Ricoh Aficio MP W3600, AFICIO MP W2400 null

Ricoh Aficio MP W3600, AFICIO MP W2400 null
Operating Instructions
About This Machine
1
Getting Started
2
Entering Text
3
Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in this manual before using the machine.
Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine.
Notes:
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.
Notes:
The model names of the machines do not appear in the following pages. Check the type of your machine before reading this manual. (For details, see p.15 “Machine Types”.)
•
Type 1: 2404WD/GWD2004/LW324/Aficio MP W2400
•
Type 2: 2406WD/GWD2006/LW326/Aficio MP W3600
Certain types might not be available in some countries. For details, please contact your local dealer.
Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
Power Source
120V, 60Hz, 15A or more
Please be sure to connect the power cord to a power source as above. For details about power source,
see Troubleshooting.
Manuals for This Machine
Refer to the manuals that are relevant to what you want to do with the machine.
Important
❒ Media differ according to manual.
❒ The printed and electronic versions of a manual have the same contents.
❒ Adobe Acrobat Reader/Adobe Reader must be installed in order to view the
manuals as PDF files.
❒ Depending on which country you are in, there may also be html manuals. To
view these manuals, a Web browser must be installed.
❒ For details about the functions of RW-3600, refer to the manuals for this option.
❖ About This Machine
Be sure to read the Safety Information in this manual before using the machine.
This manual provides an introduction to the functions of the machine. It also
explains the control panel, preparation procedures for using the machine,
how to enter text, and how to install the CD-ROMs provided.
❖ General Settings Guide
Explains User Tools settings, and Address Book procedures such as registering e-mail addresses, and user codes. Also refer to this manual for explanations on how to connect the machine.
❖ Troubleshooting
Provides a guide to solving common problems, and explains how to replace
paper, toner, and other consumables.
❖ Security Reference
This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered
with, or prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.
❖ Copy/Document Server Reference
Explains Copier and Document Server functions and operations. Also refer to
this manual for explanations on how to place originals.
❖ Printer Reference
Explains Printer functions and operations.
❖ Scanner Reference
Explains Scanner functions and operations.
❖ Network Guide
Explains how to configure and operate the machine in a network environment, and use the software provided.
i
❖ Other manuals
• PostScript 3 Supplement
• UNIX Supplement
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
Note
❒ Manuals provided are specific to machine types.
❒ For “UNIX Supplement”, please visit our Web site or consult an authorized
dealer.
❒ “PostScript 3 Supplement” and “UNIX Supplement” include descriptions of
functions and settings that might not be available on this machine.
❒ The following software products are referred to using general names:
Product name
General name
DeskTopBinder Lite and DeskTopBinder Professional *1
ScanRouter EX Professional
er EX Enterprise *1
*1
ii
Optional
*1
DeskTopBinder
and ScanRout- the ScanRouter delivery software
What You Can Do with This Machine
This section introduces the features of this machine.
Note
❒ For details about options, see “Options”.
❒ For functions of printer (Printer Controller RW-3600) and scanner (RW-3600
Scanner Option), see manuals that come with those options.
❒ Scanner functions stated below apply to Scanner Option Type W3600 only.
Reference
p.22 “Options”
Copier, Printer, and Scanner Functions
This machine provides copier, printer (optional), and scanner (optional) functions.
ATZ002S
• You can make copies of originals. See Copy Reference.
• You can print documents created in applications. See Printer Reference.
You can print documents from Windows 95/98/Me (TCP/IP, IPP), Windows
2000 (TCP/IP, IPP), Windows XP/Server 2003 (TCP/IP, IPP), Windows NT
4.0 (TCP/IP, IPP), NetWare, UNIX (TCP/IP), and Macintosh (AppleTalk) environments because the machine supports all these. (multi-protocol)
• You can print HP-GL, HP-GL/2 (HP-RTL), TIFF, and CALS files directly using the GL/2 & TIFF filter. See Printer Reference.
• You can scan originals and send scan files to a computer. See Scanner Reference.
iii
Utilizing Stored Documents
You can store files scanned in copier, printer, or scanner mode on the machine's
hard disk. With DeskTopBinder (optional) or Web Image Monitor, you can use
your computer to search for, view, print, delete, and send stored files via the network. You can also change print settings and print multiple documents (Document Server).
ATZ003S
• You can also retrieve stored documents scanned in scanner mode.
For details, see Scanner Reference.
• Using File Format Converter (optional), you can download documents stored
in copier, document server, or printer mode to your computer.
For details, see Copy/Document Server Reference, and Printer Reference.
• For details about machine's settings, see “Network Settings”, General Settings
Guide.
• For details about document server in printer mode, see “Saving and Printing
Using the Document Server”, Printer Reference.
• For details about document server in scanner mode, see “Storing Files Using
the Scanner Function”, Scanner Reference.
• For details about document server, see “Document Server”, Copy/Document
Server Reference.
• For details about DeskTopBinder, see the DeskTopBinder manuals.
iv
Using the Scanner in a Network Environment
You can use a scanner over the network.
ATZ004S
• You can send scan files to a specified destination using e-mail (Sending scan
file by e-mail). See “Sending Scan Files by E-mail”, Scanner Reference.
• You can send scan files directly to folders (Sending scan file by Scan to Folder)
See “Sending Scan Files to Folders”, Scanner Reference.
• You can use this machine as a delivery scanner for the ScanRouter delivery
application (Network delivery scanner). You can save scan files in the delivery server or send them to a folder in a computer on the same network. For
details about the machine's settings, see “Network Settings”, General Settings
Guide. For details about how to use the function, see “Delivering Scan Files”,
Scanner Reference.
v
Administrating the Machine/Protecting Documents (Security
Functions)
You can prevent information leakage by managing the machine and protecting
documents.
ATZ005S
• You can protect documents from unauthorized access and stop them from being copied without permission. See Security Reference.
• You can control the use of the machine, as well as prevent machine settings
from being changed without authorization. See Security Reference.
• By setting passwords, you can prevent unauthorized access via the network.
See Security Reference.
• You can erase the data on the hard disk to prevent the information from leaking out. See the manual for the DataOverWriteSecurity Unit (optional) and
Security Reference.
vi
Monitoring the Machine Via Computer
You can change the machine's settings and monitor its status from a connected
computer.
ATZ006S
Web Image Monitor lets you configure and operate the machine using a Web
browser on a computer. You can also install SmartDeviceMonitor for Admin on
a computer to configure and operate the machine.
Using Web Image Monitor, you can register information in the address book,
specify the machine’s settings, and check the machine’s status with ease.
Using Web Image Monitor, you can check and specify the initial settings (system
settings, printer features, network settings, security settings/certificate management, and E-mail Notification), control print jobs, display the print job journal,
and protect the data in the machine using authentication.
You can also use SmartDeviceMonitor for Admin to register information in the
address book.
vii
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
What You Can Do with This Machine..................................................................iii
Copier, Printer, and Scanner Functions .................................................................... iii
Utilizing Stored Documents....................................................................................... iv
Using the Scanner in a Network Environment ........................................................... v
Administrating the Machine/Protecting Documents (Security Functions) ................. vi
Monitoring the Machine Via Computer..................................................................... vii
Notice ......................................................................................................................1
Important ....................................................................................................................1
Notes To Wireless LAN Interface (optional) Users ....................................................1
For Users in the State of California ............................................................................3
How to Read This Manual .....................................................................................4
Symbols .....................................................................................................................4
Names of Major Options ............................................................................................5
Terms .........................................................................................................................5
Safety Information .................................................................................................6
Safety During Operation.............................................................................................6
Positions of RWARNING and RCAUTION labels ..............................................9
ENERGY STAR Program .....................................................................................13
Specifications ...........................................................................................................14
Recycled Paper........................................................................................................14
Machine Types .....................................................................................................15
1. Getting Started
Guide to Components .........................................................................................17
Options.....................................................................................................................22
Control Panel........................................................................................................25
Display Panel........................................................................................................27
Simplified Display.....................................................................................................28
When the Authentication Screen is Displayed..................................................29
User Code Authentication (Using the Control Panel)...............................................29
User Code Authentication (Using a Printer Driver) ..................................................30
Login (Using the Control Panel) ...............................................................................30
Logout (Using the Control Panel).............................................................................31
Login (Using a Printer Driver)...................................................................................32
Login (Using Web Image Monitor) ...........................................................................32
Logout (Using Web Image Monitor) .........................................................................32
Changing Modes ..................................................................................................33
System Reset...........................................................................................................34
Turning On the Power .........................................................................................35
Turning On the Main Power .....................................................................................35
Turning On the Power ..............................................................................................36
Turning Off the Power ..............................................................................................36
Turning Off the Main Power .....................................................................................37
Saving Energy..........................................................................................................38
Anti-humidity Heater Switch .....................................................................................39
viii
2. Entering Text
Entering Text ........................................................................................................41
Available Characters ................................................................................................41
Keys .........................................................................................................................41
How to Enter Text ....................................................................................................42
3. Appendix
Dos and Don'ts.....................................................................................................45
Software and Utilities Included on the CD-ROM ...............................................47
Viewing the Contents of the CD-ROM .....................................................................47
Printer Drivers for This Machine...............................................................................48
TWAIN Driver ...........................................................................................................49
DeskTopBinder Lite..................................................................................................50
SmartDeviceMonitor for Admin ................................................................................51
DeskTopBinder-SmartDeviceMonitor for Client .......................................................52
Installing the Operating Instructions .................................................................53
PDF Manuals ...........................................................................................................54
Opening the Installed Operating Instructions...................................................55
Opening from the Icon..............................................................................................55
Opening from the [Start] Menu .................................................................................55
Opening from the CD-ROM......................................................................................56
Specifications for the Main Unit .........................................................................57
Specifications for Options ..................................................................................61
Roll Feeder Type 240 A or 240 B.............................................................................61
Paper Cassette Type 240 ........................................................................................61
Table Type 240 ........................................................................................................62
Carrier Sheet............................................................................................................62
IEEE 802.11b Interface Unit Type H ........................................................................62
USB Host Interface Unit Type 7300 .........................................................................63
Gigabit Ethernet Board Type A ................................................................................63
Copy Paper ...........................................................................................................64
Recommended Paper Sizes and Types...................................................................64
Unusable Paper .......................................................................................................68
Paper Storage ..........................................................................................................70
Handling Paper ........................................................................................................70
INDEX......................................................................................................... 71
ix
x
Notice
Important
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no
responsibility for its completeness or accuracy. If you have any questions concerning the legality of copying or printing certain items, consult with your legal
advisor.
Notes To Wireless LAN Interface (optional) Users
Notes to users
It is strictly forbidden to use antenna(s) except designated.
The antenna used for this transmitter must be installed to provide a separation
distance of at least 2.5 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.
Notes to users in the United States of America
This equipment complies with FCC RF radiation exposure limits set forth for an
uncontrolled environment.
Notice:
This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed
to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
1
This device complies with part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired
operation.
Warning
Changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate the equipment.
Note to users in Canada
Note:
This Class B digital apparatus complies with Canadian ICES-003.
Operation is subject to the following two conditions:
(1) This device may not cause interference, and (2) this device must accept any
interference, including interference that may cause undesired operation of the
device.
IEEE 802.11b Interface Unit Type H:
This device complies with RSS-210 of Industry Canada.
The term “IC:” before the certification/registration number only signifies that
the Industry Canada technical specifications were met.
To prevent radio interference to the licensed service, this device is intended to
be operated indoors and away from windows to provide maximum shielding.
Equipment (or its transmit antenna) that is installed outdoors is subject to licensing.
To reduce potential radio interference to other users, the antenna type and its
gain should be so chosen that the equivalent isotropically radiated power (EIRP)
is not more than that required for successful communication.
This device has been designed to operate with an antenna having a maximum
gain of [0.00] dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is [50] ohms.
2
Remarque concernant les utilisateurs au Canada
Avertissement:
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
L'utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1)
il ne doit pas produire de brouillage et (2) l'utilisateur du dispositif doit être prêt
à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
IEEE 802.11b Interface Unit Type H:
Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada.
L'expression <<IC:>> avant le numéro d'homologation/enregistrement signifie
seulement que les spécifications techniques d'Industrie Canada ont été respectées.
Pour empêcher que cet appareil cause du brouillage au service faisant l'objet
d'une licence, il doit être utilisé à l'intérieur et devrait être placé loin des fenêtres
afin de fournir un écran de blindage maximal.
Si le matériel (ou son antenne d'émission) est installé à l'extérieur, il doit faire
l'objet d'une licence.
Afin de réduire le risque d'interférence aux autres utilisateurs, le type d'antenne
et son gain doivent être choisis de façon à ce que la puissance isotrope rayonnée
équivalente (p.i.r.e.) ne soit pas supérieure au niveau requis pour obtenir une
communication satisfaisante.
Ce dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximal de [0.00] dBi. Une antenne ayant un gain plus élevé est strictement interdite
par les réglements d'Industrie Canada. L'impédance d'antenne requise est [50]
ohms.
For Users in the State of California
Perchlorate Material - special handling may apply,
See www.dtsc.ca.gov/hazardouswaste/perchlorate
3
How to Read This Manual
Symbols
This manual uses the following symbols:
Indicates important safety notes.
Ignoring these notes could result in serious injury or death. Be sure to read these
notes. They can be found in the “Safety Information” section of this manual.
Indicates important safety notes.
Ignoring these notes could result in moderate or minor injury, or damage to the
machine or to property. Be sure to read these notes. They can be found in the
“Safety Information” section of this manual.
Indicates points to pay attention to when using the machine, and explanations
of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure
to read these explanations.
Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine’s display panel.
{}
Indicates the names of keys on the machine’s control panel.
4
Names of Major Options
This section explains the names of the major options described in this manual.
Major options for this machine are referred to as follows:
• Roll Feeder Type 240A → Paper roll tray 1
• Roll Feeder Type 240B → Paper roll tray 2
• Paper Cassette Type 240 → Cut paper tray
• Table Type 240 → Table
• Folder FD6500A → Folding finisher
Terms
This section explains the meanings of terms used in this manual.
• Long length original/paper
Original/paper length longer than 1,189 mm, 46.8".
5
Safety Information
When using this machine, the following safety precautions should always be followed.
Safety During Operation
In this manual, the following important symbols are used:
Indicates a potentially hazardous situation which, if instructions are not followed, could result
in death or serious injury.
Indicates a potentially hazardous situation which, if instructions are not followed, may result
in minor or moderate injury or damage to property.
R WARNING:
• Disconnect the power plug (by pulling the plug, not the cable) if the
power cable or plug becomes frayed or otherwise damaged.
• To avoid hazardous electric shock, do not remove any covers or
screws other than those specified in this manual.
• Turn off the power and disconnect the power plug (by pulling the plug,
not the cable) if any of the following occurs:
• You spill something into the machine.
• You suspect that your machine needs service or repair.
• The external housing of your machine has been damaged.
• Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open flame.
• Disposal can take place at our authorized dealer.
• Dispose of used toner containers in accordance with local regulations.
• Keep the machine away from flammable liquids, gases, and aerosols.
A fire or an electric shock might occur.
• Connect the machine only to the power source described on the inside front cover of this manual. Connect the power cord directly into
a wall outlet and do not use an extension cord.
• Do not damage, break or make any modifications to the power cord.
Do not place heavy objects on it. Do not pull it hard nor bend it more
than necessary. These actions could cause an electric shock or fire.
• If the power cord is damaged (exposure of the core, disconnection, etc.),
contact your service representative to change a new one. Operating the
machine with a damaged power cord may cause an electric shock or fire.
• This machine emits a weak magnetic field. People using a pacemaker should stay
away from the machine if abnormalities are felt. They should then consult a doctor.
6
R CAUTION:
• Protect the machine from dampness or wet weather, such as rain and snow.
• Contact your service representative if you need to lift the machine (such as
when relocating it to another floor). Do not attempt to lift the machine without
the assistance of your service representative. The machine will be damaged
if it topples or is dropped, resulting in malfunction and risk of injury to users.
The machine's various handling areas are for service engineer use only. Do
not touch these areas.
• Unplug the power cord from the wall outlet before you move the machine.
While moving the machine, you should take care that the power cord will not
be damaged under the machine.
• When you disconnect the power plug from the wall outlet, always pull the
plug (not the cable).
• Do not allow paper clips, staples, or other small metallic objects to fall inside
the machine.
• Keep toner (used or unused) and toner containers out of reach of children.
• For environmental reasons, do not dispose of the machine or expended
supply waste at household waste collection points. Disposal can take place
at an authorized dealer.
• The inside of the machine could be very hot. Do not touch the parts with a
label indicating the “hot surface”. Otherwise, an injury might occur.
• The fusing section of this machine might be very hot. Caution should be taken when removing misfed paper.
• Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur.
• Do not place the machine on an unstable or tilted surface. If it topples over,
an injury might occur.
• Do not use aluminum foil, carbon paper, or similar conductive paper to avoid
a fire or machine failure.
• Make sure the room where you are using the machine is well ventilated and
spacious. Good ventilation is especially important when the machine is used
heavily.
• Do not open toner cartridges forcefully. Toner can spill, dirtying your clothes
or hands, and possibly resulting in accidental ingestion.
• If toner or used toner is inhaled, gargle with plenty of water and move into a
fresh air environment. Consult a doctor if necessary.
• If toner or used toner gets into your eyes, flush immediately with large
amounts of water. Consult a doctor if necessary.
• If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary.
7
R CAUTION:
• Avoid getting toner on your clothes or skin when removing paper jam or replacing toner. If your skin comes into contact with toner, wash the affected
area thoroughly with soap and water.
• If toner gets on your clothing, wash with cold water. Hot water will set the
toner into the fabric and may make removing the stain impossible.
• Do not look into the lamp. It can damage your eyes.
• When loading paper, take care not to trap or injure your fingers.
• During operation, rollers for transporting the paper and originals revolve. A
safety device is being installed so that the machine can be operated safely.
But take care not to touch the machine during operation. An injury might occur.
• Fire and breakdown can result from heavy accumulation of dust inside this
machine. Consult your service representative for details about and charges
for cleaning the machine’s interior.
• There is a cutter blade inside the paper roll tray. When replacing or loading
the paper roll, or clearing paper jams, do not touch the parts a label indicates. Otherwise an injury may result.
• When replacing or loading the paper roll, do not put the paper roll on the upper
of the paper roll tray. Otherwise the tray may fall and an injury may result.
• Hold the paper roll horizontally with both hands. When you grab the paper
holder and hold the paper roll vertically, the paper roll may fall off and an injury may result.
• When replacing or loading the paper, or clearing paper jams, pull out the cut
paper tray slowly with both hands. Do not pull out the cut paper tray with a
single hand. Otherwise the rear of the cut paper tray may fall and an injury
may result.
8
Positions of RWARNING and RCAUTION
labels
This machine has labels for RWARNING and RCAUTION at the positions
shown below. For safety, please follow the instructions and handle the machine
as indicated.
ATZ008S
ATZ035D
Do not touch the parts a label indicates. The inside of the machine could be very
hot. Caution should be taken when removing misfed paper.
ATZ036D
Do not touch the parts a label indicates. The inside of the machine could be very
hot. Caution should be taken when removing misfed paper.
ATZ037D
Do not touch the parts a label indicates. The inside of the machine could be very
hot. Caution should be taken when removing misfed paper.
9
ATZ009S
ATZ040D
The inside of the machine could be very hot. Do not touch the parts a label indicates. Otherwise, an injury might occur.
ATZ038S
The inside of the machine could be very hot. Do not touch the parts which a label
is put on. Otherwise, an injury might occur.
ATZ039D
Do not touch the parts a label indicates. The inside of the machine could be very
hot. Caution should be taken when removing misfed paper. The higher temperature (145°C) applies to plain paper. Translucent paper can cause the indicated
part to reach 160°C.
ATZ088D
The inside of the machine could be very hot. Do not touch the parts which a label
is put on. Otherwise, an injury might occur.
10
ATZ041S
The inside of the machine could be very hot. Do not touch the parts which a label
is put on. Otherwise, an injury might occur.
ATZ033S
ATZ042D
The inside of the machine could be very hot. Do not touch the parts which a label
is put on. Otherwise, an injury might occur.
ATY016D
There is a cutter blade inside. When replacing or loading the paper roll, or clearing paper jams, do not touch the parts this label indicates. Otherwise an injury
may result.
ATZ044S
When replacing or loading the paper roll, do not put the paper roll on the upper
of the paper roll tray. Otherwise the tray may fall and an injury may result.
ATZ045D
Hold the paper roll horizontally with both hands. When you grab the paper
holder and hold the paper roll vertically, the paper roll may fall off and an injury
may result.
11
ATZ046S
The inside of the machine could be very hot. Do not touch the parts which a label
is put on. Otherwise, an injury might occur.
ATZ034S
ATZ047S
When replacing or loading the paper, or clearing paper jams, pull out the cut paper tray slowly with both hands. Do not pull out the cut paper tray with a single
hand. Otherwise the rear of the cut paper tray may fall and an injury may result.
12
ENERGY STAR Program
ENERGY STAR® Program
The ENERGY STAR® Program encourages energy conservation by promoting energy efficient
computers and other office equipment.
The program backs the development and dissemination of products that feature energy saving
functions.
It is an open program in which manufacturers participate voluntarily.
Targeted products are computers, monitors, printers, facsimiles, copiers, scanners, and multifunction devices. Energy Star standards and logos are internationally uniform.
❖ Low power mode
This product automatically lowers its power consumption 7 minutes after the
last copy or print job is completed. Printing is possible in this mode, but to use
the copier, press the {Energy Saver} key.
❖ Sleep mode
To conserve energy, this product automatically turns off 14 minutes after the
last copy or print job is completed. Printing is possible in this mode, but to use
the copier, press the operation switch.
13
Specifications
Low power mode
Sleep mode
Power consumption
130 W
Default interval
7 minutes
Recovery time
83 seconds
Power consumption
29 W
Default interval
14 minutes
Recovery time
120 seconds
Note
❒ For details about changing how long the machine waits before switching to
Low power mode, see “Timer Settings”, General Settings Guide.
❒ For details about changing how long the machine waits before switching to
Auto Off, see “Timer Settings”, General Settings Guide.
Reference
“Timer Settings”, General Settings Guide
Recycled Paper
We recommend use of recycled paper which is environmentally friendly. Please
contact your sales representative for recommended paper.
14
Machine Types
This machine comes in two models which vary in copy/print speed. To ascertain
which model you have, see the inside front cover.
Type 1
Copy/print speed
2 sheets/minute (A0 (E)K),
4 sheets/minute (A1 (D)L)
Type 2
3 sheets/minute (A0 (E)K),
6 sheets/minute (A1 (D)L)
15
16
1. Getting Started
This section describes how to start using this machine.
Guide to Components
This section introduces the names and functions of the components.
Important
❒ Do not leave the main unit open for more than 10 minutes, otherwise image
quality may deteriorate.
❒ Do not obstruct the ventilation holes by placing objects near them or leaning
things against them. If the machine overheats, a failure might occur.
17
Getting Started
❖ Front
1
ATY040S
1. Original switching lever
8. Main power switch
Use to copy or scan folded originals.
Use to turn the main power on or off. If
you will not use the machine for a long
time, disconnect the power cord. Normally, the machine should be left on.
If the machine does not operate after
turning on the operation switch, check
the main power switch is also turned on.
If off, turn it on.
2. Upper output stacker
When the upper output is selected, output paper is stacked here.
3. Original stacker
Originals are stacked here.
4. Original cover
Open to clear jammed originals.
5. Ventilation holes
Prevent overheating.
6. Main unit
Open when paper jam or toner runs out.
7. Main unit opening lever
Use to open the main unit.
18
9. Paper roll tray (optional)
Load a paper roll here.
10. Operation switch
Press to turn the power on (the operation
switch indicator lights up). To turn the
power off, press again (the operation
switch indicator goes off). See “Turning
On the Power”.
Guide to Components
11. Control panel
16. Bypass tray
See “Control Panel”.
Use to feed paper in manually. Load paper print side up.
12. {Scanner Stop} key
Use if originals are feeding in slanted, or
to cancel scanning while an original is
feeding in.
17. Bypass tray's paper guide
13. Original guide
18. Cut paper tray (optional)
Set to the width of your originals.
Load cut paper here.
14. Original table
19. Lower output stacker
Place originals here scanning side down.
When the lower output is selected, output paper is stacked here.
15. Main unit front cover
Open when toner runs out.
1
Set to the width of the paper for bypass
copying.
20. Lower output auxiliary guide
Pull this out to insert rolled paper or long
originals.
Note
❒ Do not pull out the lower output auxiliary guide when lower output is selected. Otherwise, output paper may not be stacked properly.
19
Getting Started
❖ Rear
1
ATZ011S
1. Upper output guide
6. Upper output exit
Takes delivered paper to the upper output stacker.
When the upper output is selected, output paper is delivered here with the print
side facing the user.
2. Original exit switching lever
Takes originals to the original output
guide, and switches delivery to the rear
output.
7. Original output guide
3. Original exit
When the lower output is selected, output paper is delivered here with the print
side up.
Originals are delivered here.
4. Ventilation holes
8. Lower output exit
Prevent overheating.
9. Lower output guides
5. Anti-humidity heater switch (optional)
Prevent delivered paper being stacked at
an angle when the lower output is selected.
When humidity is high, paper in the paper roll or cut paper trays may absorb
moisture, which can affect image quality.
The anti-humidity heater prevents this.
Turn this switch on when humidity is
high.
20
Stacks originals delivered to the rear output.
10. Lower output tray (optional)
Delivers paper from the lower output exit, and then sends them to the lower output stacker.
Guide to Components
Note
❒ Use the lower output guides if A0K or A1K sheets are being delivered to the
lower output exit.
1
Reference
p.22 “Options”
p.25 “Control Panel”
p.39 “Anti-humidity Heater Switch”
“Original Output Locations”, Copy/Document Server Reference
“Copy Output Locations”, Copy/Document Server Reference
“Setting Folded Originals (the Original Switching Lever)”, Copy/Document
Server Reference
21
Getting Started
Options
This section introduces the names and functions of main optional parts.
1
External Options
This section provides explanations about external options.
ATY015S
1. Paper roll tray 1
5. Folding finisher
You can load one paper roll.
Automatically folds paper like fans or accordion.
2. Paper roll tray 2
6. Rear stacker
You can load two paper rolls.
Allows you to stack paper delivered to
the lower output exit.
3. Table
Put the main unit on this table. You can
store cut paper and so on inside it.
4. Cut paper tray
Load cut paper here. You can load up to
250 A3 sheets.
22
7. Original hanger
Allows you to hang originals.
Guide to Components
❖ Paper roll tray
This illustration shows the paper roll tray 2.
1
ATZ068S
1. Paper roll 1
2. Paper roll 2
3. Cutter knob
Use to manually cut paper if there are
paper jams in the cutter area of the
machine. Always return the cutter
knob to the left or right end.
4. Paper holder
The two paper holders grip the paper
roll and are mounted on the paper roll
tray's roll holder.
5. Paper feed knob
Use when loading paper rolls or clearing paper jams.
6. Roll holder
Adjust this to the size of the paper roll
you are using.
Note
❒ The paper roll tray is required to install the cut paper tray.
❒ If the rear stacker is installed, the lower output stacker, lower output tray,
lower output guides, and folding finisher cannot be used.
Reference
p.23 “Other Options”
p.61 “Roll Feeder Type 240 A or 240 B”
“Loading Paper”, Troubleshooting
“Clearing Misfeeds”, Troubleshooting
“Changing the Paper Size in the Paper Roll Tray”, Troubleshooting
Other Options
This section provides explanations about other options.
• Printer unit
Allows you to use the printer function.
You can install either Type W3600 or RW-3600 printer unit.
• Scanner unit
Allows you to use the scanner function.
23
Getting Started
• USB host board (For Type W3600)
Allows you to connect a variety of external devices.
• IEEE 802.11b wireless LAN board (For Type W3600)
Allows you to install a wireless LAN interface.
• Gigabit Ethernet (1000BASE-TX) (For Type W3600)
Allows you to communicate with 1000BASE-TX.
• File Format Converter
Allows you to download stored documents scanned in copier, document
server, or printer mode. See Copy/Document Server Reference, and Printer
Reference.
• DataOverWriteSecurity Unit
Allows you to erase data on the hard disk.
• Carrier sheet
Use to load bent, folded, creased, thin or pasted originals.
1
ZEDP020J
• Paper holder
Use to set a paper roll in the paper roll tray's roll holder.
This is useful to change quickly to a different size paper roll from the paper
holder.
ZEDP030J
Note
❒ You cannot install both of the options below at the same time: IEEE 802.11b
wireless LAN board, and Gigabit Ethernet (1000BASE-TX).
Reference
“Setting the Carrier Sheet”, Copy/Document Server Reference
24
Printer Reference
Control Panel
Control Panel
This section introduces the names and functions of the components on the control panel.
This illustration shows the control panel of the machine with options fully installed.
1
ATY041S
1. Screen contrast knob
5. {Program} key (copier, document
Adjusts display panel brightness.
server, and scanner mode)
2. {User Tools/Counter} key
Press to register frequently used settings,
or to recall registered settings.
• User Tools
Press to change the default and conditions to meet your requirements. See
“Accessing User Tools”, General Settings Guide.
• Counter
Press to check or print the counter value. See “Counter”, General Settings
Guide.
• Inquiry
Press to find out where to order expendable supplies and where to call
when a malfunction occurs. You can
also print these details. See “Inquiry”,
General Settings Guide.
3. Display panel
Displays keys for each function, operation
status, or messages. See “Display Panel”.
4. {Clear Modes} key
Press to clear the current settings.
6. {Interrupt} key (copier, document
server, and scanner mode)
Press to make interrupt copies during
copying or scanning. See “Interrupt
Copy”, Copy/Document Server Reference.
7. {Energy Saver} key
Press to switch to and from Energy Saver
mode. See “Saving Energy”.
8. Main power indicator
The main power indicator goes on when
you turn on the main power switch.
Do not turn off the main power switch
while the operation switch indicator is lit
or blinking. Doing so may damage the
hard disk.
9. Operation switch
Press to turn the power on (the operation
switch indicator goes on). To turn the
power off, press again (the operation
switch indicator goes off). See “Turning
On the Power”.
25
Getting Started
10. {Login/Logout} key
15. {Clear/Stop} key
Press this to log in or log out.
• Clear
Press to delete a number entered.
• Stop
Press to stop a job in progress, such as
scanning, or printing.
11. {Simplified Display} key
Press this to switch to the Simplified Display.
1
12. {Sample Copy} key
Press to make a single set of copies or
prints to check print quality before making multiple sets. See “Sample Copy”,
Copy/Document Server Reference.
13. {Start} key
Press to start copying. Start scanning or
printing documents stored using the
Document Server function.
14. {q} key (Enter key)
Press to confirm values entered or items
specified.
16. Number keys
Use to enter the numbers for copies, and
data for the selected function.
17. Function keys
Press to display the operation screen of
one of the following functions: copier,
document server, printer, or scanner.
The indicator of the selected function
goes on. See “Changing Modes”.
18. Alert indicator
Lights continuously if an error has occurred.
19. Data In indicator (printer mode)
Blinks continuously if the machine has
received a print job.
Reference
p.27 “Display Panel”
p.28 “Simplified Display”
p.33 “Changing Modes”
p.35 “Turning On the Power”
p.38 “Saving Energy”
“Accessing User Tools”, General Settings Guide
“Counter”, General Settings Guide
“Inquiry”, General Settings Guide
“Interrupt Copy”, Copy/Document Server Reference
“Sample Copy”, Copy/Document Server Reference
26
Display Panel
Display Panel
The display panel shows machine status, error messages, and function menus.
The function items displayed serve as selector keys. You can select or specify an
item by lightly pressing them.
When you select or specify an item on the display panel, it is highlighted like
. Keys appearing as
cannot be used.
1
Important
❒ Don't apply strong impact or force to the screen. Or it may be damaged. Maximum force allowable is approx. 30N (approx. 3 kgf). (N = Newton, kgf = Kilogram force. 1 kgf = 9.8N.)
The copy display is set as the default screen when the machine is turned on.
The following display is of a machine with the options fully installed.
27
Getting Started
Simplified Display
This section explains how to switch to the simplified display.
When you press the {Simplified Display} key, the screen changes from the initial
display to the simplified display.
Letters and keys are displayed at a larger size, making operations easier.
1
ATY042S
❖ Example of a simplified display
This illustration shows the copier function's simplified display.
ATY043S
1. [Key Color]
Press to increase screen contrast.
This is available only for the simplified
display.
Note
❒ To return to the initial display, press the {Simplified Display} key again.
❒ Certain keys do not appear on the simplified display.
28
When the Authentication Screen is Displayed
When the Authentication Screen is
Displayed
1
When Basic Authentication, Windows Authentication, LDAP Authentication, or
Integration Server Authentication is enabled, the authentication screen appears
on the screen. The machine only becomes operable after entering your own login
user name and login password. If user code authentication is enabled, you cannot use the machine until you enter the user code.
If you can use the machine, you can say that you are logged in. When you go out
of the operable state, you can say that you are logged out. After logging in the
machine, be sure to log out of it to prevent unauthorized usage.
Important
❒ Ask the user administrator for the login user name, login password, and user
code. For details about user authentication, contact your administrator.
❒ User code to enter on User Code Authentication is the numerical value registered in the address book as “login user name”.
Note
❒ If authentication fails, the “Authentication has failed.” message appears. Check that the login user name and login password are correct.
User Code Authentication (Using the Control Panel)
When user authentication is set, the following screen appears:
Enter a user code (up to eight digits), and then press [OK].
Note
❒ To log out, do one of the following:
• Press the operation switch.
• Press the {User Tools/Counter} key, press [System Settings], and then press
the {User Tools/Counter} key.
• Press the {Energy Saver} key after jobs are completed.
29
Getting Started
User Code Authentication (Using a Printer Driver)
When user authentication is set, specify the user code in the printer properties
of the printer driver. For details, see the printer driver Help.
1
Note
❒ When logged in through User Code Authentication, you do not have to log
out.
Login (Using the Control Panel)
Follow the procedure below to log in when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
A Press [Enter] for [Login User Name].
B Enter a login user name, and then press [OK].
C Press [Enter] for [Login Password].
D Enter a login password, and then press [OK].
E Press [Login].
When the user is authenticated, the screen for the function you are using appears.
30
When the Authentication Screen is Displayed
Note
❒ If authentication fails, the “Authentication has failed.” message appears. Check that the login user name and login password are correct.
❒ If user code authentication has been specified, a different screen appears.
See “Authentication Information”, General Settings Guide.
1
Reference
“Authentication Information”, General Settings Guide
Logout (Using the Control Panel)
Follow the procedure below to log out when Basic Authentication, Windows
Authentication, LDAP Authentication, or Integration Server Authentication is
set.
Important
❒ To prevent use of the machine by unauthorized persons, always log out when
you have finished using the machine.
A Press the {Login/Logout} key.
ATY044S
B Press [Yes].
31
Getting Started
Login (Using a Printer Driver)
When Basic Authentication, Windows Authentication, LDAP Authentication, or
Integration Server Authentication is set, make encryption settings in the printer
properties of the printer driver, and then specify a login user name and password. For details, see the printer driver Help.
1
Note
❒ When logged in using a printer driver, you do not have to log out.
Login (Using Web Image Monitor)
This section explains how to log in the machine via Web Image Monitor.
A Click [Login].
B Enter a login user name and password, and then click [Login].
Note
❒ For user code authentication, enter a user code in [User Name], and then
click [OK].
Logout (Using Web Image Monitor)
This section explains how to log out the machine via Web Image Monitor.
A Click [Logout] to log out.
Note
❒ Delete the cache memory of a Web browser after logging out.
32
Changing Modes
Changing Modes
This section explains how to change modes.
1
ATY045S
Note
❒ You cannot switch modes in any of the following situations:
• When accessing User Tools / Counter / Inquiry
• During interrupt copying
• While scanning an original
❒ The copy display is set as the default screen when the machine is turned on.
You can change this default setting. For the setting procedure, see “System
Settings”, General Settings Guide.
Reference
“System Settings”, General Settings Guide
33
Getting Started
System Reset
The machine returns automatically to its initial condition when the job is finished, after a certain period of time has elapsed. This function is called “System
Reset”. See “System Settings”, General Settings Guide.
You can change the System Reset time. See “Timer Settings”, General Settings
Guide.
1
Reference
“System Settings”, General Settings Guide
“Timer Settings”, General Settings Guide
34
Turning On the Power
Turning On the Power
This section discusses how to turn on/off the power.
1
❖ Operation switch
This machine has two power switches: operation switch and main power
switch.
• Operation switch (right side of the control panel)
Press to activate the machine. When the machine has finished warming up,
you can make use of each function.
• Main power switch (left side of the machine)
Turning off this switch makes the main power indicator on the right side
of the control panel go off. When this is done, machine power is completely
off. Use this switch only when necessary.
Note
❒ This machine automatically enters Energy Saver mode or turns itself off if you
do not use it for a while. See “Timer Settings”, General Settings Guide.
Reference
“Timer Settings”, General Settings Guide
Turning On the Main Power
Turn on the main power as follows:
Important
❒ Do not turn off the main power switch immediately after turning it on. Doing
so may result in damage to the hard disk or memory, leading to malfunctions.
A Make sure the power cord is firmly plugged into the wall outlet.
B Turn on the main power switch.
The main power indicator goes on.
ATY049S
35
Getting Started
Note
❒ To start using the folding finisher, turn its main power switch on before
turning on the main unit's main power switch.
❒ After you switch the main power on, a screen may appear to indicate that
the machine is initializing. Do not switch the power off during this process.
Initialization takes about three minutes.
1
Turning On the Power
Turn on the power as follows:
A Press the operation switch.
The operation switch indicator goes on.
ATY046S
Note
❒ If the power does not come on when the operation switch is pressed, check
the main power switch is on. If it is off, turn it on.
Turning Off the Power
Turn off the power as follows:
A Press the operation switch.
The operation switch indicator goes off.
ATY046S
36
Turning On the Power
Note
❒ Even if you press the operation switch, the operation switch indicator does
not go out, but blinks in the following cases:
• During communication with external equipment.
• When the hard disk is active.
1
Turning Off the Main Power
Turn off the main power as follows:
Important
❒ Do not turn off the main power switch when the operation switch indicator is
lit or blinking. Doing so may result in damage to the hard disk or memory.
❒ Make sure to turn off the main power switch before pulling out the power
plug. Not doing so may result in damage to the hard disk or memory.
A Make sure the operation switch indicator is not lit.
B Turn off the main power switch.
The main power indicator goes out.
Note
❒ To power down the folding finisher, turn off the main power switch of the
main unit first, and then turn off the folding finisher's main power switch.
37
Getting Started
Saving Energy
This machine has the following energy saving functions.
1
❖ Energy Saver
If you do not use the machine for a certain period after an operation, or when
you press the {Energy Saver} key, the display disappears and the machine
goes into Energy Saver mode. When you press the {Energy Saver} key again,
the machine returns to the ready condition. The machine uses less electricity
in Energy Saver mode.
You can change the amount of time the machine waits before switching to Energy Saver mode after copying has finished or the last operation is performed.
See “Timer Settings”, General Settings Guide.
❖ Low power mode
If you do not use the machine for a certain period, it automatically lowers its
power consumption. When you press the {Energy Saver} key, the machine returns to standby.
You can change the amount of time the machine waits before switching to the
Low power mode. See “Timer Settings”, General Settings Guide.
❖ Auto Off
The machine automatically turns itself off when the job is finished, after a certain period of time has elapsed. This function is called “Auto Off”.
You can change the Auto Off time. See “Timer Settings”, General Settings
Guide.
Note
❒ The Energy Saver, Low power mode, and Auto Off function will not operate
in the following cases:
•
•
•
•
•
•
•
•
•
•
•
•
When a warning message appears
When the service call message appears
When paper is jammed
When the cover is open
When the “Add Toner” message appears
When toner is being replenished
When the User Tools / Counter / Inquiry screen is displayed
When fixed warm-up is in progress
When the printer, or other functions are active
When operations are suspended during printing
When the Data In indicator is on or blinking
When the screen of stored document under the printer function is displayed
Reference
“Timer Settings”, General Settings Guide
38
Turning On the Power
Anti-humidity Heater Switch
This section explains the anti-humidity heater switch.
