
“lp” will be assigned, if the option tails about available options, see
is not used. p.19 “Specifying the Device Op-
tion”.
sd Path name of the spool directory. Path name of the spool directory
that is to be created.
lf Path name of the log file. Path name of the log file.
For example /var/log/lpd-errs.
mx Maximum file size which the di- None, or something suitable.
rectory can copy. When set to 0, the
size is unlimited. If nothing is en-
tered, the size is set to 1024 k.
10
Using the Installation Shell Script
11
UNIX Configuration
Solaris
12
Using the Installation Shell Script
HP-UX
13
UNIX Configuration
Printing Method
❖ Solaris, HP-UX
% lp -d printer_name file_name [file_name...]
For example:
The printer name is np, file names are file1 and file2
% lp -d np file1 file2
Note
❒ “printer_name” is the name entered when executing the installation shell
script.
❒ You can use wild cards ( * or ? ) for the file name.
❒ The message “print session full” appears when the maximum number of
print requests has been reached (max. 5 sessions —Job Spool setting availa-
ble). You should try to print again when the number of requests is less than
five. You can check the number of print requests using telnet. For details
about using telnet, see the manual that comes with this machine.
❒ The number of print sessions does not change, whether you increase or re-
duce the machine's total memory size.
14
Printing Method
rsh
% rsh host_name print < file_name
For example:
host name is nphost, file name is file1
% rsh nphost print < file1
Note
❒ “host_name” is the name entered when executing the installation shell script.
❒ If you are using HP-UX, use the remsh command instead of rsh.
rcp
15
UNIX Configuration
ftp
Use the put or mput commands depending on the number of files to be printed.
1 Important
❒ File names cannot contain “=” or “,”.
❒ You can use wild cards ( * or ? ) for the file name with the mput command.
B Enter the user name. Skip the password, and then press the {RETURN} ( {EN-
TER} ) key.
Name:
Password:
E Exit ftp.
ftp> bye
16
Printer Status
Printer Status
You can use the following commands to have information and printer status dis-
played or copied to a file.
Use the lpq or lpstat command to display the status of the printer or information
1
about print jobs.
Use the rsh, rcp or ftp commands to get more detailed information from the
printer.
17
UNIX Configuration
Note
❒ Leave the user name and password blank, and then press the {RETURN} ( {EN-
TER} ) key.
❒ “-” indicates standard output. Display will be displayed on screen if standard
output has not been specified.
18
Specifying the Device Option
19
UNIX Configuration
Note
❒ Multiple options must be separated by commas (,). Do not use spaces.
❒ When the printing file contains the PostScript commands control of the op-
tion, the command takes priority.
1 ❒ Enter the option using the lp or lpr command, when the shell script is imple-
mented. The option settings made here are configured as default. You must
create another printer if you want to change printer option settings. For de-
tails about changing the configured option, see p.8 “Deleting the printer”.
❒ When printing with the lp command, use ( _ ) instead of ( = ) and ( ; ) instead
of ( , ) for operating systems that cannot use ( = ) and ( , ) such as Solaris 2.5 or
later.
20
Specifying the Device Option
paper a4, a5, jisb5, legal, letter, Specifies the paper size.
halfletter, executive, fgl, fools-
cap, folio, com10, monarch,
C5, C6, dl, k16, custom
mediatype plainorrecycled, plain, recy- Specifies the paper type.
cled, special, thick, thin, trans-
parency, color, letterhead,
preprinted, prepunched, la-
bels, bond, cardstock, auto
outbin upper Specifies the output tray.
copies Number of copies (1–999) Specifies the number to col-
late.
qty Number of collated sets (1– Specifies the number to cop-
999) ies.
duplex on, off Specifies whether duplex
printing is on or off.
binding longedge, shortedge, left, Specifies the binding direction
right, top for duplex printing.
orientation portrait, landscape Specifies the feed direction of
the paper.
image direction normal, reverse Specifies the print image rota-
tion.
resolution value of resolution (300, 600) Specifies the resolution for
printing.
billing code Value of billing code Specifies the billing code.
(0x09(<HT>), 0x20-0xFF (ex-
pect 0x22))
user code Value of user code (0x21 to Specifies the user code.
0x7e, except 0x22)
symbol set desktop, iso4, iso6, iso11, Specify the set of print charac-
iso15, iso17, iso21, iso60, ters.
iso69, isol1, isol2, isol5, legal,
math8, mspubl, pc8, pc850,
pc852, pc8dn, pc8tk, pifont,
psmath, pstext, roman8, vn-
intl, vnmath, vnus, win30,
winl1, winl2, winl5
21
UNIX Configuration
Printer Language
Select a printer language to print.
1 filetype=printer language
fil=printer language
Printer language Value
PCL 5c or PCL 5e pcl
PostScript 3 postscript or rps
PDF pdf
The following sample shows how to print with PostScript 3 (host name: nphost,
file name: file1):
• rsh
% rsh nphost print filetype=postscript < file1
• rcp
% rcp file1 nphost:filetype=postscript
• ftp
ftp> put file1 filetype=postscript
Text Printing
Set this function when printing text files directly.
filter=text
The following sample shows how to print text files directly.
• rsh
% rsh nphost print filter=text < file1
• rcp
% rcp file1 nphost:filter=text
• ftp
ftp> put file1 filter=text
22
Specifying the Device Option
Input Tray
Select a default input tray.
Important 1
❒ Only installed input trays are available.
tray=value of input tray
Input tray Value
Tray 1 tray1
Tray 2 tray2
Tray 3 tray3
Bypass tray bypass
Auto Tray Select all
The following sample shows how to print from tray 2 (host name: nphost, file
name: file1):
• rsh
% rsh nphost print tray=tray2 < file1
• rcp
% rcp file1 nphost:tray=tray2
• ftp
ftp> put file1 tray=tray2
23
UNIX Configuration
Paper Size
Select the paper size.
1 Important
❒ Only the loaded paper sizes are available.
❒ When PostScript 3 is selected in Printer Language, and a custom paper size
that exceeds “297x418.4 mm” is specified, a printout is counted as an A3 size
output. Be careful if you are using the charge option, etc.
paper=value of paper size
Paper size Value
A4 a4
A5 a5
B5JIS (Japanese Industrial Standard) jisb5
81/2 × 11 letter
81/2 × 14 legal
8 × 13 fgl
81/2 × 13 foolscap
81/4 × 13 folio
The following sample shows how to print using A4 size paper (host name:
nphost, file name: file1):
• rsh
% rsh nphost print paper=a4 < file1
• rcp
% rcp file1 nphost:paper=a4
• ftp
ftp> put file1 paper=a4
24
Specifying the Device Option
Paper Type
Select the paper type.
Important 1
❒ Only the loaded paper types are available.
mediatype=value of paper type
Paper type Value
Plain paper/recycled paper plainorrecycled
Plain paper plain
Recycled paper recycled
Special paper special
Thick paper thick
OHP transparency transparency
Color paper color
Letterhead letterhead
Preprinted paper preprinted
Prepunched paper prepunched
Labels labels
Bond paper bond
Cardstock cardstock
Auto Paper Select auto
The following sample shows how to print using recycled paper (host name:
nphost, file name: file1):
• rsh
% rsh nphost print mediatype=recycled < file1
• rcp
% rcp file1 nphost:mediatype=recycled
• ftp
% ftp> put file1 mediatype=recycled
25
UNIX Configuration
Output Tray
Select the output tray.
Reference
For details about available output tray, see the manual that comes with this
machine.
The following sample shows how to print to the standard tray (standard tray:
upper, host name: nphost, file name: file1):
• rsh
% rsh nphost print outbin=upper < file1
• rcp
% rcp file1 nphost:outbin=upper
• ftp
ftp> put file1 outbin=upper
Copies
Specify the number of copies.
copies=number of copies (1 to 999)
Important
❒ Do not specify “copies” and “qty *1 ” commands at the same time.
*1 “qty” specifies the number of collated sets.
The following sample shows how to print 10 copies (host name: nphost, file
name: file1):
• rsh
% rsh nphost print copies=10 < file1
• rcp
% rcp file1 nphost:copies=10
• ftp
ftp> put file1 copies=10
26
Specifying the Device Option
Collating
Specify the number of collated sets.
qty=number of collated sets (1 to 999)
1
The following sample shows how to print 10 copies using the collate function
(host name: nphost, file name: file1):
• rsh
% rsh nphost print qty=10 < file1
• rcp
% rcp file1 nphost:qty=10
• ftp
ftp> put file1 qty=10
Duplex Printing
This option enables duplex printing.
Important
❒ The duplex unit is required.
duplex=value of duplex printing
Duplex printing Value
enable on
disable off
The following sample shows how to set duplex printing (host name: nphost, file
name: file1):
• rsh
% rsh nphost print duplex=on,binding=longedge < file1
• rcp
% rcp file1 nphost:duplex=on,binding=longedge
• ftp
ftp> put file1 duplex=on,binding=longedge
Note
❒ Before selecting duplex, the binding option must be set to on.
❒ Data and paper volume affect the completion of the print job.
Reference
For details about available paper size for duplex printing, see the manual that
comes with this machine.
27
UNIX Configuration
Binding
Select the binding direction for duplex printing.
1 Important
❒ The duplex unit is required.
binding=value of binding
Binding direction Value
Longedge longedge
Shortedge shortedge
Left left
Right right
Top top
The following sample shows how to set duplex printing and long-edge binding
(host name: nphost, file name: file1):
• rsh
% rsh nphost print duplex=on,binding=longedge < file1
• rcp
% rcp file1 nphost:duplex=on,binding=longedge
• ftp
ftp> put file1 duplex=on,binding=longedge
Note
❒ Before selecting the binding option, the duplex option must be set to on.
❒ Data and paper volume affect completion of the print job.
28
Specifying the Device Option
Orientation
Select the paper feed orientation.
Important 1
❒ This function is only for PCL.
orientation=feed direction (portrait or landscape)
Orientation value
Portrait portrait
Landscape landscape
The following sample shows how to print the paper vertically using the orienta-
tion function (host name : nphost, file name : file1):
• rsh
% rsh nphost print orientation=portrait < file1
• rcp
% rcp file1 nphost:orientation=portrait
• ftp
ftp> put file1 orientation=portrait
Image Direction
Select the print image rotation.
imagedirection=value of print image rotation
Rotation Value
0 degree normal
180 degrees reverse
The following sample shows how to print the 180 degrees rotation using the im-
agedirection function (host name : nphost, file name : file1):
• rsh
% rsh nphost print imagedirection = reverse < file1
• rcp
% rcp file1 nphost: imagedirection = reverse
• ftp
ftp> put file1 imagedirection = reverse
29
UNIX Configuration
Resolution
Select the printing resolution.
1 resolution=value of resolution
Resolution Value
600 dpi 600
400 dpi 400
The following sample shows how to print with 600 dpi and better quality. (host
name: nphost, file name: file1):
• rsh
% rsh nphost print resolution=600 < file1
• rcp
% rcp file1 nphost:resolution=600
• ftp
ftp> put file1 resolution=600
Billing Code
Specifies the billing code.
billingcode=Value of billingcode (0x09(<HT>), 0x20-0xFF
(except 0x22)) *1
*1
MAX 228 bytes = 255byte (Max number of characters allowed for each PJL command
line on GW-PJL source) - 27 bytes (number of characters for @PJL SET BILLING-
CODE = ""<CR><LF>)
• rsh
% rsh nphost print billingcode=0x09 < file1
• rcp
% rcp file1 nphost: billingcode=0x09
• ftp
ftp> put file1 billingcode=0x09
Note
❒ Note that PJL syntax allows unlimited spaces (for example, more than one
space can be placed between "@PJL" and "SET," or before/after the "=" sign).
❒ Therefore, a password can be less than the maximum value (228 bytes).
❒ This also implies the maximum value (228 bytes) is secured as long as the nor-
mal syntax is used.
30
Specifying the Device Option
User Code
Specifying the user code.