During winter or humid periods when there can be sudden changes in temperature and humidity, the paper in the paper roll tray, or the cut paper tray can absorb moisture. This may cause image quality to deteriorate.
To prevent this, the machine has a built-in anti-humidity heater.
There is a switch for the anti-humidity heater on the right side of the paper roll
tray. Turn this switch on if the humidity level becomes high and image quality
is affected. Turn the switch off at other times.
1
ATZ019S
Reference
p.70 “Handling Paper”
39
Getting Started
1
40
2. Entering Text
This section describes how to enter characters.
Entering Text
When you enter a character, it appears at the position of the cursor. If there is a
character already at the cursor position, the entered character appears before
that.
Available Characters
This section explains which characters are available.
You can enter the following characters:
• Alphabetic characters
• Symbols
• Numerals
0123456789
Keys
This section explains the entry screen and the keys displayed on it.
You can change the entry screen using the keys below.
ATY047S
41
Entering Text
Note
❒ When entering uppercase or lowercase letters continuously, use [Shift Lock] to
lock the case.
❒ You can also use the number keys to enter numbers, regardless of mode.
Reference
p.43 “Adding user text”
2
How to Enter Text
This section explains text entry more specifically.
Entering letters
A Press [Shift] to switch between uppercase and lowercase.
B Press the letters you want to enter.
Deleting characters
A Press [Backspace] or [Delete All] to delete characters.
42
Entering Text
Adding user text
You can select and use a User Text that is registered in [Program / Change / Delete
User Text].
For details about registering User Texts, see “System Settings”, General Settings
Guide.
A Press [User Text].
2
B Select the User Text you want to use.
Reference
“System Settings”, General Settings Guide
43
Entering Text
2
44
3. Appendix
This section describes Dos and Don'ts, the provided CD-ROMs, specifications,
and copy paper.
Dos and Don'ts
The following items should be followed during use of this machine.
R CAUTION:
• Keep the machine away from flammable liquids, gases, and aerosols. A fire
or an electric shock might occur.
R CAUTION:
• Unplug the power cord from the wall outlet before you move the machine.
While moving the machine, you should take care that the power cord will
not be damaged under the machine.
Important
❒ Do not turn the power off while the operation switch indicator is lit or blinking. Doing so may damage the hard disk.
❒ Before unplugging the power cord or turning off the main power switch,
make sure remaining memory space is at 100%, as shown on the screen. See
“Turning Off the Power”, “Turning Off the Main Power”.
❒ Do not touch areas on or around the fusing unit. These areas get hot.
❒ When you use this machine for a long time in a poorly ventilated confined
space, you may detect an odd smell. To keep the workplace comfortable, we
recommend good ventilation.
❒ The area around the ventilation hole might feel warm. This is caused by exhaust air and is not a malfunction.
❒ If the machine is moved from a cold to a warm place, condensation may form
inside it. After moving the machine, do not use it for at least an hour. The machine requires this time to adapt to its new environment.
❒ The machine will malfunction if its internal temperature becomes too high. Be
sure not to block the intake and exhaust vents.
❒ Do not turn off the power while the machine is in operation. See “Turning Off
the Power”, “Turning Off the Main Power”.
❒ Do not move or tilt the machine when the power is on.
❒ Do not allow small objects such as paperclips to fall into or become stuck inside the machine.
❒ Do not knock the machine while it is operating (for instance, do not use the
machine's surfaces to knock stacks of paper into square).
45
Appendix
❒ Depending on the ambient temperature and humidity, steam may come from
the exhaust vent behind the control panel during printing. This is water vapour from the paper, not a sign of malfunction.
❒ Do not open the main unit cover, the paper roll tray, or the cut paper tray
when the machine is in operation. If you do, misfeeds might occur.
❒ Do not leave the main unit open for more than 10 minutes, otherwise image
quality may deteriorate.
❒ If you do not use the machine for a long time, remove the paper from the paper roll tray, or the cut paper tray and place it in its storage bag.
❒ Condensation can lead to image deterioration. To prevent this, this machine
has an anti-condensation function. Even when the main power switch is in
the standby position, the anti-condensation heater is active, keeping the machine body slightly warm.
❒ The paper roll tray has the anti-humidity function. Even when the main power switch is in the standby position, the anti-humidity heater is active if it is
turned on.
❒ Be sure to make a note of the registered machine settings in case they are lost
due to accident or malfunction.
❒ The supplier shall not be liable for any loss or damage resulting from a failure
of the machine, loss of settings, or use of the machine.
3
Reference
p.36 “Turning Off the Power”
p.37 “Turning Off the Main Power”
p.39 “Anti-humidity Heater Switch”
46
Software and Utilities Included on the CD-ROM
Software and Utilities Included on the CDROM
Three CD-ROMs come with this machine: “Printer Drivers and Utilities”, “Scanner Driver and Utilities”, and “Manuals”. In “Manuals”, operating instructions
are stored in PDF format and HTML format.
The following are included in the three separate CD-ROMs:
❖ Font Manager 2000
For installing new screen fonts, or organizing and managing fonts already in
the system. For details about Font Manager 2000, see the manual on the CDROM labeled “Printer Drivers and Utilities”.
3
❖ SmartDeviceMonitor for Admin
For the system administrator to manage network printers.
❖ DeskTopBinder-SmartDeviceMonitor for Client
For users to manage their network print status.
❖ Printer Utility for Mac
This utility allows users to download and manage a variety of fonts as well as
manage printers. For details about this utility, see PostScript 3 Supplement.
Note
❒ Documentation about using the machine is included on the CD-ROM in PDF
format. For details about using Acrobat Reader, see Acrobat Reader online
Help.
Reference
SmartDeviceMonitor for Admin Help
DeskTopBinder-SmartDeviceMonitor for Client Help
Acrobat Reader online Help
Viewing the Contents of the CD-ROM
Follow the procedure below to view the contents of the CD-ROMs.
A Insert the CD-ROM into the CD-ROM drive.
The installer starts.
B Click [Browse This CD-ROM].
Explorer starts and displays the contents of the CD-ROM.
47
Appendix
Printer Drivers for This Machine
Printing requires installation of a printer driver for your operating system. The
following drivers are included on the CD-ROM labeled “Printer Drivers and
Utilities”.
Printer Language
3
RPCS
PostScript 3
HDI driver
Windows 95
*1
OK
OK
OK
Windows 98
*2
OK
OK
OK
Windows Me *3
OK
OK
OK
Windows 2000 *4
OK
OK
OK
Windows XP *5
OK
OK
OK
Windows Server 2003 *6
OK
OK
OK
Windows NT 4.0 *7
–
–
OK
Mac OS *8
–
OK
–
Mac OS X *9
–
OK
–
*1
*2
*3
*4
*5
*6
*7
*8
*9
Microsoft Windows 95 operating system
Microsoft Windows 98 operating system
Microsoft Windows Millennium Edition
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Server
Microsoft Windows 2000 Professional
Microsoft Windows XP Professional
Microsoft Windows XP Home Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows NT Server operating system version 4.0, Microsoft Windows NT
Workstation operating system version 4.0 in a computer using x86 processors.
Versions 8.6 to 9.2 of the Mac OS (Mac OS X Classic mode is supported.)
Mac OS X 10.1 or later (Native mode)
❖ RPCS printer driver
This printer driver allows the computer to communicate with the printer using a printer language. In addition to the conventional user interface, another
preset user interface is provided.
❖ Adobe PostScript Printer Drivers and PPD files
Adobe PostScript printer drivers allow the computer to communicate with
the printer using a printer language. PPD files allow the printer driver to enable specific printer functions.
❖ PPD files
PPD files allow the printer driver to enable specific printer functions.
48
Software and Utilities Included on the CD-ROM
❖ HDI driver
The HDI driver for the AutoCAD 2000 series is provided to work specifically
with the AutoCAD 2000 series of CAD applications.
Using the HDI driver reduces data size during print out, enabling faster print
out.
Also, the HDI driver is specially designed for use in environments where AutoCAD 2000 applications are running.
Reference
“Preparing the Machine”, Printer Reference
“Using the HDI Driver for AutoCAD”, Printer Reference
PostScript 3 Supplement
3
TWAIN Driver
This section describes the file path and system requirements of the TWAIN driver.
This driver is required to scan an original using a scanner. To use the machine
as a network TWAIN scanner, this driver must be installed.
❖ File path
The driver is included in the following folder on the CD-ROM labeled “Scanner Driver and Utilities” provided with this machine:
\DRIVERS\TWAIN
❖ System requirements
• Hardware
PC/AT-compatible machines that support the following operating system
properly
• Operating system
Microsoft Windows 95/98/Me
Microsoft Windows 2000/XP
Microsoft Windows NT 4.0
Microsoft Windows Server 2003
• Display resolution
800×600 pixels, 256 colors or higher
Note
❒ Under Windows NT with RISC-based processors (MIPS R series, Alpha
AXP, or PowerPC), this driver is not supported.
49
Appendix
DeskTopBinder Lite
This section explains the file path and system requirements of DeskTopBinder
Lite.
DeskTopBinder is to be installed on the client computers for integration and
management of various kinds of files such as scan files, files created with applications, and existing scan files. This software allows you to use various functions
for stored scan files such as viewing stored files. Also, with the ScanRouter delivery software, you can view the files stored in in-trays of the delivery server,
or use other functions for stored files.
For details about the software installed with DeskTopBinder Lite, see “DeskTopBinder Lite”, Scanner Reference.
3
❖ File path
The software is included in the following folder on the CD-ROM labeled
“Scanner Driver and Utilities” provided with this machine:
\UTILITY\DESKV2
❖ System requirements
• Hardware
PC/AT-compatible machines that support the operating system properly
• Operating system
When installing all functions of Desk Navigator
Microsoft Windows 98SE/Me/2000 Professional SP1 or later/2000 Server
SP1 or later/2000 Advanced Server SP1 or later/XP Professional/XP
Home Edition
When installing only SmartDeviceMonitor for Client
Microsoft Windows 95 SP1/98/98SE/Me/2000 Professional SP1 or later/2000 Server SP1 or later/XP Professional/XP Home Edition
Microsoft Windows NT 4.0 SP5 or later
Reference
Scanner Reference
50
Software and Utilities Included on the CD-ROM
SmartDeviceMonitor for Admin
SmartDeviceMonitor for Admin is an application that uses TCP/IP and IPX/SPX
to monitor network printers. It can monitor multiple network printers using
IPv4 address. We recommend that network administrators use this application.
❖ File path
SmartDeviceMonitor for Admin is stored in the following folder in the CDROM labeled “Printer Drivers and Utilities”:
NETWORK\DEVMON\ADMIN\DISK1
Operating system
Windows 95 / 98 / Me
3
Protocol stack
TCP/IP provided with Windows 95 / 98 / Me
IPX/SPX provided with Windows 95 / 98 / Me
NetWare Client provided with Windows 95 / 98
Novell Client provided with Windows 95 / 98
Windows 2000
TCP/IP provided with Windows 2000
IPX/SPX provided with Windows 2000
NetWare Client provided with Windows 2000
Novell Client provided with Windows 2000 or Windows NT
Windows XP
TCP/IP provided with Windows XP
IPX/SPX provided with Windows XP
NetWare Client provided with Windows XP
Novell Client provided with Windows XP
Windows Server 2003
TCP/IP provided with Windows Server 2003
IPX/SPX provided with Windows Server 2003
NetWare Client provided with Windows Server 2003
Novell Client provided with Windows Server 2003
Windows NT 4.0
TCP/IP provided with Windows NT
IPX/SPX provided with Windows NT
Client Service for NetWare provided with Windows NT
Novell Client provided with Windows 2000 or Windows NT
❖ Available functions
SmartDeviceMonitor for Admin has the functions to check the followings:
• Printer supplies such as paper or ink
• Results of print jobs executed from the computer
Reference
Network Guide
SmartDeviceMonitor for Admin Help
51
Appendix
DeskTopBinder-SmartDeviceMonitor for Client
DeskTopBinder-SmartDeviceMonitor for Client allows you to manage and print
various data such as files created with an application, images scanned with a
scanner, and existing images as one document.
❖ File path
DeskTopBinder-SmartDeviceMonitor for Client is stored in the following
folder on the CD-ROM labeled “Printer Drivers and Utilities”:
NETWORK\DEVMON\CLIENT\DISK1
3
❖ Operating environment of the printer driver
• Applicable computer
Machines which properly work with the applicable OS below. PC/AT
compatible machine.
• Applicable OS
Microsoft Windows 95/98/Me
Microsoft Windows 2000/XP
Microsoft Windows NT 4.0
Microsoft Windows Server 2003
Note
❒ See “DeskTopBinder Lite”, Scanner Reference or Help of DeskTopBinderSmartDeviceMonitor for Client.
❒ DeskTopBinder includes SmartDeviceMonitor for Client. See Help of DeskTopBinder-SmartDeviceMonitor for Client.
52
Installing the Operating Instructions
Installing the Operating Instructions
The supplied “Manuals” CD-ROM contains HTML format manuals. Install the
manuals you want to use.
Important
❒ The system requirements for installing the manuals are as follows:
• Operating System: Windows 95/98/Me, Windows 2000/XP, Windows
Server 2003, or Windows NT4.0
• Minimum Display Resolution: 800×600 pixels
❒ Recommended Browser:
• Microsoft Internet Explorer 4.01 SP2 or later
• Netscape 6.2 or later
❒ A simplified manual is displayed if you are using Internet Explorer 3.02 or
Netscape Navigator 4.05 or later versions.
❒ HTML manuals can also be viewed on a Macintosh.
3
A Select a language and a product, and then click [OK].
B Click [Install manuals].
If you want to read manuals from the CD-ROM, click [Read HTML manuals] or
[Read PDF manuals].
C Install the manual you require according to the displayed instructions.
D When installation is complete, click [Finish].
E Click [Finish].
Note
❒ If you cannot install a manual, copy the “Manual” folder to your computer’s hard drive, and then run “Setup.exe”.
❒ To delete an installed manual, on the [Start] menu, click [Programs], then
[Product Name], and then uninstall the data.
❒ If you are installing the manuals on a Macintosh, open the “Manuals.htm”
file on the CD-ROM.
53
Appendix
PDF Manuals
The supplied “Manuals” CD-ROM contains PDF versions of the HTML user
manuals.
❖ File path
The PDF manuals are in the following folder on the CD-ROM:
MANUAL_PDF\ENGLISH
Note
❒ To view the PDF manuals, you need to have Adobe Acrobat or Adobe Reader
installed on your computer.
3
54
Opening the Installed Operating Instructions
Opening the Installed Operating
Instructions
This section explains how to open installed manuals.
3
Opening from the Icon
This section explains how to open a manual using its desktop icon.
A Double-click the icon on your desktop.
The browser opens and the manual appears.
Opening from the [Start] Menu
This section explains how to open a manual from the [Start] menu.
A On the [Start] menu, point to [Programs] (Windows XP: [All Programs]), then
[Product Name], and then click the manual you want to view.
The browser opens, and then the manual appears.
Note
❒ Depending on the settings made during installation, menu folder names
may differ.
55
Appendix
Opening from the CD-ROM
This section explains how to open a manual from the supplied “Manuals” CDROM.
A Click [Read manuals].
B Click the title of the manual you want to view.
The browser opens, and then the manual appears.
3
56
Specifications for the Main Unit
Specifications for the Main Unit
❖ Configuration:
Desktop
❖ Photosensitivity type:
OPC drum
❖ Original scanning:
Original feed image scanning over fixed contact image sensor
3
❖ Copy process:
Dry electrostatic transfer system
❖ Development:
Dry two-component magnetic brush development system
❖ Fusing:
Heating roll pressure system
❖ Resolution:
600 dpi
❖ Original reference position:
Center
❖ Warm-up time:
Less than 2 minutes (23°C)
❖ Originals:
Sheet
❖ Original size (W × L):
• Metric version:
Size that can be placed: 210 × 182 mm-960 × 15000 mm
Scan size: 210 × 210 mm-914 × 15000 mm
• Inch version:
Size that can be placed: 81/2" × 7" -371/2" × 590" (49.2 ft.)
Scan size: 81/2" × 81/2"-36" × 590" (49.2 ft.)
57
Appendix
❖ Paper size (W × L):
• Metric version:
Paper roll: 210 × 279 mm-914 × 15000 mm
Bypass tray: 210 × 257 mm-914 × 2000 mm
Cut paper: A3K, B4 JIS (Japanese Industrial Standard)K, A4K
• Inch version:
EK-AK
Paper roll: 81/2" × 11"-36" × 590"
Bypass tray: 81/2" × 10"-36" × 78"
Cut paper: 12" × 18"K, 11" × 17"K, 8 1/2" × 14"K, 8 1/2" × 13"K, 8 1/2" × 11"K
3
❖ Paper weight:
52.3 - 110 g/m2 (13.9 - 29.3 lb.)
❖ Non-reproduction area (Copier):
• Metric version:
• Top: 8 mm
• Bottom: 8 mm
• Left and Right: 2 ± 2 mm (less than 5 mm on either side)
• Inch version:
• Top: 0.32"
• Bottom: 0.32"
• Left and Right: 0.08" ± 0.08" (less than 0.20" on either side)
❖ First copy time:
• Metric version:
18 seconds (A1L, paper roll tray), 19 seconds (A3K, cut paper tray)
• Inch version:
18 seconds (DL, paper roll tray), 19 seconds (BK, cut paper tray)
❖ Copying speed (full-size copying):
• Type 1:
2 copies/minute (A0 (E)K), 4 copies/minute (A1 (D)L)
• Type 2:
3 copies/minute (A0 (E)K), 6 copies/minute (A1 (D)L)
58
Specifications for the Main Unit
❖ Reproduction ratio:
• Metric version:
Full-size: 100%
Reduce: 25.0%, 35.4%, 50.0%, 70.7%
Enlarge: 141.4%, 200.0%, 282.8%, 400.0%
Zoom: 25.0-400.0% (0.1% increments)
• Inch version (Engineering):
Full-size: 100%
Reduce: 25.0%, 32.4%, 50.0%, 64.7%
Enlarge: 129.4%, 200.0%, 258.8%, 400.0%
Zoom: 25.0-400.0% (0.1% increments)
• Inch version (Architecture):
Full-size: 100%
Reduce: 25.0%, 33.3%, 50.0%, 66.7%
Enlarge: 133.3%, 200.0%, 266.7%, 400.0%
Zoom: 25.0-400.0% (0.1% increments)
3
❖ Maximum continuous copy run:
99 sheets
❖ Copy paper feed method:
Bypass tray
❖ Power consumption:
Type 1 (Full system *1 )
Type 2 (Full system *1 )
Warm-up
1.4 kw
1.4 kw
Stand-by (Anti-humidity
heater = OFF)
0.110 kw
0.110 kw
Stand-by (Anti-humidity
heater = ON)
0.190 kw
0.190 kw
Copying
0.94 kw
0.96 kw
Maximum
1.5 kw
1.5 kw
*1
Main unit with the Roll Feeder Type 240B, Paper Cassette Type 240, Printer Option Type W3600, Scanner Option Type W3600, File Format Converter Type C,
USB Host Interface Unit Type 7300, and Gigabit Ethernet Board Type A
❖ Dimensions (W×D×H):
1080 × 637 × 580 mm, 43" × 25" × 23"
❖ Space for main unit (W × D):
2280 × 1237 mm, 89.8" × 48.8"
59
Appendix
❖ Noise emission:
Sound power level:
Stand-by
Less than 40 dB(A)
Copying
Less than 68 dB(A)
Sound pressure level:
Stand-by
Less than 30 dB(A)
Copying
Less than 57 dB(A)
• Sound power level and sound pressure level are actual values measured in
accordance with ISO 7779.
• Sound power level and sound pressure level are measured from the position of the bystander.
3
❖ Weight:
Approx. 107 kg, 235.9 lb.
❖ HDD:
80 GB or more
• Capacity for Document Server
26 GB
• Capacity for memory sorting
14 GB
• Capacity for others
0.8 GB or more
60
Specifications for Options
Specifications for Options
Roll Feeder Type 240 A or 240 B
❖ Paper sizes:
Width: 210 – 914 mm, length: 150 m (diameter: 175 mm)
❖ Paper widths:
• Metric version
210 mm, 257 mm, 297 mm, 364 mm, 420 mm, 440 mm, 490 mm, 515 mm,
594 mm, 620 mm, 625 mm, 660 mm, 680 mm, 707 mm, 728 mm, 800 mm,
841 mm, 880 mm, 914 mm
• Inch version
81/2", 9", 11", 12", 17", 18", 22", 24", 30", 34", 36"
3
❖ Power consumption
90 W (supplied by main unit)
❖ Dimensions (W × D × H):
1080 × 700 × 720 mm, 43" × 27" × 28"
❖ Weight:
Approx. 70 kg (Type 240 A), 72 kg (Type 240 B)
Paper Cassette Type 240
❖ Paper weight:
64 – 105 g/m2.
❖ Paper sizes:
A3K, B4 JISK, A4K, 12" × 18"K, 11" × 17"K, 8 1/2" × 14"K, 8 1/2" × 13"K,
8 1/2" × 11"K
❖ Power consumption (Max):
Approx. 20 W (supplied by main unit)
❖ Paper capacity:
250 sheets
❖ Dimensions (W × D × H):
620 × 570 × 130 mm, 24" × 22" × 5"
❖ Weight:
Approx. 6 kg
61
Appendix
Table Type 240
❖ Dimensions (W × D × H):
1080 × 700 × 720 mm, 43" × 27" × 28"
❖ Weight:
Approx. 34 kg
Carrier Sheet
3
Allows you to load bent, folded, creased, thin, or pasted originals using this
sheet.
IEEE 802.11b Interface Unit Type H
❖ Transmission spec.:
Based on IEEE 802.11b (wireless LAN)
❖ Protocol:
TCP/IP, IPX/SPX, AppleTalk
Note
❒ SmartDeviceMonitor and Web Image Monitor are supported.
❖ Data transfer speed:
Auto select from the following speed
1 Mbps, 2 Mbps, 5.5 Mbps, 11 Mbps
❖ Frequency range:
• Inch version:
2412 - 2462 MHz (1 - 11 channels)
• Metric version:
2412 - 2472 MHz (1 - 13 channels)
❖ Transmittable distance:
1 Mbps: 400 m
2 Mbps: 270 m
5.5 Mbps: 200 m
11 Mbps: 140 m
Note
❒ These figures are a guideline for outdoor use. In general, the transmittable
distance indoors is 10 - 100 m, depending on environment.
❖ Transmission mode:
Ad hoc, and infrastructure mode
62
Specifications for Options
USB Host Interface Unit Type 7300
❖ Interface Connector:
USB 1.1 host interface A type
❖ Data Transmission Speed:
12 Mbps (Full speed)
❖ Distance Between Devices:
2.5 m
3
Gigabit Ethernet Board Type A
❖ Interface Connector:
• Ethernet (10Base-T, 100Base-TX, 1000Base-T)
• USB 2.0
It requires a USB computer port and cable that support USB 2.0.
❖ Data Transmission Speed:
• Ethernet: 1000 Mbps, 100 Mbps, 10 Mbps
• USB: 480 Mbps (High speed: USB 2.0), 12 Mbps (Full speed)
❖ Protocol:
TCP/IP, IPX/SPX, AppleTalk
❖ Distance Between Devices:
• Ethernet: 100 m
• USB: 5 m
63
Appendix
Copy Paper
This section describes recommended paper sizes and types, unusable paper, paper storage, and handling paper.
Recommended Paper Sizes and Types
The following limitations apply to each tray:
Important
❒ If you use damp or curled paper, a paper jam may occur.
3
❖ Metric version
Where paper is
placed
Paper roll tray
(optional)
Paper type
Paper roll
Plain paper
52.3 – 110 g/m
(13.9 – 29.3 lb)
Paper size
2
Number of
sheets that
can be
placed
–
Diameter: less than 175 mm
Core: 75.7 mm – 77 mm
Width: 210, 257, 297, 364, 420, 440,
490, 515, 594, 620, 625, 660, 680,
707, 728, 800, 841, 880, 914 mm
Roll length: less than 150 m
Paper roll tray
(optional)
Translucent paper
Paper roll
–
Diameter: less than 175 mm
Core: 75.7 mm – 77 mm
Width: 210, 257, 297, 364, 420, 440,
490, 515, 594, 620, 625, 660, 680,
707, 728, 800, 841, 880, 914 mm
Roll length: less than 150 m
Paper roll tray
(optional)
Recycled paper
Paper roll
–
Diameter: less than 175 mm
Core: 75.7 mm – 77 mm
Width: 210, 257, 297, 364, 420, 440,
490, 515, 594, 620, 625, 660, 680,
707, 728, 800, 841, 880, 914 mm
Roll length: less than 150 m
Paper roll tray
(optional)
Film
Paper roll
Diameter: less than 175 mm
Core: 75.7 mm – 77 mm
Width: 210, 257, 297, 364, 420, 440,
490, 515, 594, 620, 625, 660, 680,
707, 728, 800, 841, 880, 914 mm
Roll length: less than 150 m
64
–
Copy Paper
Where paper is
placed
Paper type
Cut paper tray
(optional)
Plain paper
Cut paper tray
(optional)
Bypass tray
Paper size
Number of
sheets that
can be
placed
A3K, B4 JISK, A4K
250 sheets
Recycled paper
A3K, B4 JISK, A4K
250 sheets
Plain paper
A0K, A1KL, A2KL
1 sheet
g/m2
52.3-110
(13.9-29.3 lb)
52.3-110 g/m
(13.9-29.3 lb)
2
3
A3KL, A4K, B1 JISK,
B2 JISKL, B3 JISKL, B4 JISKL
Paper width: 210 – 914 mm
Paper length: 257 – 2000 mm
Bypass tray
Translucent paper
A0K, A1KL, A2KL
1 sheet
A3KL, A4K, B1 JISK,
B2 JISKL, B3 JISKL, B4 JISKL
Paper width: 210 – 914 mm
Paper length: 257 – 2000 mm
Bypass tray
Film
A0K, A1KL, A2KL
1 sheet
A3KL, A4K, B1 JISK,
B2 JISKL, B3 JISKL, B4 JISKL
Paper width: 210 – 914 mm
Paper length: 257 – 2000 mm
65
Appendix
❖ Inch version
Where paper is
placed
Paper roll tray
(optional)
Paper type
Paper roll
Plain paper
52.3 – 110 g/m
(13.9 – 29.3 lb)
Paper size
2
Number of
sheets that
can be
placed
–
Diameter: 6.7" or less
Internal diameter: 2.98" - 3.03"
Width: 81/2", 9", 11", 12", 17",
18", 22", 24", 34", 36"
3
Roll length: 590" (49.2 ft.) or less
Paper roll tray
(optional)
Translucent paper
(vellum)
Paper roll
–
Diameter: 6.7" or less
Internal diameter: 2.98" - 3.03"
Width: 81/2", 9", 11", 12", 17",
18", 22", 24", 34", 36"
Roll length: 590" (49.2 ft.) or less
Paper roll tray
(optional)
Film
Paper roll
–
Diameter: 6.7" or less
Internal diameter: 2.98" - 3.03"
Width: 81/2", 9", 11", 12", 17",
18", 22", 24", 34", 36"
Roll length: 590" (49.2 ft.) or less
Cut paper tray
(optional)
Plain paper
g/m2
52.3-110
(13.9-29.3 lb)
12" × 18"K, 11" × 17"K,
81/2"×14"K, 81/2"×13"K,
81/2"×11"K
250 sheets
Cut paper tray
(optional)
Recycled paper
12" × 18"K, 11" × 17"K,
81/2"×14"K, 81/2"×13"K,
81/2"×11"K
250 sheets
Bypass tray
Plain paper
• Engineering
E (34"×44")K,
D (22"×34")KL,
C (17"×22")KL,
B (11"×17")KL,
A (81/2"×11")K
1 sheet
g/m2
52.3-110
(13.9-29.3 lb)
• Architecture
E (36"×48")K,
D (24"×36")KL,
C (18"×24")KL,
B (12"×18")KL,
A (9"×12")K
66
Copy Paper
Where paper is
placed
Bypass tray
Paper type
Translucent paper
(vellum)
Paper size
• Engineering
E (34"×44")K,
D (22"×34")KL,
C (17"×22")KL,
B (11"×17")KL,
A (81/2"×11")K
Number of
sheets that
can be
placed
1 sheet
• Architecture
E (36"×48")K,
D (24"×36")KL,
C (18"×24")KL,
B (12"×18")KL,
A (9"×12")K
Bypass tray
Film
• Engineering
E (34"×44")K,
D (22"×34")KL,
C (17"×22")KL,
B (11"×17")KL,
A (81/2"×11")K
3
1 sheet
• Architecture
E (36"×48")K,
D (24"×36")KL,
C (18"×24")KL,
B (12"×18")KL,
A (9"×12")K
Note
❒ Load paper into the cut paper tray with the print side down.
❒ Load paper into the bypass tray with the print side up.
❒ You must manually specify the size of custom size paper when loading it on
the bypass tray.
❒ If multiple-sheet jams occur, load the paper sheet by sheet.
❒ Do not use paper designed for inkjet printers, as these may stick to the fusing
unit and cause a misfeed.
❒ If you load paper of the same size in the same orientation in two or more
trays, the machine automatically shifts to the other tray - except the bypass
tray - when the first tray in use runs out of paper. This function is called “Auto
Tray Switching”. (However, if one tray has recycled or special paper, the settings of the other trays must be the same for Auto Tray Switching to work.)
This saves interrupting a copy run to replenish paper when making a large
number of copies. See “Copier / Document Server Features”, and “Tray Paper Settings”, General Settings Guide.
Reference
“Copier / Document Server Features”, General Settings Guide
“Tray Paper Settings”, General Settings Guide
67
Appendix
Paper roll
• If humidity is high, and the paper roll has expanded due to moisture, be sure
to cut off approximately 1000 mm (40"), before making copies or printing.
• Use a paper roll that has a black core.
• When a paper roll of 90 g/m2 (24 lb) or 110 g/m2 (29.3 lb) paper is used and
there is little paper left on the roll, image may be faint near the leading and/or
trailing edge, or an image may be doubled. To prevent this, set 3-5 mm (0.11"0.19") margins from the leading and trailing edges.
3
Reference
“Margin Adjustment”, Copy/Document Server Reference
Notes on using translucent paper
Smooth out any curls in the paper before loading it.
Load translucent paper lengthways when possible.
Hemmed paper
When using hemmed paper, wrinkles and other problems may occur on paper.
Use the following procedure when copying or printing onto hemmed paper:
• Use the bypass tray.
• Make sure the paper is straight, and align the paper guides of the bypass tray
to the paper size.
• Load only one sheet at a time.
• Remove each paper from the output tray and place it on a flat surface.
Note
❒ Due to the thickness of hemmed paper, image may be faint, blurred, or wrinkled, and paper jams may occur. You may be able to prevent this by copying
or printing on the rear surface of the paper or feeding the bottom of the paper
in first.
Reference
“Copying from the Bypass Tray”, Copy/Document Server Reference
Unusable Paper
This section describes paper unusable on this machine.
R CAUTION:
• Do not use aluminum foil, carbon paper, or similar conductive paper to
avoid a fire or machine failure.
68
Copy Paper
Important
❒ To prevent faults, do not use any of the following kinds of treated paper:
• Paper for inkjet printers
• Thermal fax paper
• Art paper
• Aluminum foil
• Carbon paper
• Conductive paper
• OHP transparencies for color copying
• Paper with perforated lines
• Tab stock
• Envelopes
❒ Faults can occur if you copy or print onto sides that are already printed. Take
care to copy or print onto unprinted sides only.
3
Note
❒ To prevent misfeeds, do not use the following kinds of paper:
• Bent, folded, or creased paper
• Torn paper
• Slippery paper
• Perforated paper
• Rough paper
• Thin paper with little stiffness
• Paper with a dusty surface
• Adhesive labels
• OHP transparencies
❒ If you copy or print on to rough grain paper, the output image might be
blurred.
❒ When using non-recommended paper (especially chemically treated paper,
hemmed paper, film), paper jams may occur, paper wrinkle, or output image
deteriorate.
❒ Do not use paper that has already been copied or printed on.
❒ Do not copy or print on both sides of paper.
❒ If you use paper roll that is not marked with a black core, paper jams might
occur when the paper ends.
❒ Do not use paper printed onto with an inkjet printer, as it may become entangled or jammed, which may damage the machine. In the worst event, this
may cause fire, depending on paper and ink type combination.
69
Appendix
Paper Storage
This section describes how to store paper.
• When storing paper, the following precautions should always be followed:
• Do not store paper where it will be exposed to direct sunlight.
• Avoid storing paper in humid areas (humidity: 70% or less).
• Store on a flat surface.
• Do not store paper vertically.
• Under high temperature and humidity conditions, or low temperature and
humidity conditions, store paper in plastic bags.
3
Reference
p.70 “Handling Paper”
Handling Paper
This section describes handling paper.
Depending on the humidity of the storage environment, handle paper as follows:
ATY039S
Note
❒ If humidity is above 70%, turn on the anti-humidity heater.
Reference
p.39 “Anti-humidity Heater Switch”
70
INDEX
A
Alert indicator, 25
Anti-humidity heater switch, 17, 39
Authentication Screen, 29
Auto Off, 38
Available Characters, 41
F
File Format Converter, 23
Folding finisher, 22
Function keys, 25
G
Gigabit Ethernet (1000BASE-TX), 23, 63
B
Bypass tray, 17
Bypass tray's paper guide, 17
H
Handling paper, 70
HDI driver, 48
How to Enter Text, 42
C
Carrier sheet, 23, 62
CAUTION, 6, 9
Changing Modes, 33
Clear Modes key, 25
Clear/Stop key, 25
Computer, vii
Control Panel, 29, 30, 31
Copier, iii
Copy Paper, 64
Cut paper tray, 17, 22, 61
D
DataOverWriteSecurity Unit, 23
Date-in indicator, 25
DeskTopBinder Lite, 50
DeskTopBinder-SmartDeviceMonitor
for Client, 52
Display panel, 25, 27
Document Server, iv
Dos and Don'ts, 45
E
Energy Saver, 38
Energy Saver key, 25
Energy-saving, 13
ENERGY STAR Program, 13
Entering Text, 41
Enter key (# key), 25
Entry screen, 41
Error indicator, 25
External Options, 22
I
IEEE 802.11b wireless LAN board, 23, 62
Installing the Operating Instructions, 53
Interrupt key, 25
K
Key arrangement, 41
L
Login, 30, 32
Login/Logout key, 25
Logout, 31, 32
Lower output auxiliary guide, 17
Lower output exit, 17
Lower output stacker, 17
Lower output tray, 17
Low power mode, 13, 38
M
Main power, 35
Main power indicator, 25
Main power switch, 17
Main unit, 17, 57
Main unit front cover, 17
Main unit opening lever, 17
Manuals for This Machine, i
N
Names of major options, 5
Network, v
Number keys, 25
71
O
Opening from the CD-ROM, 56
Opening from the Icon, 55
Opening from the Start Menu, 55
Opening the Installed Operating
Instructions, 55
Operation switch, 17, 25
Options, 22, 61
Original cover, 17
Original exit, 17
Original exit switching lever, 17
Original guide, 17
Original hanger, 22
Original output guide, 17
Original switching lever, 17
Original table, 17
Other Options, 23
P
Paper holder, 23
Paper roll tray, 17, 61
Paper roll tray 1, 22, 61
Paper roll tray 2, 22, 61
Paper Sizes, 64
Paper Storage, 70
Paper Types, 64
PDF Manuals, 54
Positions of WARNING and
CAUTION labels, 9
PostScript 3, 48
Power, 35
PPD, 48
Printer, iii
Printer Driver, 30, 32, 48
Printer unit, 23
Program key, 25
R
Rear stacker, 22
Recommended Paper Sizes and Types, 64
RPCS, 48
S
Sample Copy key, 25
Scanner, iii, v
Scanner Stop key, 17
Scanner unit, 23
Screen contrast knob, 25
Simplified Display, 28
Simplified Display key, 25, 28
Sleep mode, 13
SmartDeviceMonitor for Admin, 51
SmartDeviceMonitor for Client, 52
Software and Utilities Included on the
CD-ROM, 47
Specifications for Options, 61
Specifications for the Main Unit, 57
Start key, 25
Symbols, 4
System Reset, 34
T
Table, 22, 62
Terms, 5
Turning Off the Main Power, 37
Turning Off the Power, 36
Turning On the Main Power, 35
Turning On the Power, 36
Turn off, 35
Turn on, 35
TWAIN Driver, 49
U
Unusable Paper, 68
Upper original stacker, 17
Upper output exit, 17
Upper output guide, 17
Upper output stacker, 17
USB host board, 23, 63
User Code Authentication, 29, 30
User Text, 43
User Tools/Counter key, 25
V
Ventilation holes, 17
W
WARNING, 6, 9
Web Image Monitor, vii, 32
72
EN
USA
B286-7787
In accordance with IEC 60417, this machine uses the following symbols for the main power switch:
a means POWER ON.
c means STAND BY.
In accordance with IEC 60417, this machine uses the following symbols for the anti-humidity heater
switch:
a means POWER ON.
b means POWER OFF.
Trademarks
Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe®, PostScript®, Acrobat®, are registered trademarks of Adobe Systems Incorporated.
NetWare is a registered trademark of Novell, Inc.
AppleTalk, Macintosh, and Mac OS are trademarks of Apple Computer, Inc., registered in the U.S. and
other countries.
PowerPC® is a trademark of International Business Machines Corporation in the United States, other
countries, or both.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
•
The product name of Windows® 95 is Microsoft® Windows® 95
•
The product name of Windows® 98 is Microsoft® Windows® 98
•
The product name of Windows® Me is Microsoft® Windows® Millennium Edition (Windows Me)
•
The product names of Windows® 2000 are as follows:
Microsoft® Windows® 2000 Advanced Server
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Professional
•
The product names of Windows® XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
•
The product names of Windows Server® 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
•
The product names of Windows NT® are as follows:
Microsoft® Windows NT® Server 4.0
Microsoft® Windows NT® Workstation 4.0
Copyright © 2007
Operating Instructions About This Machine
Type for 2404WD/GWD2004/LW324/Aficio MP W2400
Type for 2406WD/GWD2006/LW326/Aficio MP W3600
EN USA B286-7787
Operating Instructions
General Settings Guide
1
Connecting the Machine
2
System Settings
3
Copier / Document Server Features
4
Printer Features
5
Scanner Features
6
Registering Addresses and Users for Scanner Functions
7
Other User Tools
8
Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine.
Notes:
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.
Caution:
Use of controls or adjustments or performance of procedures other than those specified in this manual
might result in hazardous radiation exposure.
Notes:
The model names of the machines do not appear in the following pages. Check the type of your machine before reading this manual.
•
Type 1: 2404WD/GWD2004/LW324/Aficio MP W2400
•
Type 2: 2406WD/GWD2006/LW326/Aficio MP W3600
Certain types might not be available in some countries. For details, please contact your local dealer.
Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
Manuals for This Machine
Refer to the manuals that are relevant to what you want to do with the machine.
Important
❒ Media differ according to manual.
❒ The printed and electronic versions of a manual have the same contents.
❒ Adobe Acrobat Reader/Adobe Reader must be installed in order to view the
manuals as PDF files.
❒ Depending on which country you are in, there may also be html manuals. To
view these manuals, a Web browser must be installed.
❒ For details about the functions of RW-3600, refer to the manuals for this option.
❖ About This Machine
Be sure to read the Safety Information in this manual before using the machine.
This manual provides an introduction to the functions of the machine. It also
explains the control panel, preparation procedures for using the machine,
how to enter text, and how to install the CD-ROMs provided.
❖ General Settings Guide
Explains User Tools settings, and Address Book procedures such as registering e-mail addresses and user codes. Also refer to this manual for explanations on how to connect the machine.
❖ Troubleshooting
Provides a guide to solving common problems, and explains how to replace
paper, toner, and other consumables.
❖ Security Reference
This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered
with, or prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.
❖ Copy/ Document Server Reference
Explains Copier and Document Server functions and operations. Also refer to
this manual for explanations on how to place originals.
❖ Printer Reference
Explains Printer functions and operations.
❖ Scanner Reference
Explains Scanner functions and operations.
i
❖ Network Guide
Explains how to configure and operate the machine in a network environment, and use the software provided.
❖ Other manuals
• PostScript3 Supplement
• UNIX Supplement
• Manuals for DeskTopBinder Lite
DeskTopBinder Lite Setup Guide
DeskTopBinder Introduction Guide
Auto Document Link Guide
Note
❒ Manuals provided are specific to machine types.
❒ For "UNIX Supplement", please visit our Web site or consult an authorized
dealer.
❒ "PostScript3 Supplement" and "UNIX Supplement" include descriptions of
functions and settings that might not be available on this machine.
Product name
General name
DeskTopBinder Lite and DeskTopBinder
Professional*1
DeskTopBinder
ScanRouter EX Professional*1 and ScanRouter
EX Enterprise*1
the ScanRouter delivery software
*1 Optional
ii
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
How to Read This Manual .....................................................................................1
Symbols .....................................................................................................................1
Display Panel..........................................................................................................2
Accessing User Tools ...........................................................................................3
Changing Default Settings .........................................................................................3
Quitting User Tools ....................................................................................................4
Menu Protect..............................................................................................................4
1. Connecting the Machine
Connecting to the Interfaces ................................................................................5
Connecting to the Ethernet Interface .........................................................................6
Connecting to the USB Interface................................................................................8
Connecting to the IEEE 802.11b (Wireless LAN) Interface........................................9
Network Settings..................................................................................................12
Settings Required to Use the Printer........................................................................12
Settings Required to Use E-mail Function ...............................................................15
Settings Required to Use Scan to Folder Function ..................................................18
Settings Required to Use the Network Delivery Scanner.........................................20
Settings Required to Use Network TWAIN Scanner ................................................22
Settings Required to Use Document Server ............................................................24
Using Utilities to Make Network Settings .................................................................26
2. System Settings
General Features..................................................................................................35
Output tray settings ..................................................................................................40
Tray Paper Settings .............................................................................................41
Timer Settings ......................................................................................................46
Interface Settings.................................................................................................48
Network ....................................................................................................................48
IEEE 802.11b ...........................................................................................................51
Print List ...................................................................................................................53
File Transfer .........................................................................................................54
Administrator Tools.............................................................................................59
Programming the LDAP server...........................................................................68
To program / change the LDAP server ....................................................................68
To enter an identification name................................................................................68
To enter a server name............................................................................................69
To enter the search base .........................................................................................69
To enter a port number ............................................................................................69
To start SSL communication ....................................................................................70
To set authentication................................................................................................70
To enter the user name and password ....................................................................71
To test the connection..............................................................................................71
To set search conditions ..........................................................................................72
To set search options...............................................................................................72
To delete the programmed LDAP server .................................................................74
iii
3. Copier / Document Server Features
General Features..................................................................................................75
Reproduction Ratio..............................................................................................78
Edit ........................................................................................................................81
Stamp ....................................................................................................................86
Background Numbering ...........................................................................................86
Preset Stamp ...........................................................................................................86
User Stamp ..............................................................................................................88
Date Stamp ..............................................................................................................89
Page Numbering ......................................................................................................90
Input/Output .........................................................................................................92
Program / Delete Overlay Format .......................................................................93
Programming an Overlay Format.............................................................................93
Overwriting a Stored format .....................................................................................94
Deleting a Stored format ..........................................................................................95
Settings for the Document Server......................................................................96
4. Printer Features
List / Test Print .....................................................................................................97
Printing the Configuration Page ...............................................................................98
Maintenance ....................................................................................................... 100
System ................................................................................................................ 101
Host Interface ..................................................................................................... 104
PS Menu.............................................................................................................. 105
PDF Menu ...........................................................................................................106
5. Scanner Features
General Settings ................................................................................................107
Scan Settings ..................................................................................................... 109
Send Settings ..................................................................................................... 110
6. Registering Addresses and Users for Scanner Functions
Address Book..................................................................................................... 113
Managing names in the Address Book ..................................................................116
Sending e-mail by Quick Dial .................................................................................116
Sending scanned files to a shared folder directly...................................................116
Preventing unauthorized user access to shared folders from the machine ...........117
Managing users and machine usage .....................................................................117
Registering Names ............................................................................................ 118
Registering Names.................................................................................................118
Changing a Registered Name................................................................................120
Deleting a Registered Name ..................................................................................121
iv
Authentication Information ............................................................................... 122
Registering a User Code........................................................................................123
Changing a User Code...........................................................................................124
Deleting a User Code.............................................................................................126
Displaying the Counter for Each User....................................................................127
Printing the Counter for Each User ........................................................................128
Printing the Counter for All Users...........................................................................129
Clearing the Number of Prints................................................................................130
E-mail Destination.............................................................................................. 132
Registering an E-mail Destination..........................................................................132
Changing an E-mail Destination.............................................................................134
Deleting an E-mail Destination...............................................................................135
Registering Folders ........................................................................................... 137
Using SMB to Connect...........................................................................................138
Using FTP to Connect............................................................................................145
Using NCP to Connect ...........................................................................................150
Registering Names to a Group ......................................................................... 156
Registering a Group ...............................................................................................156
Registering Names to a Group...............................................................................158
Adding a Group to Another Group .........................................................................160
Displaying Names Registered in a Group ..............................................................162
Removing a Name from a Group ...........................................................................163
Deleting a Group Within Another Group ................................................................164
Changing a Group Name .......................................................................................166
Deleting a Group ....................................................................................................167
Registering a Protection Code ......................................................................... 168
Registering a Protection Code to a Single User.....................................................168
Registering a Protection Code to a Group User.....................................................170
Registering SMTP and LDAP Authentication.................................................. 172
SMTP Authentication .............................................................................................172
LDAP Authentication ..............................................................................................174
7. Other User Tools
Changing the Display Language ...................................................................... 177
Inquiry ................................................................................................................. 178
Counter ............................................................................................................... 180
Displaying the Total Counter..................................................................................180
v
8. Appendix
Copyrights ..........................................................................................................181
expat ......................................................................................................................181
NetBSD ..................................................................................................................182
Sablotron................................................................................................................184
JPEG LIBRARY .....................................................................................................184
SASL ......................................................................................................................185
MD4........................................................................................................................186
MD5........................................................................................................................186
Samba(Ver 3.0.4)...................................................................................................187
RSA BSAFE® .........................................................................................................187
Open SSL...............................................................................................................188
Open LDAP ............................................................................................................193
LibTIFF...................................................................................................................195
INDEX....................................................................................................... 196
vi
How to Read This Manual
Symbols
This manual uses the following symbols:
Indicates important safety notes.
Ignoring these notes could result in serious injury or death. Be sure to read these
notes. They can be found in the "Safety Information" section of About This Machine.
Indicates important safety notes.
Ignoring these notes could result in moderate or minor injury, or damage to the
machine or to property. Be sure to read these notes. They can be found in the
"Safety Information" section of About This Machine.
Indicates points to pay attention to when using the machine, and explanations
of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure
to read these explanations.
Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine’s display panel.
{}
Indicates the names of keys on the machine’s control panel.
1
Display Panel
The display panel shows machine status, error messages, and function menus.
The function items displayed serve as selector keys. You can select or specify an
item by lightly pressing them.
When you select or specify an item on the display panel, it is highlighted like
. Keys appearing as
cannot be used.
Important
❒ A force or impact of more than 30 N (about 3 kgf) will damage the display
panel.
To display the following screen, press the {User Tools/Counter} key to display the
User Tools menu, and then press [System Settings].
Using the System Settings menu screen as an example, this section explains how
to use the machine’s display panel.
ATM007S
1. The menu tabs for various settings appear. To display the setting
you want to specify or change, press
the appropriate menu tab.
2. A list of settings appears. To specify or change a setting, press the appropriate key in the list.
3. Press this to quit the User Tools
menu.
2
Accessing User Tools
This section describes how to access User Tools menu.
User Tools allow you to change or set defaults.
Note
❒ Operations for system settings differ from normal operations. Always quit
User Tools when you have finished.
❒ Any changes you make with User Tools remain in effect even if the main
power switch or operation switch is turned off, or the {Energy Saver} or {Clear
Modes} key is pressed.
Reference
p.4 “Quitting User Tools”
Changing Default Settings
This section describes how to change the settings of User Tools.
Important
❒ If Administrator Authentication Management is specified, contact your administrator.
A Press the {User Tools/Counter} key.
ATM006S
B Select the menu.
To change the System Settings, press [System Settings].
To change the Copier / Document Server Features, press [Copier / Document
Server Features].
To change the Printer Features, press [Printer Features].
To change the Scanner Features, press [Scanner Features].
To change the language used on the display, press [Español].
To check the telephone numbers to contact for repairs, or to order consumables, press [Inquiry].
To check the counter, press [Counter].
C Select the user tool you want to change.
3
D Change settings by following instructions on the display, and then press
[OK].
Note
❒ To cancel changes made to settings and return to the initial display, press
the {User Tools/Counter} key.
Reference
p.35 “System Settings”
p.75 “Copier / Document Server Features”
p.97 “Printer Features”
p.107 “Scanner Features”
p.177 “Other User Tools”
Quitting User Tools
This section describes how to end User Tools.
A Press the {User Tools/Counter} key.
ATM006S
Note
❒ You can also quit User Tools by pressing [Exit].
Menu Protect
Using Menu Protect, you can prevent unauthenticated users from changing the
user tools. Menu Protect can be specified for each of the following user tools
menus.
• Copier / Document Server Features
• Printer Features
• Scanner Features
For details, consult your administrator.
4
1. Connecting the Machine
This chapter describes how to connect the machine to the network and specify
the network settings.
Connecting to the Interfaces
This section describes how to identify the machine’s interface and connect the
machine according to the network environment.
ATM001S
1. 10BASE-T/100BASE-TX port
Port for connecting the 10BASE-T or
100BASE-TX cable
2. USB2.0 port
Port for connecting the USB2.0 interface
cable
3. Wireless LAN port (optional)
Port for using the wireless LAN
Note
❒ You cannot install these two options
at the same time: IEEE 802.11b wireless LAN board, Gigabit Ethernet
board.
❒ If the optional GigaBit Ethernet board
is installed, only the Ethernet interface
and USB interface on the board can be
used.
5
Connecting the Machine
Connecting to the Ethernet Interface
This section describes how to connect 10BASE-T or 100BASE-TX cable to the Ethernet interface.
1
Important
❒ If the main power switch is on, turn it off.
A A ferrite core for the Ethernet cable is supplied with this machine. Make a
loop in the cable about 4.5 cm (1.8") (1) from the machine end of the cable.
Attach the ferrite core.
AEV047S
B Make sure the main power switch of the machine is off.
C Connect the Ethernet interface cable to the 10BASE-T/100BASE-TX port.
ATL012S
D Connect the other end of the Ethernet cable to a network connection device
such as a hub.
6
Connecting to the Interfaces
E Turn on the main power switch of the machine.
1
ATM002S
Note
❒ For details about installing the printer driver, see "Preparing the Machine",
Printer Reference.
Reference
"Turning On the Power", About This Machine
"Preparing the Machine", Printer Reference
7
Connecting the Machine
Connecting to the USB Interface
This section describes how to connect the USB2.0 interface cable to the USB2.0
port.
1
A Connect the USB2.0 interface cable to the USB2.0 port.
ATL013S
B Connect the other end to the USB2.0 port on the host computer.
Note
❒ This machine does not come with a USB interface cable. Make sure you
purchase the appropriate cable for the machine and your computer.
❒ The USB2.0 interface board is supported by Windows Me / 2000 / XP,
Windows Server 2003, Mac OS X 10.3.3 or higher.
• For Windows Me:
Make sure to install “USB Printing Support". When used with Windows
Me, only a speed equal to that of USB1.1 is possible.
• For Mac OS:
When used with Mac OS X 10.3.3 or higher, a transfer speed of USB2.0
is supported.
❒ For details about installing the printer driver, see "Preparing the Machine",
Printer Reference.
Reference
"Preparing the Machine", Printer Reference
8
Connecting to the Interfaces
Connecting to the IEEE 802.11b (Wireless LAN) Interface
This section describes how to connect to the IEEE 802.11b (wireless LAN) interface.
1
Note
❒ Check the settings of the IPv4 address and subnet mask of this machine.
❒ For details about how to set the IPv4 address and subnet mask from the control panel of the machine, see "Interface Settings".
❒ Before using this machine with an IEEE 802.11b (Wireless LAN) connection,
you must select [IEEE 802.11b] in [LAN Type].
Reference
p.48 “Network”
Setup Procedure
This section describes how to setup IEEE 802.11b (wireless LAN) interface.
Set up IEEE 802.11b (wireless LAN) according to the following procedure:
ARH007S
9
Connecting the Machine
Note
❒ Select [802.11 Ad-hoc Mode] mode when connecting Windows XP as a wireless
LAN client using Windows XP standard driver or utilities, or when not using
the infrastructure mode.
1
❒ You can specify either "WEP" or "WPA" to the Security Method.
❒ Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode].
❒ If you select the [WPA] option for Security Method, select one of the following:
[WPA-PSK], [WPA], [WPA2-PSK], or [WPA2]. If you select [WPA-PSK] or [WPA2PSK], enter your PSK.
❒ For details about how to specify wireless LAN settings from the control panel
on the machine, see "IEEE 802.11b".
❒ For details about how to specify wireless LAN settings from other than the
control panel on the machine, see "Using Utilities to Make Network Settings".
❒ For details about the setting items, see "IEEE 802.11b".
Reference
p.26 “Using Utilities to Make Network Settings”
p.51 “IEEE 802.11b”
Checking the Connection
This section describes how to check the wireless LAN connection.
Make sure the LED of the IEEE 802.11b interface unit is lit.
❖ When using in infrastructure mode
ATL008S
1. If [LAN Type] on the [Interface Settings] / [Network] screen is not set to [IEEE
802.11b], it does not light, even if the main power is on.
2. If it is connected properly to the network, the LED is green when in infrastructure mode. If the LED is blinking, the machine is searching for devices.
10
Connecting to the Interfaces
❖ When using in ad hoc mode / 802.11 ad hoc mode
1
ATL008S
1. If the IEEE 802.11b interface unit is functioning, the LED lights up in orange.
2. If it is connected properly to the network, the LED is green when in ad hoc
mode or 802.11 ad hoc mode. If the LED is blinking, the machine is searching
for devices. The LED will light after a few seconds.
Print the configuration page to verify settings.
Note
❒ For more information about printing a configuration page, see "Print List".
Reference
p.98 “Printing the Configuration Page”
Checking the Signal
This section describes how to check the machine's radio wave status.
When using in infrastructure mode, you can check the machine's radio wave status using the control panel.
A Press [System Settings].
B Press [Interface Settings].
C Press [IEEE 802.11b].
D Press [Wireless LAN Signal].
The machine's radio wave status appears.
E After checking radio wave status, press [Exit].
F Press the {User Tools/Counter} key.
Reference
p.26 “Using Utilities to Make Network Settings”
p.51 “IEEE 802.11b”
11
Connecting the Machine
Network Settings
This section describes the network settings you can change with User Tools (System Settings). Make settings according to functions you want to use and the interface to be connected.
1
Important
❒ These settings should be made by the system administrator, or with the advice of the system administrator.
Settings Required to Use the Printer
This section lists the settings required for using the printer function.
Ethernet
This section lists the settings required for using the printer function with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".
Menu
12
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
Machine IPv6 Address
As required
Interface Settings/Network
IPv6 Gateway Address
As required
Interface Settings/Network
IPv6 Stateless Address Autoconfiguration
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Interface Settings/Network
NCP Delivery Protocol
As required
Interface Settings/Network
NW Frame Type
As required
Interface Settings/Network
LAN Type
Interface Settings/Network
SMB Computer Name
As required
Interface Settings/Network
SMB Work Group
As required
Interface Settings/Network
Ethernet Speed
As required
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Necessary
Necessary
Network Settings
Menu
Interface Settings/Network
User Tool
Machine Name
Setting Requirements
As required
Note
❒ IPv6 can be used only for the printer function.
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [LAN Type] is displayed when the wireless LAN board is installed. If Ethernet
and IEEE 802.11b (wireless LAN) are both connected, the selected interface
has priority.
1
Reference
p.48 “Interface Settings”
IEEE 802.11b (wireless LAN)
This section lists the settings required for using the printer function with an IEEE
802.11b (wireless LAN) connection.
For details about how to specify the settings, see "Interface Settings".
Menu
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
Machine IPv6 Address
As required
Interface Settings/Network
IPv6 Gateway Address
As required
Interface Settings/Network
IPv6 Stateless Address Autoconfiguration
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Interface Settings/Network
NCP Delivery Protocol
As required
Interface Settings/Network
NW Frame Type
As required
Interface Settings/Network
LAN Type
Interface Settings/Network
SMB Computer Name
As required
Interface Settings/Network
SMB Work Group
As required
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Interface Settings/Network
Machine Name
As required
Necessary
Necessary
13
Connecting the Machine
Menu
1
User Tool
Setting Requirements
Interface Settings/
IEEE 802.11b
Communication Mode
Necessary
Interface Settings/
IEEE 802.11b
SSID Setting
As required
Interface Settings/
IEEE 802.11b
Channel
As required
Note
❒ IPv6 can be used only for the printer function.
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface
board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
Reference
p.48 “Interface Settings”
14
Network Settings
Settings Required to Use E-mail Function
This section lists the settings required for sending e-mail.
1
Ethernet
This section lists the settings required for sending e-mail with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File
Transfer".
Menu
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Interface Settings/Network
Ethernet Speed
Interface Settings/Network
LAN Type
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
File Transfer
SMTP Server
File Transfer
SMTP Authentication
As required
File Transfer
POP before SMTP
As required
File Transfer
Reception Protocol
As required
File Transfer
POP3 / IMAP4 Settings
As required
File Transfer
Administrator's E-mail Address
As required
File Transfer
E-mail Communication Port
As required
File Transfer
Program / Change / Delete E-mail
Message
As required
File Transfer
Scanner Resend Interval Time
As required
File Transfer
Number of Scanner Resends
As required
Necessary
As required
Necessary
Necessary
15
Connecting the Machine
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [LAN Type] is displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
❒ When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3 / IMAP4 Settings.
❒ When setting POP before SMTP to [On], check POP3 port number in E-mail
Communication Port.
1
Reference
p.48 “Interface Settings”
p.54 “File Transfer”
IEEE 802.11b (wireless LAN)
This section lists the settings required for sending e-mail with an IEEE 802.11b
(wireless LAN) connection.
For details about how to specify the settings, see "Interface Settings" and "File
Transfer".
Menu
16
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Necessary
Interface Settings/Network
LAN Type
Necessary
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Interface Settings/
IEEE 802.11b
Communication Mode
Interface Settings/
IEEE 802.11b
SSID Setting
As required
Interface Settings/
IEEE 802.11b
Channel
As required
Interface Settings/
IEEE 802.11b
Security Method
As required
Necessary
Network Settings
Menu
User Tool
Setting Requirements
Interface Settings/
IEEE 802.11b
Transmission Speed
As required
File Transfer
SMTP Server
File Transfer
SMTP Authentication
As required
File Transfer
POP before SMTP
As required
File Transfer
Reception Protocol
As required
File Transfer
POP3 / IMAP4 Settings
As required
File Transfer
Administrator's E-mail Address
As required
File Transfer
E-mail Communication Port
As required
File Transfer
Program / Change / Delete E-mail
Message
As required
File Transfer
Scanner Resend Interval Time
As required
File Transfer
Number of Scanner Resends
As required
Necessary
1
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [LAN Type] is displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
❒ When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3 / IMAP4 Settings.
❒ When setting POP before SMTP to [On], check POP3 port number in E-mail
Communication Port.
Reference
p.48 “Interface Settings”
p.54 “File Transfer”
17
Connecting the Machine
Settings Required to Use Scan to Folder Function
This section lists the settings required for sending files.
1
Ethernet
This section lists the settings required for sending files with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File
Transfer".
Menu
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Interface Settings/Network
Ethernet Speed
Interface Settings/Network
LAN Type
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
File Transfer
Default User Name / Password (Send)
As required
File Transfer
Scanner Resend Interval Time
As required
File Transfer
Number of Scanner Resends
As required
Necessary
As required
Necessary
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [LAN Type] is displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
Reference
p.48 “Interface Settings”
p.54 “File Transfer”
18
Network Settings
IEEE 802.11b (wireless LAN)
This section lists the settings required for sending files with an IEEE 802.11b
(wireless LAN) connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".
Menu
User Tool
1
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Necessary
Interface Settings/Network
LAN Type
Necessary
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Interface Settings/
IEEE 802.11b
Communication Mode
Interface Settings/
IEEE 802.11b
SSID Setting
As required
Interface Settings/
IEEE 802.11b
Channel
As required
Interface Settings/
IEEE 802.11b
Security Method
As required
Interface Settings/
IEEE 802.11b
Transmission Speed
As required
File Transfer
Default User Name / Password (Send)
As required
File Transfer
Scanner Resend Interval Time
As required
File Transfer
Number of Scanner Resends
As required
Necessary
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface
board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
Reference
p.48 “Interface Settings”
p.54 “File Transfer”
19
Connecting the Machine
Settings Required to Use the Network Delivery Scanner
This section lists the settings required for delivering data to network.
1
Ethernet
This section lists the settings required for delivering data to network with an
Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File
Transfer".
Menu
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Interface Settings/Network
Ethernet Speed
Interface Settings/Network
LAN Type
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
File Transfer
Delivery Option
As required
File Transfer
Scanner Resend Interval Time
As required
File Transfer
Number of Scanner Resends
As required
Necessary
As required
Necessary
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [LAN Type] is displayed when the wireless LAN interface board is installed.
When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
❒ If Delivery Option is set to [On], check that IPv4 Address is specified.
Reference
p.48 “Interface Settings”
p.54 “File Transfer”
20
Network Settings
IEEE 802.11b (wireless LAN)
This section lists the settings required for delivering data to network with an
IEEE 802.11b (wireless LAN) connection.
For details about how to specify the settings, see "Interface Settings" and "File
Transfer".
Menu
User Tool
1
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Necessary
Interface Settings/Network
LAN Type
Necessary
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Interface/Settings/
IEEE 802.11b
Communication Mode
Interface/Settings/
IEEE 802.11b
SSID Setting
As required
Interface/Settings/
IEEE 802.11b
Channel
As required
Interface/Settings/
IEEE 802.11b
Security Method
As required
Interface/Settings/
IEEE 802.11b
Transmission Speed
As required
File Transfer
Delivery Option
As required
File Transfer
Scanner Resend Interval Time
As required
File Transfer
Number of Scanner Resends
As required
Necessary
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface
board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are
connected, the selected interface takes precedence.
❒ If Delivery Option is set to [On], check that IPv4 Address is specified.
21
Connecting the Machine
Reference
p.48 “Interface Settings”
p.54 “File Transfer”
1
Settings Required to Use Network TWAIN Scanner
This section lists the settings required for using TWAIN Scanner under the network environment.
Ethernet
This section lists the settings required for using network TWAIN Scanner with
an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".
Menu
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Necessary
Interface Settings/Network
LAN Type
Necessary
Interface Settings/Network
Ethernet Speed
As required
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [LAN Type] is displayed when the wireless LAN interface board is installed.
When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
Reference
p.48 “Interface Settings”
22
Network Settings
IEEE 802.11b (wireless LAN)
This section lists the settings required for using network TWAIN Scanner with
an IEEE 802.11b (wireless LAN) connection.
For details about how to specify the settings, see "Interface Settings".
Menu
User Tool
1
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Necessary
Interface Settings/Network
LAN Type
Necessary
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Interface Settings/
IEEE 802.11b
Communication Mode
Interface Settings/
IEEE 802.11b
SSID Setting
As required
Interface Settings/
IEEE 802.11b
Channel
As required
Interface Settings/
IEEE 802.11b
Security Method
As required
Interface Settings/
IEEE 802.11b
Transmission Speed
As required
Necessary
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface
board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are
connected, the selected interface takes precedence.
Reference
p.48 “Interface Settings”
23
Connecting the Machine
Settings Required to Use Document Server
This section lists the settings required for using Document Server function under
the network environment.
1
Ethernet
This section lists the settings required for using Document Server function with
the Ethernet connection.
For details about how to specify the settings, see "Interface Settings".
Menu
User Tool
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Interface Settings/Network
Ethernet Speed
Interface Settings/Network
LAN Type
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Necessary
As required
Necessary
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [LAN Type] is displayed when the wireless LAN interface board is installed.
When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence.
Reference
p.48 “Interface Settings”
24
Network Settings
IEEE 802.11b (wireless LAN)
This section lists the settings required for using Document Server function with
an IEEE 802.11b (wireless LAN) connection.
For details about how to specify the settings, see "Interface Settings".
Menu
User Tool
1
Setting Requirements
Interface Settings/Network
Machine IPv4 Address
Necessary
Interface Settings/Network
IPv4 Gateway Address
As required
Interface Settings/Network
DNS Configuration
As required
Interface Settings/Network
DDNS Configuration
As required
Interface Settings/Network
Domain Name
As required
Interface Settings/Network
WINS Configuration
As required
Interface Settings/Network
Effective Protocol
Necessary
Interface Settings/Network
LAN Type
Necessary
Interface Settings/Network
Permit SNMPv3 Communication
As required
Interface Settings/Network
Permit SSL/TLS Communication
As required
Interface Settings/Network
Host Name
As required
Interface Settings/
IEEE 802.11b
Communication Mode
Interface Settings/
IEEE 802.11b
SSID Setting
As required
Interface Settings/
IEEE 802.11b
Channel
As required
Interface Settings/
IEEE 802.11b
Security Method
As required
Interface Settings/
IEEE 802.11b
Transmission Speed
As required
Necessary
Note
❒ For the Effective Protocol setting, check that the protocol you want to use is
set to [Active].
❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface
board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are
connected, the selected interface takes precedence.
Reference
p.48 “Interface Settings”
25
Connecting the Machine
Using Utilities to Make Network Settings
This section describes how to make network settings using utilities.
You can also specify network settings using utilities such as Web Image Monitor,
SmartDeviceMonitor for Admin, and telnet.
1
Note
❒ For details about using Web Image Monitor, see "Using Web Image Monitor",
Network Guide.
❒ For details about using SmartDeviceMonitor for Admin, see "Using SmartDeviceMonitor for Admin", Network Guide.
❒ For Details about using telnet, see "Remote Maintenance", Network Guide.
Reference
"Using Web Image Monitor", Network Guide
"Using SmartDeviceMonitor for Admin", Network Guide
"Remote Maintenance by telnet", Network Guide
Interface Settings
This section describes how to make Interface settings using utilities.
Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin,
and telnet.
❖ [Network] → [Machine IPv4 Address] → [Auto-Obtain (DHCP)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Machine IPv4 Address] → [Specify] → [IPv4 Address]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Machine IPv4 Address] → [Specify] → [Sub-net Mask]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [IPv4 Gateway Address]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
26
Network Settings
❖ [Network] → [Machine IPv6 Address] → [Manual Configuration Address]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
1
❖ [Network] → [IPv6 Gateway Address]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [IPv6 Stateless Address Autoconfiguration]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [DNS Configuration] → [Auto-Obtain (DHCP)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [DNS Configuration] → [Specify] → "DNS Server 1-3"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [DDNS Configuration]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Domain Name] → [Auto-Obtain (DHCP)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Domain Name] → [Specify] → [Domain Name]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
27
Connecting the Machine
❖ [Network] → [WINS Configuration] → [On] → "Primary WINS Server"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
1
❖ [Network] → [WINS Configuration] → [On] → "Secondary WINS Server"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [WINS Configuration] → [On] → "Scope ID"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [WINS Configuration] → [Off]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Effective Protocol] → "IPv4"
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: You can specify the TCP/IP settings if
SmartDeviceMonitor for Admin is communicating with the machine using
IPX/SPX.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Effective Protocol] → "IPv6"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Effective Protocol] → "NetWare"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: You can specify the IPX/SPX settings if
SmartDeviceMonitor for Admin is communicating with the machine using
TCP/IP.
• telnet: Can be used for specifying the setting.
28
❖ [Network] → [Effective Protocol] → "SMB"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
Network Settings
❖ [Network] → [Effective Protocol] → "AppleTalk"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
1
❖ [Network] → [NCP Delivery Protocol] → [IPX Priority]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [NCP Delivery Protocol] → [TCP / IP Priority]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [NCP Delivery Protocol] → [IPX Only]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [NCP Delivery Protocol] → [TCP / IP Only]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [NW Frame Type] → [Auto Select]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [NW Frame Type] → [Ethernet II]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [NW Frame Type] → [Ethernet 802.2]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
29
Connecting the Machine
❖ [Network] → [NW Frame Type] → [Ethernet 802.3]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
1
❖ [Network] → [NW Frame Type] → [Ethernet SNAP]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [SMB Computer Name]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [SMB Work Group]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Ethernet Speed]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [LAN Type] → [Ethernet]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [LAN Type] → [IEEE 802.11b]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Ping Command]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
30
Network Settings
❖ [Network] → [Permit SNMPv3 Communication] → [Encryption Only]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
1
❖ [Network] → [Permit SNMPv3 Communication] → [Encryption / Clear Text]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Permit SSL / TLS Communication] → [Ciphertext Only]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [Permit SSL / TLS Communication] → [Ciphertext Priority]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [Permit SSL / TLS Communication] → [Ciphertext / Clear Text]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [Network] → [Host Name]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [Network] → [Machine Name]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [IEEE 802.11b] → [Communication Mode] → [802.11 Ad-hoc Mode]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
31
Connecting the Machine
❖ [IEEE 802.11b] → [Communication Mode] → [Ad-hoc Mode]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
1
❖ [IEEE 802.11b] → [Communication Mode] → [Infrastructure Mode]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [IEEE 802.11b] → [SSID Setting]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [IEEE 802.11b] → [Channel]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [IEEE 802.11b] → [Security Method]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
❖ [IEEE 802.11b] → [Transmission Speed]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
32
Network Settings
File Transfer
Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin,
and telnet.
1
❖ [File Transfer] → [SMTP Server]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [SMTP Authentication]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [POP before SMTP]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [Reception Protocol] → [POP3]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [Reception Protocol] → [IMAP4]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [Reception Protocol] → [SMTP]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [POP3 / IMAP4 Settings]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
33
Connecting the Machine
❖ [File Transfer] → [Administrator's E-mail Address]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
1
❖ [File Transfer] → [E-mail Communication Port]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [E-mail Reception Interval]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [Max. Reception E-mail Size]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [E-mail Storage in Server]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [Default User Name / Password (Send)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [Scanner Resend Interval Time]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
❖ [File Transfer] → [Number of Scanner Resends]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
34
2. System Settings
This chapter describes user tools in the System Settings menu. For details on
how to access System Settings, see "Accessing User Tools".
General Features
This section describes the user tools in the General Features menu under System
Settings.
Default settings are shown in bold type.
❖ Program / Change / Delete User Text
You can register text phrases you often use when specifying settings, such as
".com" and "Regards".
You can register up to 40 entries.
Program / Change:
A Press [System Settings].
B Check that [General Features] is selected.
C Press [Program / Change / Delete User Text].
D Check that [Program / Change] is selected.
E Select the user text you want to change.
To program new user text, press [Not Programmed].
F Enter the user text, and then press [OK].
Enter the user text using up to 80 characters.
G Press [Exit].
H Press the {User Tools/Counter} key.
Delete:
A Press [System Settings].
B Check that [General Features] is selected.
C Press [Program / Change / Delete User Text].
D Press [Delete].
E Select the user text you want to delete.
F Press [Yes].
G Press [Exit].
H Press the {User Tools/Counter} key.
❖ Panel Key Sound
The beeper (key tone) sounds when a key is pressed.
The default setting is On.
35
System Settings
❖ Warm-up Beeper (copier/Document Server)
You can have the beeper sound when the machine becomes ready to copy after leaving Energy Saver mode, or when the power is turned on.
The default setting is On.
If the Panel Tone setting is [Off], the beeper does not sound, whatever the
Warm Up Notice setting.
❖ Copy Count Display (copier/Document Server)
The copy counter can be set to show the number of copies made (count up) or
the number of copies yet to be made (count down).
The default setting is Up.
2
❖ Function Priority
Specify the mode to be displayed immediately after the operation switch is
turned on, or when System Reset mode is turned on.
The default setting is Copier.
❖ Print Priority
Print Priority is given to the mode selected.
The default setting is Display Mode.
When [Interleave] is selected, the current print job will be interrupted after a
maximum of five sheets.
❖ Function Reset Timer
You can set the length of time the machine waits before changing modes
when using the multi-access function.
This is useful if you are making many copies and have to change settings for
each copy. If you set a longer reset period, you can prevent interruption from
other functions.
The default setting is Set Time.
When you select [Set Time], enter the time (3–30 seconds, in 1 second increments) using the number keys.
The default setting for Function Reset Time is 3 second(s).
The Function Reset Timer setting is ignored if Interleave is set for Print Priority.
❖ Interleave Print
You can set the timing for changing modes when [Print Priority] has been set to
[Interleave].
The default setting is 10 sheet(s).
You can set the number from 1 to 20 sheets using the number keys.
❖ Output: Document Server
Specify a tray to which documents are delivered.
The default setting is Upper Paper Exit.
❖ Output: Printer
Specify a tray to which documents are delivered.
The default setting is Upper Paper Exit.
36
General Features
❖ Original Feed Delay 1
Specify the duration of delay before an original is fed into the machine after
being set. If originals frequently feed in slanted, or you are using special originals, set the delay accordingly.
The default setting is 1 second(s).
The time can be set from 0 to 5 seconds.
❖ Original Feed Delay 2
Specify the duration of the pause immediately after originals are first fed into
the machine. If originals frequently feed in slanted, or you are using special
originals, set the delay accordingly.
The default setting is 1 second(s).
The time can be set from 1 to 5 seconds.
2
❖ Feed Start Method
Specify whether feeding starts automatically or after pressing the {Start} Key.
The default setting is Auto.
❖ Fine Ratio Adjustment: Copier
Depending on paper type, environment, and humidity, copy paper can expand or shrink slightly. This means that the size of the copy and the original
do not match. if this happens, specify the vertical and horizontal correction
ratio. You can specify this setting for each paper type (plain, translucent, film
and recycled paper)
ABB009S
The default setting is Vertical: 0.0% / Horizontal: 0.0%.
Specify the ratio between –1.0% and 1.0% (in 0.1% increments)
37
System Settings
To set the Fine Ratio setting, measure the length of the original and the copy
image to calculate the ratio.
2
ZEDG010E
❖ Fine Ratio Adjustment: Printer
Specify the fine ratio when the optional printer is installed. Depending on paper type, environment, and humidity, copy paper can expand or shrink
slightly. This means that the size of the copy and the original do not match.
When the horizontal ratios are almost the same and there are differences between the vertical ratios, you can specify the vertical correction ratio. You can
make this setting for each paper type (plain, translucent, film and recycled paper).
The default setting is 0.0%.
Specify the ratio between –1.0% and 1.0% (in 0.1% increments).
For details about how to set the fine ratio, see "Fine Ratio Adjustment: Copier".
❖ Adjust Scan Position
You can adjust the position of the scan area.
The default setting is 0.
Specify the scan position between –10 and +10 (in 1 increments).
❖ System Status/Job List Display Time
Specify how long to display the System Status and Job List display for.
The default setting is On, 15 second(s).
By selecting [On], you can specify a display time between 10 and 999 seconds.
❖ Key Repeat
You can enable or disable repetition of an operation if a key on the screen or
control panel is pressed continuously.
The default setting is Normal.
38
General Features
❖ Fold Width Fine Adjustment
Adjusts the fan fold width.
"Adjustment Value (Fan Folding Finisher)" adjusts the Fan Fold width
(shown as A, B, and C in the figure below).
This menu appears only when the folding finisher is installed.
2
ATM008S
The default setting is 0.0 mm (Metric version) / 0.00 inch (Inch version).
Enter a value in 0.5 mm units in the ranging from -6.0 mm (-0.24 inch) to 6.0
mm (0.24 inch).
39
System Settings
❖ Margin Fold Margin Adjustment
Adjusts the margin width ((1) in the figure below) when [Fan Fold 81/2inch (Margin Fold)] is selected.
2
ATL011S
This menu appears only when the folding finisher is installed.
The default setting is 40 mm (Metric version) / 1.50 inch (Inch version).
Use the number keys to enter a value in 1 mm units in the ranging from 35
mm (1.00 inch) to 40 mm (1.50inch).
Reference
p.3 “Accessing User Tools”
"Function Compatibility", Copy/Document Server Reference
Output tray settings
When the folding finisher is installed and a folding option is selected, either the
lower paper exit or the folding finisher will be used for paper output, regardless
of the current paper exit setting.
If the folding finisher is used for paper output, the tray used will differ, depending on the fold type selected.
40
Tray Paper Settings
Tray Paper Settings
This section describes the user tools in the Tray Paper Settings menu under System Settings.
Default settings are shown in bold type.
Important
❒ If the specified paper size differs from the actual size of the paper loaded in
the paper tray, a misfeed might occur because the correct paper size was not
detected.
2
❖ Paper Tray Priority: Copier (copier/Document Server)
Specify the tray to supply paper for output.
The default setting is Tray 1.
When optional cut paper tray is installed, the default setting will be the cut
paper tray.
When optional paper roll tray or optional cut paper tray is installed, [Tray 2]
is displayed.
When optional two paper rolls tray and cut paper tray are installed, [Tray 3] is
displayed.
❖ Paper Tray Priority: Printer
Specify the tray to supply paper for output.
The default setting is Tray 1.
When optional paper roll tray or optional cut paper tray is installed, [Tray 2]
is displayed.
When optional two paper rolls tray and cut paper tray are installed, [Tray 3] is
displayed.
41
System Settings
❖ Tray Paper Size: Tray 1
Select the size of the paper loaded in the paper tray.
Metric version:
• A Series:
A0 Width (841 mm), A1 Width (594 mm), A2 Width (420 mm), A3 Width
(297 mm), A4 Width (210 mm)
• JIS B Series:
B1 JIS Width (728 mm), B2 JIS Width (515 mm), B3 JIS Width (364 mm), B4
JIS Width (257 mm)
• Others:
880 mm, 800 mm, 707 mm, 660 mm, 625mm, 620mm, 440 mm
2
Inch version:
• Engineering:
34 inch, 22 inch, 17 inch, 11 inch, 81/2 inch
• Architecture:
36 inch / 914 mm, 24 inch, 18 inch, 12 inch, 9 inch
• Others:
30 inch
The default setting is A0 Width (841 mm) (Metric version) / 36 inch / 914 mm
(Inch version).
42
Tray Paper Settings
❖ Tray Paper Size: Tray 2
Select the size of the paper loaded in the paper tray.
• When two paper rolls tray is installed
Metric version:
• A Series:
A0 Width (841 mm), A1 Width (594 mm), A2 Width (420 mm), A3
Width (297 mm), A4 Width (210 mm)
• JIS B Series:
B1 JIS Width (728 mm), B2 JIS Width (515 mm), B3 JIS Width (364 mm),
B4 JIS Width (257 mm)
• Others:
880 mm, 800 mm, 707 mm, 660 mm, 625 mm, 620 mm, 440 mm
Inch version:
• Engineering:
34 inch, 22 inch, 17 inch, 11 inch, 81/2 inch
• Architecture:
36 inch/914 mm, 24 inch, 18 inch, 12 inch, 9 inch
• Others:
30 inch
The default setting is A2 Width (420 mm) (Metric version) / 18 inch (Inch
version).