Usercode=\"value of user code\"
1
Specify the user code using up to eight alphanumeric characters (0x21 to 0x7e,
except 0x22).
The user code must be inside double quotation marks (" ").
Some operating systems cannot forward the user code if it is inside double quo-
tation marks. If this is the case, include escape characters such as back slashes (\)
(0x5c) in place of double quotation marks.
• rsh
% rsh nphost print usercode=/"12345/" < file1
• rcp
% rcp file1 nphost: usercode=/"12345/"
• ftp
ftp> put file1 USERCODE=/"12345/"
Note
❒ If you are printing with the ftp command, enter the user code in uppercase
letters.
31
UNIX Configuration
Symbol Set
Select the set of print characters for the chosen font.
1 Important
❒ This function is only for PCL.
symset=value of font
Font Value
Desktop desktop
ISO 4 iso4
ISO 6 iso6
ISO 11 iso11
ISO 15 iso15
ISO 17 iso17
ISO 21 iso21
ISO 60 iso60
ISO 69 iso69
ISO L1 isol1
ISO L2 isol2
ISO L5 isol5
Legal legal
Math-8 math8
MS Publ mspubl
PC-8 pc8
PC-850 pc850
PC-852 pc852
PC-8 D/N pc8dn
PC8-TK pc8tk
Pifont pifont
PS Math psmath
PS Text pstext
Roman-8 roman8
VN Intl vnintl
VN Math vnmath
VN US vnus
Win 3.0 win30
Win L1 winl1
32
Specifying the Device Option
Font Value
Win L2 winl2
Win L5 winl5
The following sample shows how to print the ISO 4 character set (host name : 1
nphost, file name : file1):
• rsh
% rsh nphost print symset=iso4 < file1
• rcp
% rcp file1 nphost:symset=iso4
• ftp
ftp> put file1 symset=iso4
33
INDEX
B L
Billing code, 30 Linux
Binding Deleting the printer, 8
Option, 28 Printer Status, 17
BSD UNIX workstation Printing Method, 14
Deleting the printer, 8 lp
Printer Status, 17 Printing, 14
Printing Method, 14 lpr
Printing, 14
C
O
Collating
Option, 27 Orientation
configuration Option, 29
UNIX, 3 Output Tray
Copies Option, 26
Option, 26
P
D
Paper Size
Deleting the printer, 8 Option, 24
Device Option, 19 Paper Type
Duplex Printing Option, 25
Option, 27 Printer Language
Option, 22
F Printer Status, 17
ftp, 17
ftp rsh, 17
Printing, 16 Printing Method, 14
Printing with rsh, rcp, ftp, 15
H
How to Read This Manual, 2 R
HP-UX rcp
Deleting the printer, 8 Printing, 15
Printer Status, 17 Resolution
Printing Method, 14 Option, 30
Rotation
I Option, 29
Image direction rsh
Option, 29 Printing, 15
Input Tray
Option, 23
Installation Shell Script, 4, 6, 8
IP Address, 5
34
S
Solaris
Deleting the printer, 8
Printer Status, 17
Printing Method, 14
Symbol Set
Option, 32
System V UNIX
Printer Status, 17
T
Text Printing
Option, 22
U
UNIX, 3
User code
Option, 31
35
36 GB GB EN USA AE AE D468-6801
Copyright © 2008
UNIX Supplement
GB GB
EN USA
AE AE D468-6801
Operating Instructions
Troubleshooting
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Documentation for This Machine.......................................................................................................................1
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Name of Major Item......................................................................................................................................8
Notes...............................................................................................................................................................9
Laws and Regulations......................................................................................................................................10
Legal Prohibition..........................................................................................................................................10
1. When the Machine Does Not Operate As Wanted
Indicators..........................................................................................................................................................11
Panel Tone........................................................................................................................................................12
When the Function Status Indicator Lights Up in Red....................................................................................13
When You Have Problems Operating the Machine.....................................................................................15
When a Job Is Not Performed.........................................................................................................................19
2. Troubleshooting When Using the Copy Function
Messages Displayed When Using the Copy Function..................................................................................21
When You Cannot Make Clear Copies.........................................................................................................23
When You Cannot Make Copies As Wanted...............................................................................................26
When Memory Is Full..................................................................................................................................29
3. Troubleshooting When Using the Facsimile Function
Adjusting the Volume.......................................................................................................................................31
Messages Displayed When Using the Facsimile Function............................................................................34
When You Cannot Send or Receive Fax Messages As Wanted.................................................................45
When Memory Is Full..................................................................................................................................50
If an Error Report Is Printed..............................................................................................................................52
Turning Off the Main Power / In the Event of Power Failure.......................................................................53
When an Error Occurs Using Internet Fax.....................................................................................................54
Error Mail Notification.................................................................................................................................54
Error Report (E-mail)....................................................................................................................................54
Server-Generated Error E-mail...................................................................................................................54
2
4. Troubleshooting When Using the Printer Function
Messages Displayed When Installing the Printer Driver...............................................................................55
Windows 2000...........................................................................................................................................55
Windows XP Professional or Windows Server 2003/2003 R2.............................................................55
Windows XP Home Edition.........................................................................................................................56
Windows Vista.............................................................................................................................................56
Windows Server 2008...............................................................................................................................57
If USB Connection Fails...................................................................................................................................58
Messages Displayed When Using the Printer Function.................................................................................59
Status Messages..........................................................................................................................................59
Alert Messages............................................................................................................................................60
Printing the Error Log....................................................................................................................................61
When You Cannot Print...................................................................................................................................63
When the Data In Indicator Does Not Light Up or Flash..........................................................................65
Other Printing Problems...................................................................................................................................67
5. Troubleshooting When Using the Scanner Function
When Scanning Is Not Done As Expected....................................................................................................77
When You Cannot Send Scanned Files.........................................................................................................79
When You Cannot Browse the Network to Send a Scan File..................................................................79
When the TWAIN Driver Cannot Be Started............................................................................................79
When the Network Delivery Function Cannot Be Used...........................................................................79
When S/MIME Cannot Be Used...............................................................................................................80
When You Cannot Send Scan Files Using WSD......................................................................................80
Operations Are Not Possible When Messages Are Displayed...............................................................81
Messages Displayed When Using the Scanner Function.............................................................................82
Messages Displayed on the Control Panel When Using the Scanner Function.....................................82
Messages Displayed on the Client Computer...........................................................................................89
6. Clearing Misfeeds
Removing Jammed Paper................................................................................................................................93
When A is displayed...................................................................................................................................94
When P is displayed....................................................................................................................................95
When Y1 is displayed.................................................................................................................................95
When Y2 is displayed.................................................................................................................................96
3
7. Appendix
Trademarks.......................................................................................................................................................97
INDEX.............................................................................................................................................................99
4
Manuals for This Machine
Read this manual carefully before you use this machine.
Refer to the manuals that are relevant to what you want to do with the machine.
5
• Enable SSL (Secure Sockets Layer) Encryption.
• Change the user name and password of the administrator using Web Image Monitor.
For details, see "Setting Up the Machine", Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
6
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
7
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
8
Notes
9
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
10
1. When the Machine Does Not Operate
As Wanted
This chapter describes basic troubleshooting procedures that are applicable to all functions of this machine.
1
Indicators
This section describes the indicators light up when the machine requires the user to remove misfed paper,
to add paper, or to perform other procedures.
Indicator Status
11
1. When the Machine Does Not Operate As Wanted
Panel Tone
The following table describes the meaning of the various beep patterns that the machine produces to alert
1 users about left originals and other machine conditions.
Single short beep. A valid operation is A control panel key was pressed, the
accepted. machine was switched on, or a
document was placed on the ADF.
Two long beeps. Machine has warmed up. After cooling or being switched on, the
machine has fully warmed up and is
ready for use.
Five short beeps repeated Strong alert. The machine requires user attention
five times. because paper has jammed, the toner
needs replenishing, or other problems
have occurred.
• Users cannot mute the machine's beep alerts. When the machine beeps to alert users of a paper jam
or toner request, if the machine's covers are opened and closed repeatedly within a short space of
time, the beep alert might continue, even after normal status has resumed.
• You can select to enable or disable beep alerts. For details about Panel Key Sound, see "System
Settings", Network and System Settings Guide .
12
When the Function Status Indicator Lights Up in Red
Documents and reports do The paper output tray is full. Remove the prints from the tray.
not print out.
Documents and reports do There is no paper left. Load paper. See "Loading Paper",
not print out. About This Machine .
An error has occurred. The function whose indicator Record the code number shown in the
is lit is defective. display and contact your service
representative. See "Messages
Displayed" of each chapter.
You can use other functions normally.
The machine is unable to A network error has • Check the displayed message and
connect to the network. occurred. take an appropriate action. See
"Messages Displayed" of each
chapter.
• Check that the machine is correctly
connected to the network, and that
the machine is correctly set. For
details about how to connect the
network, see "Connecting the
Machine", Network and System
Settings Guide .
• Contact the network administrator.
• When the function key is still lit in
red, even if you take the measures
above, contact your service
representative.
13
1. When the Machine Does Not Operate As Wanted
14
When You Have Problems Operating the Machine
Although the copier screen Functions other than the Wait a little longer.
appears when the machine is copier function are not yet
turned on using the main ready.
power switch, it cannot be
switched to another screen by
pressing the [Facsimile],
[Printer], or [Scanner] key.
The machine has just been Functions other than the Wait a little longer.
turned on and the User Tools copier function are not yet
screen is displayed, but the ready. Time required varies
User Tools menu has items by function. Functions appear
missing. in the User Tools menu when
they become ready for use.
The operation switch This occurs in the following • Close the ADF.
indicator continues blinking cases: • Check if the machine is
and does not turn off when • The exposure glass communicating with external
pressed. cover or ADF is open. equipment.
• The machine is • Wait a little longer.
communicating with
external equipment.
• The hard disk is active.
The display is difficult to see. Screen contrast is not Adjust the screen's contrast so that you
adjusted. can see the display panel properly. See
"General Features", Network and
System Settings Guide .
The display is off. The machine is in Energy Turn on the operation switch.
Saver mode.
The display is off. The operation switch is turned Turn on the operation switch.
off.
15
1. When the Machine Does Not Operate As Wanted
Nothing happens when the The main power switch is Turn on the main power switch.
operation switch is turned on. turned off.
1
"Please wait." appears. This message appears when Wait for a while. If the machine does not
you turn on the operation get ready in a minute, contact your
switch. service representative.
"Please wait." appears. If the machine has not been in • Wait for a while. If the machine
use for a long time, it may take does not get ready in a couple of
longer than normal to print or minutes, contact your service
start up when switched on. representative.
• Wait until the message disappears.
Do not turn off the main power
switch while the message is
showing.
"Please wait." appears. This message appears when Wait for a while. If the message does not
you change the toner disappear in two minutes, contact your
cartridge. service representative.
The user code entry screen is Users are restricted by User Enter the user code (up to eight digits),
displayed. Code Authentication. and then press the [OK] or [ ] key.
The Authentication screen Basic Authentication, Enter your login user name and user
appears. Windows Authentication, password. See "When the
LDAP Authentication or Authentication Screen is Displayed",
Integration Server About This Machine .
Authentication is set.
Authentication failed. The entered login user name Inquire the user administrator for the
or login password is not correct login user name and login
correct. password.
16
When You Have Problems Operating the Machine
"Temperature Alert. Turn The temperature inside the Locate the machine in an environment
main power off, adjust room machine is too high or too where the temperature remains between
temp. and wait a while before low. 10 and 32°C. See "Where to Put Your 1
restarting." appears, and Machine", About This Machine .
printing is disabled.
"You do not have the The use of the function is Contact the administrator about the
privileges to use this function." restricted to authenticated permission for the required function.
appears. users only.
An error message remains, • When a misfeed Remove misfed paper, and then open
even if misfed paper is message appears, it and close the cover. See p.93
removed. remains until you open "Removing Jammed Paper".
and close the cover as
required.
• Paper is still jammed in
the tray.