• When paper roll tray and cut paper tray are installed
A3K, B4 JISK, A4K, 12" × 18"K, 11" × 17"K, 81/2" × 14"K, 81/2" × 13"K,
81/2" × 11"K
The default setting is A4K (Metric version) / 12" × 18"K (Inch version).
2
❖ Tray Paper Size: Tray 3
Select the size of the paper loaded in the paper tray.
A3K, B4 JISK, A4K, 12" × 18"K, 11" × 17"K, 81/2" × 14"K, 81/2" × 13"K,
81/2" × 11"K
The default setting is A4K (Metric version) / 12" × 18"K (Inch version).
❖ Printer Bypass Paper Size
Specify the size of the paper in the paper bypass when printing data from the
computer.
A0K, B1 JISK, A1K, A1L, B2 JISK, B2 JISL, A2K, A2L, B3 JISK,
B3 JISL, A3K, A3L, B4 JISK, B4 JISL, A4K, 36" × 48"K, 34" × 44"K,
30" × 42"K, 24" × 36"K, 24" × 36"L, 22" × 34"K, 22" × 34"L, 18" × 24"K,
18" × 24"L, 17" × 22"K, 17" × 22"L, 12" × 18"K, 12" × 18"L, 11" × 17"K,
11" × 17"L, 9" × 12"K, 81/2" × 14"K, 81/2" × 11"K, Custom Size
You can specify a custom size of between 257.0 - 2000.0 mm (10.12" - 78.74")
vertically, and between 210.0 - 914.4 mm (8.27" - 36.00") horizontally.
43
System Settings
❖ Paper Type: Paper Bypass
Sets the display so you can see what type of paper is loaded in the paper bypass.
• The paper types you can set for the paper bypass are as follows:
No Display, Recycled Paper, Translucent Paper, Film
The default setting is No Display.
❖ Paper Type: Tray 1–3
Sets the display so you can see what type of paper is loaded in each paper
tray. The print function uses this information to automatically select the paper tray.
• The paper types you can set for the paper bypass are as follows:
No Display, Recycled Paper, Translucent Paper, Film
The default setting for "Paper Type" is No Display.
The default setting for "Apply Auto Paper Select" is Yes.
A mark appears next to the paper tray if [No] is selected in Auto Paper Select.
When cut paper tray is installed, you cannot select [Translucent Paper] and [Film].
2
❖ Paper Thickness: Paper Tray
Specify the thickness of paper loaded in the paper trays.
If the copy image blurs or the translucent paper loosens, changing the paper
thickness level may improve results.
The default setting for "Plain Paper" is 3.
The default setting for "Recycled Paper" is 3.
The default setting for "Translucent Paper" is 2.
The default setting for "Film" is 3.
Refer to the chart below when selecting the mode for the paper thickness.
Thickness
Paper type
1
2
3
4
5
Plain Paper
110 g/m2
90 g/m2
70 g/m2
60 g/m2
50 g/m2
(29.3 lb)
(23.9 lb)
(18.6 lb)
(15.9 lb)
(13.3 lb)
110 g/m2
90 g/m2
70 g/m2
60 g/m2
50 g/m2
(29.3 lb)
(23.9 lb)
(18.6 lb)
(15.9 lb)
(13.3 lb)
70–90 g/m2
70–80 g/m2
70–80 g/m2
50–70 g/m2
(18.6–23.9 lb)
(18.6–21.3 lb)
(18.6–21.3 lb)
(13.3–18.6 lb)
Hemmed
paper
0.07–0.095
mm
0.07–0.095
mm
0.07–0.095
mm
0.07–0.095
mm
(2.8–3.7 Mil)
(2.8–3.7 Mil)
(2.8–3.7 Mil)
(2.8–3.7 Mil)
Recycled
Paper
Translucent
Paper
Film
44
—
When Plain Paper is used for printing in a low-temperature environment
(temperature 10 °C, humidity 15%), change the thickness level from 3 to 2.
If the paper becomes loose when [Translucent Paper] is selected with a thickness level of 2, change the thickness level to 1.
These settings do not apply for hemmed paper.
Depending on paper type, operating conditions (low temperature and humidity), and paper feeding settings (multiple copies on paper of 542 mm, 22"
width or less), toner fusing conditions vary. To improve toner fusing, change
the thickness level to 3 → 2 → 1.
Tray Paper Settings
When using thin, soft, or limp paper, toner fusing may appear wrinkled or the
image may be blurred. If this happens, change the thickness level to 3 → 4 → 5.
When level 1 or 2 are selected for translucent paper, and you change the paper
type from plain or film to translucent, it may take longer for the machine to
get ready for copying (up to two minutes).
When level 1 or 2 are selected for translucent paper, and you make copies on
paper of size A1 or above continuously, the interval between each copying
may take longer. Even if you make copy on one sheet only, it may takes 1
minute until the next copy job starts.
2
❖ Paper Thickness: Paper Bypass
Specify the thickness of paper placed in the paper bypass.
If the copy image blurs or the translucent paper becomes loose, changing the
paper thickness level may improve the situation.
The default setting for "Plain Paper" is 3.
The default setting for "Recycled Paper" is 3.
The default setting for "Translucent Paper" is 2.
The default setting for "Film" is 3.
For information on the available settings, see the table titled "Paper Thickness: Paper Tray."
❖ Paper Volume
Specify the initial remaining volume of roll paper to be displayed for each paper tray.
The system monitors the amount of paper used, and automatically determines
the remaining volume, based on the specified initial remaining volume.
We recommend that you specify an appropriate remaining volume each time
a paper tray is loaded.
Select "New (Full)" when a paper tray is loaded with a new 150 m roll of paper.
The default setting is New (Full).
Reference
p.3 “Accessing User Tools”
45
System Settings
Timer Settings
This section describes the user tools in the Timer Settings menu under System
Settings.
Default settings are shown in bold type.
❖ Auto Off Timer
After a specified period has passed, following job completion, the machine
automatically turns off, in order to conserve energy. This function is called
"Auto Off". The machine status after the Auto Off operation is referred to as
"Off mode", or "Sleep mode". For the Auto Off Timer, specify the time to
elapse before Auto Off.
The default setting is 14 min..
The time can be set between 10 seconds and 240 minutes, using the number
keys.
The machine takes about 2 minutes to reach operation readiness after turning
the power on or leaving sleep mode.
Auto Off may not work when error messages appear.
2
❖ Energy Saver Timer
Set the amount of time the machine waits before switching to lower-power
mode after copying has finished or the last operation is performed.
The default setting is 7 min..
The time can be set from 1 to 240 minutes, using the number keys.
❖ Panel Off Timer
Set the amount of time the machine waits before switching the panel off after
copying has finished or the last operation is performed.
The warm up time for making a copy from standby mode is 3 seconds for
Panel off Level 1 and 15 seconds for Panel off Level 2.
The default setting is On, 1 min..
The time can be set between 10 seconds and 240 minutes, using the number
keys.
❖ System Auto Reset Timer
The System Reset setting automatically switches the screen to that of the function set in Function Priority when no operations are in progress, or when an
interrupted job is cleared. This setting determines the system reset interval.
The default setting is On, 60 second(s).
The time can be set from 10 to 999 seconds, using the number keys.
❖ Copier / Document Server Auto Reset Timer
Specifies the time to elapse before copier and Document Server modes reset.
The default setting is On, 60 second(s).
The time can be set from 10 to 999 seconds, using the number keys.
If [Off] is selected, the machine does not automatically switch to the user code
entry screen.
46
Timer Settings
❖ Printer Auto Reset Timer
Specifies the time to elapse before the printer function resets.
The default setting is On, 60 second(s).
The time can be set from 10 to 999 seconds, using the number keys.
❖ Scanner Auto Reset Timer
Specifies the time to elapse before the scanner function resets.
The default setting is On, 60 second(s).
The time can be set from 10 to 999 seconds, using the number keys.
If [Off] is selected, the machine will not automatically switch to the user code
entry screen.
2
❖ Set Date
Set the date for the copier's internal clock using the number keys.
To change between year, month, and day, press [ ← ] and [ → ].
❖ Set Time
Set the time for the copier's internal clock using the number keys.
Enter the time using the 24-hour format (in 1 second increments).
To change between hours, minutes and seconds, press [ ← ] and [ → ].
❖ Auto Logout Timer
Specify whether or not to automatically log out a user when the user does not
operate the machine for a specified period of time after logging in.
The default setting is Off.
The time can be set from 60 to 999 seconds, in one second increments, using
the number keys.
Reference
p.3 “Accessing User Tools”
47
System Settings
Interface Settings
This section describes the user tools in the Interface Settings menu under System
Settings.
Default settings are shown in bold type.
2
Network
This section describes the user tools in the Network menu under Interface Settings.
❖ Machine IPv4 Address
Before using this machine in the network environment, you must specify the
IPv4 address and subnet mask.
The default setting is Auto-Obtain (DHCP).
When you select [Specify], enter the IPv4 address and subnet mask as
"xxx.xxx.xxx.xxx" ("x" indicates a number).
When you select [Specify], make sure that IPv4 address is different from that
of other machines on the network.
The physical address (MAC address) also appears.
❖ IPv4 Gateway Address
A gateway is a connection or interchange point between two networks.
Specify the gateway address for the router or host computer used as a gateway.
The default setting is 000.000.000.000.
❖ Machine IPv6 Address
Specify the machine’s IPv6 network address.
• Link-local Address
The machine’s specified link-local address appears.
• Manual Configuration Address
The machine’s manually configured address appears.
• Stateless Address: 1-5
The specified stateless address appears.
❖ IPv6 Gateway Address
Displays the machine’s IPv6 gateway address.
❖ IPv6 Stateless Address Autoconfiguration
Specify IPv6 Stateless Address Autoconfiguration.
The default setting is Active.
❖ DNS Configuration
Make settings for the DNS server.
The default setting is Auto-Obtain (DHCP).
When you select [Specify], enter the DNS Server IPv4 address as
"xxx.xxx.xxx.xxx"("x" indicates a number).
48
Interface Settings
❖ DDNS Configuration
Specify the DDNS settings.
The default setting is Active.
❖ Domain Name
Specify the domain name.
The default setting is Auto-Obtain (DHCP).
When you select [Specify], enter the domain name using up to 63 characters.
2
❖ WINS Configuration
Specify the WINS server settings.
The default setting is Off.
If [On] is selected, enter the WINS Server IPv4 address as
"xxx.xxx.xxx.xxx"("x" indicates a number).
If DHCP is in use, specify the scope ID.
Enter a scope ID using up to 31 characters.
❖ Effective Protocol
Select the protocol to use in the network.
The default setting for "IPv4" is Active.
The default setting for "IPv6" is Inactive.
The default setting for "NetWare" is Active.
The default setting for "SMB" is Active.
The default setting for "AppleTalk" is Active.
❖ NCP Delivery Protocol
Select the protocol for NCP delivery.
The default setting is TCP / IP Priority.
If you select "IPX Only" or "TCP / IP Only", you cannot switch the protocol
even if you cannot connect with it. If "NetWare" in [Effective Protocol] is set to
"Inactive", you can only use TCP/IP.
❖ NW Frame Type
Select the frame type when you use NetWare.
The default setting is Auto Select.
❖ SMB Computer Name
Specify the SMB computer name.
Enter the computer name using up to 15 characters.
"*+,/:;<>=?[\]|. and spaces cannot be entered.
Do not set a computer name starting with RNP and rnp.
Use uppercase letters for alphabets.
❖ SMB Work Group
Specify the SMB work group.
Enter the computer name using up to 15 characters.
"*+,/:;<>=?[\]|. and spaces cannot be entered.
Use uppercase letters for alphabet.
49
System Settings
❖ Ethernet Speed
Set the access speed for networks.
Select a speed that matches your network environment. [Auto Select] should
usually be selected.
The default setting is Auto Select.
Machine
2
10Mbps Half
Duplex
10Mbps Full
Duplex
100Mbps
Half Duplex
100Mbps Full
Duplex
Auto Select
10Mbps Half
Duplex
b
-
-
-
b
10Mbps Full
Duplex
-
b
-
-
-
100Mbps
Half Duplex
-
-
b
-
b
100Mbps Full
Duplex
-
-
-
b
-
Auto Select
b
-
b
-
b
Router/HUB
❖ LAN Type
When you have installed the IEEE 802.11b interface unit, select the method of
connection.
The default setting is Ethernet.
[LAN Type] is displayed when wireless LAN board is installed. If Ethernet and
IEEE 802.11b (wireless LAN) are both connected, the selected interface has
priority.
❖ Ping Command
Check the network connection with ping command using given IPv4 address.
If you fail to connect to the network, check the following, and then retry the
ping command.
• Make sure that "IPv4" in [Effective Protocol] is set to "Effective".
• Check that the machine with assigned IPv4 address is connected to the network.
• There is a possibility that the same IPv4 address is used for the specified
equipment.
❖ Permit SNMPv3 Communication
Set the encrypted communication of SNMPv3.
The default setting is Encryption / Clear Text.
If you select to [Encryption Only], you need to set an encryption password for
the machine.
50
Interface Settings
❖ Permit SSL / TLS Communication
Set the encrypted communication of SSL/TLS.
The default setting is Ciphertext / Clear Text.
If you set to [Ciphertext Only], you need to install the SSL certificate for the machine.
❖ Host Name
Specify the host name.
Enter the host name using up to 63 characters.
2
❖ Machine Name
Specify the machine name.
Enter the machine name using up to 31 characters.
IEEE 802.11b
This section describes the user tools in the IEEE 802.11b menu under Interface
Settings.
[IEEE 802.11b] is displayed when this machine is installed with the wireless LAN
interface board.
Be sure to make all settings simultaneously.
❖ Communication Mode
Specifies the communication mode of the wireless LAN.
The default setting is 802.11 Ad-hoc Mode.
❖ SSID Setting
Specifies SSID to distinguish the access point in infrastructure mode or 802.11
ad hoc mode.
The characters that can be used are ASCII 0x20-0x7e (32 bytes).
If blank is specified in 802.11b ad hoc mode or ad hoc mode, "ASSID" appears.
❖ Channel
Specifies a channel when you select 802.11b ad hoc mode or ad hoc mode. The
default setting is 11.
The following channels are available:
• Metric version: 1-14
• Inch version: 1-11
51
System Settings
❖ Security Method
Specifies the encryption of the IEEE 802.11b (wireless LAN).
The default setting is Off.
If you select [WEP], always enter WEP key. If you select [WPA], specify the encryption and authentication methods.
Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode].
• WEP
If you select "WEP", enter WEP key.
When using 64 bit WEP, up to 10 characters can be used for hexadecimal
and up to five characters for ASCII. When using 128 bit WEP, up to 26 characters can be used for hexadecimal and up to 13 characters for ASCII.
The number of characters that can be entered is limited to 10 or 26 for hexadecimal and 5 or 13 for ASCII.
• WPA
WPA Encryption Method:
Select either "TKIP" or "CCMP(AES)".
WPA Authent. Method:
Select either "WPA-PSK", "WPA", "WPA2-PSK" or "WPA2".
If you select "WPA-PSK" or "WPA2–PSK", enter the pre-shared key (PSK)
of 8- 63 characters in ASCII code.
2
❖ Wireless LAN Signal
When using in infrastructure mode, you can check the machine's radio wave
status using the control panel.
Radio wave status is displayed when you press [Wireless LAN Signal].
❖ Transmission Speed
Specifies the communication speed of the IEEE 802.11b (wireless LAN).
The default setting is Auto Select.
❖ Restore Factory Defaults
You can return the IEEE 802.11b (wireless LAN) settings to their defaults.
Reference
p.3 “Accessing User Tools”
52
Interface Settings
Print List
This section describes how to print the configuration page.
You can check items related to the network environment.
The configuration page shows the current network settings and network information.
A Press [System Settings].
2
B Press [Interface Settings].
C Press [Print List].
D Press the {Start} key.
The configuration page is printed.
E Press [Exit].
F Press the {User Tools/Counter} key.
53
System Settings
File Transfer
This section describes the user tools in the File Transfer menu under System Settings.
Default settings are shown in bold type.
❖ Delivery Option
Enables or disables sending stored or scanned documents to the ScanRouter
delivery server.
The default setting is Off.
Specify this option when selecting whether or not to use the ScanRouter delivery software. If you do, you will have to preregister I/O devices in the
ScanRouter delivery software.
2
❖ Capture Server IPv4 Address
Specify the capture server IPv4 address.
This setting appears when the media link board is installed, and that the capture function is being used by the ScanRouter delivery software.
❖ SMTP Server
Specify the SMTP server name.
If DNS is in use, enter the host name.
If DNS is not in use, enter the SMTP server IPv4 address.
The default setting for Port No. is 25.
Enter the server name using up to 127 characters. Spaces cannot be entered.
Enter port number between 1 and 65535 using the number keys, and then
press the {q} key.
54
❖ SMTP Authentication
Specify SMTP authentication (PLAIN, LOGIN, CRAMMD5, DIGEST-MD5).
When sending e-mail to an SMTP server, you can enhance the SMTP server
security level using authentication that requires entering the user name and
password.
If the SMTP server requires authentication, set [SMTP Authentication] to [On],
and then specify the user name, e-mail address, password and encryption.
The default setting is Off.
• Enter the user name using up to 191 characters.
Spaces cannot be entered. Depending on the SMTP server type, "realm"
must be specified. Add "@" after the user name, as in "user [email protected]".
• Enter the password using up to 128 characters.
Spaces cannot be entered.
• Select Encryption as follows:
"Encryption"-[Auto]
Use If the authentication method is PLAIN, LOGIN, CRAM-MD5, or DIGEST-MD5.
"Encryption"-[On]
Use If the authentication method is CRAMMD5 or DIGEST-MD5.
"Encryption"-[Off]
Use If the authentication method is PLAIN, or LOGIN.
File Transfer
❖ POP before SMTP
Specify POP authentication (POP before SMTP).
When sending e-mail to an SMTP server, you can enhance the SMTP server
security level by connecting to the POP server for authentication.
The default setting is Off.
If you set POP before SMTP to [On], specify the waiting time after authentication, user name, e-mail address and password.
• Wait Time after Authent.: 300 msec.
Specify "Wait Time after Authent." from zero to 10,000 milliseconds, in increments of one millisecond.
• User Name
Enter the user name using up to 191 characters. Spaces cannot be entered.
• E-mail Address
Enter the E-mail Address using up to 128 characters. Spaces cannot be entered.
• Password
Enter the password using up to 128 characters. Spaces cannot be entered.
To enable POP server authentication before sending e-mail via the SMTP
server, set [POP before SMTP] to [On]. E-mail is sent to the SMTP server after the
time specified for "Wait Time after Authent." has elapsed.
If you select [On], enter server name in POP3 / IMAP4 Settings. Also, check
POP3 port number in E-mail Communication Port.
2
❖ Reception Protocol
Specify Reception Protocol for E-mail Notification function.
The default setting is POP3.
❖ POP3 / IMAP4 Settings
Specify the POP3/IMAP4 server name for E-mail Notification function.
The specified POP3/IMAP4 server name is used for [POP before SMTP].
The default setting is Auto.
• Server Name
If DNS is in use, enter the host name.
If DNS is not in use, enter the POP3/IMAP4 or server IPv4 address.
Enter POP3/IMAP4 server name using up to 127 characters. Spaces cannot
be entered.
• Select Encryption as follows:
"Encryption"-[Auto]: Password encryption is automatically set according to
the POP/IMAP server settings.
"Encryption"-[On]: Encrypt password.
"Encryption"-[Off]: Do not encrypt password.
55
System Settings
❖ Administrator's E-mail Address
Specify the Administrator's E-mail Address.
If a failure occurs in the machine or consumables need to be replaced, e-mail
messages are sent to the Administrator's E-mail Address by E-mail Notification function.
On e-mailed scanned documents, if the sender is not specified this appears as
the sender's address.
When sending e-mail, administrator's e-mail address will appear as the sender’s
address under the following conditions:
• The sender has not been specified and the machine’s e-mail address has
not been registered.
• The specified sender is not registered in the machine’s address book and
the machine’s e-mail address has not been registered.
When conducting SMTP authentication for the transmitted files under the e–
mail function, the Administrator's E-mail Address will appear in the “From:"
box. If you have specified the user name and e-mail address in [SMTP Authentication], make sure to specify this setting.
Enter up to 128 characters.
On e-mailed scanned documents, if [Auto Specify Sender Name] is [Off], specify
the sender.
2
❖ E-mail Communication Port
Specify the port numbers for receiving e-mails. The specified POP3 port number is used for POP before SMTP.
The default setting for POP3 is 110.
The default setting for IMAP4 is 143.
The default setting for SMTP is 25.
Enter a port number between 1 and 65535 using the number keys, and then
press the {q} key.
❖ E-mail Reception Interval
Specify, in minutes, the time interval for E-mail Notification function via
POP3 or IMAP4 server.
The default setting is On, 15 minute(s).
If [On] is selected, the time can be set from 2 to 1440 minutes in increments of
one minute.
❖ Max. Reception E-mail Size
Specify the maximum reception e-mail size for receiving e-mails.
The default setting is 2MB.
Enter a size from one to 50 MB in increments of one megabyte.
❖ E-mail Storage in Server
Specify whether or not to store received e-mails on the POP3 or IMAP4 server.
The default setting is Off.
56
File Transfer
❖ Default User Name / Password (Send)
Specify the user name and password required when sending scan files directly to a shared folder on a computer running Windows, to an FTP server, or to
a NetWare server.
Enter in up to 64 characters.
❖ Program / Change / Delete E-mail Message
You can program, change, or delete the e-mail message used when sending a
scan file as an attachment.
Program / Change:
A Press [System Settings].
B Press [File Transfer].
C Press [Program / Change / Delete E-mail Message].
D Check that [Program / Change] is selected.
E Press [Not Programmed].
F Press [Change].
G Enter a name, and then press [OK].
Enter the name using up to 20 characters.
H Press [Edit].
To start a new line, press [OK] to return to the e-mail message screen, and
then press [TNext] in "Select Line to Edit:".
I Enter the text, and then press [OK].
Enter up to five lines of text. Each line can consist of up to 80 characters.
J Press [OK].
K Press [Exit].
L Press the {User Tools/Counter} key.
2
Delete:
A Press [System Settings].
B Press [File Transfer].
C Press [Program / Change / Delete E-mail Message].
D Press [Delete].
E Select the e-mail message to delete.
The confirmation message about deleting appears.
F Press [Yes].
57
System Settings
❖ Auto Specify Sender Name
Set whether or not to specify the name of the sender when sending e-mail.
The default setting is Off.
• On
If you select [On], the specified e-mail address will appear in the "From:"
box. If you do not specify the sender’s address, the administrator’s e-mail
address will appear in the "From:" box.
If you do not specify the sender when sending a file by e-mail, or if the
specified e-mail address is not registered in the machine’s address book,
the machine’s e-mail address will appear in the "From:" box. If the machine
does not have an e-mail address, the administrator’s e-mail address will
appear in the "From:" box.
• Off
If you select [Off], the specified e-mail address will appear in the "From:"
box, but you cannot send e-mail without specifying the sender’s e-mail address.
2
❖ Scanner Resend Interval Time
Specifies the interval the machine waits before resending a scan file, if it cannot be sent to the delivery server or mail server.
The default setting is 300 second(s).
The interval time can be set from 60 to 900 seconds in one second increments,
using the number keys.
This setting is for the scanner function.
❖ Number of Scanner Resends
Sets a maximum number of times a scan file is resent to the delivery server or
mail server.
The default setting is On, 3 time(s).
If [On] is selected, the number of times can be set from 1 to 99. This setting is
for the scanner function.
This setting is for the scanner function.
Reference
p.3 “Accessing User Tools”
58
Administrator Tools
Administrator Tools
This section describes the user tools in the Administrator Tools menu under System Settings.
Default settings are shown in bold type.
Administrator Tools are used by the administrator. To change these settings,
contact the administrator.
We recommend specifying Administrator Authentication before making Administrator Tools settings.
2
❖ Address Book Management
You can add, change or delete information registered in the Address Book.
For details, see "Address Book".
• Program / Change
You can register and change names as well as user codes.
• Names
You can register a name, key display, registration number, and title selection.
• Auth. Info
You can register a user code, and specify the functions available to each
user code. You can also register user names and passwords to be used
when sending e-mail, sending files to folders, or accessing an LDAP
server.
• Protection
You can register a protection code.
• E-mail
You can register an e-mail address.
• Folder
You can register the protocol, path, port number, and server name.
• Add to Group
You can put names registered in the Address Book into a group.
• Delete
You can delete a name from the Address Book.
You can register up to 2,000 names.
You can register up to 500 user codes.
You can also register and manage names in the Address Book using Web Image Monitor or SmartDeviceMonitor for Admin.
59
System Settings
❖ Address Book: Program / Change / Delete Group
Names registered in the Address Book can be added into a group.
You can then easily manage the names registered in each group.
• Program / Change
You can register and change groups.
• Names
You can register a name, key display, registration number, and title selection.
• Programmed User/Group
You can check the names or groups registered in each group.
• Protection
You can register a protection code.
• Add to Group
You can put groups registered in the Address Book into a group.
• Delete
You can delete a group from the Address Book.
You can register up to 100 groups.
You can also register and manage groups in the Address Book using Web Image Monitor or SmartDeviceMonitor for Admin.
Use SmartDeviceMonitor for Admin provided with the printer scanner unit.
2
❖ Address Book: Change Order
Changes the order of registered names.
You can rearrange the order of items on the same page, but you cannot move
items to another page.
For example, you cannot move an item from "PLANNING" ([OPQ]) to "DAILY" ([CD]).
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Change Order].
60
Administrator Tools
D
Press the name key to be moved.
2
E
You can select a name using the number keys.
Press the name key in the place you want to move it to.
The user key is moved to the selected position, and the user key currently
at the selected position is moved forward or backward.
If you move the selected user key forward, the user key currently at the selected position is moved backward.
If you move the selected user key backward, the user key currently at the
selected position is moved forward.
You can also select a name using the number keys.
61
System Settings
❖ Print Address Book: Destination List
You can print the destination list registered in the Address Book.
• Print in Title 1 Order
Prints the Address Book in Title 1 order.
• Print in Title 2 Order
Prints the Address Book in Title 2 order.
• Print in Title 3 Order
Prints the Address Book in Title 3 order.
• Print Group Dial List
Prints the group Address Book.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Print Address Book: Destination List].
D Select the print format.
E Press the {Start} key.
The list prints out.
2
62
Administrator Tools
❖ Address Book: Edit Title
You can edit the title to easily find a user.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Edit Title].
2
D
Press the title key you want to change.
E
Enter the new name, and then press [OK].
Press [OK].
F
❖ Address Book: Switch Title
Specifies the title to select a name.
The default setting is Title 1.
❖ Back Up / Restore Address Book
You can back up the machine’s address book to external storage or restore the
backup copy from the external storage.
You can use the built-in SD card device for backing up data. For details about
using SD cards, contact your local service representative.
• Back Up
You can back up the machine’s address book to external storage.
• Restore
You can restore the backup copy of the address book from external storage.
• Format
You can format the external storage.
• Obtain Media Info
The free space and occupied space of the external storage are displayed.
63
System Settings
❖ Display / Print Counter
Allows you to view and print the number of prints.
• Display / Print Counter
Displays the number of prints for each function (Total, Copier, Send Total,
Printer, Scanner Send).
• Print Counter List
Prints out a list of the number of prints made under each function.
2
❖ Display / Clear / Print Counter per User
Allows you to view and print the numbers of prints accessed with user codes,
and to set those values to 0.
Press [UPrevious] and [TNext] to show all the numbers of prints.
The number of prints may differ from the counter values shown in Display /
Print Counter.
• Print Counter List for All Users
Prints the counter value for all the users.
• Clear Counter List for All Users
Resets the counter value for all the users.
• Print Counter List per User
Prints the counter value for each user.
• Clear Counter List per User
Resets the counter value for each user.
• Select All on the Page
Select the all users on the page.
64
Administrator Tools
❖ User Authentication Management
• User Code Auth.
Using User Code Authentication, you can limit the available functions and
supervise their use.
When using User Code Authentication, register the user code.
Using the Printer PC Control function, you can obtain a log of prints corresponding to the codes entered using the printer driver.
For details about Basic Authentication, Windows Authentication, LDAP
Authentication, and Integration Server Authentication, consult your administrator.
• Copier
• Printer
• GL/2TIFF
• Printer: PC Control
• Document Server
• Scanner
• Basic Auth.
• Windows Auth.
• LDAP Auth.
• Integration Svr. Auth.
• Off
2
❖ Enhanced Authentication Management
For details about this function, consult your administrator.
❖ Administrator Authentication Management
For details about this function, consult your administrator.
❖ Program / Change Administrator
For details about this function, consult your administrator.
❖ Key Counter Management
Specify that functions you want to manage with the key counter.
❖ Extended Security
Specify whether or not to use the extended security functions. For details
about the extended security functions, consult your administrator.
65
System Settings
❖ Auto Delete File in Document Server
Specify whether documents stored in the Document Server will or will not be
deleted after a specified period of time.
The default setting is On, 3 day(s).
If you select [On], documents stored subsequently are deleted after the specified period.
If you select [On], documents are not automatically deleted.
If you select [On], enter a number of days from 1 to 180 (in 1 day increments).
The default is 3 days, this means documents are deleted 3 days (72 hours) after they are stored.
2
❖ Delete All Files in Document Server
You can delete files stored in the Document Server, including files stored for
Sample Print, Locked Print, Hold Print, and Stored Print under the printer
function.
Even if a password is always set, all documents are deleted.
A confirmation message appears. To delete all documents, select [Yes].
❖ Program / Change / Delete LDAP Server
Program the LDAP server to find up e-mail destinations in the LDAP server
Address Book directly. This function is possible when sending scan files by email using the scanner function.
To start an LDAP search, make sure that the items listed below are set. For
other items, check your environment and make any necessary changes.
• Server Name
• Search Base
• Port Number
• Search Conditions
• Authentication
To use the LDAP server in Administrator Tools, select [On] under LDAP server.
This function supports LDAP Version 2.0 and 3.0. Ver 2.0 does not support
High Security authentication.
❖ LDAP Search
Specify whether or not to use the LDAP server for searching.
The default setting is Off.
If you select [Off], the LDAP server list will not appear on the search display.
❖ AOF (Always On)
Specify whether or not to use Auto Off.
The default setting is On.
❖ Firmware Version
You can check the version of the software installed in this machine.
❖ Network Security Level
For details about this function, consult your administrator.
66
Administrator Tools
❖ Auto Erase Memory Setting
For details about this function, consult your administrator.
❖ Erase All Memory
For details about this function, consult your administrator.
❖ Delete All Logs
For details about this function, consult your administrator.
2
❖ Transfer Log Setting
For details about this function, consult your administrator.
❖ Fixed USB Port
Specify whether or not to fix the USB port.
The default setting is Off.
If a PC with the printer driver installed is connected to another device of the
same model through the USB interface, selecting [On] for this option eliminates the need for additional installation of the driver to the PC.
Reference
p.3 “Accessing User Tools”
p.113 “Address Book”
p.128 “Printing the Counter for Each User”
p.180 “Counter”
67
System Settings
Programming the LDAP server
This section describes how to specify the LDAP server settings.
To program / change the LDAP server
2
This section describes how to program / change the LDAP server.
A Press [System Settings].
B Press [Administrator Tools].
C Press [TNext] twice.
D Press [Program / Change / Delete LDAP Server].
E Check that [Program / Change] is selected.
F Select the LDAP server you want to program or change.
When programming the server, select [Not Programmed].
G Set each item as necessary.
H Press [OK] after setting each item.
For details about LDAP server, see "Programming the LDAP server".
I Press [Exit].
J Press the {User Tools/Counter} key.
Reference
p.68 “Programming the LDAP server”
To enter an identification name
This section describes how to enter a identification name.
A Press [Change] under "Name".
Register a name for the LDAP server that will appear on the server selection
screen of the LDAP search operation.
B Enter the server’s identification name.
C Press [OK].
68
Programming the LDAP server
To enter a server name
This section describes how to enter a server name.
A Press [Change] under "Server Name".
Register the LDAP server’s host name or IPv4 address.
B Enter the LDAP server name.
C Press [OK].
2
To enter the search base
This section describes how to enter the search base.
A Press [Change] under "Search Base".
Select a route folder to start the search from e-mail addresses registered in the
selected folder are search targets.
B Enter the search base.
For example, if the search target is the sales department of ABC company, enter “dc=sales department, o=ABC”. (In this example, the description is for an
active directory. “dc” is for the organization unit, and “o” is for the company.)
Search base registration may be required depending on your server environment. When registration is required, unspecified searches will result in error.
Check your server environment and enter any required specifications.
C Press [OK].
To enter a port number
This section describes how to enter a port number.
A Press [Change] under "Port Number".
Specify the port number for communicating with the LDAP server. Specify a
port that is compliant with your environment.
B Enter the port number using the number keys, and then press the {q} key.
When SSL is set to [On], the port number automatically changes to “636”.
69
System Settings
To start SSL communication
This section describes how to specify SSL communication.
A Press [On] under "Use Secure Connection (SSL).
Use SSL to communicate with the LDAP server.
To use SSL, the LDAP server must support SSL.
When SSL is set to [On], the port number automatically changes to “636”.
SSL setting must be enabled on this machine. For details, consult your network administrator.
2
To set authentication
This section describes how to specify authentication.
To make a search request to the LDAP server, use the administrator account for
authentication.
A Press [TNext].
B Press [On] or [High Security] under "Authentication".
Authentication settings must comply with your server’s authentication settings. Check your server settings before setting this machine.
[High Security] is available only with LDAP Version 3.0.
When [High Security] is selected, the administrator password is encrypted before it is sent to the network. When [On] is selected, the password is sent without encryption.
70
Programming the LDAP server
To enter the user name and password
This section describes how to enter the user name and password.
When [On] or [High Security] is selected for the authentication setting, use the administrator account name and password. Do not enter the administrator account
name and password when using authentication for each individual or each
search.
2
A Press [TNext].
B Press [Change] under "User Name".
C Enter the user name, and then press [OK].
Procedures for the user name setting differ depending on server environment. Check your server environment before making the setting.
Example: Domain Name\User Name, User [email protected] Name,
CN=Name, OU=Department Name, DC=Server Name
D Press [Change] under "Password”.
E Enter the password, and then press [OK].
The user name and password are required for administrator authentication to
access the LDAP server.
You can set the user name and password in this machine’s Address Book to
allow individual authentication access to the LDAP server. Use Administrator Tools to select the user name and password you want to use.
To test the connection
This section describes how to test the connection.
Access the LDAP server to check the proper connection is established. Check authentication works according to the authentication settings.
A Press [Connection Test].
A connection test is carried out.
B Press [Exit].
If the connection test fails, check your settings and try again.
This function does not check search conditions or the search base.
71
System Settings
To set search conditions
This section describes how to specify search conditions.
You can enter an attribute as a typical search keyword. Using the entered attribute, the function searches the LDAP server’s Address Book.
A Press [TNext] twice.
B Press [Change] for items you want to use as search conditions from the fol-
2
lowing: "Name", "E-mail Address", "Fax Number", "Company Name", and
"Department Name".
C Enter the attribute you want to use when searching for e-mail addresses,
and then press [OK].
The attribute value may change depending on the server environment. Check
the attribute value complies with your server environment before setting it.
You can leave items blank, but you cannot leave attributes blank when
searching for e-mail addresses from the LDAP server Address Book.
To set search options
This section describes how to specify search options.
To search the LDAP server data using a keyword other than prepared keywords
such as Name, E-mail Address, FAX Number, Company Name, and Department
Name, specify the attribute for the keyword registered in your LDAP server, and
the name to be displayed on the control panel during the search. For example, to
search e-mail addresses by employee number, enter “employeeNo.” in the Attribute field, and “Employee No.” in the key display field.
A Press [TNext] three times.
B Press [Change] under "Attribute".
C Enter the attribute you want to use when searching for e-mail addresses,
and then press [OK].
The attribute value may change depending on the server environment. Check
the attribute complies with your server environment before setting it.
D Press [Change] under "Key Display".
72
Programming the LDAP server
E Enter the key display, and then press [OK].
The registered “key display” appears as a keyword for searching LDAP.
• Without key display registration
2
• With key display registration
The key does not appear on the search screen unless both “Attribute” and
“Key Display” are registered. Make sure you register both to use the optional
search.
73
System Settings
To delete the programmed LDAP server
This section describes how to delete the programmed LDAP server.
A Press [System Settings].
B Press [Administrator Tools].
C Press [TNext] twice.
D Press [Program / Change / Delete LDAP Server].
E Press [Delete].
F Select the LDAP server you want to delete.
G Press [Yes].
H Press [Exit].
I Press the {User Tools/Counter} key.
2
74
3. Copier / Document Server
Features
This chapter describes user tools in the Copier / Document Server Features
menu. For details on how to access Copier / Document Server Features, see "Accessing User Tools".
General Features
This section describes the user tools in the General Features menu under Copier /
Document Server Features.
Default settings are shown in bold type.
❖ Auto Image Density Priority
You can set whether Auto Image Density is "On" or "Off" when the machine
is turned on, reset, or modes are cleared.
The default setting for "Text" is On.
The default setting for "Drawing" is On.
The default setting for "Text / Photo" is On.
The default setting for "Photo" is Off.
The default setting for "Background Lines" is On.
The default setting for "Patched Original" is On.
The default setting for "Generation Copy" is On.
75
Copier / Document Server Features
❖ Copy Quality
Adjust the finish for each original type (Text, Drawing, Text / Photo, Photo,
Background Lines, Patched Original)
[Custom Setting] provides a set of adjustment options that service representatives can use to meet customer requests for finish quality.
• Text
Adjust line and character outline quality in the copy image.
The default setting is Normal.
Character outline is less defined when [Soft] is selected; more defined
when [Sharp] is selected.
• Drawing
Adjust the line density and lighter sections of image.
The default setting is Normal.
Originals that have light pencil lines can be reproduced with greater clarity
when [Soft] is selected. When [Sharp] is selected, pencil lines can be reproduced clearly with improved clarity.
• Text / Photo
You can select to prioritize the copy image of "Text" or ”Photo" when copying originals contain photographs and the text.
The default setting is Normal.
When [Normal] is selected, an original containing a mixture of text and photographs can be reproduced.
• Photo
You can configure the machine to copy originals.
The default setting is Printed Photo.
Select [Printed Photo] when copying originals with photographs such as
magazines or catalogues. A smooth finish image can be reproduced.
Select [Glossy Photo] when copying developed photographs. These options
improve the quality of characters within photo images.
• Background Lines
The default setting is Normal.
• Patched Original
The default setting is Darkest.
3
❖ Image Density
Specify the copy image density for each original type (Text, Drawing, Text /
Photo, Photo, Background Lines, Patched Original, Generation Copy).
The default setting is Normal.
❖ Max. Copy Quantity
The maximum copy quantity can be set between 1 and 99.
The default setting is 99 sheet(s).
76
General Features
❖ Auto Tray Switching
If you load paper of the same size in two or more trays, the machine automatically shifts to the other when the first tray runs out of paper (when Auto Paper Select is selected.) This function is called "Auto Tray Switching". This
setting specifies whether to use Auto Tray Switching or not.
The default setting is With Image Rotation.
• With Image Rotation
Use to copy when using the Auto Tray Switching function.
• Without Image Rotation
Only copies with Auto Tray Switching if you load paper of the same size
and in the same orientation in two or more trays. If the paper is not the
same size or in the same orientation, copying is interrupted and the message "Load paper." is displayed.
• Off
When a paper tray runs out of paper, copying is interrupted and the message "Load paper." is displayed.
3
❖ Job End Call
You can choose whether or not the beeper sounds when copying is complete.
The default setting is On.
If Panel Tone of User Tools (System Settings) settings is [On], the machine
beeps to notify you that it did not complete a job for reasons such as copying
was interrupted, the paper tray ran out of paper, or a paper jam occurred.