Original images are printed You may have loaded the Load paper correctly. Place paper in the
on the reverse side of the paper incorrectly. paper tray with the print side up. Bypass
paper. tray with the print side down. See
"Loading Paper", About This Machine
.
Misfeeds occur frequently. The tray's side or end fences • Remove the misfed paper. See
may not be set properly. p.93 "Removing Jammed
Paper".
• Check the side or end fences are
set properly. Also, check the side
fences are locked. See "Changing
the Paper Size", About This
Machine .
Misfeeds occur frequently. Copy paper size setting is not Set the proper paper size. See "Tray
correct. Paper Settings", Network and System
Settings Guide and "Recommended
Paper Sizes and Types", About This
Machine .
Cannot print in duplex mode. Duplex printing cannot be When using duplex printing, make
done with paper set in the settings to use paper from a tray other
bypass tray. than the bypass tray.
17
1. When the Machine Does Not Operate As Wanted
Cannot print in duplex mode. You have selected a tray that Select a paper tray in [Tray Paper
is set to [Off] for duplex Settings] under [System Settings], and
1 printing in [Tray Paper then press the [OK] key. Then, select [No
Settings] under [System Display (Plain Paper)] or [Recycled
Settings]. Paper] for Paper Type, press [Duplex],
and then select [On]. See "Tray Paper
Settings", Network and System Settings
Guide
• If you cannot make copies as you want because of paper type, paper size, or paper capacity
problems, use recommended paper. See "Recommended Paper Sizes and Types", About This
Machine .
18
When a Job Is Not Performed
19
1. When the Machine Does Not Operate As Wanted
BQP001S
*1 You can scan a document once the preceding job documents are all scanned.
*2 During parallel reception, any subsequent job is suspended until reception is completed.
• If the machine is capable of executing multiple functions simultaneously, specify which function should
have priority in "Print Priority". This setting is factory-preset to [Display mode]. For details about Print
Priority, see "System Settings", Network and System Settings Guide .
• While printing is in progress, scanning a document using another function may take longer than usual.
20
2. Troubleshooting When Using the
Copy Function
This chapter describes likely causes of and possible solutions for copier function problems.
• If you cannot make copies as you want because of the paper type, paper size or paper capacity
problems, use recommended paper. See "Recommended Paper Sizes and Types", About This
Machine .
• For messages that are not listed here, see "When You Have Problems Operating the Machine".
"Authentication failed." The entered login user name Inquire the user administrator for the
or login password is not correct login user name and login
correct. password.
"Cannot copy. Original is The scanner function is in use. Cancel the current scan job. To do this,
being scanned by another press the [Clear/ Stop] key on the
function." scanner screen to display the message
"Clear/Stop key was pressed. Stop
scanning?", and then press [Stop].
21
2. Troubleshooting When Using the Copy Function
"Cannot dup. copy this size." Duplex mode does not Duplex mode supports the following
support the selected paper paper sizes: A4 , B5 JIS , 81/2×14
size. , 81/2×13, 81/2×11 , 81/4×14
, 81/4×13 , 16K . Select one of
"Cannot select Bypass Tray in The specified function is not Select a paper tray other than the
current setting." available with the bypass bypass tray.
tray.
"Cannot sort this size." The specified paper size is not This message appears when the bypass
available with the Sort tray is selected.
function. Use copy paper that is not longer than
356 mm (14").
"Max. number of sets is nn." The number of copies You can change the maximum copy
(A figure is placed at nn.) exceeds the maximum copy quantity from [Max. Number of Sets]
quantity. under [Copier Features]. For details
about Max. Copy Quantity, see "User
Tools Menu", Copy Reference .
"Original with this length The specified custom length is Do not place originals that are longer
cannot be duplex scanned." not available for duplex than 356 mm (14").
printing from the ADF (e.g., 2
Sided 2 Sided, 2 Sided
1 Sided, 2 Sided
Combine).
"Size error in Combine The specified paper size is not This message appears when the bypass
mode." available with the Combine tray is selected.
function. Use copy paper that is not longer than
356 mm (14").
"You do not have privileges to The use of this function is Contact the administrator.
use this function." restricted to authentified users
only.
22
When You Cannot Make Clear Copies
Copies appear dirty. Image density is too high. Adjust the image density settings. See
"Adjusting Copy Image Density", Copy
2
Reference .
Copies contain blots or are The machine is not on a level Place the machine on a stable and level
patchy. surface. surface.
Make sure the machine's environment
meets requirements. See "Where to Put
Your Machine", About This Machine
.
Copies contain blots or are The paper is creased, curled, Smooth out the wrinkles from the paper,
patchy. or has blemishes. or replace it. See "Recommended Paper
Sizes and Types" and "Unusable
Paper", About This Machine .
Copies contain blots or are Image density is too light. Adjust the image density. See "Adjusting
patchy. Copy Image Density", Copy Reference
.
Copies contain blots or are The paper is damp. Use paper that has been stored in the
patchy. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Copies are too dark or too The correct paper type Check the paper loaded on the paper
light. settings are not made. tray or bypass tray matches the paper
type set on the display panel. See
"Recommended Paper Sizes and
Types", About This Machine .
Copies are too dark or too The image was not printed on Before printing on special paper, check
light. a suitable surface. its surface carefully. Printing on non-print
surfaces reduces print quality and can
damage the machine's internal
components. See "Recommended
Paper Sizes and Types" and "Unusable
Paper", About This Machine .
23
2. Troubleshooting When Using the Copy Function
The reverse side of an original Image density is too high. Adjust the image density settings. See
2 image is copied. "Adjusting Copy Image Density", Copy
Reference .
A shadow appears on copies Image density is too high. • Adjust the image density settings.
if you use pasted originals. See "Adjusting Copy Image
Density", Copy Reference .
• Change the orientation of the
original.
• Put mending tape on the pasted
part.
The same copy area is dirty The exposure glass, scanning Clean them. See "Maintaining Your
whenever making copies. glass, or ADF is dirty. Machine", About This Machine .
Copies are too light. Image density is too light. Adjust the image density settings. See
"Adjusting Copy Image Density", Copy
Reference .
Copies are too light. A light copy may result when Use recommended paper only and be
you use damp or rough grain sure its storage environment meets the
paper. recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper
Storage", About This Machine .
Copies are too light. The toner bottle is almost Add toner. See "Adding Toner", About
empty. This Machine .
Parts of images are not The original is not set Set originals correctly. See "Placing
copied. correctly. Originals", Copy Reference .
Parts of images are not The correct paper size is not Select the proper paper size.
copied. selected.
24
When You Cannot Make Clear Copies
Images appear only partially. The paper is damp. • Do not install the machine in areas
that are susceptible to low
temperatures.
• Use paper that has been stored in
the recommended temperature
and humidity condition. For details
2
about the proper way to store it,
see "Paper Storage", About This
Machine .
White lines appear. The exposure glass or Clean them. See "Maintaining Your
scanning glass is dirty. Machine", About This Machine .
Copies are blank. The original is not set When using the exposure glass, face the
correctly. originals down. When using the ADF,
face them up. See "Placing Originals",
Copy Reference .
A moiré pattern is produced Your original has a dot Place the original on the exposure glass
on copies. pattern image or many lines. at a slight angle.
Black spots appear on the Because of high humidity, the Place the print on the exposure glass in
copy of a photographic print. photographic print has stuck either of the following ways:
to the exposure glass. • Place an OHP transparency on the
exposure glass, and then place the
print on the OHP transparency.
• Place the print on the exposure
glass, and then place two or three
sheets of white paper on it. Leave
the exposure glass cover or ADF
open when copying.
25
2. Troubleshooting When Using the Copy Function
Basic
Problem Cause Solution
2 Misfeeds occur frequently. The number of sheets loaded Load paper only as high as the upper
exceeds the capacity of the limit markings on the side fences of the
machine. paper tray or bypass tray. See "Loading
Paper", About This Machine .
Misfeeds occur frequently. The paper tray's side fences Push the side fences lightly, and then
are set too tightly. reset it.
Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Misfeeds occur frequently. The paper is too thick or too Use recommended paper. See
thin. "Recommended Paper Sizes and
Types", About This Machine .
Misfeeds occur frequently. The copy paper is wrinkled or Use recommended paper only and be
has been folded/creased. sure its storage environment meets the
recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper
Storage", About This Machine .
Misfeeds occur frequently. Printed paper is being used. Do not load sheets that have already
been copied or printed onto by another
machine.
Misfeeds occur frequently. Sheets are sticking together. Fan the sheets thoroughly before
loading them. Alternatively, feed the
sheets into the machine one at a time.
Copy paper becomes The paper is damp. Use paper that has been stored in the
creased. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
26
When You Cannot Make Copies As Wanted
Copy paper becomes The paper is too thin. Use recommended paper. See
creased. "Recommended Paper Sizes and
Types", About This Machine .
You cannot combine several Selected functions cannot be Check the combination of functions and
functions. used together. make the settings again. See "Function 2
Compatibility", Copy Reference .
Images are skewed. The side fences in the paper Make sure the side fences are set
feed tray are not set properly. properly. For details about how to set the
side fences, see "Changing the Paper
Size", About This Machine .
Images are skewed. The paper is feeding in at a Load the paper correctly. See "Loading
slant. Paper", About This Machine .
Images are skewed. The machine's cover is open. Make sure the right and lower right
covers are properly closed.
Edges of sheets are creased. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Sheets are feeding in Sheets are sticking together. Fan the pages to loosen the paper
together, resulting in jams. before loading it. Alternatively, feed the
paper one sheet at a time.
Edit
Problem Cause Solution
When using the Duplex You set a wide erased Set a narrower margin with User Tools.
Margin function, parts of the margin. You can set the width between 0 - 50
original image are not mm (0" - 2").
copied. See “Copier Features”, Copy Reference
.
When using the Duplex There is a lack of margin Set a narrower margin with User Tools.
Margin function, parts of the space on the opposite side of You can set the width between 0 - 50
original image are not the binding position. mm (0" - 2").
copied. See “Copier Features”, Copy Reference
.
27
2. Troubleshooting When Using the Copy Function
Combine
Problem Cause Solution
When using "Combine", You specified a reproduction When you specify a reproduction ratio
parts of the image are not ratio that does not match the using Manual Paper Select mode, make
copied. sizes of your originals and sure the ratio matches your originals and
When using "Combine", Your originals are not Use originals that are identical in size
parts of the image are not identical in size and direction. and direction.
copied.
Copies are not in correct You placed the originals in When placing a stack of originals in the
order. the incorrect order. ADF, the last page should be on the
bottom.
If you place an original on the exposure
glass, start with the first page to be
copied.
Duplex
Problem Cause Solution
Cannot print in duplex mode. You have loaded paper on Remove paper loaded on the bypass
the bypass tray. tray. Load paper in Tray 1 - 3.
Cannot print in duplex mode. You have loaded paper Change the paper.
exceeding 90 g/m2.
Cannot print in duplex mode. You have selected a tray that Select a paper tray in [Tray Paper
is set to [Off] for duplex Settings] under [System Settings], and
printing in [Tray Paper then press [OK]. Then, select [No
Settings] under [System Display (Plain Paper)] or [Recycled
Settings]. Paper] for Paper Type, press [Duplex],
and then select [On]. See "Tray Paper
Settings", Network and System Settings
Guide .
28
When You Cannot Make Copies As Wanted
Copies are not in correct You placed the originals in When placing a stack of originals in the
order. the incorrect order. ADF, the last page should be on the
bottom.
If you place an original on the exposure
glass, start with the first page to be
copied.
2
When using "Duplex", copy is You placed the originals in Place the original in the correct
made top to bottom even the wrong orientation. orientation. See "Duplex Copying",
though [Top to Top] is Copy Reference .
selected.
Parts of the original image are The margin is too wide. Set a narrower margin with User Tools.
not copied. See "User Tools Menu", Copy Reference
.
Parts of the original image are There is a lack of margin Set a narrower margin with User Tools.
not copied. space on the opposite side of See "User Tools Menu", Copy Reference
the binding position. .