Reference
p.3 “Accessing User Tools”
"Selecting the Original Type Setting", Copy/ Document Server Reference
"Adjusting Copy Image Density", Copy/ Document Server Reference
"Selecting Copy Paper", Copy/ Document Server Reference
77
Copier / Document Server Features
Reproduction Ratio
This section describes the user tools in the Reproduction Ratio menu under
Copier / Document Server Features.
Default settings are shown in bold type.
For details about the relationships between fixed reduce/enlarge ratios, document sizes, and paper sizes, see "Supplementary Information", Copier / Document Server Reference.
❖ User Reduce/Enlarge Ratio
You can register up to three frequently used Reduce / Enlarge ratios other
than the fixed Reduce / Enlarge ratio and have them shown on the initial display. You can also change registered Reduce / Enlarge ratios.
When you select [User Reduce/Enlarge Ratio], the ratio can be set from 25.0 to
400.0%, using the number keys.
• Metric version:
The default setting for "F1" is 70.7%.
The default setting for "F2" is 141.4%.
The default setting for "F3" is 200.0%.
• Inch Version (Engineering):
The default setting for "F1" is 64.7%.
The default setting for "F2" is 129.4%.
The default setting for "F3" is 200.0%.
• Inch Version (Architecture)
The default setting for "F1" is 66.7%.
The default setting for "F2" is 133.3%.
The default setting for "F3" is 200.0%.
3
78
Reproduction Ratio
❖ Reproduction Ratio
Specify the enlargement and reduction ratios that appear if [Reduce / Enlarge]
is pressed on the copier screen.
When you select [User Reduce/Enlarge Ratio], the ratio can be set from 25.0 to
400.0%, using the number keys.
3
Metric version:
• 25.0% (A0 → A4)
• 35.4% (A1 → A4, A0 → A3)
• 50.0% (A2 → A4, A1 → A3)
• 70.7% (A3 → A4, A1 → A2)
• 141.4% (A4 → A3, A2 → A1)
• 200.0% (A4 → A2, A3 → A1)
• 282.8% (A4 → A1, A3 → A0)
• 400.0% (A4 → A0)
Inch version (Engineering)
• 25.0% (E → A)
• 32.4% (D → A, E → B)
• 50.0% (C → A, D → B, E → C)
• 64.7% (B → A, C → B, D → C, E → D)
• 129.4% (A → B, B → C, C → D, D → E)
• 200.0% (A → C, B → D, C → E)
• 258.8% (A → D, B → E)
• 400.0% (A → E)
79
Copier / Document Server Features
Inch version (Architecture)
• 25.0% (E → A)
• 33.3% (D → A, E → B)
• 50.0% (C → A, D → B, E → C)
• 66.7% (B → A, C → B, D → C, E → D)
• 133.3% (A → B, B → C, C → D, D → E)
• 200.0% (A → C, B → D, C → E)
• 266.7% (A → D, B → E)
• 400.0% (A → E)
3
❖ Reduce/Enlarge Ratio Priority
You can set the ratio that has priority when [Reduce / Enlarge] is pressed on the
copier screen.
The default setting is 70.7% (Metric version) / 64.7% (Inch version: Engineering) / 66.7% (Inch version: Architecture).
❖ Magnification Key Display
Specify which scale's reproduction ratios shown on the initial display.
The default setting is Engineering.
❖ User Auto Reduce/Enlarge:
Define a user auto reduce/enlarge ratio for each document size when copying with the User Auto Reduce / Enlarge feature.
[Off] determines whether to display a defined user auto reduce/enlarge ratio
on a copier screen.
Select one of the following paper sizes for a user auto reduce/enlarge ratio
defined for each document size:
• 34" × 44"
• 22" × 34"
• 17" × 22"
• 11" × 17"
• 81/2" × 11"
• 36" × 48"
• 24" × 36"
• 18" × 24"
• 12" × 18"
• 9" × 12"
Reference
p.3 “Accessing User Tools”
"Supplementary Information", Copier / Document Server Reference
80
Edit
Edit
This section describes the user tools in the Edit menu under Copier / Document
Server Features.
Default settings are shown in bold type.
❖ Adjust Position
Specify the default setting for Print Position Adjustment.
The default setting is Bottom: 20 mm / Right: 20 mm (Metric version) / Bottom: 0.8" / Right: 0.8" (Inch version)
• Metric version: 0 to 200 mm (1 mm increments)
• Inch version: 0 to 7.8" (0.1" increments)
3
❖ Erase Border Width
Specify the width of the border to be erased. The width is displayed over the
other copier screen images.
The default setting is 10 mm (Metric version) / 0.4" (Inch version).
❖ Erase Original Shadow in Combine
In Combine Copy or Booklet/Magazine Copy mode, you can specify whether
to erase a 3 mm, 0.1" bounding margin around all four edges of each original.
The default setting is On.
81
Copier / Document Server Features
❖ Image Repeat Separation Line
You can select a separation line using the Image Repeat function from: None,
Solid, Broken A, Broken B, or Crop Marks.
• None
• Solid
3
• Broken A
• Broken B
• Crop Marks
The default setting is None.
Selecting solid or broken lines might produce a blank area of approximately
1.5 mm (0.06") in width along the separation line.
82
Edit
❖ Double Copies Separation Line
You can select a separation line using the Double Copies function from: None,
Solid, Broken A, Broken B, or Crop Marks.
• None
• Solid
3
• Broken A
• Broken B
• Crop Marks
The default setting is None.
Selecting solid or broken lines might produce a blank area of approximately
1.5 mm (0.06") in width along the separation line.
83
Copier / Document Server Features
❖ Separation Line in Combine
You can select a separation line using the Combine function from: None, Solid, Broken A, Broken B, or Crop Marks.
• None
• Solid
3
• Broken A
• Broken B
• Crop Marks
The default setting is None.
Selecting solid or broken lines might produce a blank area of approximately
1.5 mm (0.06") in width along the separation line.
❖ Copy Order in Combine
You can set the copy order in Combine mode to Left to Right or Top to Bottom.
GCAH090E
The default setting is From Left to Right.
84
Edit
❖ Program / Delete Format
Store a format (background) image for use with Format Overlay. You can
store up to four formats. See "Program/Delete Overlay Format".
❖ Margin Adjustment Priority
Specify the default setting for the margin size.
You can set the top and bottom margin size.
The default setting is Top: 20 mm, Bottom: 20 mm (Metric version) / Top: 0.8",
Bottom: 0.8" (Inch version).
The size can be set as follows:
• Meric version: 0 to 200 mm (1 mm increments)
• Inch version: 0.0" to 7.9" (0.1" increments)
3
❖ Partial Copy Size
Specify the default settings of the start position (Y1) and the copy size (Y2).
The default setting is Y1: 0 mm, Y2: 210 mm (Metric version) / Y1: 0.0", Y2:
8.3" (Inch version).
The size can be set as follows:
• Metric version: Y1: 0 to 14790 mm (1 mm increments), Y2: 210 mm to 15000
mm (1 mm increments)
• Inch version: Y1: 0.0" to 582.3" (0.1" increments), Y2: 8.3" to 590.6" (0.1" increments)
Reference
p.3 “Accessing User Tools”
p.93 “Program / Delete Overlay Format”
85
Copier / Document Server Features
Stamp
This section describes the user tools in the Stamp menu under Copier / Document Server Features.
Default settings are shown in bold type.
Background Numbering
This section describes the user tools in the Background Numbering menu under
Stamp.
3
❖ Size
You can set the size of the numbers.
The default setting is Normal.
❖ Density
You can set the density of the numbers.
The default setting is Normal.
Preset Stamp
This section describes the user tools in the Preset Stamp menu under Stamp.
❖ Stamp Language
You can select the language of the message printed in Stamp mode.
The default setting is English.
❖ Stamp Priority
You can select the stamp type given priority when [Preset Stamp] is pressed.
The default setting is COPY.
86
Stamp
❖ Stamp Format
Specify how each of stamp is printed.
• Stamp Position
Specify where to print the stamp.
The default setting is Top Right.
• Stamp Position
You can adjust the position of the stamp within the available ranges shown
below.
Metric version:
"Top Left"…T/B: 4-407mm, L/R: 4-407mm
"Top Center"…T/B: 4-407mm, L/R: 203-203mm
"Top Right"…T/B: 4-407mm, L/R: 4-407mm
"Center Left"…T/B: 203-203mm, L/R: 4-407mm
"Center"…T/B: 203-203mm, L/R: 203-203mm
"Center Right"…T/B: 203-203mm, L/R: 4-407mm
"Bottom Left"…T/B: 4-407mm, L/R: 4-407mm
"Bottom Center"…T/B: 4-407mm, L/R: 203-203mm
"Bottom Right"…T/B: 4-407mm, L/R: 4-407mm
3
Inch version:
"Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Center Left"…T/B: 8.0"-8.0", L/R: 0.1"-16.0"
"Center"…T/B: 8.0"-8.0", L/R: 8.0"-8.0"
"Center Right"…T/B: 8.0"-8.0", L/R: 0.1"-16.0"
"Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
• Size
You can set the size of the stamp.
The default setting is 1X.
• Density
You can set the pattern used to print the stamp.
Normal:
The stamp is printed on the image. You cannot check which parts will overlap.
Lighter:
The image can be seen through the stamp.
Lightest:
The image appears even clearer than in the Lighter setting.
The default setting is Normal.
• Page to Stamp
You can have the stamp printed on the first page or all pages.
The default setting is All Pages.
Reference
"Preset Stamp", Copy/ Document Server Reference
87
Copier / Document Server Features
User Stamp
This section describes the user tools in the User Stamp menu under Stamp.
❖ Program / Delete Stamp
You can register, change, or delete user stamps.
You can register up to four custom stamps with your favorite designs.
❖ Stamp Format: 1-4
Specify how each of registered User Stamps 1 to 4 is printed.
• Stamp Position
Specify where to print the User Stamp.
The default setting is Top Right.
• Stamp Position
You can adjust the position of the User Stamp within the available ranges
shown below.
3
Metric version:
"Top Left"…T/B: 4-407mm, L/R: 4-407mm
"Top Center"…T/B: 4-407mm, L/R: 203-203mm
"Top Right"…T/B: 4-407mm, L/R: 4-407mm
"Center Left"…T/B: 203-203mm, L/R: 4-407mm
"Center"…T/B: 203-203mm, L/R: 203-203mm
"Center Right"…T/B: 203-203mm, L/R: 4-407mm
"Bottom Left"…T/B: 4-407mm, L/R: 4-407mm
"Bottom Center"…T/B: 4-407mm, L/R: 203-203mm
"Bottom Right"…T/B: 4-407mm, L/R: 4-407mm
Inch version:
"Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Center Left"…T/B: 8.0"-8.0", L/R: 0.1"-16.0"
"Center"…T/B: 8.0"-8.0", L/R: 8.0"-8.0"
"Center Right"…T/B: 8.0"-8.0", L/R: 0.1"-16.0"
"Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
• Page to Stamp
Sets whether to print the stamp on all pages or only the first page.
The default setting is All Pages.
Reference
"User Stamp", Copy/Document Server Reference
88
Stamp
Date Stamp
This section describes the user tools in the Date Stamp menu under Stamp.
❖ Format
You can select the date format for Date Stamp mode.
The default setting is DD / MM / YYYY (Metric version) / MM / DD / YYYY
(Inch version).
❖ Font
You can select the Date Stamp font.
The default setting is Font 1.
3
❖ Size
You can set the Date Stamp size.
The default setting is Auto.
❖ Superimpose
You can have the Date Stamp printed in white when it overlaps black parts of the image.
The default setting is Off.
❖ Stamp Setting
Specify how Date Stamp is printed.
• Stamp Position
Specify where to print the Date Stamp.
The default setting is Top Left.
• Stamp Position
You can adjust the position of the Date Stamp within the available ranges
shown below.
Metric version:
"Top Left"…T/B: 4-407mm, L/R: 4-407mm
"Top Center"…T/B: 4-407mm, L/R: 203-203mm
"Top Right"…T/B: 4-407mm, L/R: 4-407mm
"Bottom Left"…T/B: 4-407mm, L/R: 4-407mm
"Bottom Center"…T/B: 4-407mm, L/R: 203-203mm
"Bottom Right"…T/B: 4-407mm, L/R: 4-407mm
Inch version:
"Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
• Page to Stamp
Sets whether to print the stamp on all pages or only the first page.
The default setting is All Pages.
89
Copier / Document Server Features
Page Numbering
This section describes the user tools in the Page Numbering menu under Stamp.
❖ Stamp Format
You can select the page number format given priority when [Page Numbering]
is pressed.
The default setting is P1,P2....
❖ Font
You can select the page number printed in Page Numbering mode.
The default setting is Font 1.
3
❖ Size
You can set the size of the stamp printed in Page Numbering mode.
The default setting is Auto.
❖ Page Numbering in Combine
You can set page numbering when using the Combine function and the Page
Numbering function together.
The default setting is Per Original.
❖ Stamp Position
Specify how each of stamp is printed.
• Stamp Position
Specify where to print the stamp.
• Stamp Position
You can adjust the position of the stamp within the available ranges shown
below.
Metric version:
"Top Left"…T/B: 4-407mm, L/R: 4-407mm
"Top Center"…T/B: 4-407mm, L/R: 203-203mm
"Top Right"…T/B: 4-407mm, L/R: 4-407mm
"Bottom Left"…T/B: 4-407mm, L/R: 4-407mm
"Bottom Center"…T/B: 4-407mm, L/R: 203-203mm
"Bottom Right"…T/B: 4-407mm, L/R: 4-407mm
Inch version:
"Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
"Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0"
"Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0"
90
Stamp
❖ Superimpose
You can have page numbers printed in white when they overlap black parts
of the image.
The default setting is Off.
❖ Page Numbering Initial Letter
You can select the page numbering initial letter between”P1, P2.../ P.1, P.2...”
and ”S1, S2.../ S.1, S.2...”
The default setting is P1,P2.../P.1,P.2....
Reference
p.3 “Accessing User Tools”
3
91
Copier / Document Server Features
Input/Output
This section describes the user tools in the Input/Output menu under Copier /
Document Server Features.
Default settings are shown in bold type.
❖ Rotate Sort: Auto Paper Continue
Specify to continue copying when paper of the required orientation has run
out during rotate sort.
The default setting is Off.
• On
Copying continues using copy paper of a different orientation. The copy
job will finish even if you have left the machine.
• Off
When paper of the required orientation runs out, the machine stops copying and prompts you to supply copy paper. After you have loaded paper,
the machine will continue copying.
3
❖ Customize Function: Fold Type/Fold Option
Specify which "Fold Type/Fold Option" has priority to be shown on the initial display.
•
•
•
•
•
•
Off
Fan Fold 81/2inch
Fan Fold 9inch
Fan Fold 11inch
Fan Fold 12inch
Fan Fold 81/2inch (Margin Fold)
Reference
p.3 “Accessing User Tools”
92
Program / Delete Overlay Format
Program / Delete Overlay Format
This section describes how to program / delete Overlay Format.
Note
❒ The maximum size of original size to be stored is A0(E). You cannot store long
length originals.
❒ For details about Format Overlay, see "Format Overlay", Copier / Document
Server Reference.
3
Reference
"Format Overlay", Copier / Document Server Reference
Programming an Overlay Format
This section describes how to program an Overlay Format.
A Make sure the machine is ready to copy.
B Press [Copier / Document Server Features].
C Press [Edit].
D Press [Program / Delete Format].
E Check that [Program] is selected.
F Select a format number (1 to 4).
93
Copier / Document Server Features
G Select the original orientation.
3
H Place the original, and then press [Start Scanning].
The original is scanned and stored.
I Press [Exit].
J Press the {User Tools / Counter} key.
Overwriting a Stored format
This section describes how to overwrite a stored Overlay Format.
A Make sure the machine is ready to copy.
B Press [Copier / Document Server Features].
C Press [Edit].
D Press [Program / Delete Format].
E Check that [Program] is selected.
F Select a format number you want to overwrite.
G Press [Yes].
You cannot restore a format that has been overwritten.
Press [Stop] if you do not want to overwrite the existing format.
H Select the original orientation.
I Place the original, and then press [Start Scanning].
The original is scanned and stored.
J Press [Exit].
K Press the {User Tools / Counter} key.
94
Program / Delete Overlay Format
Deleting a Stored format
This section describes how to delete a stored Overlay Format.
A Make sure the machine is ready to copy.
B Press [Copier / Document Server Features].
C Press [Edit].
D Press [Program / Delete Format].
E Press [Delete].
F Select the format number you want to delete.
G Press [Yes].
3
You cannot restore a format that has been deleted.
Press [No] if you do not want to delete the existing format.
H Press [Exit].
I Press the {User Tools / Counter} key.
95
Copier / Document Server Features
Settings for the Document Server
This section describes user tool settings for the Document Server.
For details, see "System Settings", and "Copier / Document Server Features".
❖ System Settings
3
Heading
Item
Default
General Features
Warm-up Beeper
On
General Features
Copy Count Display
Up
General Features
Output: Document Server
Internal Tray 1
Tray Paper Settings Paper Tray Priority: Copier
Tray 1
Timer Settings
Copier / Document Server Auto Reset Timer
60 second(s)
Administrator
Tools
Auto Delete File in Document Server
Yes, 3 day(s)
Administrator
Tools
Delete All Files in Document Server
-
Reference
p.35 “System Settings”
96
4. Printer Features
This chapter describes user tools in the Printer Features menu. For details on
how to access Printer Features, see "Accessing User Tools".
List / Test Print
This section describes the user tools in the Test Print menu under Printer Features.
❖ Multiple Lists
You can print the configuration page and error log.
❖ Configuration Page
You can print the machine's current configuration values.
❖ Error Log
You can print error logs listing all errors that occurred during printing. The
most recent 30 errors are stored in the error log. If a new error is added when
there are 30 errors already stored, the oldest error is deleted.
However, if the oldest error belongs to one of the following types of print
jobs, it is not deleted. Instead, it will be stored in a separate error log, up to a
maximum of 30 errors. You can check any of these print jobs for error log information.
• Sample Print
• Locked Print
• Hold Print
• Stored Print
The records of Auto Job Cancel and jobs canceled manually from the control
panel can be printed.
❖ Menu List
You can print a Menu List showing the machine's function menus.
❖ PS Configuration / Font Page
You can print the current configuration and installed PostScript font list.
❖ PDF Configuration / Font Page
You can print the current configuration and installed PDF font list.
❖ Hex Dump
You can print in the Hex Dump mode.
97
Printer Features
Note
❒ When printing from the [List / Test Print] menu, the machine first tries to print
from a tray containing plain or recycled paper. It checks the cut paper tray
first, then the paper roll tray. If there is no paper tray containing plain or recycled paper, the machine then tries print on tracing paper and finally printing film.
❒ If the paper roll tray is selected for list printing, the roll paper is cut to A4 size.
The paper trays available to be selected for list printing are those that have
been selected [Yes] in [Apply Auto Paper Select] of [Paper Type: Tray 1-3] under
[System Settings]. (except for printing the system configuration listing).
❒ The machine first tries to use A4 (81/2" x 11") paper for printing the Configuration Page. If the cut paper tray does not contain A4 paper, the machine then
tries to use 210 mm-wide paper by checking the paper roll tray and then the
preferred paper tray.
❒ The machine first tries to use the preferred paper tray that usually contains
plain or recycled paper to print PS Configuration / Font Page. The page will
be printed to fit the size of the plain or recycled paper.
4
Printing the Configuration Page
This section describes how to print the Configuration Page.
A Press [Printer Features].
B Press [Configuration Page] on the [List / Test Print].
The configuration page is printed.
C Press the {User Tools/Counter} key.
98
List / Test Print
Interpreting the Configuration Page
This section describes the Configuration Page.
❖ System Reference
• Unit Number
Displays the serial number assigned to the board by its manufacturer.
• Total Memory
Displays the total amount of memory (SDRAM) installed on the printer.
• Firmware Version
Printer: Displays the version number of the printer firmware.
System: Displays the version number of the system firmware.
Engine: Displays the version number of the printer engine.
LCDC: Displays the version number of the panel display.
NIB: Displays the version number of the Network interface.
• Device Connection
This item(s) appears when the device option(s) is installed.
• HDD: Font / Macro Download
Displays the capacity of the hard disk drive.
• Printer Language
Displays the version number of the printer driver language.
• Connection Equipment
Displays the installed optional equipments.
4
❖ Paper Input
Displays settings made under Tray Paper Settings menu.
❖ System
Displays settings made under the System menu.
❖ PS Menu
Displays settings made under PS Menu.
❖ PDF Menu
Displays settings made under PDF Menu.
❖ Host Interface
Displays settings made under the Host Interface menu.
When DHCP is active on the network, the actual IPv4 address, subnet mask
and gateway address appear in parentheses on the configuration page.
❖ Interface Information
Displays the interface information.
Reference
p.3 “Accessing User Tools”
99
Printer Features
Maintenance
This section describes the user tools in the Maintenance menu under Printer Features.
Default settings are shown in bold type.
❖ List / Test Print Lock
You can lock the [List / Test Print] menu.
The default setting is Off.
❖ Delete All Temporary Print Jobs
You can delete all print jobs temporarily stored in the machine.
❖ Delete All Stored Print Jobs
You can delete all print jobs stored in the machine.
4
Reference
p.3 “Accessing User Tools”
p.35 “System Settings”
100
System
System
This section describes the user tools in the System menu under Printer Features.
Default settings are shown in bold type.
❖ Print Error Report
Select this to have an error report printed when a printer or memory error occurs.
The default setting is Off.
❖ Auto Continue
You can select this to enable Auto Continue. When it is On, printing continues
after a system error occurs.
The default setting is Off.
If this option is set to [Off], a message appears when the specified tray runs
out of paper. To cancel a current print job, press [Job Reset]. Printing resumes
automatically when you reload the driver-specified tray.
4
❖ Memory Overflow
Select this to have a memory overflow error report printed.
The default setting is Do not Print.
❖ Rotate by 180 Degrees
Specify whether to rotate the print image 180 degrees relative to the paper orientation.
The default setting is Off.
❖ Auto Delete Temporary Print Jobs
You can select to automatically delete print jobs temporarily stored in the machine.
The default setting is Off.
If you select [On], you can set up to 200 hours for auto file deleting.
❖ Auto Delete Stored Print Jobs
You can select to automatically delete print jobs stored in the machine.
The default setting is On, 3 day(s).
If you select [On], you can set up to 180 days for auto file deleting.
❖ Initial Print Job List
You can set the desired type of print job list that appears on the screen when
you press [Print Jobs].
The default setting is Complete List.
• Complete List
Displays the list of print jobs stored in the machine.
• List Per User ID
Displays the list of the User ID who stored a file in the machine.
101
Printer Features
❖ Memory Usage
You can select the amount of memory used in Font Priority or Frame Priority,
according to paper size or resolution.
The default setting is Frame Priority.
• Font Priority
This setting uses memory for registering fonts.
• Frame Priority
This setting uses frame memory for high speed printing.
❖ Copies
You can specify the number of print sets. This setting is disabled if the number of pages to print has been specified with the printer driver or another
command.
The default setting is 1.
The number of copies can be specified from 1 to 999 by increments of one.
4
❖ Blank Page Print
You can select whether or not to print blank pages.
The default setting is On.
Pages that match one of the following conditions are identified as blank.
• There are no images.
• There are images but they are outside the printable area.
• There are only blank characters.
❖ Reserved Job Waiting Time
You can specify how long the machine waits to receive a print job before allowing other functions such as the copier and scanner functions to interrupt
it.
The default setting is Short Wait.
❖ Printer Language
Specify the printer language.
The default setting is Auto.
This menu appears only when the PostScript 3 unit is installed.
❖ Sub Paper Size
You can enable the Auto Substitute Paper Size (A4, LT) feature.
The default setting is Off.
❖ Bypass Tray Setting Priority
Specify whether (Printer) Driver / Command or Machine Settings, has priority for determining the paper size for the bypass tray.
The default setting is Driver / Command.
❖ Edge to Edge Print
You can select whether or not to print on the entire sheet.
The default setting is Off.
The 5 mm margin along the edges may not be printed properly.
102
System
❖ Default Printer Language
You can set the default printer language if the machine cannot find the printer
language automatically.
The default setting is PS.
This menu appears only when the PostScript 3 unit is installed.
❖ Tray Switching
You can set to switch the paper tray.
The default setting is Off.
Reference
p.3 “Accessing User Tools”
"Loading paper", Troubleshooting
4
103
Printer Features
Host Interface
This section describes the user tools in the Host Interface menu under Printer
Features.
Default settings are shown in bold type.
❖ I/O Buffer
You can set the size of the I/O Buffer. Normally it is not necessary to change
this setting.
The default setting is 128KB.
❖ I/O Timeout
You can set how many seconds the machine should wait before ending a print
job. If data from another port usually arrives in the middle of a print job, you
should increase this timeout period.
The default setting is 15 seconds.
4
Reference
p.3 “Accessing User Tools”
104
PS Menu
PS Menu
This section describes the user tools in the PS Menu under Printer Features.
Default settings are shown in bold type.
❖ Data Format
You can select a data format.
The default setting is TBCP.
This setting is not effective when operating the machine with a parallel or
EtherTalk connection.
When operating the machine with a parallel connection, and also if the binary
data is sent from the printer driver, the print job is canceled.
When operating the machine with an Ethernet connection, the print job is canceled under the following conditions:
• The printer driver data format is TBCP, and the data format selected on the
display panel is Binary Data.
• The printer driver data format is binary, and the data format selected on
the display panel is TBCP.
4
❖ Resolution
You can set the print resolution in dots per inch.
The default setting is 600 dpi.
Reference
p.3 “Accessing User Tools”
105
Printer Features
PDF Menu
This section describes the user tools in the PDF Menu under Printer Features.
Default settings are shown in bold type.
❖ Change PDF Password
Set the password for the PDF file executing PDF Direct Print.
• Current Password
• New Password
• Confirm New Password
A password can be set using the Web Image Monitor, but in this case the password information is sent through the network. If security is a priority, set the
password using this menu from the Control Panel.
4
❖ PDF Group Password
Set the group password already specified with DeskTopBinder.
• Current Password
• New Password
• Confirm New Password
A password can be set using the Web Image Monitor, but in this case the password information is sent through the network. If security is a priority, set the
password using this menu from the Control Panel.
❖ Resolution
You can set the print resolution in dots per inch.
The default setting is 600 dpi.
Reference
p.3 “Accessing User Tools”
106
5. Scanner Features
This chapter describes user tools in the Scanner Features menu. For details on
how to access Scanner Features, see "Accessing User Tools".
General Settings
This section describes the user tools in the General Settings menu under Scanner
Features.
Default settings are shown in bold type.
❖ Switch Title
Select the title to be shown on the destination list.
The default setting is Title 1.
❖ Update Delivery Server Destination List
Press [Update Delivery Server Destination List] to update the receivers from the
delivery server. To use this function, it is necessary to set [Delivery Option] to
[On].
For details about "Delivery Option", see "File Transfer".
❖ Search Destination
Select a destination list to be used in "Search Destination".
To search from LDAP server, it is necessary to register the LDAP server in
[System Settings] and set [LDAP Search] to [On].
The default setting is Address Book.
For details about "LDAP Search", see ”Administrator Tools".
❖ TWAIN Standby Time
When the machine is being used to send e-mail or a file, or functioning as
Document Server or a network delivery scanner, a scanning request to the
machine as a TWAIN scanner will switch the machine to the network TWAIN
scanner function. This setting determines the delay until the machine switches to the network TWAIN scanner function.
The default setting is Set Time, 10 sec..
When [Immediate] is selected, the machine will switch to the network TWAIN
scanner function at once.
When [Set Time] is selected, you can enter the delay time with the number
keys (3-30 seconds). The machine will switch to the network TWAIN scanner
function when the time set here passes after the last key operation.
❖ Destination List Display Priority 1
Select a destination list to be displayed when the machine is in the initial state.
You can select either [E-mail / Folder] or [Delivery Server].
The default setting is Delivery Server.
107
Scanner Features
❖ Destination List Display Priority 2
In the machine’s address book, select which address book appears by default.
You can select either [E-mail Address] or [Folder].
The default setting is E-mail Address.
❖ Print & Delete Scanner Journal
Up to 250 transmission/delivery results can be checked on this machine. If
the stored transmission / delivery results reach 250, select whether to print
the delivery journal.
• On
The transmission/delivery journal is printed automatically. The printed
journal is deleted.
• Off
Transmission/delivery results are deleted one by one as new results are
stored.
• Do not Print: Disable Send
Transmission/delivery cannot be performed when the journal is full.
Selecting [Print Scanner Journal] or [Delete Scanner Journal] resets the journal,
which allows you to begin transmission/delivery.
The default setting is On.
When printed, all records are deleted after printing. When not printed,
records over the limit are automatically deleted in succession from the oldest
record.
While the journal is being printed, files with the status waiting cannot be sent.
5
❖ Print Scanner Journal
The scanner journal is printed and deleted.
Before printing the scanner journal, be sure to raise the original switching lever.
❖ Delete Scanner Journal
The scanner journal is deleted without being printed.
Reference
p.54 “File Transfer”
p.59 “Administrator Tools”
108
Scan Settings
Scan Settings
This section describes the user tools in the Scan Settings menu under Scanner
Features.
Default settings are shown in bold type.
❖ Next Original Wait Setting
To divide originals and scanning them individually to make a single file, select [Off], [Set Wait Time], or [Continuous Wait] for the waiting status.
The default setting is Set Wait Time.
The default setting time is 60 sec..
If [Set Wait Time] is selected, enter the wait time in seconds (3-999) for placing
additional originals with the number keys. Scanning will start if additional
originals are placed and the {Start} key is pressed within this time. You can
end scanning and begin transmission by pressing the {q} key within this
time. Once the specified time has elapsed, transmission starts automatically.
If [Continuous Wait] is selected, the machine will wait for additional originals
until the {q} key is pressed. Scanning will start when additional originals
are placed and the {Start} key is pressed. You can end scanning and begin
sending by pressing the {q} key.
If a paper misfeed occurs or any of the following operations are performed
while the machine is waiting for additional originals, the countdown stops
and does not start again until the {q} key is pressed.
• Changing the settings such as the scan settings
• Opening the scanner cover
• Pressing the {Interrupt} key to activate the copy mode
5
Reference
p.3 “Accessing User Tools”
"Scan Settings", Scanner Reference
"Scan Size", Scanner Reference
109
Scanner Features
Send Settings
This section describes the user tools in the Send Settings menu under Scanner
Features.
Default settings are shown in bold type.
❖ Compression (Black & White)
Select whether or not to compress scan files.
The default setting is On.
Compression reduces the time required for transferring the scan file.
The actual time required for file transfer will vary depending on the file size
and network load.
❖ Max. E-mail Size
Select whether or not to limit the size of an e-mail to which an image is attached.
The default setting is On, 2048KB.
When [On] is selected, enter the size limit (128-102400 KB) with the number
keys.
When the SMTP limits the size, match that setting.
5
❖ Divide & Send E-mail
This function is effective only when [On] is selected for [Max. E-mail Size].
Select whether or not an image exceeding the size specified in [Max. E-mail Size]
should be divided and sent using more than one e-mail.
The default setting is Yes (per Max. Size).
The default maximum number of divisions is 5.
When [Yes (per Max. Size)] is selected, enter the Max. Number of Divisions (2500) with the number keys.
When [Multi-page: TIFF] or [Multi-page: PDF] is selected for [File Type], the image
will not be divided even if [Yes (per Page)] is selected.
When [Yes (per Max. Size)] is selected, some received files may not be able to be
restored, depending on the type of e-mail software.
If [Off] is selected for this option, and an attempt is made to send an e-mail
message that is larger than the specified maximum e-mail size, the machine
will read only as much of the message as the maximum size allows.
When this happens, you can then select either to cancel sending or send only
the portion that has been read.
Set the maximum e-mail size within the capacity of the SMTP server.
110
Send Settings
❖ Insert Additional E-mail Info
Select the language in which e-mail information such as title, date, and administrator's e-mail address is sent.
• On
• Off
Select one of the following 20 languages:
• British English, American English, German, French, Italian, Spanish, Dutch,
Portuguese, Polish, Czech, Swedish, Finnish, Hungarian, Norwegian, Danish, Japanese, Simplified Chinese, Traditional Chinese, Russian, and
Hangul.
Even if [Off] is selected, the massage entered into the scanner screen will be
sent by e-mail.
The e-mail text which is a template cannot be changed.
❖ No. of Digits for Single Page Files
Sets digit number for serial number to attach to Single Page file name.
The default setting is 4 Digits.
5
❖ Stored File E-mail Method
Specify the e-mail setting for sending stored files. You can select [Send File] or
[Send URL Link]. This setting can be used for the following:
The default setting is Send File.
• Sending Stored Files by E-mail
• Simultaneous Storage and Sending by E-mail
If you select [Send File], actual files are attached to e-mails.
If you select [Send URL Link], URL Links to file locations are attached to emails.
Reference
p.3 “Accessing User Tools”
111
Scanner Features
5
112
6. Registering Addresses and
Users for Scanner Functions
This chapter describes how to register destinations and users in the Address
Book. For details on how to access System Settings see "Accessing User Tools".
Address Book
This section describes Address Book settings.
Registering information such as the names of users and their e-mail addresses in
the Address Book allows you to manage them easily.
Important
❒ Address Book data is stored on the hard disk. It can be lost if there is some
kind of hard disk failure. The manufacturer shall not be responsible for any
damages resulting data loss.
You can register and manage the following items in the Address Book:
❖ Names
You can register the name of the user and the key display. This is the basic information required for managing user of the machine.
To register an e-mail address in the address book, you must register information such as the user name and destination name in advance.
❖ Auth. Info
You can register user codes in order to restrict particular functions to certain
users, and to check their use of each function. You can also register login user
names and login passwords to be used when sending e-mail, sending to folders, or accessing an LDAP server.
113
Registering Addresses and Users for Scanner Functions
❖ Protection
You can set protection codes to stop sender's name from being used or folders
from being accessed without authorization.
❖ E-mail Address
You can register e-mail destinations in the Address Book.
6
114
Address Book
❖ Folder
You can register the protocol, path name and server name.
• SMB
• FTP
6
• NCP
❖ Add to Group
You can put registered e-mail and folder destinations into a group for easier
management.
115
Registering Addresses and Users for Scanner Functions
Note
❒ You can also use a Web Image Monitor to register names in the Address Book.
With the SmartDeviceMonitor for Admin, you can register multiple names at
the same time. For details about using Web Image Monitor, see the Web Image Monitor Help.
❒ Using Address Management Tool in SmartDeviceMonitor for Admin, you
can backup Address Book data. We recommend backing up data when using
the Address Book. For operating instructions, see SmartDeviceMonitor for
Admin Help.
Managing names in the Address Book
By registering a name and key display beforehand, you can specify e-mail and
folder destinations simply by selecting the name key.
Reference
p.118 “Registering Names”
Sending e-mail by Quick Dial
6
By registering e-mail addresses in the Address Book, you can specify e-mail destinations simply by selecting them from the scanner initial display when sending
a document using the scanner function. A registered e-mail address can be used
as the sender's address, and the sender's addresses are automatically entered in
the “From" field of an e-mail header.
Reference
p.132 “E-mail Destination”
Sending scanned files to a shared folder directly
After registering the path name, user name and password, you can connect to a
shared folder simply by selecting the destination shown on the initial scanner
display whenever sending files using the scanner function to a shared folder.
To share the folder using Windows, select the SMB protocol.
To register the folder to the FTP server, select the FTP protocol.
To register the folder to the NetWare server, select the NCP protocol.
Reference
p.137 “Registering Folders”
116
Address Book
Preventing unauthorized user access to shared folders from the
machine
After registering a protection code, you can specify the object of protection to
prevent an e-mail destination from being used without permission.
You can prevent unauthorized access to registered folders.
Reference
p.168 “Registering a Protection Code”
Managing users and machine usage
Register user codes to limit users to the following functions and check their use
of each function:
• Copier
• Document Server
• Scanner
• Printer
6
Reference
p.122 “Authentication Information”
117
Registering Addresses and Users for Scanner Functions
Registering Names
This section describes names in Address Book.
Register user information including their names.
The user name is useful for selecting a destination when sending e-mail. You can
also use it as a folder destination.
You can register up to 2000 names.
Registering Names
This section describes how to register names.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Press [New Program].
F Press [Change] under ”Name".
The name entry display appears.
G Enter the name, and then press [OK].
118
The key display name is set automatically.
Registering Names
H When you want to change the key display, press [Change] under "Key Display".
I Enter the key display, and then press [OK].
J Press the key for the classification you want to use under "Select Title”.
The keys you can select are as follows:
• [Frequent]: Added to the page that is displayed first.
• [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added
to the list of items in the selected title.
You can select [Frequent] and one more page for each title.
6
K Press [OK].
L Press [Exit].
M Press the {User Tools/Counter} key.
Note
❒ The name can be used for documents in the Document Server. For details
about the Document Server, see "Using the Document Server", Copy/ Document Server Reference.
❒ You can register up to 2000 programs and allocate them registration numbers between 00001 and 50000.
❒ Registration numbers are initially assigned automatically, but you can
change them afterward. To change a registration number, press [Change] to
the right of “Registration No.”, and enter a new number using the number
keys.
Reference
"Entering Text", About This Machine
"Using the Document Server", Copy/ Document Server Reference
119
Registering Addresses and Users for Scanner Functions
Changing a Registered Name
This section describes how to change a registered name.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the registered name you want to change.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F To change the name or key display, press [Change] under the name or key
display.
G Enter the name or key display, and then press [OK].
H To change the title, press the key for the classification you want to use from
Select Title.
I To change the registration number, press [Change] under ”Registration No.".
J Enter a new registration number using the number keys, and then press the
{q} key.
K Press [OK].
L Press [Exit].
M Press the {User Tools/Counter} key.
Reference
"Entering Text", About This Machine
120
Registering Names
Deleting a Registered Name
This section describes how to delete a registered name.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Press [Delete].
E Select the name you want to delete.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Yes].
G Press [Exit].
H Press the {User Tools/Counter} key.
121
Registering Addresses and Users for Scanner Functions
Authentication Information
This section describes the procedure for authenticating a user code.
Important
❒ The functions associated with each user code are the same. If you change or
delete user codes, management data and limits associated with that code become invalid.
Register user codes to limit users to the following functions and check their use
of each function:
Copier
Document Server
Scanner
Printer
Note
❒ You can register up to 100 user codes. If you add the optional user account
enhance unit, you can register up to 500 user codes.
❒ The number of copies scanned using the scanner function is counted for each
user code. This allows you to check each user's usage.
❒ To automatically register the printer driver user code, select [Printer: PC Control] for the printer in User Code Authentication. To use the user code set in
User Tools, set the user codes registered in User Tools for the printer driver.
❒ For details about setting user codes for the printer driver, see Printer Driver
Help.
6
122
Authentication Information
Registering a User Code
This section describes how to register a user code.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Press the name whose code is to be registered, or enter the registered num-
6
ber using the number key.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Auth. Info].
G Enter the user code using the number keys, and then press the {q} key.
If you make a mistake, press [Clear] or the {Clear/Stop} key.
H Press [TNext] twice.
123
Registering Addresses and Users for Scanner Functions
I Select the functions to be used with the user code from Available Functions.
J Press [OK].
To continue registering user codes, repeat the procedure from step E.
K Press [Exit].
L Press the {User Tools/Counter} key.
Note
❒ You can enter a one-to eight-digit user code.
6
❒ To register the name, see “Registering Names”.
Reference
p.118 “Registering Names”
Changing a User Code
This section describes how to change a registered user code.
Important
❒ Even if you change a user code, the counter value will not be cleared.
A Press [System Settings].
124
B Press [Administrator Tools].
C Press [Address Book Management].
Authentication Information
D Check that [Program / Change] is selected.
E Select the user whose user code you want to change.
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Auth. Info].
G Press [Change], and then enter the new user code using the number keys
6
H Press the {q} key.
I To change the available functions, press [Auth. Info] and then press [TNext]
twice.
J Press the key to select the functions to enable them.
Press the key to highlight it, and then the function is enabled. To cancel a selection, press the highlighted key.
K Press [OK].