This section describes likely causes of and possible solutions for problems related to full memory.
"Press [Resume] to scan and The machine checked if the To continue copying, remove all copies,
copy remaining originals." remaining originals should be and then press [Resume]. To stop
copied, after the scanned copying, press [Stop].
originals were printed.
29
2. Troubleshooting When Using the Copy Function
30
3. Troubleshooting When Using the
Facsimile Function
This chapter describes likely causes of and possible solutions for facsimile function problems.
BQP008S
2. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
31
3. Troubleshooting When Using the Facsimile Function
3. Select [General Settings/Adjust] using [ ] or [ ], and then press the [OK] key.
4. Select [Adjust Sound Volume] using [ ] or [ ], and then press the [OK] key.
5. Select the item you want to adjust using [ ] or [ ], and then press the [OK] key.
6. Select the volume using [ ] or [ ], and then press the [OK] key.
Press the [Escape] key to cancel the setting and the display returns to that of step 5.
7. Press the [User Tools/Counter] key.
BQP008S
32
Adjusting the Volume
• You can also adjust the On Hook volume when you press the [On Hook Dial] key. See "On Hook
Dial", Facsimile Reference .
• If the extended security function prevents you from changing this setting, contact the administrator.
• You can set the volume level to between 0 and 7.
33
3. Troubleshooting When Using the Facsimile Function
"Authentication failed." Wrong login user name or Confirm correct login user name or
3 password. password.
"Cannot send fax as scanner The machine is scanning an Before sending the fax, cancel the
is in use by another function." original under another current scan job under the other function.
function. To do this, press the [Clear/Stop] key on
the control panel to display the message
"Clear/Stop key was pressed. Stop
scanning?", and then press [Stop].
"Check whether there are The alias telephone number • In [Fax Features], under [IP-Fax
any network problems." you entered is already Settings], select [H.323 Settings],
[13-10] registered on the gatekeeper and then check the alias telephone
by another device. number is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the network administrator.
"Check whether there are Cannot access gatekeeper. • In [Fax Features], under [IP-Fax
any network problems." Settings], select [H.323 Settings],
[13-11] and then check "Gatekeeper
Address" is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the network administrator.
34
Messages Displayed When Using the Facsimile Function
"Check whether there are Registering of user name is • In [Fax Features], under [IP-Fax
any network problems." rejected by SIP server. Settings], select [SIP Settings], and
[13-17] then check "SIP Server IP Address"
and "SIP User Name" are correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
3
• Contact the network administrator.
"Check whether there are Cannot access SIP server. • In [Fax Features], under [IP-Fax
any network problems." Settings], select [SIP Settings], and
[13-18] then check "SIP Server IP Address"
is correctly programmed. You can
also use the Web Image Monitor
for confirmation. See the Web
Image Monitor's Help.
• Contact the network administrator.
"Check whether there are The password registered for Contact the administrator.
any network problems." the SIP server is not the same
[13-24] as the password registered for
this machine.
35
3. Troubleshooting When Using the Facsimile Function
"Check whether there are In [Effective Protocol], the IP • In [System Settings], under
any network problems." address is not enabled, or an [Interface Settings], select
[13-25] incorrect IP address has been [Network], and then check "IPv4"
registered. is programmed to "Active" in
[Effective Protocol]. You can also
use the Web Image Monitor for
confirmation. See the Web Image
3 Monitor's Help.
• In [System Settings], under
[Interface Settings], select
[Network], and then check the IP
address is correctly programmed
in [Machine IPv4 Address]. You
can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the administrator.
"Check whether there are The "Effective Protocol" and • In [System Settings], under
any network problems." "SIP Server IP Address" [Interface Settings], select
[13-26] settings are different, or an [Network], and then check the IP
incorrect IP address has been address is correctly programmed.
registered. You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the administrator.
36
Messages Displayed When Using the Facsimile Function
"Check whether there are Cannot find the DNS server, • In [System Settings], under
any network problems." SMTP server or folder for [Interface Settings], select
[14-01] forwarding. [Network], and then check the
DNS server is correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
3
• In [System Settings], under
[Interface Settings], select
[Network], and then check the host
name or IP address of the SMTP
server is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• In [System Settings], under [File
Transfer], select [SMTP Server],
and then check "Server Name" or
"Port No." is correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Check that the folder for transfer is
correctly specified.
• Check that the computer in which
the folder for transfer is specified is
operating correctly.
• Check that the LAN cable is
correctly connected to the
machine.
• Check the network connection and
radio wave status.
• Contact your network
administrator.
37
3. Troubleshooting When Using the Facsimile Function
"Check whether there are E-mail transmission was • In [System Settings], under [File
any network problems." refused by SMTP Transfer], select [SMTP
[14-09] authentication, POP before Authentication], [POP before
SMTP authentication or login SMTP], or [Fax E-mail Account],
authentication of the computer and then check that "User Name"
in which the folder for and "Password" are correctly
forwarding is specified. programmed. See "File Transfer",
38
Messages Displayed When Using the Facsimile Function
"Check whether there are Neither the machine's nor the • In [System Settings], under [File
any network problems." administrator's e-mail address Transfer], select [Fax E-mail
[14-33] is registered. Account], and then check that
"Email Address" is correctly
programmed. See "File Transfer",
Network and System Settings
Guide . You can also use the
Web Image Monitor for
confirmation. See the Web Image
3
Monitor's Help.
• Contact your network
administrator.
"Check whether there are No POP3/IMAP4 server • In [System Settings], under [File
any network problems." address is programmed. Transfer], select [POP3/IMAP4
[15-01] Settings], and then check "Server
Name" is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact your network
administrator.
"Check whether there are Cannot log on to the POP3/ • In [System Settings], under [File
any network problems." IMAP4 server. Transfer], select [Fax E-mail
[15-02] Account], and then check that
"User Name" and "Password" are
correctly programmed. See "File
Transfer", Network and System
Settings Guide . You can also
use the Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Contact your network
administrator.
39
3. Troubleshooting When Using the Facsimile Function
"Check whether there are No machine e-mail address is • In [System Settings], under [File
any network problems." programmed. Transfer], select [Fax E-mail
[15-03] Account], and then check that
"User Name" and "Password" are
correctly programmed. See "File
Transfer", Network and System
Settings Guide . You can also
40
Messages Displayed When Using the Facsimile Function
"Check whether there are Cannot find the DNS server or • In [System Settings], under
any network problems." POP3/IMAP4 server. [Interface Settings], check the IP
[15-11] address of the DNS Server is
correctly programmed. You can
also use the Web Image Monitor
for confirmation. See the Web
Image Monitor's Help.
• In [System Settings], under [File 3
Transfer], select [Reception
Protocol], and then check the
reception protocol is correctly
programmed. You can also use the
Web Image Monitor. See the Web
Image Monitor's Help.
• In [System Settings], under [File
Transfer], select [POP3/IMAP4
Settings], and then check "Server
Name" is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• In [System Settings], under [File
Transfer], select [E-mail
Communication Port], and then
check the port number of the
POP3/IMAP4 server is correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Check the network connection and
radio wave status.
• Check that the LAN cable is
correctly connected to the
machine.
• Contact your network
administrator.
41
3. Troubleshooting When Using the Facsimile Function
"Check whether there are Cannot log on to the POP3/ • In [System Settings], under [File
any network problems." IMAP4 server. Transfer], select [Fax E-mail
[15-12] Account], and then check that
"User Name" and "Password" are
correctly programmed. See "File
Transfer", Network and System
Settings Guide . You can also
"Connection with LDAP A network error has occurred • Try the operation once more. If the
server has failed. Check the and connection has failed. message is still shown, the network
server status." may be crowded.
• In [System Settings], under
[Administrator Tools], check the
settings of LDAP server. For details,
see "Programming the LDAP
server", Network and System
Settings Guide
"Error occurred, and trans. A document jam occurred Press [Exit], and then resend the pages
was cancelled." during Immediate that have not been sent. If the error
Transmission. There may be a reoccurs frequently, contact your service
problem with the machine or representative.
the telephone line (for
example, noise or cross talk).
42
Messages Displayed When Using the Facsimile Function
"Exceeded max. number of The number of search results Search again after changing the search
search results which can be has exceeded the maximum conditions.
displayed. Max.: nnn" number of items that can be
(A figure is placed at n.) displayed.
" Func. Problems" There is a problem with the Record the code number shown in the
"Data will be initialized." fax. display and contact your service
representative. Other functions can be
used.
3
"LDAP server auth. has The entered user name or Make settings correctly for the user
failed. Check the settings." password does not match that name and the password for LDAP server
specified for LDAP server authentication.
authentication.
"LDAP server search timed A network error has occurred Try the operation once more. If the
out. Check the server status." and connection has failed. message is still shown, the network may
be crowded. Check the information of
[System Settings]. See "Administrator
Tools", Network and System Settings
Guide .
"Memory is full. Scanning The memory is full. If you press [Exit], the machine returns to
will be stopped and only standby mode and starts transmitting the
scanned page(s) will be pages that have been stored.
stored."
"Put original back, check it Original jammed during Place originals that have not been
and press Start key." Memory Transmission. scanned on the exposure glass or ADF
again.
"Sender has not been The sender has not been A sender's name should be specified
specified." specified. before sending e-mail. Send e-mail after
specifying the sender's name.
"Settings have been The destination list is being Wait until the message disappears. Do
updated. The selected dest./ updated from the network not switch off the power while this
functions have been using SmartDeviceMonitor for message is displayed. Depending on the
cancelled." Admin or Web Image number of destinations to be updated,
Monitor. there may be some delay before you
can resume operation. Operations are
not possible while this message is
displayed.
43
3. Troubleshooting When Using the Facsimile Function
"Some page(s) are near The first page of the document The original's blank side might have
blank. To cancel, press the is almost blank. been scanned. Be sure to place your
Stop." originals correctly. For details about
determining the cause of blank pages,
see "Detecting Blank Sheet", Facsimile
Reference .
"Some page(s) are near The first page of the document The original's blank side might have
3 blank." is almost blank. been scanned. Be sure to place your
originals correctly. For details about
determining the cause of blank pages,
see "Detecting Blank Sheet", Facsimile
Reference .
"Specified group contains The specified group contains To select destinations for sending by e-
some invalid dest. Do you some destinations for sending mail, press [Select] for the message
want to select only valid by e-mail. displayed on the e-mail screen.
dest.?"
"Updating the settings...Re- The destination list is being Wait with the main power switch on. The
select dest./functions after updated from the network machine will enter standby mode after it
update finishes." using SmartDeviceMonitor for exits from RDS mode.
Admin or Web Image
Monitor.
"You do not have a privilege Use of this function is Contact the administrator.
to use this function." restricted.
• If "Check whether there are any network problems." appears, the machine is not correctly connected
to the network or the settings of the machine are not correct. If you do not need to connect to a network,
you can specify the setting so this message is not displayed, and then the [Facsimile] key no longer
lights. For details about how to do this, see "Parameter Settings", Facsimile Reference . If you
reconnect the machine to the network, be sure to set "Display" by configuring the appropriate User
Parameter.
• If the paper tray runs out of paper, "Out of paper. Load paper." appears on the display, asking you
to add paper. If there is paper left in the other trays, you can receive documents as usual, even if the
message appears on the display. You can turn this function on or off with "Parameter Settings". For
details about how to do this, see "Parameter Settings", Facsimile Reference .
44
When You Cannot Send or Receive Fax Messages As Wanted
Transmission/Reception
Problem Cause Solution
Both transmission and The modular cord may be Make sure the modular cord is correctly
3
reception are impossible. disconnected. connected. See "Connecting the
Machine to a Telephone Line and
Telephone", Network and System
Settings Guide
Both transmission and The terminal adaptor setting is Check the setting.
reception are impossible. incorrect.
Transmission
Problem Cause Solution
Document appears blank at The original was placed Place it correctly. See "Placing
the other end. upside down. Originals", Facsimile Reference .
Transmission failed due to a The size of the Internet fax Set [Maximum E-mail Size] under [E-
"maximum email size" error. document exceeds the mail Settings] to [Off], or set the
maximum email size maximum e-mail size to a larger value.
specified on the machine. Then, re-send the document. See "E-mail
Settings", Facsimile Reference .
LAN-Fax Driver does not The entered login user name, Check your login user name, password,
work. password, or driver or driver encryption key, and enter them
encryption key is incorrect. correctly. Contact the administrator.
LAN-Fax Driver does not A high security level is set by Contact the administrator.
work. the extended security
function.
Cannot cancel a Memory The document is being Press the [Clear/Stop] key. See
Transmission. scanned. "Canceling a Transmission", Facsimile
Reference .
45
3. Troubleshooting When Using the Facsimile Function
Cannot cancel a Memory The document is being sent or Press the [Clear/Stop] key. See
Transmission. it is in standby. "Canceling a Transmission", Facsimile
Reference .
Reception
Problem Cause Solution
The machine failed to print If this happened when the • Load paper into the paper tray.
received fax documents. Receive File indicator was lit, • Add toner.
the paper or toner might have
See "Substitute Reception", Facsimile
run out, making printing
Reference .
impossible.
The machine failed to print When the Load Paper Load paper into the paper tray. See
received fax documents. indicator is lit. "Loading Paper", About This Machine
.
46
When You Cannot Send or Receive Fax Messages As Wanted
Reception is impossible, but The toner has run out. Replace the toner bottle. See "Replacing
transmission is Toner", About This Machine .
possible.
Reception is possible, but The terminal adaptor setting is Check the setting.
transmission is impossible. incorrect.
Transmission is possible, but The terminal adaptor setting is Check the setting.
reception is impossible. incorrect. 3
Printing
Problem Cause Solution
Print is slanted. The tray's side fences may not Check the side fences are locked. See
be locked. "Changing the Paper Size", About This
Machine .
Print is slanted. The paper is fed in at a slant. Load the paper correctly. See "Loading
Paper", About This Machine .
Print is slanted. The machine's cover is open. Make sure the right and lower right
covers are properly closed.
Misfeeds occur frequently. The number of sheets loaded Load paper only as high as the upper
exceeds the capacity of the limit markings on the side fences of the
machine. paper tray or bypass tray.
Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Misfeeds occur frequently. The paper is too thick or too Use recommended paper. See
thin. "Recommended Paper Sizes and
Types", About This Machine .
47
3. Troubleshooting When Using the Facsimile Function
Misfeeds occur frequently. The copy paper is wrinkled or Use recommended paper only and be
has been folded/creased. sure its storage environment meets the
recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper
Copy paper becomes Printed paper is being used. Do not load sheets that have already
creased. been copied or printed onto by another
machine.
Copy paper becomes The paper is damp. Use paper that has been stored in the
creased. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Copy paper becomes The paper is too thin. Use recommended paper. See
creased. "Recommended Paper Sizes and
Types", About This Machine .
Printed images contain blots The machine is not on a level The machine must be placed on a stable
or are patchy. surface. and level surface.
Check the environment of location to
select an appropriate location. See
"Where to Put Your Machine", About
This Machine .
Printed images contain blots The paper is creased, curled, Straighten the paper if curled. Replace it
or are patchy. or has blemishes. if wrinkled or damaged. See
"Recommended Paper Sizes and Types"
and "Unusable Paper", About This
Machine .
The image is too dark or too The correct paper type Check the paper loaded on the paper
light. settings are not made. tray or bypass tray matches the paper
type set on the display panel. See
"Recommended Paper Sizes and
Types", About This Machine .
48
When You Cannot Send or Receive Fax Messages As Wanted
The image is too dark or too Using toner bottles not Use only toner bottles recommended by
light. recommended by the the supplier.
supplier or refilling the toner
bottle may degrade the print
quality or cause a
malfunction.
Background of received Image density is too dark. Adjust scan density. See "Image Density
images appears dirty. Images (Contrast)", Facsimile Reference . 3
from the back of the page
appear.
Printed or sent images are The exposure glass or ADF is Clean them. See "Maintaining Your
spotty. dirty. Machine", About This Machine .
Received image is too light. When using moist, rough, or Only use recommended paper. See
processed paper, areas of "Recommended Paper Sizes and
print may not be fully Types", About This Machine .
reproduced.
Received image is too light. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Recommended
Paper Sizes and Types" and "Unusable
Paper", About This Machine .
Received image is too light. • The image density has • Increase the scanning density. See
been set too low. "Image Density (Contrast)",
• The original of the Facsimile Reference .
transmitted fax was • Ask the sender to reprint the
printed on paper that is original on thicker paper and fax it
too thin. again.
Received image is too light. When the Add Toner Replace the toner bottle soon. See
indicator is lit, toner is "Replacing Toner", About This Machine
beginning to run out. .
49
3. Troubleshooting When Using the Facsimile Function
Other fax machine's name is When a destination is Use ASCII characters (for example: a-z,
not correctly printed or programmed in the Address 0- 9).
displayed. Book using
SmartDeviceMonitor for
Admin or Web Image
Monitor, in some languages,
the programmed destination
Others
Problem Cause Solution
All fax documents stored in All fax documents are lost If any documents have been lost for this
memory have been lost. from memory if the machine reason, a Power Failure Report is
Those documents include remains unpowered for automatically printed when the machine
ones stored through Memory approximately 12 hours or is turned on. If fax documents stored for
Transmission/Reception, longer. Memory Transmission have been lost,
Memory Lock, and Substitute check the destinations and resend the
Reception. documents. If fax documents received
through Memory, Memory Lock or
Substitute Reception have been lost, ask
the senders to resend the documents.
See p.53 "Turning Off the Main
Power / In the Event of Power Failure".
The following functions are This function is made Contact the administrator.
not available: Forwarding, unavailable by the enhanced
routing email received via security function.
SMTP.
This section describes likely causes of and possible solutions for problems related to full memory.
50
When You Cannot Send or Receive Fax Messages As Wanted
"Memory is full. Cannot scan The memory is full. If you press [Exit], the machine returns to
more. Transmission will be standby mode and starts transmitting the
stopped." stored pages.
Check the pages that have not been sent
using the Communication Result Report,
and then resend those pages.
51
3. Troubleshooting When Using the Facsimile Function
3 • The "Page" column gives the total number of pages. The "Page not sent" or "Page not received" column
gives the number of pages not sent or received successfully.
• You can display destinations by configuring the appropriate User Parameter. For details about how
to do this, see "Parameter Settings", Facsimile Reference .
• You can display sender names by configuring the appropriate User Parameter. For details about how
to do this, see "Parameter Settings", Facsimile Reference .
52
Turning Off the Main Power / In the Event of Power Failure
• When you disconnect the power plug from the wall outlet, always pull the plug (not the cable).
3
• Do not turn off the main power switch while the power indicator is lit or blinking. If you do, the hard
disk and memory may be damaged and failure could result.
• Turn off the main power switch before pulling out the plug. If you pull out the plug with the switch on,
the hard disk and memory may be damaged and failure could result.
• Make sure 100% is shown on the display before you unplug the machine. If a lower value is shown,
some data is currently present in memory.
• Right after a power failure, the internal battery needs to be sufficiently recharged to guard against
future data loss. Keep the machine plugged in and the main power switch on for about 5 days after
the power loss.
Even if the main power switch is turned off, the contents of the machine memory (for example, programmed
numbers) will not be lost. However, if power is lost for about 12 hours because the main power switch is
turned off, there is a power cut, or the power cord is removed, contents of the Fax memory are lost. Lost
items will include any fax documents stored in memory using Memory Transmission/ Reception, Memory
Lock, or Substitute Reception.
If a file was deleted from memory, a Power Failure Report is automatically printed as soon as the power
is restored.
This report can be used to identify lost files. If a memory stored for Memory Transmission was lost, resend
it. If a document received by Memory Reception or Substitute Reception was lost, ask the sender to resend
it.
53
3. Troubleshooting When Using the Facsimile Function
The machine sends the Error Mail Notification to the sender when it is unable to successfully receive a
particular e-mail message. A "cc" of this notification is also sent to the administrator's e-mail address when
3 one is specified.
• If an incoming Internet Fax from another party bypasses the SMTP server, even if reception is not
successful, an Error Mail Notification is not sent to the sender.
• You can select to send Error Mail Notification by configuring the appropriate User Parameter. For
details about how to do this, see "Parameter Settings", Facsimile Reference .
• If Error Mail Notification cannot be sent, the Error Report (E-mail) is printed by the machine.
• If an error occurs when an e-mail is received via SMTP, the SMTP server sends an error e-mail to the
originator of the document.
The Error Report (E-mail) is printed by the machine when it is unable to send an Error Mail Notification.
The transmitting server sends this error e-mail to the originator of e-mail that cannot be transmitted
successfully (due to reasons such as specifying an incorrect e-mail address).
• If an Internet Fax transmission bypasses the SMTP server, even if transmission is not successful, an
error e-mail is not sent from the server.
• After a server-generated error e-mail is printed, the first page of the sent document is printed.
54
4. Troubleshooting When Using the
Printer Function
This chapter describes likely causes of and possible solutions for printer function problems.
Windows 2000
• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .
This section describes the procedure under Windows XP Professional or Windows Server 2003/2003
R2.
55
4. Troubleshooting When Using the Printer Function
• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .
• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .
Windows Vista
56
Messages Displayed When Installing the Printer Driver
• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .
57
4. Troubleshooting When Using the Printer Function
The machine is not The USB cable is not Disconnect the USB cable, and then turn
automatically recognized. connected properly. off the main power switch. Turn the
machine on again. When the machine
has fully booted up, reconnect the USB
cable.
58
Messages Displayed When Using the Printer Function
Status Messages
Message Status 4
"Hex Dump Mode" In Hex Dump mode, the machine prints received data in
hexadecimal format. Turn off the machine after printing, and
then turn back on. Hex Dump mode is used for advanced
troubleshooting.
"Please wait." This message may appear for a few seconds. It means the
machine is initializing or executing maintenance operations.
Wait a while.
"Ready" This is the default ready message. The machine is ready for
use. No action is required.
"Resetting job..." The machine is resetting the print job. Wait until "Ready"
appears on the display panel.
"Setting change..." The machine is setting changing. You cannot use the control
panel while this message is displayed. Wait a while.
"Waiting for print data..." The machine is waiting for the next data to print. Wait a while.
59
4. Troubleshooting When Using the Printer Function
Alert Messages
• Before turning the main power off, see "Turning On/Off the Power", About This Machine .
"Authentication failed." • The login user name or • Check your login user name and
password entered is password.
incorrect. • Contact the administrator.
4 • The machine cannot
perform authentication.
"Duplex mode is in off The selected paper tray has Press [JobReset] to change the paper
position for Tray #" not been configured for tray settings or do single-sided printing.
duplex printing. For details about the tray settings, see
# indicates the tray number. "Tray Paper Settings", Network and
System Settings Guide .
"Ethernet Board Error" An error has occurred in the Turn off the main power switch, and
Ethernet board. back on again. If the message appears
again, contact your sales or service
representative.
"File System Full." PDF file do not print out Delete all unnecessary files from the
because the capacity of file hard disk, or decrease the file size sent
system is full. to the machine.
"HDD functional problems." An error has occurred in the Turn off the main power switch, and
hard disk drive. back on again. If the message appears
again, contact your service
representative.
"Memory Overflow" Maximum capacity of PCL or Select [Frame Priority] from [Memory
PostScript 3 list display has Usage] in [System] under [Printer
been exceeded. Features] (see "Printer Features", Printer
Reference ), or reduce the value of
resolution in the printer driver. If this
message continues to appear after
taking these steps, decrease the number
of files sent to the machine.
60
Messages Displayed When Using the Printer Function
"Paper Tray is in use." The specified paper tray is in Wait until the other function has finished
use by another function, such using the specified paper tray.
as the copier function.