L Press [Exit].
M Press the {User Tools/Counter} key.
Note
❒ To change the name, key display and title, see “Changing a Registered
Name”.
Reference
p.120 “Changing a Registered Name”
125
Registering Addresses and Users for Scanner Functions
Deleting a User Code
This section describes how to delete registered user code.
Important
❒ After clearing the user code, the counter is automatically cleared.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose code is to be deleted.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Auth. Info].
G Press [Change] to delete the user code, and then press the {q} key.
H Press [OK].
I Press [Exit].
126
Authentication Information
J Press the {User Tools/Counter} key.
Note
❒ To delete a name from the Address Book entirely, see “Deleting a Registered Name”.
Reference
p.121 “Deleting a Registered Name”
Displaying the Counter for Each User
This section describes how to display the counter for each user.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Display / Clear / Print Counter per User].
D Select the function usage you want to print from [Print Counter] or [Scanner
Counter].
Counters for individual function usage under each user code appear.
127
Registering Addresses and Users for Scanner Functions
Printing the Counter for Each User
This section describes how to print the counter for each user.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Display / Clear / Print Counter per User].
D Select a user code from the left side of the display.
6
Press [Select All on the Page] to select all user codes on the page.
E Press [Print Counter List] under "Per User".
Enter the user code, and then press the {q} key if the User Code Authentication is specified.
128
Authentication Information
F Select the function usage you want to print from [Copier Counter], [Printer
Counter], [Scanner Counter], and [Total Prints].
G Press [Print].
Printing the Counter for All Users
This section describes how to print the counter for all users.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Display / Clear / Print Counter per User].
D Press [Print Counter List] under "All Users".
Enter the user code, and then press the {q} key if the User Code Authentication is specified.
E Select the function usage you want to print from [Copier Counter], [Printer
Counter], [Scanner Counter], and [Total Prints].
F Press [Print].
129
Registering Addresses and Users for Scanner Functions
Clearing the Number of Prints
This section describes how to clear the counter.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Display / Clear / Print Counter per User].
D Select the user code to clear.
E To clear the number of prints made under a user code, select the user code
6
from the left side of the display.
Press [Select All on the Page] to select all user codes on the page.
F Press [Clear] under "Per User".
G Select the function usage you want to clear from [Copier Counter], [Printer
Counter],[Scanner Counter], and [All Counters].
H Press [OK].
I To clear the number of prints for all user codes, press [Clear] under "All Users".
J Select the function usage you want to clear from [Copier Counter], [Printer
Counter],[Scanner Counter], and [All Counters].
130
Authentication Information
K Press [OK].
L Press [Exit].
M Press the {User Tools/Counter} key.
6
131
Registering Addresses and Users for Scanner Functions
E-mail Destination
This section describes the procedure for registering, changing, and deleting Email Destination.
Register e-mail destinations so you do not need to enter an e-mail address every
time, and can send scan files from scanner function by e-mail.
• It is easy to select the e-mail destination if you register “Name" and “Key Display" as the e-mail destination.
• You can register e-mail destinations as a group.
• You can use the e-mail address as the sender's address when sending scan
files in scanner mode. If you want to do this, set a protection code on the sender address to prevent unauthorized access.
Note
❒ You can select an e-mail address from an LDAP server, and then register it in
the Address Book. See “Sending Scan File by E-mail", Scanner Reference.
Reference
p.168 “Registering a Protection Code”
6
Registering an E-mail Destination
This section describes how to register an e-mail destination.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose e-mail address you want to register. Press the name
key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
132
E-mail Destination
F Press [E-mail].
G Press [Change] under "E-mail Address".
H Enter the e-mail address, and then press [OK].
6
I Press [OK].
J Press [Exit].
K Press the {User Tools/Counter} key.
Note
❒ You can enter up to 128 characters for the e-mail address.
❒ To register the name, see Registering Names”.
Reference
p.118 “Registering Names”
p.123 “Registering a User Code”
p.158 “Registering Names to a Group”
Using the e-mail address as the sender
This section describes how to use the e-mail address as a sender.
A Press [Protection].
B Press [Sender] under "Use Name as".
133
Registering Addresses and Users for Scanner Functions
Changing an E-mail Destination
This section describes how to change an e-mail destination.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose e-mail address you want to change.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [E-mail].
G Press [Change] under "E-mail Address".
H Enter the e-mail address, and then press [OK].
I Press [OK].
J Press [Exit].
134
E-mail Destination
K Press the {User Tools/Counter} key.
Note
❒ To change the name, key display and title, see “Changing a Registered
Name”.
Reference
p.120 “Changing a Registered Name”
p.133 “Using the e-mail address as the sender”
"Entering Text", About This Machine
Deleting an E-mail Destination
This section describes how to delete an e-mail destination.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose e-mail address you want to delete.
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [E-mail].
G Press [Change] under "E-mail Address".
H Press [Delete All], and then press [OK].
I Press [OK].
J Press [Exit].
135
Registering Addresses and Users for Scanner Functions
K Press the {User Tools/Counter} key.
Note
❒ To delete the name, key display, and title, see “Deleting a Registered Name”.
Reference
p.121 “Deleting a Registered Name”
6
136
Registering Folders
Registering Folders
This section describes the procedure for registering, changing, and deleting folders.
By registering a shared folder, you can send scan files to it directly.
There are three types of protocol you can use:
• SMB
For sending files to shared Windows folders.
• FTP
Use when sending files to an FTP server.
• NCP
Use when sending files to an NetWare server.
Note
❒ For details about protocols, server names, and folder levels, consult your network administrator.
❒ You can prevent unauthorized users from accessing folders from the machine. See "Registering a Protection Code".
❒ You can only select either SMB, FTP, or NCP. If you change protocol after finishing your settings, all previous entries are cleared.
6
137
Registering Addresses and Users for Scanner Functions
Using SMB to Connect
This section describes the procedure for registering, changing, and deleting SMB
folders.
Note
❒ To register a folder in an FTP server, see “Using FTP to Connect”.
❒ To register a folder in an NetWare server, see “Using NCP to Connect”.
Reference
p.145 “Using FTP to Connect”
p.150 “Using NCP to Connect”
Registering a SMB Folder
This section describes how to register a SMB folder.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose folder you want to register. Press the name key, or
enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
138
Registering Folders
F Press [Auth. Info], and then press [TNext].
G Press [Specify Other Auth. Info] on the right side of Folder Authentication.
When [Do not Specify] is selected, the SMB User Name and SMB Password that
you have specified in Default User Name / Password (Send) of File Transfer
settings applies.
H Press [Change] under "Login User Name".
I Enter the login user name, and then press [OK].
J Press [Change] under "Login Password".
K Enter the password, and then press [OK].
L Enter the password again to confirm, and then press [OK].
M Press [Folder].
N Check that [SMB] is selected.
6
To specify a folder, you can either enter the path manually or locate the folder
by browsing the network.
O Press [Connection Test] to check the path is set correctly.
P Press [Exit].
If the connection test fails, check the settings, and then try again.
Q Press [OK].
139
Registering Addresses and Users for Scanner Functions
R Press [Exit].
S Press the {User Tools/Counter} key.
Note
❒ To register the name, see Registering Names”.
❒
❒
❒
❒
You can enter up to 64 characters for the user name.
You can enter up to 64 characters for the password.
You can enter a path using up to 128 characters.
If User Authentication is specified, contact your administrator.
Reference
p.118 “Registering Names”
p.140 “Locating the SMB folder manually”
p.141 “Locating the SMB folder using Browse Network”
Locating the SMB folder manually
This section describes how to locate the SMB folder manually.
6
A Press [Change] under "Path".
B Enter the path where the folder is located.
C Press [OK].
If the format of the entered path is not correct, a message appears. Press [Exit],
and then enter the path again.
Note
❒ Enter the path using this format: “\\ServerName\Share- Name\PathName”.
❒ You can also enter an IPv4 address.
❒ You can enter a path using up to 128 characters.
140
Registering Folders
Locating the SMB folder using Browse Network
This section describes how to locate the SMB folder using Browse Network.
A Press [Browse Network].
The client computers sharing the same network as the machine appear.
If you have already specified your user name and password in steps 7 to 13
on "Registering a SMB Folder", the Network display only lists client computers you are authorized to access.
B Select a client computer.
Shared folders under it appear.
6
You can press [Up One Level] to switch between levels.
C Select the folder you want to register, and then Press [OK].
If a Login Screen Appears
This section describes how to log on to the machine if the login screen appears
when you try to access a folder by browsing the network.
If you have not specified folder authentication, or if an incorrect user name or
password has been entered for folder authentication, the login screen appears.
A Enter the login user name, and then press [OK].
Enter the login user name specified for folder authentication.
B Enter the password, and then press [OK].
The path to the selected folder appears.
If a message appears, press [Exit], and then enter the login user name and
password again.
141
Registering Addresses and Users for Scanner Functions
Changing a SMB Folder
This section describes how to change settings of the registered SMB folder.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose folder you want to change.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Folder].
G Select the items you want to change.
H Press [Connection Test] to check the path is set correctly.
I Press [Exit].
J Press the {User Tools/Counter} key.
Note
❒ To change the name, key display and title, see “Changing a Registered
Name”.
❒ If the connection test fails, check the settings, and then try again.
Reference
p.120 “Changing a Registered Name”
p.143 “Changing the registered SMB folder”
p.143 “To change the protocol”
142
Registering Folders
Changing the registered SMB folder
This section describes how to change the registered SMB folder.
A Press [Change] under "Path".
B Enter the New path where the folder is located, and then press [OK].
You can also use Browse Network to specify a new folder. For details, see "Locating the SMB folder using Browse Network".
Reference
p.141 “Locating the SMB folder using Browse Network”
To change the protocol
This section describes how to change the protocol.
A Press [FTP] or [NCP].
6
B A confirmation message appears. Press [Yes].
Changing the protocol will clear all settings made under the previous protocol.
C Enter each item again.
Reference
p.145 “Registering a FTP Folder”
143
Registering Addresses and Users for Scanner Functions
Deleting a SMB folder
This section describes how to delete the registered SMB folder.
A [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose folder you want to delete.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Folder].
G Press the protocol which is not currently selected.
A confirmation message appears.
H Press [Yes].
I Press [OK].
J Press [Exit].
K Press the {User Tools/Counter} key.
Note
❒ To delete the name, key display, and title, see “Deleting a Registered Name”.
Reference
p.121 “Deleting a Registered Name”
144
Registering Folders
Using FTP to Connect
This section describes the procedure for registering, changing, and deleting FTP
folders.
Note
❒ To register a shared folder configured in Windows, see “Using SMB to Connect”.
❒ To register a folder in an NetWare server, see “Using NCP to Connect”.
Reference
p.138 “Using SMB to Connect”
p.150 “Using NCP to Connect”
Registering a FTP Folder
This section describes how to register an FTP folder.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose folder you want to register.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Auth. Info], and then press [TNext].
G Press [Specify Other Auth. Info] on the right side of "Folder Authentication".
When [Do not Specify] is selected, the FTP User Name and FTP Password that
you have specified in Default User Name / Password (Send) of File Transfer
settings applies. For details, see "File Transfer".
H Press [Change] under "Login User Name".
145
Registering Addresses and Users for Scanner Functions
I Enter the login user name, and then press [OK].
J Press [Change] under "Login Password".
K Enter the password, and then press [OK].
L Enter the password again to confirm, and then press [OK].
M Press [Folder].
N Press [FTP].
6
O Press [Change] under "Server Name".
P Enter the server name, and then press [OK].
Q Press [Change] under "Path".
R Enter the path, and then press [OK].
You can enter an absolute path, using this format: “/user/ home/username";
or a relative path, using this format: “directory/sub-directory".
If you leave the path blank, the login directory is assumed to be the current
working directory.
You can also enter an IPv4 address.
You can enter a path using up to 256 characters.
S To change the port number, press [Change] under "Port No".
T Enter the port number using the number keys, and then press the {q} key.
You can enter 1 to 65535.
U Press [Connection Test] to check the path is set correctly.
V Press [Exit].
If the connection test fails, check the settings, and then try again.
W Press [OK].
X Press [Exit].
146
Registering Folders
Y Press the {User Tools/Counter} key.
Note
❒ To register the name, see Registering Names”.
❒
❒
❒
❒
You can enter up to 64 characters for the user name.
You can enter up to 64 characters for the password.
You can enter a server name using up to 64 characters.
If User Authentication is specified, contact your administrator.
Reference
p.118 “Registering Names”
p.140 “Locating the SMB folder manually”
p.141 “Locating the SMB folder using Browse Network”
Changing a FTP Folder
This section describes how to change the registered FTP folder.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose folder you want to change, and then press [Folder].
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Folder].
G Select the items you want to change.
H Press [Connection Test] to check the path is set correctly.
I Press [Exit].
147
Registering Addresses and Users for Scanner Functions
J Press the {User Tools/Counter} key.
Note
❒ To change the name, key display and title, see “Changing a Registered
Name”.
Reference
p.120 “Changing a Registered Name”
p.148 “Changing the protocol”
Changing the protocol
This section describes how to change the protocol.
A Press [SMB], or [NCP].
6
B A confirmation message appears. Press [Yes].
Changing the protocol will clear all settings made under the previous protocol.
C Enter each item again.
Reference
p.138 “Registering a SMB Folder”
Changing the registered FTP folder
This section describes how to change the registered FTP folder.
148
A Press [Change] under "Port No".
B Enter the new port number, and then press the {q} key.
C Press [Change] under "Server Name".
D Enter the new server name, and then press [OK].
E Press [Change] under "Path".
F Enter the new path, and then press [OK].
Registering Folders
Deleting a FTP Folder
This section describes how to delete the registered FTP folder.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose folder you want to delete.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Folder].
G Press the protocol which is not currently selected.
A confirmation message appears.
H Press [Yes].
I Press [OK].
J Press [Exit].
K Press the {User Tools/Counter} key.
Note
❒ To delete a name entirely, see “Deleting a Registered Name”.
Reference
p.121 “Deleting a Registered Name”
149
Registering Addresses and Users for Scanner Functions
Using NCP to Connect
This section describes the procedure for registering, changing, and deleting NCP
folders.
Note
❒ To register a shared folder configured in Windows, see “Using SMB to Connect”
❒ To register a folder in an FTP server, see “Using FTP to Connect”
Reference
p.138 “Using SMB to Connect”
p.145 “Using FTP to Connect”
Registering a NCP Folder
This section describes how to register an NCP folder.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Press the name you want to register or enter the registered number using
the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Auth. Info], and then press [TNext].
G Press [Specify Other Auth. Info] on the right side of Folder Authentication.
When [Do not Specify] is selected, the NCP User Name and NCP Password that
you have specified in Default User Name / Password (Send) of File Transfer
settings applies. For details, see "File Transfer".
H Press [Change] under "Login User Name".
150
Registering Folders
I Enter the login user name, and then press [OK].
J Press [Change] under "Login Password".
K Enter the password, and then press [OK].
L Enter the password again to confirm, and then press [OK].
M Press [Folder].
N Press [NCP].
O Select "Connection Type".
If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a NetWare server, press [Bindery].
If you have set "Connection Type" to [NDS], enter the user name followed by
the name of the context where the user object is located. If the user name is
“user" and the context name is “context", enter “user.context"
P Specify the folder, and then Press [OK].
Q Press [Connection Test] to check the path is set correctly.
R Press [Exit].
S Press the {User Tools/Counter} key.
6
Note
❒ You can enter up to 64 characters for the user name.
❒ You can enter up to 64 characters for the password.
❒ To specify a folder, you can either enter the path manually or locate the
folder by browsing the network.
❒ If User Authentication is specified, contact your administrator.
Reference
p.118 “Registering Names”
p.152 “Locate the NCP folder manually”
p.152 “Locating the NCP folder using Browse Network”
"Entering Text", About This Machine
151
Registering Addresses and Users for Scanner Functions
Locate the NCP folder manually
This section describes how to locate the NCP folder manually.
A Press [Change] under "Path".
B Enter the path where the folder is located.
C Press [OK].
Note
❒ If you set "Connection Type" to [NDS], and if the NDS tree name is "tree",
the name of the context including the volume is "context", the volume
name is "volume" and the folder name is "folder", then the path will be
"\\tree\volume. context\folder".
❒ If you set "Connection Type" to [Bindery], and if the NetWare server name
is "server", the volume name is "volume" and the folder name is "folder",
then the path will be "\\server\volume\folder".
❒ You can enter a path using up to 128 characters.
❒ If the connection test fails, check the settings, and then try again.
6
Locating the NCP folder using Browse Network
This section describes how to locate the NCP folder using Browse Network.
A Press [Browse Network].
B Search for the destination folder in the NDS tree or NetWare server.
You can press [Up One Level] to switch between levels.
If you have set "Connection Type" to [NDS], a list of items in the NDS tree appears. If you have set "Connection Type" to [Bindery], a list of items on the NetWare server appears.
C Select the folder you want to register, and then press [OK].
Note
❒ Only the folders you are allowed to access appear in [Browse Network].
❒ If the languages used on the machine and the destination you want to view
differ, the items in the list may not appear correctly.
❒ Up to 100 items can be displayed in the list.
152
Registering Folders
Changing a NCP folder
This section describes how to change the registered NCP folder.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the user of the registered folder you want to change.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Folder].
G Select "Connection Type".
If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a NetWare server, press [Bindery].
H Specify the folder.
I Press [Connection Test] to check the path is set correctly.
J Press [Exit].
K Press the {User Tools/Counter} key.
Note
❒ To change the name, key display and title, see “Changing a Registered
Name”.
Reference
p.120 “Changing a Registered Name”
p.154 “Changing the registered NCP folder”
153
Registering Addresses and Users for Scanner Functions
Changing the registered NCP folder
This section describes how to change the register NCP folder.
A Press [Change] under "Path".
B Enter the path where the folder is located, and then press [OK].
You can also use Browse Network to specify a new folder. For details, see "Locating the NCP folder manually".
Reference
p.152 “Locate the NCP folder manually”
p.152 “Locating the NCP folder using Browse Network”
p.154 “Changing the protocol”
Changing the protocol
This section describes how to change the protocol.
A Press [SMB], or [FTP].
B A confirmation message appears. Press [Yes].
6
Changing the protocol will clear all settings made under the previous protocol.
C Enter each item again.
Reference
p.138 “Registering a SMB Folder”
p.145 “Registering a FTP Folder”
154
Registering Folders
Deleting an NCP Folder
This section describes how to delete the registered NCP folder.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select a user of the folder you want to delete.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Folder].
G Press the protocol which is not currently selected.
A confirmation message appears.
H Press [Yes].
I Press [OK].
J [Exit].
K Press the {User Tools/Counter} key.
Note
❒ To delete a name entirely, see Deleting a Registered Name”.
Reference
p.121 “Deleting a Registered Name”
155
Registering Addresses and Users for Scanner Functions
Registering Names to a Group
This section describes how to register names to a group.
You can register names to a group to enable easy management of e-mail addresses
and folders for each group.
To add names to a group, the groups must be registered beforehand.
Important
❒ When using Scan to Folder function, you cannot send scan files to a group
with over 50 folders registered.
❒ You can register up to 100 groups.
Note
❒ You can set a protection code to prevent unauthorized access to the folders
registered in a group. For details, see “Registering a Protection Code".
Reference
p.168 “Registering a Protection Code”
6
Registering a Group
This section describes how to register a group.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Program / Change / Delete Group].
D Check that [Program / Change] is selected.
E Press [New Program].
156
Registering Names to a Group
F Press [Change] under "Group Name".
G Enter the group name, and then press [OK].
The key display name is set automatically.
H When you want to change the key display, press [Change] under "Key Display".
I Enter the key display, and then press [OK].
J Press the title key under Select Title, if necessary.
6
The keys you can select are as follows:
• [Frequent]: Added to the page that is displayed first.
• [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]…
Added to the list of items in the selected title.
You can select [Frequent] and one more page for each title.
K Press [OK].
L Press [Exit].
M Press the {User Tools/Counter} key.
Reference
"Entering Text", About This Machine
157
Registering Addresses and Users for Scanner Functions
Registering Names to a Group
This section describes how to register names to a registered group.
You can put names that have been registered in the Address Book into a group.
When registering new names, you can also register groups at the same time.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name to register in a group.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Add to Group].
158
Registering Names to a Group
G Select a group to which you want to add the name to.
The group key that you have selected becomes highlighted, and the name is
added to it.
6
H Press [OK].
I Press [Exit].
J Press the {User Tools/Counter} key.
159
Registering Addresses and Users for Scanner Functions
Adding a Group to Another Group
This section describes how to add a group to another group.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Program / Change / Delete Group].
D Check that [Program / Change] is selected.
E Select the group that you want to put into another group.
6
Press the group key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Add to Group].
160
Registering Names to a Group
G Select the group which you want to add to.
The group key that you have selected becomes highlighted, and the group is
added to it.
6
H Press [OK].
I Press [Exit].
J Press the {User Tools/Counter} key.
161
Registering Addresses and Users for Scanner Functions
Displaying Names Registered in a Group
This section describes how to display names registered in a group.
You can check the names or groups registered in each group.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Program / Change / Delete Group].
D Check that [Program / Change] is selected.
E Select the group where the members you want to check is registered.
6
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Programmed User/Group].
All the names registered will be displayed.
G Press [OK].
H Press [Exit].
I Press the {User Tools/Counter} key.
162
Registering Names to a Group
Removing a Name from a Group
This section describes how to remove a name from a group.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name to remove from a group.
6
Press the name key, or enter the registered number using the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Add to Group].
G Select the group from which you want to remove the name.
The group key that you have selected becomes highlighted, and the name is
added to it.
163
Registering Addresses and Users for Scanner Functions
H Press [OK].
I Press [Exit].
J Press the {User Tools/Counter} key.
Deleting a Group Within Another Group
This section describes how to delete a group within another group.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book: Program / Change / Delete Group].
D Check that [Program / Change] is selected.
E Select the group that you want to delete from.
Press the group key, or enter the registered number during the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Add to Group].
The keys of groups in which the group is registered appear highlighted.
164
Registering Names to a Group
G Select the group that you want to delete from.
The group key is deselected and the group is deleted from it.
H Press [OK].
6
I Press [Exit].
J Press the {User Tools/Counter} key.
165
Registering Addresses and Users for Scanner Functions
Changing a Group Name
This section describes how to change a group name.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Program / Change / Delete Group].
D Check that [Program / Change] is selected.
E Press the group key you want to change.
6
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F To change the group name and key display, press [Change] under "Group
Name" or "Key Display".
G Enter the new group name or key display, and then press [OK].
H To change the title, press the title key under Select Title.
I To change the registration number, press [Change] under "Registration No".
J Enter the new registration number using the number keys, then Press the
{q} key.
K Press [OK].
166
Registering Names to a Group
L Press [Exit].
M Press the {User Tools/Counter} key.
Deleting a Group
This section describes how to delete a group
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Program / Change / Delete Group].
D Press [Delete].
E Press a group key you want to delete.
6
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Yes].
167
Registering Addresses and Users for Scanner Functions
Registering a Protection Code
This section describes how to register a Protection Code.
You can stop sender's names or folders being accessed by setting a protection
code.
You can use this function to protect the following:
• Folders
You can prevent unauthorized access to folders.
• Sender's names
You can prevent misuse of sender's names.
Reference
p.123 “Registering a User Code”
Registering a Protection Code to a Single User
This section describes how to register a Protection code to a single user.
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Select the name whose protection code you want to register.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
168
Registering a Protection Code
F Press [Protection].
G Press [Destination] or [Sender] under "Use Name as".
6
Both [Destination] and [Sender] can be selected at the same time.
H Press [Folder Destination] or [Sender] under "Protection Object".
Both [Folder Destination] and [Sender] can be selected at the same time.
I Press [Change] under "Protection Code".
J Enter a protection code using the number keys, and then press the {q} key.
K Press [OK].
L Press [Exit].
M Press the {User Tools/Counter} key.
Note
❒ Specify a protection code of up to eight digits. You can also specify “Protection” without specifying a protection code.
169
Registering Addresses and Users for Scanner Functions
Registering a Protection Code to a Group User
This section describes how to register a Protection Code to a Group User.
A Press [System Settings].
B Press [Administrator Tools].
C Press [Address Book: Program / Change / Delete Group].
D Check that [Program / Change] is selected.
E Press the group key you want to register or enter the registered number us-
6
ing the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Protection].
G Press [Folder Destination] under "Protection Object".
H Press [Change] under "Protection Code".
I Enter a protection code using the number keys, and then press the {q} key.
J Press [OK].
170
Registering a Protection Code
K Press [Exit].
L Press the {User Tools/Counter} key.
Note
❒ Specify a protection code of up to eight digits. You can also specify “Protection” without specifying a protection code.
6
171
Registering Addresses and Users for Scanner Functions
Registering SMTP and LDAP Authentication
This section describes how to register SMTP and LDAP Authentication.
SMTP Authentication
This section describes how to register SMTP Authentication.
For each user registered in the Address Book, you can register a login user name
and login password to be used when accessing an SMTP server.
To use an SMTP server, you need to program it beforehand.
Important
❒ When [Do not Specify] is selected for SMTP Authentication, the User Name and
Password that you have specified in SMTP Authentication of File Transfer
settings applies. For details, see "File Transfer".
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Press the name you want to register or enter the registered number using
the number keys
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Auth. Info].
G Press [Specify Other Auth. Info] on the right side of SMTP Authentication.
172
Registering SMTP and LDAP Authentication
H Press [Change] under "Login User Name".
I Enter the login user name, and then press [OK].
J Press [Change] under "Login Password".
K Enter the password, and then press [OK].
L Enter the password again to confirm, and then press [OK].
M [OK].
N Press [Exit].
O Press the {User Tools/Counter} key.
6
Note
❒ To register the name, see Registering Names”.
❒ You can enter up to 191 characters for the user name.
❒ You can enter up to 128 characters for the password.
❒ When using POP before SMTP Authentication, you can enter up to 191
characters for the user name, and 128 characters for the password.
❒ To change the SMTP Authentication settings, repeat stepB to O.
Reference
p.118 “Registering Names”
p.12 “Network Settings”
"Entering Text", About This Machine
173
Registering Addresses and Users for Scanner Functions
LDAP Authentication
This section describes how to register LDAP Authentication.
For each user registered in the Address Book, you can register a login user name
and login password to be used when accessing an LDAP server.
To use an LDAP server, you need to program it beforehand. For details, see
“LDAP Server Settings", Network Guide.
Important
❒ When [Do not Specify] is selected for LDAP Authentication, the User Name
and Password that you have specified in Program / Change LDAP Server of
Administrator Tools settings applies. For details, see "LDAP Server Settings".
A Press [System Settings].
6
B Press [Administrator Tools].
C Press [Address Book Management].
D Check that [Program / Change] is selected.
E Press the name you want to register or enter the registered number using
the number keys.
If you press [Search], you can search by the registered name, user code, folder
name, or e-mail address.
F Press [Auth. Info], and then press [TNext].
G Press [Specify Other Auth. Info] on the right side of "LDAP Authentication".
174
Registering SMTP and LDAP Authentication
H Press [Change] under "Login User Name".
I Enter the login user name, and then press [OK].
J Press [Change] under "Login Password".
K Enter the password, and then press [OK].
L Enter the password again to confirm, and then press [OK].
M Press [OK].
N Press [Exit].
O Press the {User Tools/Counter} key.
6
Note
❒ To register the name, see Registering Names”.
❒ You can enter up to 128 characters for the user name.
❒ You can enter up to 128 characters for the password.
❒ To change the LDAP Authentication settings, repeat stepB to O.
Reference
p.118 “Registering Names”
"Entering Text", About This Machine
175
Registering Addresses and Users for Scanner Functions
6
176
7. Other User Tools
Initial settings allow you switch the language as well as checking the number of
printed papers by displaying the counter. For the details on how to access respective settings, see "Accessing User Tools".
Changing the Display Language
You can change the language used on the display. English is set as default.
A Press [Español].
The language is changed to Spanish.
B Press [Salir].
The menu appears in Spanish.
Reference
p.3 “Accessing User Tools”
177
Other User Tools
Inquiry
The inquiry function lets you check the telephone numbers to contact for repairs,
or ordering consumables such as toner. Be sure to contact your service engineer
to verify the following:
❖ Consumables
• Telephone No. to order
• Toner
• Staple
• TX Stamp Name
❖ Machine Maintenance/Repair
• Telephone No.
• Serial No. of Machine
❖ Sales Representative
• Telephone No.
A Press [Inquiry].
7
Inquiry information appears.
B Press [Print Inquiry List].
178
Inquiry
C Press the {Start} key.
Inquiry information prints out.
D Press [Exit] twice.
Reference
p.3 “Accessing User Tools”
7
179
Other User Tools
Counter
Displaying the Total Counter
You can display the total counter value used for all functions.
A Press [Counter].
B To print a counter list, press [Print Counter List].
7
C Press the {Start} key.
A counter list prints out.
Reference
p.3 “Accessing User Tools”
180
8. Appendix
Copyrights
expat
• The software including controller, etc. (hereinafter "software") installed on
this product uses the expat under the conditions mentioned below.
• The product manufacturer provides warranty and support to the software of
the product including the expat, and the product manufacturer makes the initial developer and copyright holder of the expat, free from these obligations.
• Information relating to the expat is available at:
http://expat.sourceforge.net/
Copyright © 1998, 1999, 2000 Thai Open Source Software Centre, Ltd. and Clark
Cooper.
Copyright © 2001, 2002 Expat maintainers.
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
181
Appendix
NetBSD
8
1. Copyright Notice of NetBSD
For all users to use this product:
This product contains NetBSD operating system:
For the most part, the software constituting the NetBSD operating system is not
in the public domain; its authors retain their copyright.
The following text shows the copyright notice used for many of the NetBSD
source code. For exact copyright notice applicable for each of the files/binaries,
the source code tree must be consulted.
A full source code can be found at http://www.netbsd.org/.
Copyright © 1999, 2000 The NetBSD Foundation, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
A Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
B Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
C All advertising materials mentioning features or use of this software must
display the following acknowledgment:
This product includes software developed by The NetBSD Foundation, Inc.
and its contributors.
D Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2.Authors Name List
All product names mentioned herein are trademarks of their respective owners.
The following notices are required to satisfy the license terms of the software
182 that we have mentioned in this document:
Copyrights
• This product includes software developed by the University of California,
Berkeley and its contributors.
• This product includes software developed by Jonathan R. Stone for the NetBSD Project.
• This product includes software developed by the NetBSD Foundation, Inc.
and its contributors.
• This product includes software developed by Manuel Bouyer.
• This product includes software developed by Charles Hannum.
• This product includes software developed by Charles M. Hannum.
• This product includes software developed by Christopher G. Demetriou.
• This product includes software developed by TooLs GmbH.
• This product includes software developed by Terrence R. Lambert.
• This product includes software developed by Adam Glass and Charles Hannum.
• This product includes software developed by Theo de Raadt.
• This product includes software developed by Jonathan Stone and Jason R.
Thorpe for the NetBSD Project.
• This product includes software developed by the University of California,
Lawrence Berkeley Laboratory and its contributors.
• This product includes software developed by Christos Zoulas.
• This product includes software developed by Christopher G. Demetriou for
the NetBSD Project.
• This product includes software developed by Paul Kranenburg.
• This product includes software developed by Adam Glass.
• This product includes software developed by Jonathan Stone.
• This product includes software developed by Jonathan Stone for the NetBSD
Project.
• This product includes software developed by Winning Strategies, Inc.
• This product includes software developed by Frank van der Linden for the
NetBSD Project.
• This product includes software developed for the NetBSD Project by Frank
van der Linden
• This product includes software developed for the NetBSD Project by Jason R.
Thorpe.
• The software was developed by the University of California, Berkeley.
• This product includes software developed by Chris Provenzano, the University of California, Berkeley, and contributors.
8
183
Appendix
Sablotron
Sablotron (Version 0.82) Copyright © 2000 Ginger Alliance Ltd. All Rights Reserved
a) The application software installed on this product includes the Sablotron software Version 0.82 (hereinafter, "Sablotron 0.82"), with modifications made by
the product manufacturer. The original code of the Sablotron 0.82 is provided by
Ginger Alliance Ltd., the initial developer, and the modified code of the Sablotron 0.82 has been derived from such original code provided by Ginger Alliance Ltd.
b) The product manufacturer provides warranty and support to the application
software of this product including the Sablotron 0.82 as modified, and the product manufacturer makes Ginger Alliance Ltd., the initial developer of the Sablotron 0.82, free from these obligations.
c) The Sablotron 0.82 and the modifications thereof are made available under the
terms of Mozilla Public License Version 1.1 (hereinafter, "MPL 1.1"), and the application software of this product constitutes the "Larger Work" as defined in
MPL 1.1. The application software of this product except for the Sablotron 0.82
as modified is licensed by the product manufacturer under separate agreement(s).
d) The source code of the modified code of the Sablotron 0.82 is available at: http://support-download.com/services/device/sablot/notice082.html
e) The source code of the Sablotron software is available at: http://www.gingerall.com
f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html
8
JPEG LIBRARY
• The software installed on this product is based in part on the work of the Independent JPEG Group.
184
Copyrights
SASL
CMU libsasl
Tim Martin
Rob Earhart
Rob Siemborski
Copyright © 2001 Carnegie Mellon University. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
A Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
B Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
C The name "Carnegie Mellon University" must not be used to endorse or promote products derived from this software without prior written permission.
For permission or any other legal details, please contact:
Office of Technology Transfer
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh, PA 15213-3890
(412) 268-4387, fax: (412) 268-7395
[email protected]
D Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by Computing Services at Carnegie Mellon University (http://www.cmu.edu/computing/)."
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE
MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
8
185
Appendix
MD4
Copyright © 1990-2, RSA Data Security, Inc. All rights reserved.
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD4 MessageDigest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
MD5
Copyright © 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
8
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD5 MessageDigest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
186
Copyrights
Samba(Ver 3.0.4)
For SMB transmission, this machine uses Samba ver 3.0.4 (hereinafter referred to
as Samba 3.0.4).
Copyright © Andrew Tridgell 1994-1998
This program is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
along with this program; if not, write to the Free Software Foundation, Inc., 675
Mass Ave, Cambridge, MA 02139, USA.
Note
❒ The source code for SMB transmission by this machine can be downloaded
from the following website:
http://support-download.com/services/scbs
RSA BSAFE®
8
• This product includes RSA BSAFE © cryptographic or security protocol software from RSA Security Inc.
• RSA and BSAFE are registered trademarks of RSA Security Inc. in the United
States and/or other countries.
• RSA Security Inc. All rights reserved.
187
Appendix
Open SSL
Copyright © 1998-2004 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]
8
5. Products derived from this software may not be called "OpenSSL" nor may
"OpenSSL" appear in their names without prior written permission of the
OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND
ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
188 THE POSSIBILITY OF SUCH DAMAGE.
Copyrights
This product includes cryptographic software written by Eric Young
([email protected]). This product includes software written by Tim Hudson
([email protected]).
Original SSLeay License
Copyright © 1995-1998 Eric Young ([email protected]) All rights reserved.
This package is an SSL implementation written by Eric Young ([email protected]).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found
in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL
code. The SSL documentation included with this distribution is covered by the
same copyright terms except that the holder is Tim Hudson ([email protected]).
Note that any information and cryptographic algorithms used in this software
are publicly available on the Internet and at any major bookstore, scientific library, and patent office worldwide. More information can be found e.g. at "http://www.cs.hut.fi/crypto".
8
The legal status of this program is some combination of all these permissions
and restrictions. Use only at your own responsibility. You will be responsible for
any legal consequences yourself; I am not making any claims whether possessing or using this is legal or not in your country, and I am not taking any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE
COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE
OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
189
Appendix
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO
IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY
WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT
NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE
OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2)
The 32-bit CRC compensation attack detector in deattack.c was contributed by
CORE SDI S.A. under a BSD-style license.
Cryptographic attack detector for ssh - source code
Copyright © 1998 CORE SDI S.A., Buenos Aires, Argentina.
All rights reserved. Redistribution and use in source and binary forms, with or
without modification, are permitted provided that this copyright notice is retained.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <[email protected]>
<http://www.core-sdi.com>
8
3)
One component of the ssh source code is under a 3-clause BSD license, held by
the University of California, since we pulled these parts from original Berkeley
code.
Copyright © 1983, 1990, 1992, 1993, 1995
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
190
Copyrights
3. Neither the name of the University nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS
``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
4)
Remaining components of the software are provided under a standard 2-term
BSD licence with the following names as copyright holders:
Markus Friedl
Theo de Raadt
Niels Provos
Dug Song
Kevin Steves
Daniel Kouril
Wesley Griffin
Per Allansson
Jason Downs
Solar Designer
Todd C. Miller
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
8
191
Appendix
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
5)
Portable OpenSSH contains the following additional licenses:
c) Compatibility code (openbsd-compat)
Apart from the previously mentioned licenses, various pieces of code in the
openbsd-compat/ subdirectory are licensed as follows:
Some code is licensed under a 3-term BSD license, to the following copyright
holders:
Todd C. Miller
Theo de Raadt
Damien Miller
Eric P. Allman
The Regents of the University of California
8
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior written permission.
192
Copyrights
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS
``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Open LDAP
The OpenLDAP Public License Version 2.8, 17 August 2003
Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions in source form must retain copyright statements and notices,
2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the
documentation and/or other materials provided with the distribution, and
8
3. Redistributions must contain a verbatim copy of this document.
The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version number. You may use this Software under
terms of this license revision or under the terms of any subsequent revision of
the license.
193
Appendix
THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND
ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP
FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S)
OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The names of the authors and copyright holders must not be used in advertising
or otherwise to promote the sale, use or other dealing in this Software without
specific, written prior permission. Title to copyright in this Software shall at all
times remain with copyright holders.
OpenLDAP is a registered trademark of the OpenLDAP Foundation.
Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California,
USA. All Rights Reserved. Permission to copy and distribute verbatim copies of
this document is granted.
8
194
Copyrights
LibTIFF
TIFF emulation software includes freeware TIFF libraries developed by Sam Leffler and Silicon Graphics, Inc.. In accordance with the conditions of distribution,
the copyright notice concerning the TIFF library part is shown below.
Copyright © 1988, 1989, 1990, 1991 Sam Leffler
Copyright © 1991 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that (i) the
above copyright notices and this permission notice appear in all copies of the
software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Stanford and Silicon
Graphics.