"Parallel I/F Error" An error has occurred in the Contact your service representative.
parallel interface board.
"Printer Font Error." An error has occurred in the Turn off the main power switch, and
font settings. back on again. If the message appears
again, contact your sales or service
representative.
"Problem:Wireless card" An error may have occurred Turn off the main power switch, and
4
in the IEEE 802.11a/g card. back on again. If the message appears
again, contact your sales or service
representative.
"Tray # Error" An error has occurred with Press [JobReset] to change the paper
the paper tray. tray settings, or press [Form Feed] to
# indicates the tray number. select another paper tray and print using
that.
"USB Error" An error has occurred in the Turn off the main power switch, and
USB interface. back on again. If the message appears
again, contact your sales or service
representative.
If files could not be printed due to printing errors, print the error log to identify the problem.
• The most recent 30 errors are stored in the error log. If a new error is added when there are 30 errors
already stored, the oldest error is deleted. However, if the earliest error is a Sample Print, Locked
Print, Hold Print, or Stored Print error, it is not deleted. The error is stored separately until the number
of errors reaches 30.
• If the main power switch is turned off, the log is deleted.
61
4. Troubleshooting When Using the Printer Function
BQP008S
4 2. Select [Printer Features] using [ ] or [ ], and then press the [OK] key.
3. Select [List/Test Print] using [ ] or [ ], and then press the [OK] key.
4. Select [Error Log] using [ ] or [ ], and then press the [OK] key.
62
When You Cannot Print
Printing does not start. The power is off. Check the cable is securely plugged into
the power outlet and the machine. Turn
on the main power switch.
Printing does not start. The machine is set to Press the [Online] key.
"Offline".
Printing does not start. The cause is displayed on the Check the error message or warning 4
display of the control panel. status on the display panel and take the
required action. See p.59 "Messages
Displayed When Using the Printer
Function".
Printing does not start. The interface cable is not Connect the interface cable securely. If
connected correctly. it has a fastener, fasten that securely as
well. See "Connecting to the Interfaces",
Network and System Settings Guide
.
Printing does not start. The correct interface cable is The type of interface cable you should
not being used. use depends on the computer. Be sure to
use the correct one. If the cable is
damaged or worn, replace it. See
"Connecting to the Interfaces", Network
and System Settings Guide .
Printing does not start. The interface cable was Connect the interface cable before
connected after the machine turning on the machine.
was switched on.
63
4. Troubleshooting When Using the Printer Function
Printing does not start. If an extended wireless LAN To check signal status, press the [User
is used, failure to print might Tools/Counter] key, and then select
result from a weak wireless [System Settings] using [ ] or [ ]. On
signal. [Interface Settings], select [Wireless
LAN], and then press [Wireless LAN
Signal] using [ ] or [ ]. If signal quality
is poor, move the machine to a location
where radio waves can pass or remove
objects that might cause interference.
(You can check signal status only when
4 using wireless LAN in infrastructure
mode.)
Printing does not start. If the machine is using Check using the machine's display panel
wireless LAN, SSID settings that the SSID is correctly set. See
are incorrect. "Connecting the Machine", Network
and System Settings Guide .
Printing does not start. If the machine is using Check access point settings when in the
wireless LAN, the receiver's infrastructure mode. Depending on the
MAC address may be access point, client access may be
preventing communication limited by MAC address. Also, check
with the access point. there are no problems in transmission
between access point and wired clients,
and between access point and wireless
clients.
Printing does not start. The wireless LAN interface is Confirm the orange LED is lit, and the
not working. green LED is lit or blinks during
transmission.
Printing does not start. The login user name, login Check the login user name, login
password, or driver password, or driver encryption key.
encryption key is invalid.
Printing does not start. Advanced encryption has Check the settings of the Extended
been set using the Extended Security function with the administrator.
Security function.
64
When You Cannot Print
Data In indicator does not If the Data In indicator is unlit • When the machine is connected to
light up or flash. or not flashing even after the a computer via a cable, check the
print job starts, the machine computer print port settings are
has not received the data. correct. For details, see p.65
"When the Data In Indicator Does
Not Light Up or Flash".
• When it is networked with a
computer, contact the
administrator.
When the Data In indicator does not light up or flash after starting a print job, data is not being sent to the
machine.
When the machine is connected to the computer using the interface cable
This section describes how to check the print port when the Data In indicator does not light up or blink.
Check if the print port setting is correct. When it is connected using a parallel interface, connect it to LPT1
or LPT2.
For Windows 2000
1. Click the [Start] button, point to [Settings], and then click [Printers].
2. Click the icon of the machine. On the [File] menu, click [Properties].
65
4. Troubleshooting When Using the Printer Function
Network connection
Contact the network administrator.
66
Other Printing Problems
The print on the entire page is The paper is damp. Use paper that has been stored in the
faded. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
The print on the entire page is The paper is unsuitable. Use recommended paper. (Printing on
4
faded. coarse or treated paper might result in
faint print image.) See "Recommended
Paper Sizes and Types", About This
Machine .
Printed images contain blots Settings for thick paper have • PCL 5e
or are patchy. not been made when printing Select [Thick] in the [Type:] list on
on thick paper in the bypass the [Paper] tab.
tray.
• PCL 6
Select [Thick] in the [Paper Type:]
box on the [One Click Presets] tab.
• PostScript 3
Select [Thick] in the [Media Type:]
box on the [One Click Presets] tab.
67
4. Troubleshooting When Using the Printer Function
Printed images contain blots Printing on coarse paper or Use supplier-recommended paper. See
or are patchy. treated paper can result in "Recommended Paper Sizes and
faint print image. Types", About This Machine .
Printed images contain blots The paper is damp. Use paper that has been stored in the
or are patchy. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Printed images contain blots Check the machine is set on a Check the environment of location to
or are patchy. level surface. The machine select an appropriate location. See
4 must be placed on a stable "Where to Put Your Machine", About
and level surface. This Machine .
Printed images contain blots The paper is creased, curled, Smooth out the wrinkles from the paper,
or are patchy. or has blemishes. or replace it. See "Recommended Paper
Sizes and Types" and "Unusable Paper",
About This Machine .
The printed image is different Printing will be performed by • Only when using PCL 6
from the image on the the machine's graphic On the [Detailed Settings] tab,
computer's display. processing function. select [Raster] in the [Raster/
Vector:] box on the [Print Quality].
The image is too dark or too The correct paper type Check the paper loaded on the paper
light. settings are not made. tray or bypass tray matches the paper
type set on the display panel. See
"Recommended Paper Sizes and
Types", About This Machine .
68
Other Printing Problems
The image is too dark or too The paper is loaded reverse Before printing on special paper, check
light. side up. its surface carefully. Printing on non-print
surfaces reduces print quality and can
damage the machine's internal
components. See "Recommended
Paper Sizes and Types" and "Unusable
Paper", About This Machine .
Print result differs from the The machine is not selected Use the machine's printer driver and
display. for printing. check the machine is the designated
printer. See "Setting Up the Printer
Driver", Printer Reference .
Print result differs from the Data transmission failed or Check whether there is failed or
display. was cancelled during cancelled data remaining. See
printing. "Checking the Error Log", Printer
Reference .
Characters differ from the The loaded paper is Printing on recommended paper
display. unsuitable. produces better resolution. See
"Recommended Paper Sizes and
Types", About This Machine .
It takes too much time to The data is so large or If the Data In indicator is blinking, data
resume printing. complex that it takes time to is being processed. Simply wait until
process. printing resumes.
It takes too much time to The machine was in Energy To resume from Energy Saver mode, it
resume printing. Saver mode. has to warm up, and this takes time. See
"ENERGY STAR Program", About This
Machine .
69
4. Troubleshooting When Using the Printer Function
Paper is not fed from the When you are using a • PCL 5e
selected tray. Windows operating system, On the printer driver's [Paper] tab,
printer driver settings override in the [Input Tray:] list, select the
those set using the display desired input tray.
panel.
• PCL 6
On the printer driver's [One Click
Presets] tab, in the [Input Tray:] list,
select the desired input tray.
• PostScript 3
4 On the printer driver's [One Click
Presets] tab, in the [Paper Source:]
list, select the desired input tray.
70
Other Printing Problems
Print speed or application The correct printer driver • Only when using PCL 6
relinquishing speed is slow. settings are not made. On the [Detailed Settings] tab,
select [Speed] in the [Print Priority:]
box on the [Print Quality].
See the printer driver Help.
Quit any other applications.
Print ends mid-job. An error might have Check the machine's display panel to
occurred. see if an error has occurred.
Image position differs from The correct page layout Check the page layout settings made
the display. settings are not made. using the application.
See the application's Help.
71
4. Troubleshooting When Using the Printer Function
Print is slanted. The paper is feeding in at a Load the paper correctly. See "Loading
slant. Paper", About This Machine .
Print is slanted. The machine's cover is open. Make sure the right and lower right
covers are properly closed.
Misfeeds occur frequently. The number of sheets loaded Load paper only as high as the upper
exceeds the capacity of the limit markings on the side fences of the
machine. paper tray or bypass tray.
Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Misfeeds occur frequently. The paper is too thick or too Use recommended paper. See
thin. "Recommended Paper Sizes and
Types", About This Machine .
72
Other Printing Problems
Misfeeds occur frequently. The copy paper is wrinkled or Use recommended paper only and be
has been folded/creased. sure its storage environment meets the
recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper
Storage", About This Machine .
Misfeeds occur frequently. Printed paper is being used. Do not load sheets that have already
been copied or printed onto by another
machine. 4
Copy paper becomes The paper is damp. Use paper that has been stored in the
creased. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .
Copy paper becomes The paper is too thin. Use recommended paper. See
creased. "Recommended Paper Sizes and
Types", About This Machine .
Garbled characters are The correct printer language Set the correct printer language.
printed. might have not been selected.
Images are printed in the The feed orientation you Set the machine's feed orientation and
wrong orientation. selected and the feed the printer driver's feed orientation
orientation selected in the accordingly. See the printer driver Help.
printer driver's option setup
might not be the same.
There is considerable delay "Sleep mode" might be set. The machine requires time to warm up if
between the print start it has been in "Sleep mode". See "Timer
instruction and actual Settings", Network and System Settings
printing. Guide and "ENERGY STAR
Program", About This Machine .
73
4. Troubleshooting When Using the Printer Function
There is considerable delay Processing time depends on If the Data In indicator is blinking, data
between the print start data volume. High volume has been received by the machine. Wait
instruction and actual data, such as graphics-heavy for a while.
printing. documents, takes longer to Making the following setting on the
process. printer driver may reduce the computer's
workload.
For how to open the printing preferences
dialog box, see "Displaying the Printer
Driver Settings Screen", Printer
Reference .
4 • PCL 5e
Select the lower value for the
[Resolution] list on the [Print
Quality] in the printing preferences
dialog box.
• PCL 6
Select [Speed] for the [Print
Priority:] list on the [Print Quality] in
the printing preferences dialog
box.
• PostScript3
If your operating system is
Windows, select [Optimize for
Speed] in the [PostScript Output
Option:] list in [PS Options] on the
[Detailed Settings] tab.
Graphics print out differently If the printer driver is If you want to print accurately, set the
to how they appear on configured to use the printer driver to print without using the
screen. graphics command, the graphics command. See the printer
graphics command from the driver Help.
machine is used to print.
Photo images are coarse. Some applications print at Use the application's settings to specify
lower resolution. a higher resolution.
74
Other Printing Problems
Solid lines are printed as Dither patterns do not match. Make the following settings with the
broken lines. printer driver:
• Only when using PostScript 3
Change the [Dithering] setting in
the [Print Quality] on the [Detailed
Settings] tab.
The print job is not canceled - Even when the machine is offline,
even when the machine is printing is performed when [Job
switched to offline status. Acceptance Priority] is selected for
[Signal Control] in [Parallel Interface] in
[Interface Settings] under [System
Settings]. Select [Printer Priority] for
[Signal Control].