THE SOFTWARE IS PROVIDED “AS IS” AND WITHOUT WARRANTY OF
ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT
LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR
A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE
FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
8
195
INDEX
A
Accessing User Tools, 3
Address Book: Change Order, 59
Address Book: Edit Title, 59
Address Book: Program / Change /
Delete Group, 59
Address Book: Program / Change /
Delete Transfer Request, 59
Address Book: Select Title, 59
Address Book: Switch Title, 59
Address Book Management, 59
Adjust Position, 81
Adjust Scan Position, 35
Administrator Authentication
Management, 59
Administrator's E-mail Address, 54
Administrator Tools / System Settings, 59
AOF (Always On), 59
Auto Continue, 101
Auto Delete File in Document Server, 59
Auto Delete Stored Print Jobs, 101
Auto Delete Temporary Print Jobs, 101
Auto Image Density Priority, 75
Auto Logout Timer, 46
Auto Off Timer, 46
Auto Specify Sender Name, 54
Auto Tray Switching, 75
B
Background Numbering, 86
Back Up / Restore Address Book, 59
Blank Page Print, 101
Bypass Tray Setting Priority, 101
C
Capture Server IPv4 Address, 54
Change PDF Password, 106
Changing the Display Language, 177
Channel, 51
Communication Mode, 51
Compression (Black and White), 110
Configuration Page, 97
Copier/Document Server Auto Reset
Timer, 46
Copier / Document Server Features /
Edit, 81
Copier / Document Server Features /
General Features, 75
196
Copier / Document Server Features /
Input/Output, 92
Copier / Document Server Features /
Reproduction Ratio, 78
Copier / Document Server Features /
Stamp, 86
Copies, 101
Copy Count Display, 35
Copy Order in Combine, 81
Copy Quality, 75
Counter, 180
Customize Function/
Fold Type/Fold Option, 92
D
Data Format, 105
Date Stamp, 89
DDNS Configuration, 48
Default Printer Language, 101
Default User Name / Password (Send), 54
Delete All Files in Document Server, 59
Delete All Logs, 59
Delete All Stored Print Jobs, 100
Delete All Temporary Print Jobs, 100
Delete Scanner Journal, 107
Delivery Option, 54
Density (Background Numbering), 86
Destination List Display Priority 1, 107
Destination List Display Priority 2, 107
Display / Clear / Print Counter per User, 59
Display Panel, 2
Display / Print Counter, 59
Divide and Send E-mail, 110
DNS Configuration, 48
Document Server, 96
Domain Name, 48
Double Copies Separation Line, 81
E
Edge to Edge Print, 101
Edit / Copier / Document Server
Features, 81
Effective Protocol, 48
E-mail Communication Port, 54
E-mail Reception Interval, 54
E-mail Storage in Server, 54
Energy Saver Timer, 46
Enhanced Authentication Management, 59
Erase Border Width, 81
Erase Original Shadow in Combine, 81
Error Log, 97
Ethernet Speed, 48
Extended Security, 59
F
Feed Start Method, 35
File Transfer / System Settings, 54
Fine Ratio Adjustment
Copier, 35
Printer, 35
Firmware Version, 59
Fixed USB Port, 59
Fold Width Fine Adjustment, 35
Font (Date Stamp), 89
Font (Page Numbering), 90
Format (Date Stamp), 89
Function Priority, 35
Function Reset Timer, 35
G
General Features / Copier / Document
Server Features, 75
General Settings / Scanner Features, 107
General Settings / System Settings, 35
H
Hex Dump, 97
Host Interface / Printer Features, 104
Host Name, 48
I
IEEE 802.11b, 51
Image Density, 75
Image Repeat Separation Line, 81
Initial Print Job List, 101
Input/Output / Copier / Document
Server Features, 92
Inquiry, 178
Insert Additional E-mail Info, 110
Interface Settings / System Settings, 48
Interleave Print, 35
I/O Buffer, 104
I/O Timeout, 104
IPv4 Gateway Address, 48
IPv6 Gateway Address, 48
IPv6 Stateless Address
Autoconfiguration, 48
J
Job End Call, 75
K
Key Counter Management, 59
Key Repeat, 35
L
LAN Type, 48
LDAP Search, 59
List / Test Print Lock, 100
List / Test Print / Printer Features, 97
M
Machine IPv4 Address, 48
Machine IPv6 Address, 48
Machine Name, 48
Magnification Key Display, 78
Maintenance / Printer Features, 100
Margin Adjustment Priority, 81
Margin Fold Margin Adjustment, 35
Max. Copy Quantity, 75
Max. E-mail Size, 110
Max. Reception E-mail Size, 54
Memory Overflow, 101
Memory Usage, 101
Menu List, 97
Multiple Lists, 97
N
NCP Delivery Protocol, 48
Network, 48
Network Security Level, 59
Next Original Wait Setting, 109
No. of Digits for Single Page Files, 110
Number of Scanner Resends, 54
NW Frame Type, 48
O
Original Feed Delay 1, 35
Original Feed Delay 2, 35
Output
Document Server, 35
Printer, 35
Output tray settings, 40
197
P
Page Numbering, 90
Page Numbering in Combine (Page
Numbering), 90
Page Numbering Initial Letter, 90
Panel Key Sound, 35
Panel Off Timer, 46
Paper Thickness
Paper Bypass, 41
Paper Tray, 41
Paper Tray Priority
Copier, 41
Printer, 41
Paper Type
Paper Bypass, 41
Tray 1–3, 41
Paper Volume, 41
Partial Copy Size, 81
PDF Configuration / Font Page, 97
PDF Group Password, 106
PDF Menu / Printer Features, 106
Permit SNMPv3 Communication, 48
Permit SSL/TLS Communication, 48
Ping Command, 48
POP3 / IMAP4 Settings, 54
POP before SMTP, 54
Preset Stamp, 86
Print Address Book: Destination List, 59
Print and Delete Scanner Journal, 107
Printer Auto Reset Timer, 46
Printer Bypass Paper Size, 41
Printer Features / Host Interface, 104
Printer Features / List / Test Print, 97
Printer Features / Maintenance, 100
Printer Features / PDF Menu, 106
Printer Features / PS Menu, 105
Printer Features / System, 101
Printer Language, 101
Print Error Report, 101
Print List, 53
Print Priority, 35
Print Scanner Journal, 107
Program / Change Administrator, 59
Program / Change / Delete E-mail
Message, 54
Program / Change / Delete LDAP Server, 59
Program / Change / Delete User Text, 35
Program / Delete Format, 81
Program / Delete Stamp (User Stamp), 88
PS Configuration / Font Page, 97
PS Menu / Printer Features, 105
198
R
Reception Protocol, 54
Reduce / Enlarge Ratio Priority, 78
Reduce Recovery Time, 59
Reproduction Ratio, 78
Reproduction Ratio / Copier / Document
Server Features, 78
Reserved Job Waiting Time, 101
Resolution, 105, 106
Restore Factory Defaults, 51
Rotate by 180 Degrees, 101
Rotate Sort
Auto Paper Continue, 92
S
Scanner Auto Reset Timer, 46
Scanner Features / General Settings, 107
Scanner Features / Scan Settings, 109
Scanner Features / Send Settings, 110
Scanner Resend Interval Time, 54
Scan Settings / Scanner Features, 109
Search Destination, 107
Security Method, 51
Send Settings / Scanner Features, 110
Separation Line in Combine, 81
Set Date, 46
Set Time, 46
Setup IEEE 802.11b, 9
Setup Wireless LAN, 9
Size (Background Numbering), 86
Size (Date Stamp), 89
Size (Page Numbering), 90
SMB Computer Name, 48
SMB Work Group, 48
SMTP Authentication, 54
SMTP Server, 54
SSID Setting, 51
Stamp / Copier / Document Server
Features, 86
Stamp Format 1-4 (User Stamp), 88
Stamp Format (Page Numbering), 90
Stamp Format (Preset Stamp), 86
Stamp Language (Preset Stamp), 86
Stamp Position (Page Numbering), 90
Stamp Priority (Preset Stamp), 86
Stamp Setting (Date Stamp), 89
Stored File E-mail Method, 110
Sub Paper Size, 101
Superimpose (Date Stamp), 89
Superimpose (Page Numbering), 90
Switch Title, 107
System Auto Reset Timer, 46
System / Printer Features, 101
System Settings / Administrator Tools, 59
System Settings / File Transfer, 54
System Settings / General Features, 35
System Settings / Timer Settings, 46
System Settings / Tray Paper Settings, 41
System Status/ Job List Display Time, 35
T
Timer Settings / System Settings, 46
Transfer Log Setting, 59
Transmission Speed, 51
Tray Paper Settings / System Settings, 41
Tray Paper Size
Tray 1, 41
Tray 2, 41
Tray 3, 41
Tray Switching, 101
TWAIN Standby Time, 107
U
Unauthorized Copy Control, 59
Update Delivery Server Destination List, 107
Use LDAP Server, 59
User Authentication Management, 59
User Auto Reduce / Enlarge, 78
User Reduce / Enlarge Ratio, 78
User Stamp, 88
W
Warm-up Beeper, 35
WINS Configuration, 48
Wireless LAN Signal, 51
199
200
EN
USA
B286-7807
In accordance with IEC 60417, this machine uses the following symbols for the main power switch:
a means POWER ON.
c means STAND BY.
Trademarks
Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the
United States and/or other countries.
Acrobat® is a registered trademark of Adobe Systems Incorporated.
NetWare is a registered trademark of Novell, Inc.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
The product name of Windows 95 is Microsoft® Windows® 95
The product name of Windows 98 is Microsoft® Windows® 98
The product name of Windows Me is Microsoft® Windows® Millennium Edition (Windows Me)
The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Advanced Server
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Professional
The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
The product names of Windows NT are as follows:
Microsoft® Windows NT® Server 4.0
Microsoft® Windows NT® Workstation 4.0
Copyright © 2007
Operating Instructions General Settings Guide
Type for 2404WD/GWD2004/LW324/Aficio MP W2400
Type for 2406WD/GWD2006/LW326/Aficio MP W3600
EN USA B286-7807
Operating Instructions
Troubleshooting
1
When the Machine Does Not Operate As Wanted
2
Troubleshooting When Using the Copy Function
3
Troubleshooting When Using the Printer Function
4
Troubleshooting When Using the Scanner Function
5
Adding Paper and Toner
6
Clearing Misfeeds
7
Remarks
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine.
Notes:
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.
Caution:
Use of controls or adjustments or performance of procedures other than those specified in this manual
might result in hazardous radiation exposure.
Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
Power Source
120V, 60Hz, 15A or more
Please be sure to connect the power cord to a power source as shown above. For details about power
source, see p.78 “Power Connection”.
Manuals for This Machine
Refer to the manuals that are relevant to what you want to do with the machine.
Important
❒ Media differ according to manual.
❒ The printed and electronic versions of a manual have the same contents.
❒ Adobe Acrobat Reader/Adobe Reader must be installed in order to view the
manuals as PDF files.
❒ Depending on which country you are in, there may also be html manuals. To
view these manuals, a Web browser must be installed.
❒ For details about the functions of RW-3600, refer to the manuals for this option.
❖ About This Machine
Be sure to read the Safety Information in this manual before using the machine.
This manual provides an introduction to the functions of the machine. It also
explains the control panel, preparation procedures for using the machine,
how to enter text, and how to install the CD-ROMs provided.
❖ General Settings Guide
Explains User Tools settings, and Address Book procedures such as registering e-mail addresses, and user codes. Also refer to this manual for explanations on how to connect the machine.
❖ Troubleshooting
Provides a guide to solving common problems, and explains how to replace
paper, toner, and other consumables.
❖ Security Reference
This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered
with, or prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.
❖ Copy/Document Server Reference
Explains Copier and Document Server functions and operations. Also refer to
this manual for explanations on how to place originals.
❖ Printer Reference
Explains Printer functions and operations.
❖ Scanner Reference
Explains Scanner functions and operations.
i
❖ Network Guide
Explains how to configure and operate the machine in a network environment, and use the software provided.
❖ Other manuals
• PostScript3 Supplement
• UNIX Supplement
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
Note
❒ Manuals provided are specific to machine types.
❒ For “UNIX Supplement”, please visit our Web site or consult an authorized
dealer.
❒ “PostScript3 Supplement” and “UNIX Supplement” include descriptions of
functions and settings that might not be available on this machine.
ii
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
How to Read This Manual .....................................................................................1
Symbols .....................................................................................................................1
Names of Major Options ............................................................................................2
1. When the Machine Does Not Operate As Wanted
Indicators................................................................................................................3
Panel Tone..............................................................................................................4
Checking Machine Status and Settings...............................................................5
When an Indicator to the Right of a Function Key Is Lit ....................................8
When You Have Problems Operating the Machine.............................................9
When a Job Is Not Performed.............................................................................14
2. Troubleshooting When Using the Copy Function
When a Message Appears...................................................................................17
When You Cannot Make Clear Copies ...............................................................20
When You Cannot Make Copies As Wanted .....................................................23
When Memory Is Full ...............................................................................................26
3. Troubleshooting When Using the Printer Function
When a Message Appears During Installation of the Printer Driver ...............27
Windows 95/98/Me, Windows 2000, or Windows NT 4.0 ........................................27
Windows XP Professional, Windows Server 2003...................................................28
Windows XP Home Edition ......................................................................................28
If USB Connection Fails ......................................................................................29
When a Message Appears...................................................................................30
Status Messages......................................................................................................30
Alert Messages ........................................................................................................31
Checking the Error Log ............................................................................................33
When You Cannot Print.......................................................................................34
Other Printing Problems .....................................................................................37
4. Troubleshooting When Using the Scanner Function
When Scanning Is Not Done As Expected ........................................................43
When You Cannot Send Scanned Files .............................................................44
When Stored Files Cannot Be Accessed .................................................................44
When You Cannot Browse the Network to Send a Scan File ..................................44
When the TWAIN Driver Cannot Be Started ............................................................44
When Stored Files Cannot Be Edited ......................................................................45
When the Network Delivery Function Cannot Be Used ...........................................45
Operations Are Not Possible When Messages Appear ...........................................45
When a Message Appears...................................................................................46
When a Message Appears on the Control Panel .....................................................46
When a Message Appears on the Client Computer.................................................53
iii
5. Adding Paper and Toner
Loading Paper ......................................................................................................57
Loading the Paper Roll.............................................................................................59
Loading Cut Paper ...................................................................................................60
Changing the Paper Size.....................................................................................61
Changing the Paper Size in the Paper Roll Tray .....................................................61
Changing the Paper Size in the Cut Paper Tray ......................................................63
Adding Toner........................................................................................................64
Inserting Toner .........................................................................................................65
Sending Scanned Documents When Toner Has Run Out .......................................66
Used Toner ..............................................................................................................66
6. Clearing Misfeeds
Removing Jammed Paper ...................................................................................67
Locating Jammed Paper ..........................................................................................68
Removing Jammed Paper........................................................................................69
7. Remarks
Where to Put Your Machine ................................................................................75
Machine Environment ..............................................................................................75
Power Connection....................................................................................................78
Maintaining Your Machine ..................................................................................79
Cleaning Inside the Original Cover ..........................................................................79
Cleaning the Main Unit.............................................................................................81
INDEX......................................................................................................... 82
iv
How to Read This Manual
Symbols
This manual uses the following symbols:
Indicates important safety notes.
Ignoring these notes could result in serious injury or death. Be sure to read these
notes. They can be found in the “Safety Information” section of About This Machine.
Indicates important safety notes.
Ignoring these notes could result in moderate or minor injury, or damage to the
machine or to property. Be sure to read these notes. They can be found in the
“Safety Information” section of About This Machine.
Indicates points to pay attention to when using the machine, and explanations
of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure
to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
{}
Indicates the names of keys on the machine's control panel.
1
Names of Major Options
Major options of this machine are referred to as follows in this manual:
• Roll Feeder Type 240A → Paper roll tray 1
• Roll Feeder Type 240B → Paper roll tray 2
• Paper Cassette Type 240 → Cut paper tray
• Folder FD6500A → Folding finisher
2
1. When the Machine Does
Not Operate As Wanted
This chapter explains basic troubleshooting procedures that are applicable to all
functions of this machine.
Indicators
This section explains the Indicators displayed when the machine requires the
user to remove misfed paper, to add paper or to perform other procedures.
x: Misfeed indicator
Appears when a misfeed occurs.
See p.67 “Removing Jammed Paper”.
r: Add Paper indicator
Appears when paper-out condition occurs.
See p.57 “Loading Paper”.
D: Add Toner indicator
Appears when toner runs out.
See p.64 “Adding Toner”.
E: Waste Toner Full indicator
Appears when the waste toner bottle is full.
Contact your sales or service representative.
L: Service Call indicator
Appears when the machine is malfunctioning or requires
maintenance.
M: Open Cover indicator
Appears when the front cover, etc., is open.
3
When the Machine Does Not Operate As Wanted
Panel Tone
The following table explains the meaning of the various beep patterns that the
machine produces to alert users about left originals and other machine conditions.
1
Beep pattern
Meaning
Cause
Two long beeps.
Machine has warmed up. After cooling or being switched on, the
machine has fully warmed up and is
ready for use.
Single short beep.
Panel/screen input
accepted.
A control panel or screen key was
pressed.
Short, then long beep.
Panel/screen input
rejected.
An invalid key was pressed on the control panel or screen, or the entered password was incorrect.
Single long beep.
Job completed
successfully.
A Copier/Document Server Features
job has finished.
Five long beeps.
Soft alert.
The initial screen returns when the machine goes into energy-saving mode and
when simplified display is cancelled.
Five long beeps repeated
four times.
Soft alert.
Paper is empty.
Five short beeps repeated Strong alert.
five time.
The machine requires user attention because paper has jammed, the toner
needs replenishing, or other problems
have occurred.
Note
❒ Users cannot mute the machine's beep alerts. When the machine beeps to alert
users of a paper jam or toner request, if the machine's covers are opened and
closed repeatedly within a short space of time, the beep alert might continue,
even after normal status has resumed.
❒ For details about enabling or disabling beep alerts, see “System Settings”,
General Settings Guide.
Reference
“System Settings”, General Settings Guide
4
Checking Machine Status and Settings
Checking Machine Status and Settings
You can check the machine's system status.
1
❖ Maintenance Info
You can check the following items under [Maintenance Info]:
• [Remaining Toner]
Displays the amount of remaining toner.
• [Paper Tray]
Displays the paper type and size loaded in the paper tray.
• [Original Misfeed]
Displays state of and solutions for original misfeeds.
• [Paper Misfeed]
Displays state of and solutions for paper jams.
• [Cover Open]
Indicates whether front cover, duplex unit, etc., is open.
❖ Data Storage
You can check the following items under [Data Storage]:
• [HDD Remaining Memory]
Displays the amount of available hard disk drive memory.
• [HDD File(s)]
Displays the total number of jobs stored in the hard disk drive.
• [Print Job(s)]
Displays the number of jobs for Hold print/Stored print/Locked
print/Sample print.
• [Memory Erase Status]
Displays the state of the memory data.
❖ Machine Address Info
You can check the following items under [Machine Address Info]:
• [Machine IPv4 Address]
Displays the machine's IPv4 address.
• [Machine IPv6 Address]
Displays the machine's IPv6 address.
5
When the Machine Does Not Operate As Wanted
❖ Inquiry
You can check the following items under [Inquiry]:
• [Machine Repairs]
Displays the machine number and contact number that are required for
service.
• [Sales Representative]
Displays the sales representative's telephone number.
• [Supply Order]
Displays the contact number for placing supply orders.
• [Supply Details]
Displays the name of toner used on the machine.
1
A On the control panel, press [System Status].
B Press each tab and check the contents.
C After checking the information, press [Exit]. The previous screen returns.
6
Checking Machine Status and Settings
Note
❒ [Original Misfeed], [Paper Misfeed], and [Cover Open] appear only when these
errors occur.
❒ For details about how to locate and remove misfeeds, see “Locating Jammed
Paper” or “Removing Jammed Paper”.
1
Reference
p.68 “Locating Jammed Paper”
p.67 “Removing Jammed Paper”
7
When the Machine Does Not Operate As Wanted
When an Indicator to the Right of a
Function Key Is Lit
1
When an indicator to the right of a function key lights up, press the corresponding function key. Then, follow the instructions displayed on the control panel.
ATK021S
If an error occurs in the function you are using, check the message that appears
on the control panel, and then refer to “When a Message is Displayed” for the
relevant function.
Following explain the main reasons the function key is lit.
Problem
Cause
Solution
Documents and reports
do not print out.
There is no copy paper
left.
Add more paper. See p.57 “Loading Paper”.
An error has occurred.
The function whose indi- Record the code number shown in the
cator is lit is defective.
display and contact your service representative. See “When a Message Appears” of each chapter.
You can use other functions normally.
The machine is unable to
connect to the network.
A network error has
occurred.
• Check the displayed message and
take an appropriate action. See
“When a Message Appears” of each
chapter.
• Check that the machine is correctly
connected to the network, and that
the machine is correctly set. See
“Network Settings”, General Settings Guide.
• Contact the administrator.
• When the function key is still lit,
even if you take the measures above,
contact your service representative.
8
When You Have Problems Operating the Machine
When You Have Problems Operating the
Machine
1
The following chart gives explanations of common problems and messages.
If other messages appear, follow the instructions displayed.
Important
❒ Check the contact address and Serial No. of Machine shown in the Service
Call message (L), and then contact your service representative. If the contact
address is not shown, contact your sales representative.
Problem
Cause
Solution
Nothing happens when
the operation switch is
turned on.
The main power switch
is turned off.
Turn on the main power switch.
Although the copier
screen appears when the
machine is turned on using the main power
switch, it cannot be
switched to another
screen by pressing the
{Scanner} key.
Functions other than the
copier function are not
yet ready.
Wait a little longer.
The machine has just
been turned on and the
User Tools screen is displayed, but the User
Tools menu has items
missing.
Functions other than the Wait a little longer.
copier function are not
yet ready. Time required
varies by function. Functions appear in the User
Tools menu when they
become ready for use.
The main power indicator continues blinking
and does not turn off
when pressed.
This occurs in the follow- Check if the machine is communicating
with a computer.
ing cases:
• The machine is communicating with external equipment.
• The hard disk is active.
The display is off.
The machine is in Energy
Saver mode.
Press the {Energy Saver} key to cancel
Energy Saver mode.
The display is off.
The operation switch is
turned off.
Turn on the operation switch.
The display is off.
The screen contrast knob is Set the screen contrast knob to the light
turned to the dark position. position to see the display panel properly.
See “Control Panel”, About This Machine.
“Please wait.” appears.
This message appears
Wait for the machine to get ready.
when you turn on the operation switch.
9
When the Machine Does Not Operate As Wanted
Problem
1
Cause
Solution
“Please wait.” appears.
This message appears
when you change the
toner cartridge.
Wait for the machine to get ready.
“Memory is full.
The scanned originals
exceed the number of
sheets/pages that can be
stored in the hard disk.
• Press [Store File] to store pages that
have been scanned. Delete unnecessary files with [Delete File].
Do you want to
store scanned
file?” appears.
• Press [No] if you are not storing pages that have been scanned. Delete
unnecessary files with [Delete File].
This user code is not allowed to use the function
selected.
Contact the administrator.
This user code is not allowed to use the function
selected.
Press the {Energy Saver} key. Confirm
that the display goes off, and then press
the {Energy Saver} key again. The display
will return to the user code entry display. When printing under the copier or
printer function, press the {Energy Saver}
key only after printing has finished.
“Authentication
has failed.” appears.
The entered login user
name or login password
is not correct.
Inquire the user administrator for the correct login user name and login password.
“Authentication
has failed.” appears.
The machine cannot per- Contact the administrator.
form authentication.
“The selected
You have tried to delete Files can be deleted by the person who
files without the authori- created the file. To delete a file which
ty to do so.
you are not authorized to delete, contact
the person who created the file.
“You do not have
the privileges to
use this function.” continues to be
displayed even though
you have entered a valid
user code.
“You do not have
the privileges to
use this function.” continues to be
displayed even though
you have entered a valid
user code.
file(s) contained
file(s) without
access privileges. Only file(s)
with access privileges will be
deleted.” appears.
10
Paper is still jammed in
An error message remains, even if misfed pa- the tray.
per is removed.
Clear misfed paper. see p.67 “Removing
Jammed Paper”.
The user code entry
screen is displayed.
Users are restricted by
user management.
Enter the user code (up to eight digits),
and then press [OK].
The Authentication
screen appears.
Basic Authentication,
Windows Authentication, LDAP Authentication or Integration Server
Authentication is set.
Enter your login user name and user
password. See “When the Authentication Screen is Displayed”, About This
Machine.
When You Have Problems Operating the Machine
Problem
Original images are
printed on the reverse
side of the paper.
Cause
You may have loaded
the paper incorrectly.
Solution
Load paper correctly. Load paper into
the cut paper tray print side down, and
into the bypass tray print side up. See
p.57 “Loading Paper”.
Misfeeds occur frequently. The cut paper tray's side
fences, back fence, or
side-end fences, might
not be set properly.
• Remove the paper. See p.67 “Removing Jammed Paper”.
Misfeeds occur frequently. Paper is wrinkled or
folded.
Cut folded or wrinkled areas off the paper roll.
1
• Check the side fences, back fence,
and side-end fences are set properly.
See p.61 “Changing the Paper Size”.
Remove cut paper that is folded or wrinkled.
Misfeeds occur frequently. Jammed or torn paper is
inside the machine.
Remove the paper, as necessary. See
p.67 “Removing Jammed Paper”.
Misfeeds occur frequently. You may have loaded pa- • Remove the paper. See p.67 “Removper of a size different from
ing Jammed Paper”.
the paper size settings.
• Use Tray Paper Size Settings to set
the paper size. See “Tray Paper Settings”, General Settings Guide and
“Copy Paper”, About This Machine.
An error C message reYou did not open and
When a misfeed C message appears, it
mains, even if misfed pa- close the upper section of remains until you open and close the
per is removed.
the fusing unit.
upper section of the fusing unit. Open
the fusing unit cover in the back, and
then the upper section of the fusing unit
to check if any paper remains inside. See
p.67 “Removing Jammed Paper”.
Originals jam frequently. Originals are curled.
Smooth out any curls and try again.
11
When the Machine Does Not Operate As Wanted
❖ Document Server
Problem
“Exceeded max.
number of pages
per file. Do you
want to store the
scanned pages as
1 file?” appears.
1
Cause
Solution
The number of scanned • To store scanned pages as a file, press
pages exceeds the capac[Store File]. Scanned data is stored as
ity per file of the Docua file in the Document Server.
ment Server.
• If you do not want to store scanned
pages, press [No]. Scanned data is deleted.
• You can store up to 1000 A4 size pages per document.
“Original is be-
ing scanned by
another function.
Please wait.” ap-
Copier or Scanner function is in use.
pears.
To cancel a job in progress, first press
[Exit], and then press the {Copy} key or
{Scanner} key. Next, press the
{Clear/Stop} key. When the message
“The Stop key has been
pressed. Are
want to stop
“The Clear /
pressed. Are
want to stop
you sure you
copying?” or
Stop key was
you sure you
scanning?” ap-
pears, press [Stop].
“Cannot display
preview of this
page.” appears, and
The image data may
have been corrupted.
Pressing [Exit] displays the preview
screen without a thumbnail.
you can not check the
thumbnail image.
You forgot your password. You cannot access a pro- Contact the administrator.
tected file without enter- To delete the files stored in the docuing the password.
ment server, select [Delete All Files in Document Server]. As this will permanently
delete every single file, make sure the
document server does not contain any
files you want to keep. See “Administrator Tools”, General Settings Guide.
You cannot find out what
is stored in a file.
12
You may not be able to
ascertain the contents of
a file simply from the file
name.
You can switch the Select File screen between [List] and [Thumbnails] display to
check the contents of the file. In list display, the file name, date of storage, and
user name are shown. In thumbnail display, an image of the stored file appears.
You can enlarge the image by pressing
[Preview]. Use the Select File screen to
check information other than the file
name. See “Checking the Details of a
Stored Document”, Copy/Document
Server Reference.
When You Have Problems Operating the Machine
Problem
Memory frequently becomes full.
Cause
The document server
memory is full.
Solution
Delete unnecessary files. On the file selection display, select unnecessary files,
and then press [Delete File]. If this does
not increase available memory, do the
following.
1
• Switch to the scanner screen, and
then delete unnecessary files stored
under the scanner function.
• Switch to the printer screen, and
then delete unnecessary files stored
under Sample Print, Locked Print,
Hold Print, or Stored Print.
You want to check print
quality before making a
large print run.
You can print a single
copy without specifying
the setting again.
Check print quality by printing out only
the first set using the {Sample Copy} key.
Note
❒ Loading curled paper in the cut paper tray can result in misfeeds and soiled
paper edges. To load curled paper in the cut paper tray, first flatten it by hand,
and be sure to load it print side down. Also, to prevent paper from curling,
lay paper on a flat surface, and do not lean it against the wall.
❒ If you cannot make copies as you want because of paper type, paper size, or
paper capacity problems, use recommended paper. See “Copy Paper”, About
This Machine.
Reference
“Copy Paper”, About This Machine
13
When the Machine Does Not Operate As Wanted
When a Job Is Not Performed
If you cannot execute a function, it may be that the machine is being held up by
another function.
If you cannot execute a function, terminate any other functions currently active,
and then try executing the function again. In certain cases, you can carry out another job (copier, document server, printer, scanner) without canceling the current job being performed. Performing multiple functions simultaneously like
this is called “Multi-accessing”.
Combination Chart
1
DeskTopBinder
Web Document Server
Printing
Printing
❖ Function Compatibility
The chart shows Function Compatibility when print priority is set to “Interleave”. See “General Features”, General Settings Guide.
: Simultaneous operations are possible.
: Operation is enabled when the relevant function key is pressed and remote switching (of the scanner/external extension) is done.
: Operation is enabled when the {Interrupt} key is pressed to interrupt the
preceding operation.
→ : Operation is performed automatically once the preceding operation ends.
× : The operation must be started once the preceding operation ends. (Simultaneous operations are not possible.)
*1
*2
*2
Printing from Document Server
Document Server
Operations for Document Server
×
Scanning a Document to Store in Document Server
TWAIN
Scanning
Scanning
Scanner
Operations for Scanning
Printing
Printer
→
*1
14
Data Reception
×
Copying
×
Operations for Copying
Copying
Mode before you select
Copy
Operations for
Copying
Copying
Operations for Copying
Copy
Interrupt Copying
Mode after you select
DeskTopBinder
Web Document Server
Printing
Printing
When a Job Is Not Performed
→
→
Printer
Operations for scanning
Scanning
*2
Web
DeskTop Document Server
Document Binder
Server
TWAIN
*1
*2
*3
Scanning
Operations for
Document Server
Scanning a Document to
Store in Document Server
Printing from
Document Server
TWAIN
Document Server
Operations for Document Server
Scanning a Document to Store in Document Server
Printing from Document Server
Scanner
×
×
×
×
×
1
→
→
Printing
Scanner
×
→
→
Data Reception
Scanning
×
Scanning
×
Operations for Scanning
×
Printing
Printer
Copying
×
Data Reception
Operations for Copying
Copying
Interrupt
Copying
Mode before you select
Operations for
Copying
Copying
Operations for Copying
Copy
Interrupt Copying
Mode after you select
×
×
×
×
×
×
×
×
×
×
×
×
×
*2
×
*2
×
×
×
×
×
×
×
×
*3
*3
*3
Printing
Printing
Simultaneous operations are only possible after the preceding job documents are all
scanned and [New Job] appears.
You can scan a document after the preceding job documents are all scanned.
Simultaneous operation become possible after you press [New Job].
15
When the Machine Does Not Operate As Wanted
Note
❒ If the machine is capable of executing multiple functions simultaneously,
specify which function should have priority in “Print Priority”. This setting is
factory-preset to “Display Mode”. For setting of Printing Priority Function,
see “General Features”, General Settings Guide.
1
❒ While printing is in progress, scanning a document using another function
may take more time.
Reference
“General Features”, General Settings Guide.
16
2. Troubleshooting When
Using the Copy Function
This chapter explains likely causes of and possible solutions for copier function
problems.
When a Message Appears
This section explains the machine's main messages. If other messages appear,
follow the instructions they contain.
Important
❒ Check the contact address and Serial No. of Machine shown in the Service
Call message (L), and then contact your service representative. If the contact
address is not shown, contact your sales representative.
❒ For messages that are not listed here, see “When You Have Problems Operating the Machine”.
Message
Please wait.
Cause
Solution
The main power has just
been turned on, paper
type (plain paper/ translucent paper/ film) was
changed, or the machine
is otherwise getting
ready.
Wait for the machine to fully warm-up.
When “Scanning originals can
be started.” and “Select copy
mode and Place original.” are
displayed alternately, you can make the
settings for your copies and scan your
originals. After the originals have been
scanned, the machine will automatically
start copying after it has warmed-up.
See “Auto Start”, Copy/Document
Server Reference.
Cannot detect
original size.
The machine cannot detect Manually select a paper tray without usthe size of the original.
ing [Auto Paper Select], and specify a reproduction ratio without using [Auto
Reduce / Enlarge].
Memory is full.
The machine's memory
• When Sort is selected, press [Exit] to
is full due to scanning
copy scanned originals, and then
originals or performing a
copy remaining originals.
function. The number of • When the Job Preset function is seoriginals that can be
lected, check the number of preset
stored in memory dejobs, and then try scanning the origipends on the size of orignals again.
inals and function
settings.
Check paper size. An improper paper size
is set.
Check the settings for Reduce/ Enlarge,
etc., and then try again.
17
Troubleshooting When Using the Copy Function
2
Message
Cause
Solution
Rotate Sort is
not available
with this paper
size. Select another paper size
or cancel Rotate
Sort mode.
The rotate sort function
does not support the size
of the scanned original.
You cannot use rotate sort with A0 (E), B4
JIS, A4 (A), and custom size paper. See
“Sort”, Copy/Document Server Reference.
Set paper of the following dimensions:
❖ Metric version
• 420 × 297 mm (A3)
• 594 × 420 mm (A2)
• 841 × 594 mm (A1)
• 515 × 364 mm (B3 JIS)
• 728 × 515 mm (B2 JIS)
❖ Inch version (Engineering)
• 11" × 17" (B)
• 17" × 22" (C)
• 22" × 34" (D)
❖ Inch version (Architecture)
• 12" × 18" (B)
• 18" × 24" (C)
• 24" × 35" (D)
Maximum number of
sets is nn.
(A figure is placed at n.)
18
The number of copies ex- You can change the maximum copy
ceeds the maximum
quantity. See “General Features”, General Settings Guide.
copy quantity.
File being stored
exceeded max.
number of pages
per file. Copying
will be stopped.
The scanned originals
have too many pages to
store as one document.
Press [Exit], and then store again with an
appropriate number of pages.
You do not have
the privileges to
use this function.
This user code is not allowed to use the function
selected.
Contact the administrator.
You do not have
the privileges to
use this function.
This user code is not allowed to use the function
selected.
If the message continues to be displayed
and you cannot switch the screen, press
the {Energy Saver} key. Confirm that the
display goes off, and then press the {Energy Saver} key again. The display will
return to the user code entry display.
When printing under the copier or
printer function, press the {Energy Saver} key only after printing has finished.
Authentication
has failed.
The entered login user
name or login password
is not correct.
Inquire the user administrator for the correct login user name and login password.
When a Message Appears
Message
Authentication
has failed.
Cause
Solution
The machine cannot per- Contact the administrator.
form authentication.
You have tried to delete
The selected
file(s) contained files without the authority to do so.
file(s) without
access privileges. Only file(s)
with access privileges will be
deleted.
Files can be deleted by the person who
created the file. To delete a file which
you are not authorized to delete, contact
the person who created the file.
Document Server or
Orig. is being
scanned by anoth- Scanner function is in
use.
er function.
Please wait.
To cancel the job in process, press [Exit],
and then press the {Document Server} or
{Scanner} key. Next, press the
{Clear/Stop} key. When the message
“The Clear / Stop key was
2
pressed. Are you sure you
want to stop scanning?” appears, press [Stop].
Please wait.
The destination list is be- Wait until the message disappears. Do
ing updated from the
not switch off the power while this mesnetwork using SmartDe- sage is displayed.
viceMonitor for Admin.
Depending on the number of destinations to be
updated, there may be
some delay before you
can resume operation.
Operations are not possible while this message is
displayed.
Reference
p.9 “When You Have Problems Operating the Machine”
19
Troubleshooting When Using the Copy Function
When You Cannot Make Clear Copies
This section explains likely causes of and possible solutions for unclear copies.
Problem
2
Cause
Solution
Black or white streaks ap- The exposure glass or
pear on copies.
platen plate is dirty.
Clean the exposure glass or platen plate.
See p.79 “Maintaining Your Machine”.
Black or white streaks ap- The original is dusty.
pear on copies.
Clean the original and try copying
again.
Be particularly careful when using the
following types of original:
• Hand drawn or drawn on with other
forms of pencil or pen, such as a plotter.
• Film, translucent paper, or other
originals that attract static electricity.
• Very long originals.
20
The background is dirty.
Image density is too
dark.
Adjust the image density setting. See
“Adjusting Copy Image Density”,
Copy/Document Server Reference.
The background is dirty.
Auto Image Density is
not selected.
Select the auto density. See “Adjusting
Copy Image Density”, Copy/Document
Server Reference.
Copies are too light.
Image density is too
light.
Adjust the image density settings. See
“Adjusting Copy Image Density”,
Copy/Document Server Reference.
Copies are too light.
A light copy may result
when you use damp or
rough grain paper.
Use the recommended paper. Also, use
paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This
Machine.
Copies are too light.
Toner cartridge is almost
empty.
Add toner. See p.64 “Adding Toner”.
Parts of images are not
printed.
The paper is damp.
Use paper that has been stored in the
recommended temperature and humidity condition. See “Copy Paper”, About
This Machine.
Toner fusing is poor.
The paper thickness is
not properly set.
Set the paper thickness again. See “Tray
Paper Settings”, General Settings Guide.
Toner fusing is poor.
The copy paper is too
thick.
Set the paper thickness again. See “Tray
Paper Settings”, General Settings Guide.
The same copy area is
dirty whenever making
copies.
The exposure glass or
platen plate is dirty.
Clean the exposure glass or platen plate.
See p.79 “Maintaining Your Machine”.
The same copy area is
dirty whenever making
copies.
The original that has already been printed is
scanned.
Select [Generation Copy], and then begin
copying. See “Selecting the Original
Type Setting”, Copy/Document Server
Reference.
When You Cannot Make Clear Copies
Problem
Cause
Solution
Image density is uneven. The original has areas of
solid color, or Positive/Negative is selected
when copying multiple
sheets.
When using Repeat Copy with originals
that have areas of solid color, set the
number of originals as follows: A0 - A2
(E - C): 1 sheet, A3 (B) or smaller: 3
sheets. For details about sizes of originals, see “Measure Chart”, Copy/Document Server Reference.
Image density is uneven. Halftone originals can
cause this problem.
Try using “Text / Photo” or “Photo”.
Images are blurred when
using translucent paper.
Translucent paper is being used when copying
multiple sheets.
Select a proper paper thickness for the
copy paper. See “Tray Paper Settings”,
General Settings Guide.
Extreme wrinkling occurs when using translucent paper.
An improper paper
thickness is selected.
Select a proper paper thickness for the
copy paper. See “Tray Paper Settings”,
General Settings Guide.
Strong wrinkles appear
when using translucent
paper.
The paper type has recently been changed
from plain paper to
translucent paper.
Wait about one minute.
Streaks, scratches, or
wrinkles appear in areas
of solid black.
Copy paper has been
changed from plain to
translucent paper, or
from translucent to plain
paper.
After switching from plain to translucent paper, wait one minute. After
switching from translucent to plain paper, wait two minutes before making
copies.
The reverse side of an
original image is copied.
Image density is too
high.
Adjust the image density. See “Adjusting Copy Image Density”, Copy/Document Server Reference.
The reverse side of an
original image is copied.
Auto Image Density is
not selected.
Select the auto density. See “Adjusting
Copy Image Density”, Copy/Document
Server Reference.
Copies are blurred.
Continuous copies have
been made on small
sized paper.
Wait about two minutes, and then try
copying again.
A shadow appears on
copies if you use pasted
originals.
Image density is too
high.
Adjust the image density. See “Adjusting Copy Image Density”, Copy/Document Server Reference.
2
Change the orientation of the original.
Put mending tape on the pasted part.
Parts of images are not
copied.
The original is not set
correctly.
Set originals correctly. See “Placing
Originals”, Copy/Document Server
Reference.
Parts of images are not
copied.
The correct paper size is
not selected.
Select the proper paper size.
White lines appear.
The exposure glass or
platen plate is dirty.
Clean the exposure glass or platen plate.
See p.79 “Maintaining Your Machine”.
21
Troubleshooting When Using the Copy Function
Problem
2
22
Cause
Solution
White lines appear.
When D is blinking, ton- Add toner. See p.64 “Adding Toner”.
er is beginning to run
out.
Copies are blank.
The original is not set
correctly.
When using the exposure glass, face the
originals down. See “Placing Originals”,
Copy/Document Server Reference.
A moiré pattern is produced on copies.
Your original has a dot
pattern image or many
lines.
Place the original on the exposure glass
at a slight angle.
Wrinkles appear on the
copy.
The paper is damp.
• Replace the paper with new paper.
• To prevent paper absorbing moisture, turn on the anti-humidity heater switch. See “Guide to
Components”, About This Machine.
When You Cannot Make Copies As Wanted
When You Cannot Make Copies As
Wanted
This section explains likely causes of and possible solutions for unclear copies.