See "Interface Settings", Network and
System Settings Guide .
Images are incomplete, or You may be using paper Use the same size paper as that selected
excess pages are printed. smaller than the size selected in the application. If you cannot load
in the application. paper of the correct size, use the
reduction function to reduce the image,
and then print.
See the printer driver Help.
75
4. Troubleshooting When Using the Printer Function
Duplex printing is Duplex printing cannot be When using duplex printing, make
malfunctioning. done with paper set in the settings to use paper from a tray other
bypass tray. than the bypass tray.
Duplex printing is You have loaded thick paper, Specify another paper type.
malfunctioning. OHP transparencies, or
labels specified as the paper
type.
Duplex printing is Duplex printing cannot be Change the Paper Type setting for the
malfunctioning. done with a tray for which tray to [On] on the System Settings menu.
4 [Off] has been specified as See "System Settings", Network and
Paper Type on the System System Settings Guide .
Settings menu.
When using Windows The correct application or Make sure the application's paper size
2000/XP/Vista, Windows printer driver settings are not and orientation settings match those of
Server made. the printer driver. If a different paper size
2003/2003R2/2008, and orientation are set, select the same
combined printing or booklet size and orientation.
printing does not come out as
expected.
A print instruction was issued User code management may Ask the administrator about valid user
from the computer, but have been set. codes. To print, the user code must be
printing did not start. entered from the printer driver.
Images are printed at a slant. The tray's side fences might Check the side fences are locked. See
not be locked. "Changing the Paper Size", About This
Machine .
Sheets are feeding in Sheets are sticking together. Fan the sheets thoroughly before
together, resulting in jams. loading them. Alternatively, feed the
sheets into the machine one at a time.
76
5. Troubleshooting When Using the
Scanner Function
This chapter describes likely causes of and possible solutions for scanner function problems.
The scanned image is dirty. The exposure glass, scanning Clean them. See "Maintaining Your
glass or ADF is dirty. Machine", About This Machine .
The scanned image is upside The original was placed Place the original in the correct
down. upside down. orientation. See "Specifying Send
Options", Scanner Reference .
No image results from The original was placed with When the original is placed directly on
scanning. the front and back reversed. the exposure glass, the side to be
scanned must face down. When the
original is fed via the ADF, the side to be
scanned must face up.
Images are scanned in If you set the original with its • If you select [1 Sided Original] or
rotated. top edge backward and save [2 Sided Orig. (T to B)] under
full color/gray scale images [Original Setting], place your
as a TIFF or JPEG file, they are originals upper edge first in the
scanned in rotated. ADF.
• If you select [2 Sided Orig. (T to T)]
under [Original Setting], select
[Single Page:PDF] or [Multi-
page:PDF] for [File Type Priority]
under [Send Settings].
77
5. Troubleshooting When Using the Scanner Function
The scanned image contains If you scan originals using Scanning at a higher resolution may
white spaces. functions other than the reduce the margins.
network TWAIN scanner
function, certain paper size
and resolution settings may
produce scanned images that
are larger than the specified
size because of margins
being added to the sides.
78
When You Cannot Send Scanned Files
This section describes likely causes of and possible solutions for the network browsing failing to operate
when files are sent.
The network cannot be The following machine Check the settings. See "Connecting the
browsed when specifying the settings may not be correct: Machine", Network and System Settings
destination folder. • IP address Guide . 5
• Subnet Mask
This section describes likely causes of and possible solutions for the TWAIN driver-related problems.
The Scanner Properties Advanced encryption has For details about the extended security
dialog box cannot be been specified in the setting, contact an administrator.
displayed. extended security setting.
This section describes likely causes of and possible solutions for the network delivery function problems.
Cannot use the network The delivery software may be Contact the administrator.
delivery function. an old version or a security
setting may be specified.
79
5. Troubleshooting When Using the Scanner Function
Cannot use the network The network delivery function Specify it correctly. See "Network
delivery function. setting is not correct. Settings Required to Use the Network
Delivery Scanner", Network and System
Settings Guide .
This section describes likely causes of and possible solutions for S/MIME-related problems.
If several destinations are Encrypted e-mails are sent to Make sure S/MIME-authentication
5 selected for the broadcasting
sequence, the data is sent
the destinations for which S/
MIME authentication is set,
destinations are separate from plain text
destinations.
over twice. and plain text e-mails are sent Contact the administrator for details
to the destinations for which about destination settings.
S/MIME authentication is not
set.
• Using S/MIME makes e-mail larger than when not using S/MIME.
This section describes likely causes of and possible solutions for sending scan files using WSD.
• To use the WSD scanner function, enable the WSD scanner in Web Image Monitor in advance. For
details about this function, see "Sending Scan Files Using WSD", Scanner Reference .
80
When You Cannot Send Scanned Files
The WSD scanner function Scan Profile is not set on the client Set Scan Profile. For details about
cannot be used. computer. how to do this, see "Creating a
New Scan Profile", Scanner
Reference .
The WSD scanner function The [Take no action] setting has Open scanner Properties, click
cannot be used. been selected on the client the [Events] tab, and then select
computer, forcing the client [Start this Program] as the
computer to remain inactive computer's response on receipt
when it receives scan data. of scan data. For details, see your
operating system's Help.
"Updating destination list. The destination list is being Wait until the message disappears. Do
Reselect destination(s) or updated from the network not switch off the power while this
sender's name later." using SmartDeviceMonitor message is displayed.
for Admin. Depending on the
number of destinations to be
updated, there may be some
delay before you can resume
operation. Operations are
not possible while this
message is displayed.
81
5. Troubleshooting When Using the Scanner Function
Messages Displayed on the Control Panel When Using the Scanner Function
This section describes likely causes of and possible solutions for the error messages that appear on the
control panel.
• If a message not described here appears, act according to the message. For details about how to
5 turn off the main power switch, see "Turning On/Off the Power", About This Machine .
"Authentication failed." The entered login user name Check the login user name and
or password is incorrect. password. The machine is unable to
authenticate. Contact the administrator.
"Cannot communicate with WSD (Device) protocol or Use IPv4 or IPv6, located in
PC. Contact the WSD (Scanner) protocol is [Configuration] in Web Image Monitor,
administrator." disabled. to enable [WSD (Device)] and [WSD
(Scanner)].
"Cannot enter manually more The e-mail has too many (nnn Split the destinations into two or more
than nnn destinations." or more) destinations. groups.
(A figure is placed at nnn.)
"Cannot specify more than The e-mail has too many Split the destinations into two or more
100 destinations." (100 or more) destinations. groups.
"Cannot start scanning While a file was being sent, a If the same message appears again after
because communication was network error occurred and scanning again, the cause could be a
failed." the file could not be sent mixed network, or else network settings
correctly. were changed during WSD scanner
transmission. Check with your system
administrator.
82
Messages Displayed When Using the Scanner Function
"Cannot start scanning. The Scan Profile might be Check the Scan Profile configuration.
Check the setting(s) on the incorrectly configured.
PC."
"Cannot write on memory The memory device is Replace the memory device.
device because remain. insufficient and scan data
space is insufficient." cannot be saved.
"Cannot write on memory The memory device is write Unlock the write-protection on the
device because the device is protected. memory device.
write-protected."
"Cannot write on memory The memory device is faulty, • Check to see if the memory device
device. Check memory or the file name contains a is defective.
device and machine sett." character that cannot be • Check the memory device. It might 5
used. be unformatted, or its format might
be incompatible with this machine.
• Check the file name set at the time
of scanning. For details on the
characters that can be used in file
names, see "Values of Various Set
Items for Transmission/Delivery
Function", Scanner Reference .
Check with your system
administrator.
"Check the resolution and The scanned original Specify the scan size and resolution
reset nnn original(s)." exceeded maximum data again. Note that it may not be possible
(A figure is placed at nnn.) capacity. to scan very large originals at a high
resolution. See "Relationship between
Resolution and Scan Size", Scanner
Reference .
"Communicating..." Data is being prepared for Wait until the data has been sent. This
sending to a client computer. message might reappear if the machine
is operating on a mixed network or if
changes were made to network settings
during WSD scanning transmission.
Check with your system administrator.
83
5. Troubleshooting When Using the Scanner Function
"Connection has failed. The correct network settings • Check the network settings of the
Check settings and check are not made. client computer.
Scanned File Status." • Check that components such as the
LAN cable are connected
properly.
• Check that the server settings are
correct and the server is working
properly.
"Connection with LDAP server A network error has occurred Try the operation once more. If the
has failed. Check the server and connection has failed. message is still shown, the network may
status." be crowded. Check the information of
System Settings. See "Administrator
5 Tools", Network and System Settings
Guide .
"Dest. authentication failed. The entered user name or • Check that the user name and
Check settings and check password was invalid. password are correct.
Scanned File Status." • Check that the ID and password for
the destination folder are correct.
• A password of 128 or more
characters may not be recognized.
"Destination list has been A specified destination or Specify the destination or sender's name
updated. Selected sender's name was cleared again.
destinations/ sender will be when the destination list in the
cleared." delivery server was updated.
"Entered protection code for The correct protection code Make sure the protection code is
dest. is incorrect. Please re- was not entered. correct, and then enter it again. See
enter." "Registering a Protection Code",
Network and System Settings Guide
.
84
Messages Displayed When Using the Scanner Function
"Exceeded max. data The scanned data exceeded Specify the scan size and resolution
capacity Check resolution maximum data capacity. again. Note that it may not be possible
and Start." to scan very large originals at a high
resolution. See "Relationship between
Resolution and Scan Size", Scanner
Reference .
"Exceeded max. Email size. The maximum e-mail size has • Increase the size of [Max. E-mail
Sending E-mail has been been exceeded. Size].
cancelled." • Set [Divide & Send E-mail] to [On
(per page)] or [On (per max. size)].
See "Send Settings", Scanner
Reference .
"Exceeded max. memory The memory is full. Specify whether to use the data or not.
5
capacity. Do you want to
send the scanned data?"
"Exceeded max.memory The memory is full. Try one of the following measures:
capa. Scanning will be • Wait for a while, and then retry the
cancelled. Scanned data will scan operation.
be cleared."
• Reduce the scan area or scanning
resolution.
• Delete unneeded stored files.
"Exceeded max. number of The correct protection code Make sure the protection code is
alphanumeric characters." was not entered. correct, and then enter it again. See
"Registering a Protection Code",
Network and System Settings Guide
.
"Exceeded max. number of Search results have Search again after changing the search
search results which can be exceeded the max. conditions.
displayed. Max.: nnn" displayable number.
(A figure is placed at nnn.)
"Exceeded max. page The number of scanned Select whether to send the data so far.
capacity. Do you want to pages exceeded maximum
send the scanned data?" page capacity.
85
5. Troubleshooting When Using the Scanner Function
"Exceeded max. pg. per file. The scan could not be Reduce the number of documents to be
Press [Write] to wrt. scanned completed because the written to the memory device and try
data to mem. device. Or press maximum number of pages again.
[Cancel] to delete." that can be scanned by this
machine was exceeded
during writing to the Memory
device.
"LDAP server auth. has failed. The user name and password Make settings correctly for the user
Check the settings." differ from those set for LDAP name and the password for LDAP server
server authentication. authentication.
"LDAP server search timed A network error has occurred Try the operation once more. If the
out. Check the server status." and connection has failed. message is still shown, the network may
5 be crowded. Check the information of
System Settings. See "Administrator
Tools", Network and System Settings
Guide .
"Memory device not There is no memory device Insert a memory device, or check to see
detected. Insert the device." inserted. whether the memory device is properly
inserted in the media slot.
"Memory is full. Press [Write] The scan could not be Select whether or not to save the
to write current scanned data completed because there scanned document to the memory
to memory device. Or press was insufficient memory at the device.
[Cancel] to delete." time of saving to the memory
device.
"No valid dest. lists. Check the The authentic settings for the Check that the delivery server is on and
settings or the server status." delivery server are incorrect. the authentic settings for the delivery
server are correct.
"Only one memory device Only one memory device can Insert one memory device only in the
can be used in one time." be connected at a time. media slot.
86
Messages Displayed When Using the Scanner Function
"Only one memory device Another memory device was Remove the extra memory device. Only
can be used in one time. inserted while the following one memory device can be inserted at a
Remove all other media to message was displayed: time.
resume writing." "Clear/Stop key was
pressed. Do you want to stop
scanning?"
"Original is being scanned by The machine is using another Retry scanning after the operation with
another function." function such as copying. the other function is completed.
"Out of paper. Set XX paper No paper is loaded in the Load paper of a size that is listed in the
on the tray." specified paper tray. message.
("XX" indicate paper size.)
"Sender's name is not The sender's name was not A sender's name should be specified 5
selected. Specify sender's specified. before sending e-mail. Send e-mail after
name." specifying the sender's name.
"Sending failed. Check While a file was being sent, a Try the operation once more. If the
settings and check Scanned network error occurred and message is still shown, the network may
File Status." the file could not be sent be crowded. Contact the administrator.
correctly. Press the [Job Information] key to display
the transmission results, and then check
which job has not been sent. See
"Confirmation Displays", Scanner
Reference .
"Sending has failed. Press Job Sending has failed. Press the Try the operation once more. If the
Information key to check the [Job Information] key to message is still shown, the network may
status." check the status. be crowded. Contact your network
administrator.
Use the Job Information screen to check
for the file where the problem occurred.
See "Confirmation Displays", Scanner
Reference .
87
5. Troubleshooting When Using the Scanner Function
"Some destinations cannot If you have selected multiple Using Web Image Monitor, check the
receive encrypted files. destinations including file encryption settings for all
Sending to these destinations destinations for which destinations.
may be unsafe." encryption has not been
configured, e-mail sent to
those destinations will not be
encrypted even if you specify
encryption.
"Some destinations will If you have selected multiple Using Web Image Monitor, check the
receive automatically destinations including file encryption settings for all
encrypted files. All files sent to destinations for which destinations.
these destinations will be encryption has been
"Some page(s) are near The first page of the document The original's blank side might have
blank. To cancel, press Stop." is almost blank, when using been scanned, when using the Blank
the Blank Page Detect Page Detect function. Be sure to place
function. your originals correctly. For details
about determining the cause of blank
pages, see "Scan Settings", Scanner
Reference .
"Specified group contains The specified group contains To select destinations for sending by e-
some invalid dest. Do you some destinations for sending mail, press [Select] for the message
want to select only valid by e-mail and some displayed on the e-mail screen. To select
dest.?" destinations for sending by destination for sending by Scan to
Scan to Folder. Folder, press [Select] for the message
displayed on the Scan to Folder screen.
"The number of destination The maximum number of Select 32 or fewer destination folders.
folders selectable in one time destination folders that can
is limited to 32." be selected at one time has
been exceeded.
"Updating destination list has A network error has occurred. Check whether the server is connected.
failed. Try again?"
"Updating destination list. The destination list is being If a destination or sender's name was
Reselect destination(s) or updated. already selected, re-select it after this
sender's name later." message disappears.
88
Messages Displayed When Using the Scanner Function
"You do not have privileges to Privileges to use this function. Contact the administrator.
use this function."
This section describes likely causes of and possible solutions for the main error messages displayed on the
client computer when using the TWAIN driver.
• If a message not described here appears, act according to the message. For information about how
to turn off the main power switch, see "Turning On/Off the Power", About This Machine .
"Cannot add any more The maximum number of The maximum number of modes that can
scanning mode." registerable scan modes has be stored is 99. Delete unneeded
been exceeded. modes.
"Cannot connect to the An access mask is set. Contact the network or scanner
scanner. Check the network administrator.
Access Mask settings in User
Tools."
"Cannot find "XXX" scanner The main power switch of the Check whether the main power switch of
used for the previous scan. previously used scanner is not the scanner used for the previous scan is
"YYY" will be used instead." set to "On". turned on.
("XXX" and "YYY" indicate
scanner names.)
89
5. Troubleshooting When Using the Scanner Function
"Cannot find "XXX" scanner The machine is not connected • Check the previously used scanner
used for the previous scan. to the network correctly. is connected to the network
"YYY" will be used instead." correctly.
("XXX" and "YYY" indicate • Cancel the Personal Firewall of the
scanner names.) client computer. For details, see
Windows Help.
• Use an application such as telnet to
make sure SNMPv1 or SNMPv2 is
set as the machine's protocol. See
"Connecting the Machine" and
"Using telnet", Network and
System Settings Guide .
"Cannot specify any more The maximum number of The maximum number of scanning areas
scanning area." registerable scan areas has that can be stored is 99. Delete
been exceeded. unneeded scanning area.
"Clear Misfeed(s) in ADF." A paper misfeed has Remove jammed originals, and place
occurred inside the ADF. them again. For details, see p.93
"Removing Jammed Paper"
• Check whether the originals are
suitable to be scanned by the
machine.
"Communication error has A communication error has Check whether the client computer can
occurred on the network." occurred on the network. use the TCP/IP protocol.
"Error has occurred in the An error has occurred in the • Check whether the network cable
scanner driver." driver. is connected correctly to the client
computer.
• Check whether the Ethernet board
of the client computer is recognized
correctly by Windows.
• Check whether the client computer
can use the TCP/IP protocol.
90
Messages Displayed When Using the Scanner Function
"Error has occurred in the The application-specified • Check whether the scanning
scanner." scan conditions have settings made with the application
exceeded the setting range of exceed the setting range of the
the machine. machine.
• Disable the client computer's own
firewall. For details, see Windows
Help.
"Fatal error has occurred in An unrecoverable error has An unrecoverable error has occurred in
the scanner." occurred on the machine. the machine. Contact your service
representative.
"Invalid Winsock version. You are using an invalid Install the operating system of the
Please use version 1.1 or version of Winsock. computer or copy Winsock from the
higher." operating system CD-ROM.
"No response from the The machine or client Check whether the machine or client
scanner." computer is not connected to computer is connected to the network
the network correctly. correctly.
91
5. Troubleshooting When Using the Scanner Function
"No response from the The network is crowded. Wait for a while, and then try to
scanner." reconnect.
"Scanner is not available on The TWAIN scanner function Contact your service representative.
the specified device." cannot be used on this
machine.
"Scanner is not available. The machine's main power Set the main power switch to "On".
Check the scanner switch is off.
connection status."
"Scanner is not available. The machine is not connected • Check whether the machine is
Check the scanner to the network correctly. connected to the network correctly.
connection status." • Deselect the personal firewall
5 function of the client computer. For
details, see Windows Help.
• Use an application such as telnet to
make sure SNMPv1 or SNMPv2 is
set as the machine's protocol. See
"Connecting the Machine" and
"Using telnet", Network and
System Settings Guide .
"Scanner is not ready. Check The ADF cover is open. Check whether the ADF cover is closed.
the scanner and the options."
"The name is already in use. You tried to register a name Use another name.
Check the registered names." that is already in use.
• Under Windows Vista, a message may appear if paper jams during scanning with the WSD scanner.
After clearing the paper jam, click [OK] to close the message dialog box, and then resume the
operation.
92
6. Clearing Misfeeds
This chapter describes what to do when paper or originals misfeed (become jammed inside the machine).
• If two paper tray units (options) are installed, do not pull out more than one tray at a time when
you are changing or replenishing paper or resolving paper jams. Pressing down forcefully on the
machine's upper surfaces can result in malfunctions and/or user injury.
• The inside of the machine could be very hot. Do not touch any parts other than specified in this
document when removing misfed paper. Otherwise, it may cause burn injury.
6
• The fusing section of this machine might be very hot. Caution should be taken when removing misfed
paper.
• When clearing misfeeds, do not turn off the operation switch. If you do, your copy settings will be
lost.
• To prevent misfeeds, do not leave any torn scraps of paper inside the machine.
• Contact your service representative if misfeeds occur frequently.
• The internal parts of the machine may be hot. Wait for the duplex unit to cool down before clearing
a paper jam in the unit.
• When removing jammed sheets, take care to touch only those areas explicitly indicated in the manual.
• Do not remove the fusing unit. Doing so will result in loss of print quality.
• More than one misfeed area may be indicated. If this is the case, check every indicated area. Refer
to the following charts: A, P, and Y.
• You can find stickers explaining how to remove misfed paper inside the right cover and on the top of
the ADF cover.
• When the machine instructs you to reset originals, reset them in the feeding position. The display will
show you the number of originals to return.
93
6. Clearing Misfeeds
BQP004S
6 When A is displayed
BQP005S
94
Removing Jammed Paper
When P is displayed
6
BQP003S
When Y1 is displayed
BQP006S
95
6. Clearing Misfeeds
When Y2 is displayed
BQP007S
96
7. Appendix
Trademarks
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Apple and TrueType are trademarks of Apple Inc., registered in the U.S. and other countries.
PCL® is a registered trademark of Hewlett-Packard Company.
UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/
Open Company Limited.
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The proper names of the Windows operating systems are as follows:
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
7
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
• The product names of Windows Server 2003 R2 are as follows:
97
7. Appendix
98
INDEX
A M
Adjusting the volume.............................................31 Manuals for this machine........................................5
Alert Messages......................................................60 Memory is full........................................................29
C Messages displayed..........................21, 34, 59, 82
Messages displayed on the client computer.......89
Cannot browse the network to send a scan file...... Messages displayed on the control panel when
................................................................................79 using the scanner function.....................................82
Cannot make clear copies....................................23 Messages displayed when installing the printer
Cannot make copies as wanted...........................26 driver......................................................................55
Cannot print...........................................................63 Multi-accessing...................................................... 19
Cannot send or receive fax messages as wanted... N
................................................................................45
Cannot send scanned files....................................79 Names of major item...............................................8
Clearing misfeeds..................................................93 Network connection..............................................65
Combine................................................................. 26 Network delivery function cannot be used.........79
Control panel..................................................60, 82 Notes........................................................................9
Copy function........................................................21 Notice.......................................................................7
D O
Duplex....................................................................26 Operations are not possible when messages are
displayed...............................................................81
E
Other printing problems........................................67
Edit..........................................................................26 P
Error log.................................................................61
Error Mail Notification..........................................54 Panel tone..............................................................12
Error occurs using Internet Fax.............................54 Printer function.......................................................59
Error Report (E-mail)..............................................54 Printing....................................................................45
Printing the Error Log.............................................61
F
Problems operating the machine..........................15
Facsimile function..................................................34 R
H
Reception...............................................................45
How to read this manual.........................................8 Removing jammed paper.....................................93
I S
If an error report is printed....................................52 Scanner function....................................................82
If USB connection fails..........................................58 Scanning is not done as expected.......................77
Indicators................................................................11 Server-Generated error e-mail............................54
J Stamp.....................................................................26
Status messages..................................................... 59
Job is not performed..............................................19 Symbols....................................................................8
L T
Legal Prohibition....................................................10 Trademarks............................................................97
Transmission...........................................................45
99
Transmission/Reception.......................................45
Turning off the main power / In the event of power
failure......................................................................53
TWAIN...................................................................89
TWAIN driver cannot be started..........................79
W
When A is displayed.............................................94
When Memory Is Full.....................................29, 50
When P is displayed.............................................95
When paper is not fed properly...........................67
When S/MIME cannot be used..........................80
When the data in indicator does not light up or flash
................................................................................65
When the Function Status Indicator Lights Up in Red
................................................................................13
When the machine is connected to the computer
using the interface cable.......................................65
When Y1 is displayed...........................................95
When Y2 is displayed...........................................96
When you cannot print clearly.............................67
When You Cannot Send Scan Files Using WSD....
................................................................................80
Windows 2000.....................................................55
Windows Server 2003/2003 R2.......................55
Windows Server 2008.........................................57
Windows Vista.......................................................56
Windows XP Home Edition...................................56
Windows XP Professional.....................................55
EN USA D069-6852