❖ Basic
Problem
Cause
Misfeeds occur frequently. The number of sheets
loaded in the cut paper
tray exceeds the capacity
of the machine.
2
Solution
Load paper only as high as the upper
limit markings on the side fences of the
cut paper tray. See p.57 “Loading Paper”.
Misfeeds occur frequently. The cut paper tray's side Push the cut paper tray's side fences
fences are set too tightly. slightly apart, and then reset the tray.
Misfeeds occur frequently. The paper is damp.
Use paper that has been stored in the
recommended temperature and humidity condition. See “Copy Paper”, About
This Machine.
Misfeeds occur frequently. The paper is too thick or
too thin.
Use recommended paper. See “Copy
Paper”, About This Machine.
Misfeeds occur frequently. The paper is folded or
creased.
Cut folded or wrinkled areas off the paper roll.
Remove cut paper that is folded or wrinkled.
Misfeeds occur frequently. Jammed or torn paper is
inside the machine.
Remove the paper properly. See p.67
“Removing Jammed Paper”.
Misfeeds occur frequently. The paper is curled.
Smooth out the curl and try again.
Misfeeds occur frequently. Printed paper is being
used.
Use recommended paper. Do not use
paper that has been already copied or
printed onto. See “Copy Paper”, About
This Machine.
Copy paper becomes
creased.
The paper is damp.
Replace the paper with new paper. Cut
the paper to 1000 mm (40") just before
copying.
Copy paper becomes
creased.
The paper is damp.
Turn on the anti-humidity heater
switch. See “Anti-humidity Heater
Switch”, About This Machine.
Copy paper becomes
creased.
The paper is too thin.
Use recommended paper. See “Copy
Paper”, About This Machine.
Copies are slanted.
The original was not set
straightly.
Set the original so that it is squarely
aligned with the original guides.
Original and copy size
does not match.
Dampness can cause paper to stretch.
Adjust the Fine Magnification setting for
Additional Copy. See “Fine Magnification”, Copy/Document Server Reference.
23
Troubleshooting When Using the Copy Function
Problem
Cause
Solution
Cannot scan originals on Originals on different se- Scan the originals on each series separately.
mixed A series and JIS B
ries of paper cannot be
series paper continuously. scanned continuously at
the same time.
You cannot combine sev- Selected functions caneral functions.
not be used together.
Check the combination of functions and
make the settings again. See “Function
Compatibility”, Copy/Document Server Reference.
Images are skewed.
The side fences in the cut
paper tray is not locked.
Make sure the side fences are locked. See
p.61 “Changing the Paper Size”.
Images are skewed.
The paper is feeding in at
a slant.
Load the paper correctly. See p.57
“Loading Paper”.
The machine does not
start copying even
though you have inserted paper into the bypass
tray.
Originals are not
scanned.
After scanning the originals, load paper
in the bypass tray.
Copies shift sideways.
The paper roll is not set
correctly.
Set the paper roll correctly, making sure
it is straight and not loose. See p.57
“Loading Paper”.
Copies shift sideways.
The original does not
match the size in the
original table setting.
Adjust the original guides to the specified
size, and then insert the original along the
guides. See “Placing Originals”,
Copy/Document Server Reference.
Copies shift sideways.
The paper is not set correctly in the bypass tray.
Make sure the paper size matches the
bypass tray's paper guides. See “Copying from the Bypass Tray”, Copy/Document Server Reference.
Copies shift in the direction of the original feed
(or opposite) direction.
Print Position Adjustment or Margin Adjustment mode is selected.
Cancel Print Position Adjustment or Margin Adjustment mode. See “Margin Adjustment” and “Adjust Print Position”,
Copy/Document Server Reference.
Copies are shorter than
the selected size, or cut
off before the end.
Print Position Adjustment or Margin Adjustment mode is selected.
Cancel Print Position Adjustment or Margin Adjustment mode. See “Margin Adjustment” and “Adjust Print Position”,
Copy/Document Server Reference.
Problem
Cause
Solution
In Double Copies mode,
parts of the original image are not copied.
Combination of original
and copy paper is not
correct.
Specify the paper size again. For example, select A3L for A4K originals. See
“Double Copies”, Copy/Document
Server Reference.
2
❖ Edit
24
In Erase Border, Erase In- You set a wide erased
side, or Erase Outside
margin.
mode, parts of the original image are not copied.
Make the margin width narrower. You
can adjust it between 2 - 99 mm (0.1" 3.9"). See “Edit”, General Settings
Guide.
When You Cannot Make Copies As Wanted
Problem
Cause
Solution
In Erase Border, Erase In- Originals are not
side, or Erase Outside
scanned correctly.
mode, parts of the original image are not copied.
Place the originals correctly.
Parts of the image are not
copied.
Print Position Adjustment or Margin Adjustment mode is selected.
Cancel Print Position Adjustment or Margin Adjustment mode. See “Margin Adjustment” and “Adjust Print Position”,
Copy/Document Server Reference.
Parts of the image are not
copied.
You placed a custom size
original.
Enter the size of the original, or set the
scanning area wider. See “Placing Custom Size Originals” and “Wide Scan”,
Copy/Document Server Reference.
In Image Repeat mode,
the original image is not
copied repeatedly.
You selected copy paper Select copy paper larger than the origithe same size as the orig- nals or select the proper reproduction
inals, or you did not se- ratio.
lect the proper
reproduction ratio.
2
❖ Combine
Problem
Cause
Solution
When using Combine,
parts of the image are not
copied.
You specified a reproduction ratio that does
not match the sizes of
your originals and copy
paper.
When you specify a reproduction ratio
using Manual Paper Select mode, make
sure that the ratio matches your originals and the copy paper. Select the correct reproduction ratio before using
Combine mode.
Copies are not in correct
order.
You placed the originals
in the incorrect order.
Start with the first page to be copied.
❖ Folding finisher
Problem
Cause
The folding finisher is not The folding finisher is
recognized (is offline).
turned off, or the folding
finisher and the machine
were not turned on in the
correct order.
Solution
If the folding finishers is offline, turn off
the main power switches of both the machine and folding finisher, and then turn
them back on again in the following order:
folding finisher, and then the machine.
Then check the folding finisher is online.
“Please wait.” ap- The folding finisher is offline.
pears on the display panel and printing cannot be
done.
Turn off the main power switches of both
the machine and folding finisher, and then
turn them back on again in the following order: folding finisher, and then the machine.
Then check the folding finisher is online.
Cannot specify folding.
Translucent paper or
film has been selected.
Translucent paper and film are not
available for folding. They are delivered
to the upper output stacker, but not
folded. Select another paper type, and
then specify folding.
25
Troubleshooting When Using the Copy Function
When Memory Is Full
This section explains likely causes of and possible solutions for problems related
to full memory.
2
Message
Cause
Solution
Memory is full.
nn originals have
been scanned.
Press [Print] to
copy scanned
originals. Do not
remove remaining
originals.
The scanned originals
exceeds the number of
pages that can be stored
in memory.
Press [Print] to copy scanned originals
and cancel the scanning data. Press
[Stop] to cancel the scanning data and
not copy.
The machine checked if
the remaining originals
should be copied, after
the scanned originals
was printed.
To continue copying, remove all copies,
and then press [Continue]. To stop copying, press [Stop].
“n” in the message represents a changeable
number.
Press [Continue] to
scan and copy remaining originals.
26
3. Troubleshooting When
Using the Printer Function
This chapter explains likely causes of and possible solutions for printer function
problems.
When a Message Appears During
Installation of the Printer Driver
This section explains what to do if a message appears when installing the printer
driver.
Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the printer driver using [Add Printer] or [Install Printer].
Message number 58 appears if there is a newer version of the printer driver already installed.
Windows 95/98/Me, Windows 2000, or Windows NT 4.0
This section explains the procedure under Windows 95/98/Me, Windows 2000,
or Windows NT 4.0.
A On the [Start] menu, point to [Settings], and then click [Printers].
B Double-click the [Add Printer] icon.
C Follow the instructions in [Add Printer Wizard].
If the printer driver is on a CD-ROM, the location of the RPCS printer driver
is either \DRIVERS\RPCS\WIN9X_ME, or \DRIVERS\RPCS\WIN2K_XP.
If the installer starts, click [Cancel] to quit.
D Specify a port.
For the setting procedure, see a description for the port you are using.
Note
❒ Available ports vary according to your Windows operating system or the
type of interface. For details, see “Preparing the Machine”, Printer Reference.
Reference
“Preparing the Machine”, Printer Reference
27
Troubleshooting When Using the Printer Function
Windows XP Professional, Windows Server 2003
This section explains the procedure under Windows XP Professional or Windows Server 2003.
A On the [Start] menu, click [Printers and Faxes].
B Click [Add a printer].
C Follow the instructions in [Add Printer Wizard].
If the printer driver is on a CD-ROM, the location of the RPCS printer driver
is \DRIVERS\RPCS\WIN2K_XP.
If the installer starts, click [Cancel] to quit.
3
D Specify a port.
See the explanation for the port you are using for the setting procedure.
Note
❒ Available ports vary according to your Windows operating system or the
type of interface. For details, see “Preparing the Machine”, Printer Reference.
Reference
“Preparing the Machine”, Printer Reference
Windows XP Home Edition
This section explains the procedure under Windows XP Home Edition.
A On the [Start] menu, click [Control Panel].
B Click [Printer and Other Hardware].
C Click [Printers and Faxes].
D Click [Add a Printer].
E Follow the instructions in [Add Printer Wizard].
If the printer driver is on a CD-ROM, the location of the RPCS printer driver
is \DRIVERS\RPCS\WIN2K_XP.
If the installer starts, click [Cancel] to quit.
F Specify a port.
For the setting procedure, see a description for the port you are using.
Note
❒ Available ports vary according to your Windows operating system or the
type of interface. For details, see “Preparing the Machine”, Printer Reference.
28
Reference
“Preparing the Machine”, Printer Reference
If USB Connection Fails
If USB Connection Fails
This section explains how to troubleshoot a problem related to USB connection.
Problem
The machine is not automatically recognized.
Cause
Solution
The USB cable is not con- Disconnect the USB cable, and then turn
nected properly.
the machine off and then back on again.
After confirming the machine is on, connect the USB cable again.
Windows has already con- Check whether the comfigured the USB settings. puter has identified the
machine as an unsupported device.
Open Windows' Device Manager, and
then, under [Universal Serial Bus controllers], remove any conflicting devices.
Conflicting devices have a [!] or [?] icon
by them. Take care not to accidentally
remove required devices. For details,
see Windows Help.
3
When using Windows 2000 / XP or
Windows Server 2003, an erroneous device is displayed under [USB Controller]
in the [Device Manager] dialog box.
Windows Me and the ma- You need to download
chine cannot be connected. USB Printing Support for
Windows Me.
Download USB Printing Support from
the supplier's website.
Search the model name you use on the
supplier's website, and download USB
Printing Support.
29
Troubleshooting When Using the Printer Function
When a Message Appears
This section describes the principal messages that appear on the panel display.
If a message not described here appears, act according to the message.
Note
❒ Before turning the main power off, see “Turning On the Power”, About This
Machine.
Reference
“Turning On the Power”, About This Machine
3
Status Messages
This section describes the machine status messages.
Message
30
Status
Ready
This is the default ready message. The machine is ready
for use. No action is required.
Waiting...
The machine is waiting for the next data to print. Wait a
while.
Offline
The machine is offline. To start printing, switch the machine online by pressing [Online].
Please wait.
This message might appear for a second or two while the
machine is preparing, performing initial adjustments, or
adding toner. Wait a while.
Job Suspended...
All jobs in the machine are suspended. Wait a while.
Hex Dump Mode
In the Hex Dump mode, the machine receives data in
hexadecimal format. Turn off the machine after printing,
and then turn back on.
Resetting job...
The machine is resetting the print job. Wait until
“Ready” appears on the display panel.
Setting change...
The machine is setting changing. You cannot use the control panel while this message is displayed. Wait a while.
When a Message Appears
Alert Messages
This section describes the machine Alert messages.
Message
Cause
Solution
Cannot connect
with the wireless
card. Turn the
main power switch
off, then check
the card.
IEEE 802.11b interface
unit was not inserted
when the machine was
turned on.
Turn off the machine and check the interface unit is inserted correctly. Then,
turn the machine on again. If the message appears again, call your service
representative.
Cannot connect
with the wireless
card. Turn the
main power switch
off, then check
the card.
IEEE 802.11b interface
unit was pulled out after
the machine turned on.
Turn off the machine and check the interface unit is inserted correctly. Then,
turn the machine on again. If the message appears again, call your service
representative.
Problems with the
wireless card.
A wireless card that the
machine cannot use has
been installed.
Turn off the machine and check the interface unit is inserted correctly. Then,
turn the machine on again. If the message appears again, call your service
representative.
Problems with the
wireless board.
Access to the wireless
board in which the IEEE
802.11b interface unit is
inserted is possible, but
an error was detected.
Turn off the machine and check the interface unit is inserted correctly. Then,
turn the machine on again. If the message appears again, call your service
representative.
Problem with Hard
Disk.
An error has occurred in
the hard disk drive.
Turn off the main power switch, and back
on again. If the message appears again,
contact your service representative.
3
The entered pass- The password of the en- Enter the correct password.
crypted PDF file has
word is incorbeen entered incorrectly.
rect.
Error has occurred.
A syntax error, etc., has
occurred.
Check the PDF file is not corrupted.
USB has a problem.
An error has occurred in
the USB interface.
Turn off the main power switch, and back
on again. If the message appears again,
contact your service representative.
Hardware Problem:
Ethernet
An error has occurred in
the Ethernet board.
Turn off the main power switch, and back
on again. If the message appears again,
contact your service representative.
Printing privileges have not
been set for this
document.
You tried to print a print- You cannot print this document.
protected document.
31
Troubleshooting When Using the Printer Function
Message
Cause
Solution
You do not have
the privileges to
use this function.
Use of this function is
restricted.
Contact the administrator.
Authentication
has failed.
• The login user name
or password entered
is incorrect.
• Check your login user name and
password.
• Contact the administrator.
• The machine currently cannot perform authentication.
3
An error has occurred in Turn off the main power switch, and back
Parallel I/F
on again. If the message appears again,
board has a prob- the parallel interface
board.
contact your service representative.
lem.
Printer font error.
An error has occurred in
the font settings.
Contact your service representative.
File system is
full.
There is not enough free
space on the file system
for printing PDF files.
Delete unnecessary files from the hard
disk.
Maximum capacity of
PostScript 3 list display
has been exceeded.
Reduce the value of [Resolution] in the
printer driver. Alternatively, select
[Frame Priority] from [Memory Usage] in
[System]. See “Printer Features”, General
Settings Guide.
Memory Overflow
Alternatively, reduce the number of files
sent to the machine.
If this message continues to appear after
taking these steps, decrease the number
of files sent to the machine.
32
When a Message Appears
Checking the Error Log
If files could not be stored due to printing errors, identify the cause of the errors
by checking the error log on the control panel.
A Press the {Printer} key to display the printer screen.
3
ATK022S
B Press [Error Log].
An error log list appears.
Note
❒ The most recent 30 errors are stored in the error log. If a new error is added
when there are 30 errors already stored, the oldest error is deleted. However, if the oldest error is a Sample Print, Locked Print, Hold Print, or
Stored Print error, it is not deleted. The error is stored separately until the
number of errors reaches 30.
❒ You cannot view [Error Log] on the simplified display.
❒ If the main power switch is turned off, the log is deleted.
33
Troubleshooting When Using the Printer Function
When You Cannot Print
Use the following procedures if printing does not start when printing from a
computer.
Problem
3
Cause
Solution
Printing does not start.
The power is off.
Check the cable is securely plugged into
the power outlet and the machine. Turn
on the main power switch.
Printing does not start.
The machine is set to
“Offline”.
Press [Online].
Printing does not start.
The cause is displayed
Check the error message or warning staon the display of the con- tus on the display panel and take the retrol panel.
quired action. See p.30 “When a
Message Appears”.
Printing does not start.
The interface cable is not
connected correctly.
Connect the interface cable securely. See
“Connecting to the Interfaces”, General
Settings Guide.
Printing does not start.
The correct interface cable is not being used.
The type of interface cable you should
use depends on the computer. Be sure to
use the correct one. If the cable is damaged or worn, replace it. See “Connecting to the Interfaces”, General Settings
Guide.
Printing does not start.
The interface cable was
connected after the machine was switched on.
Connect the interface cable before turning on the machine.
Printing does not start.
If the machine is operating in an extended wireless LAN, failure to print
might result from a weak
wireless signal.
To check signal status, press the {User
Tools / Counter} key, and then press [System Settings] on the display panel. On the
[Interface Settings] tab, select [IEEE
802.11b], and then press [Wireless LAN Signal]. If signal quality is poor, move the
machine to a location where radio
waves can pass or remove objects that
might cause interference.
(You can check signal status only when
using wireless LAN in the infrastructure
mode.)
Printing does not start.
34
If the machine is operating in an extended wireless LAN, SSID settings
are incorrect.
Check using the machine's display panel that the SSID is correctly set. See “Network Settings”, General Settings Guide.
When You Cannot Print
Problem
Cause
Solution
Printing does not start.
If the machine is operating in an extended wireless LAN, the receiver's
MAC address may be
preventing communication with the access
point.
Check access point settings when in the
infrastructure mode. Depending on the
access point, client access may be limited by MAC address. Also, check there
are no problems in transmission between access point and wired clients,
and between access point and wireless
clients.
Printing does not start.
The extended wireless
LAN has not started.
Confirm the orange LED is lit, and the green
LED is lit or blinks during transmission.
Printing does not start.
The login user name,
login password, or driver encryption key is
invalid.
Check the login user name, login password, or driver encryption key.
Printing does not start.
Advanced encryption
Check the settings of the Extended Secuhas been set using the Ex- rity function with the administrator.
tended Security function.
Data-in lamp does not
blink or light up.
If the data-in lamp is un- • When the machine is connected to a
lit or not flashing even
computer via a cable, check the comafter performing [Print],
puter print port settings are correct.
the machine has not reSee “When the machine is connected
ceived the data.
to the computer using the interface
cable”.
3
• When it is networked with a computer, contact the administrator.
The status indicator of
the printer is lit.
The cause is displayed
Check the error message on the display
on the display of the con- panel and take required action. See p.30
trol panel.
“When a Message Appears”.
The destination list is being updated from the
tination list...
Please wait. Speci- network using SmartDeviceMonitor for Admin.
fied destina-
“Updating the des-
tion(s) or sender's
name has been
cleared.” appears.
Wait until the message disappears. Do
not switch off the main power while this
message is displayed. Depending on the
number of destinations to be updated,
there may be some delay before you can
resume operation. Operations are not
possible while this message is displayed.
[List / Test Print] is disabled.
A mechanical error
might have occurred.
Contact your service representative. See
“List / Test Print”, General Settings
Guide.
Printing does not start
when using the extended
wireless LAN in Ad-hoc
mode.
The correct Communica- Turn the main power off and back on.
tion mode is not set.
See “Turning On the Power”, About
This Machine.
Or, change the settings for [System Settings], [Interface Settings], and [Network].
See “Network Settings”, General Settings Guide.
If the printing does not start, consult your service representative.
35
Troubleshooting When Using the Printer Function
❖ When the machine is connected to the computer using the interface cable
The following shows how to check the print port when the data-in lamp does
not light up or blink.
Check if the print port setting is correct. When it is connected using a parallel
interface, connect it to LPT1 or LPT2.
For Windows 95/98/Me
A Click the [Start] button, point to [Settings], and then click [Printers].
B Click the icon of the machine. On the [File] menu, click [Properties].
C Click the [Details] tab.
D In the [Print to the following port:] list, confirm the correct port is selected.
For Windows 2000 or Windows NT 4.0
A Click the [Start] button, point to [Settings], and then click [Printers].
B Click the icon of the machine. On the [File] menu, click [Properties].
C Click the [Ports] tab.
D In the [Print to the following port(s)] list, confirm the correct port is selected.
For Windows XP Professional or Windows Server 2003
A Click the [Start] button, and then click [Printers and Faxes].
B Click the icon of the machine. On the [File] menu, click [Properties].
C Click the [Ports] tab.
D In the [Print to the following port(s)] list, confirm the correct port is selected.
For Windows XP Home Edition
A Click the [Start] button, and then click [Control Panel].
B Click [Printers and Other Hardware].
C Click [Printers and Faxes].
D Click the icon of the machine. On the [File] menu, click [Properties].
E Click the [Ports] tab.
F In the [Print to the following port(s)] list, confirm the correct port is selected.
3
36
Other Printing Problems
Other Printing Problems
This section explains likely causes of and possible solutions for problems that
can occur when printing from a computer.
❖ If prints are not clear
Problem
Cause
Solution
The print on the entire page is faded.
When D is blinking,
toner is beginning to
run out.
Add toner. See p.64 “Adding Toner”.
The print on the entire page is faded.
The paper is damp.
Use paper that has been stored in the recommended temperature and humidity condition.
See “Copy Paper”, About This Machine.
The print on the entire page is faded.
The paper is unsuitable. Use the recommended paper. (Printing on
coarse or treated paper might result in faint
print image.) See “Copy Paper”, About This
Machine.
Parts of images are
not printed.
The paper is damp.
Use paper that has been stored in the recommended temperature and humidity condition.
See “Copy Paper”, About This Machine.
White lines appear.
When D is blinking,
toner is beginning to
run out.
Add toner. See p.64 “Adding Toner”.
3
❖ When printer driver settings are required
Problem
Cause
Solution
The printed image is
different from the image on the computer's
display.
With certain funcIn the application, change the layout, character
tions, such as ensize, and character settings.
largement and
reduction, image layout might be different
to that on the computer display.
The printed image is
different from the image on the computer's
display.
You might have selected to replace True
Type fonts with machine fonts in the
printing process.
When printing
graphics, the output
and the screen are
different.
If the printer driver is If you want to print accurately, set the printer
configured to use the driver to print without using the graphics comgraphics command,
mand. See the printer driver Help.
the graphics command from the machine is used to print.
Garbled characters
are printed.
The correct printer
language might have
not been selected.
To print an image similar to that of the computer display, make settings to print True Type
fonts as an image. See the printer driver Help.
Set the correct printer language.
37
Troubleshooting When Using the Printer Function
Problem
Cause
Solution
Images are printed in The feed orientation
the wrong orientation. you selected and the
feed orientation selected in the printer
driver's option setup
might not be the
same.
Set the machine's feed orientation and the
printer driver's feed orientation accordingly.
See the printer driver Help.
Images are cut off, or
excess is printed.
You may be using paper smaller than the
size selected in the
application.
Use the same size paper as that selected in the
application. If you cannot load paper of the correct size, use the reduction function to reduce
the image, and then print. See the printer driver
Help.
Page layout is not as
expected.
Print areas differ depending on machine
used. Information that
fits on a single page on
one machine may not
fit on a single page of
another machine.
Adjust the [Printable area:] setting in the [Printer
Configuration...] dialog box on the [Print Settings]
tab in the RPCS printer driver. See the printer
driver Help.
Photo images are
coarse.
Some applications print Use the application's settings to specify a higher
at lower resolution.
resolution.
Solid lines are printed as broken lines.
Dither patterns do
not match.
3
Make the following settings with the printer
driver: Change the [Dithering:] setting on the [Image Adjustments] tab in the [Change User Settings...] dialog box, on the [Print Quality] tab in the
RPCS printer driver. See the printer driver
Help.
Set up optional devices on the Properties of the
Optional components Bidirectional commuconnected to the ma- nication is not working. printer.
chine are not recogSee the printer driver Help.
nized when using
Windows 95 / 98 /
Me, Windows 2000 /
XP, Windows Server
2003, and Windows
NT 4.0.
Print results using
The correct applicacombined printing or tion or printer driver
auto reduce/enlarge settings are not made.
are not as expected
under Windows 95 /
98 / Me / 2000 / XP,
Windows Server
2003, or Windows NT
4.0.
When printing on
custom size paper
under Windows, the
image appears in the
wrong position.
38
Make sure the application's paper size and orientation settings match those of the printer
driver. If a different paper size and orientation
are set, select the same size and orientation.
The correct custom
To print on custom size paper from the paper
paper size is not spec- tray, specify the paper size in the printer drivified in the printer
er's settings. See the printer driver Help.
driver's settings.
Other Printing Problems
❖ When paper does not feed in properly
Problem
Cause
Solution
Paper is not fed from
the selected tray.
When you are using a Set the desired input tray using the printer
Windows operating
driver. See the printer driver Help.
system, printer driver
settings override
those set using the
display panel.
Print is slanted.
The cut paper tray's
side fences might not
be locked.
Check the side fences are locked. See p.61
“Changing the Paper Size”.
Print is slanted.
The paper is feeding
in at a slant.
Load the paper correctly. See p.57 “Loading Paper”.
Misfeeds occur
frequently.
The number of sheets Load paper only as high as the upper limit
loaded in the cut paper markings on the side fences of the cut paper
tray exceeds the capac- tray. See p.57 “Loading Paper”.
ity of the machine.
Misfeeds occur
frequently.
The paper is damp.
Use paper that has been stored in the recommended temperature and humidity condition.
See “Copy Paper”, About This Machine.
Misfeeds occur
frequently.
The paper is too thick
or too thin.
Use recommended paper. See “Copy Paper”,
About This Machine.
Misfeeds occur
frequently.
The copy paper is
wrinkled or has been
folded/creased.
Use recommended paper. Use paper that has
been stored in the recommended temperature
and humidity condition. See “Copy Paper”,
About This Machine.
Misfeeds occur
frequently.
Printed paper is being used.
Use recommended paper. See “Copy Paper”,
About This Machine.
Copy paper becomes
creased.
The paper is damp.
Use paper that has been stored in the recommended temperature and humidity condition.
See “Copy Paper”, About This Machine.
Copy paper becomes
creased.
The paper is too thin. Use recommended paper. See “Copy Paper”,
About This Machine.
There is considerable
delay between the
print start instruction
and actual printing.
Processing time deIf the data-in lamp is blinking, data has been repends on data volceived by the printer. Wait for a moment.
ume. High volume
data, such as graphics-heavy documents,
take longer to process.
There is considerable
delay between the
print start instruction
and actual printing.
The machine might
be in “Sleep mode”.
The machine requires time to warm up if it has
been in “Sleep mode”. Specify “Sleep mode” in
[System Settings], [Auto Off Timer].
There is considerable
delay between the
print start instruction
and actual printing.
The paper type setting was changed.
If the paper type setting has been changed,
there might be a delay before printing begins.
Wait for a moment.
3
39
Troubleshooting When Using the Printer Function
Problem
Cause
It takes a long time to
complete a print job.
Processing time depends on data volume. High volume
data, such as graphics-heavy documents,
take longer to process.
Solution
Wait for a moment.
Making the following setting on the printer
driver may reduce the computer's workload.
• Select [Speed] in the [Print priority] on the
[Print Quality] tab in the printing preferences
dialog box.
• Also, select the [User settings] check box, and
then click [Change User Settings...]. Select the
lower value for the [Resolution:] list on the
[Image Adjustments] tab in the [Change User
Settings] dialog box.
3
See the printer driver Help.
Print jobs take a long
time to complete.
If a print job is data
heavy, it will take
longer to complete.
If the data-in lamp is blinking, data has been received by the printer. Wait for a moment.
❖ Folding finisher
Problem
Cause
Solution
Cannot specify folding. The folding finisher is When the folding finisher is offline, folding
offline.
cannot be specified.
Turn off the main power switches of both the
machine and folding finisher, and then turn
them back on again in the following order: folding finisher, and then the machine.
Then check the folding finisher is online.
Cannot specify folding. The optional device is Configure the optional device correctly using
not configured cor[Change Accessories...] on the printer driver. See
rectly on the printer
the printer driver Help.
driver.
Cannot specify folding. Translucent paper or
film was specified.
“Please wait.”
appears on the display panel and printing cannot be done.
Translucent paper and film are not available for
folding. They are delivered to the upper output
stacker, but not folded. Select another paper
type, and then specify folding.
The folding finisher is Turn off the main power switch of both the maoffline.
chine and folding finisher, and then turn them
back on again in the following order: folding
finisher, and then the machine.
Then check the folding finisher is online.
40
Other Printing Problems
❖ Other printing problems
Problem
Cause
Solution
A print instruction
was issued from the
computer, but printing did not start.
User Authentication
may have been set.
• Ask the administrator for the user code.
PDF files do not print
out/cannot perform
PDF direct print.
PDF files are password-protected.
To print password-protected PDF files, enter
the password in the [PDF Menu] or on Web Image Monitor.
• Specify the user code you confirmed when
printing from the printer driver. On the
printer driver's [Printer Configuration] tab,
click [User Code], and then enter the user
code.
3
• For details about [PDF Menu], see “PDF
Menu”, General Settings Guide.
• For details about Web Image Monitor, see
the Web Image Monitor Help.
PDF files do not print
out/cannot perform
PDF direct print.
PDF files cannot be
Change the PDF file security setting.
printed if they are
print-disabled in PDF
file security setting.
PDF files do not print
out/cannot perform
PDF direct print.
High compression
PDF files created using the machine's
scanner function cannot print directly.
Open the application used to create the PDF,
and then print the file using the application's
driver.
Re-save the file in normal (non-compressed)
PDF format.
Some types of High Compression PDF files are
not supported. Consult your sales representative about the supported file types.
PDF direct print pro- Fonts were not
duces strange or mal- embedded.
formed characters.
Embed fonts in the PDF file you want to print
and then print.
Printing by wireless
LAN is slow.
The number of jobs
exceeds the capacity
of the machine.
Reduce the number of jobs.
Printing by wireless
LAN is slow.
• A communication error might
have occurred.
• Check if there are any other active wirelessdevices near the machine.
• Interference from
other wireless
LAN devices can
reduce communication speed.
• Remove the machine from close proximity
with IEEE 802.11b wireless LAN devices.
If the problem cannot be solved, contact your service representative.
41
Troubleshooting When Using the Printer Function
3
42
4. Troubleshooting When
Using the Scanner Function
This chapter explains likely causes of and possible solutions for scanner function
problems.
When Scanning Is Not Done As Expected
This section explains causes and remedies when scan results are not as expected.
Problem
Cause
Solution
The scanned image is
dirty.
The exposure glass or platen plate
is dirty.
Clean the exposure glass or platen plate. See p.79 “Maintaining
Your Machine”.
The image is distorted
or out of position.
The original has not been loaded
square.
Insert the original along the original guides, so it is straight. See
“Setting Original Orientation”,
Scanner Reference.
The orientation of the
scanned image is not
correct.
The original was placed in the
wrong top/bottom or left/right
orientation.
Place the original in the correct
orientation. See “Setting Original
Orientation”, Scanner Reference.
No image results from
scanning.
The original was placed with the
front and back reversed.
When the original is placed directly on the original table, the
side to be scanned must face
down. See “Setting Original Orientation”, Scanner Reference.
The scanned image
contains white spaces.
• If you scan originals using
Scanning at a higher resolution
functions other than the netmay reduce the margins.
work TWAIN scanner function, certain paper size and
resolution settings may produce scanned images that are
larger than the specified size
because of margins being added to the sides.
• If the File Format Converter
(optional ) is installed, the
margins may become wider.
The scanner journal
cannot be printed.
The paper tray is open.
Close the paper tray.
The scanner journal
cannot be printed.
Paper is loaded in the bypass tray Remove the paper from the bybut another paper tray is specified. pass tray.
The scanner journal
cannot be printed.
The original exit switching lever
is in the rear output position.
Switch the original exit switching
lever to upper output.
The file size of the com- For detailed images such as line
pressed image is larger drawings, the file size increases
than that of the nonafter compression.
compressed image.
If large-size files become a problem, set Compression to [Off] under Scanner Features.
43
Troubleshooting When Using the Scanner Function
When You Cannot Send Scanned Files
The following sections explain likely causes of and solutions for Network Delivery and E-mail Sending-related problems.
When Stored Files Cannot Be Accessed
This section explains likely causes of and possible solutions for job access-related problems.
Problem
The stored file is locked
and is not accessible.
4
Cause
Solution
The file, which is password pro- Contact the administrator.
tected, is locked because the password was incorrectly entered ten
times.
When You Cannot Browse the Network to Send a Scan File
This section explains likely causes of and possible solutions for the Browse Network failing to operate when files are sent.
Problem
Cause
The network cannot be
The following machine settings
browsed when specifying may not be correct:
the destination folder.
• IPv4 address
Solution
Check the settings. See “Network
Settings ”, General Settings
Guide.
• Subnet Mask
When the TWAIN Driver Cannot Be Started
This section explains likely causes of and possible solutions for the TWAIN driver failing to operate.
44
Problem
Cause
Solution
The Scanner Properties
dialog box cannot be
displayed.
Advanced encryption has been
specified in the extended security
setting.
For details about the extended security setting, contact an administrator.
When You Cannot Send Scanned Files
When Stored Files Cannot Be Edited
This section explains likely causes of and possible solutions for the TWAIN driver failing to operate.
Problem
Cause
Stored files cannot be
deleted. File names and
passwords cannot be
changed. Files cannot
be redelivered.
Limits have been imposed using
the available extended security
function.
Solution
Contact the administrator.
When the Network Delivery Function Cannot Be Used
4
This section explains likely causes of and possible solutions for the Network Delivery function failing to operate.
Problem
Cause
Solution
The network delivery
function cannot be
used.
The delivery software may be an
old version or a security setting
may be specified.
Contact the administrator.
The network delivery
function cannot be
used.
The network delivery function
setting is not correct.
Specify it correctly. See “Settings
Required to Use the Network Delivery Scanner”, General Settings
Guide.
Operations Are Not Possible When Messages Appear
This section explains likely causes of and possible solutions for messages that
appear and when the machine fails to operate.
Message
Cause
Solution
Destination list
/ machine settings are updated. Selected
destinations or
function settings have been
cleared. Please
re-select the
settings.
The destination list is being updated from the network using
SmartDeviceMonitor for Admin.
Depending on the number of destinations to be updated, there
may be some delay before you
can resume operation. Operations are not possible while this
message is displayed.
Wait until the message disappears. Do not switch off the power while this message is
displayed.
45
Troubleshooting When Using the Scanner Function
When a Message Appears
This section explains likely causes of and possible solutions for error messages
that may appear on the machine's control panel.
When a Message Appears on the Control Panel
This section explains causes and remedies if an error message appears on the
display of the control panel.
Important
❒ If a message not described here appears, act according to the message. For information about how to turn off the main power switch, see “Turning On the
Power”, About This Machine.
4
Message
Cause
No HDD is available for this
function, or File
Format Converter
is not connected.
Cannot use Scanner Function.
No HDD is available for
Contact your service representative.
this function, or File Format
Converter is not connected.
Connection with
LDAP server has
failed. Check the
server status.
A network error has occurred and connection
has failed.
LDAP server authentication has
failed. Check the
settings.
The user name and pass- Make settings correctly for the user
word differ from those set name and the password for LDAP servfor LDAP Authentication. er authentication.
The destination
list has been updated. Specified
destination(s) or
sender's name has
been cleared.
A specified destination
or sender's name was
cleared when the destination list in the delivery
server was updated.
Updating the des- A network error has
tination list has occurred.
failed. Try
again?
46
Solution
Try the operation once more. If the message is still shown, the network may be
crowded. Check the information of System Settings. See “System Settings”,
General Settings Guide.
Specify the destination or sender's name
again.
Check whether the server is connected.
When a Message Appears
Message
Cause
Updating the des- The destination list has
tination list... been updated.
Please wait.
Specified destination(s) or
sender's name has
been cleared.
Solution
If a destination or sender's name was already selected, re-select it after this message disappears.
Exceeded max.
number of files
which can be sent
at the same time.
Reduce the number
of the selected
files.
The number of files exceeded the maximum
number possible.
Exceeded max. No.
of results to
display. Max.:
nnn
Search results have exSearch again after changing the search
ceeded the max. display- conditions.
able number.
Reduce the number of files and send
them again.
4
(A figure is placed at n.)
You do not have
the privileges to
use this function.
The machine has not
been set to allow you to
use the function.
Exceeded max.
number of standby
files.Try again
after the current
file is sent.
The maximum number of
There are 100 files waiting in the sendstandby files was exceeded. ing queue for e-mail, Scan to Folder, or
delivery functions. Wait until files have
been sent.
Exceeded time
limit for LDAP
server search.
Check the server
status.
A network error has occurred and connection
has failed.
Try the operation once more. If the message is still shown, the network may be
crowded. Check the information of System Settings. See “System Settings”,
General Settings Guide.
The specified
group contains
some destination(s) that do
not have access
privileges. Do
you want to select only the
privileged destination(s)?
The specified group contains some destinations
for sending by e-mail
and some destinations
for sending by Scan to
Folder.
To select destinations for sending by email, press [Select] for the message displayed on the e-mail screen. To select
destination for sending by Scan to Folder, press [Select] for the message displayed on the Scan to Folder screen.
Contact the administrator.
47
Troubleshooting When Using the Scanner Function
Message
Cause
Solution
Cannot find the
specified path.
Please check the
settings.
The destination computer name or folder name is
invalid.
Check whether the computer name and
the folder name for the destination are
correct.
Exceeded max.
number of alphanumeric characters for the
path.
The maximum number
of specifiable alphanumeric characters in a
path has been exceeded.
The maximum number of characters which
can be entered for the path is 128. Check
the number of character you entered, and
then enter the path again. See “Transmission Function”, Scanner Reference.
You have tried to delete
The selected
file(s) contained files without the authority to do so.
file(s) without
access privileges. Only file(s)
with access privileges will be
deleted.
4
Some of selected
files are currently in use.
They could not be
deleted.
You cannot delete a file
Cancel transmission (“Waiting...”status
whose status is “Waitcleared) or the DeskTopBinder setting,
ing...” or that is being ed- and then delete the file.
ited with
DeskTopBinder.
You cannot cancel a file
Cannot cancel
currently being sent.
sending all selected file(s).
Certain file(s)
are currently being sent.
48
The files can be deleted by the file administrator. To delete a file which you
are not authorized to delete, contact the
administrator.
You can only cancel files waiting to be
sent. You cannot cancel files already
sent or currently being sent, files that
were sent but did not reach the destination, or files that have been cancelled.
Selected file is
currently in use.
Cannot change
file name.
You cannot change the
Cancel transmission (“Waiting...” status
name of a file whose sta- cleared) or the DeskTopBinder setting,
tus is “Waiting...” or that and then change the file name.
is being edited with
DeskTopBinder.
Selected file is
currently in use.
Cannot change
password.
You cannot change the
password of a file whose
status is “Waiting...” or
that is being edited with
DeskTopBinder.
Cancel transmission (“Waiting...” status
cleared) or the DeskTopBinder setting,
and then delete the password.
Selected file is
currently in use.
Cannot change
user name.
You cannot change the
sender's name whose
status is “Waiting...” or
that is being edited with
DeskTopBinder.
Cancel transmission (“Waiting...” status
cleared) or the DeskTopBinder setting,
and then change the user name.
When a Message Appears
Message
Connection with
the destination
has failed. Check
the status and
connection. To
check the current
status, press
[Scanned Files
Status].
Cause
Solution
The correct Network set- • Check the network settings of the clitings are not made.
ent computer.
• Check that components such as the
LAN cable are connected properly.
• Check that the server settings are
correct and the server is working
properly.
The entered user name
• Check that the user name and passAuthentication
word are correct.
with the destina- or password was invalid.
tion has failed.
• Check that the ID and password for
the destination folder are correct.
Check settings.
To check the cur• A password of 128 or more characrent status,
ters may not be recognized.
press [Scanned
Files Status].
Destination(s) or
sender name is
not specified.
Destination(s) or sender
name is not specified.
Send e-mail after specifying the destination(s) or sender's name.
Destination(s)
have not been
specified.
Destination(s) have not
been specified.
Send e-mail after specifying the destination(s).
Sender has not
been specified.
The sender's name was
not specified.
A sender's name should be specified before sending e-mail. Send e-mail after
specifying the sender's name.
Exceeded max. E- The maximum e-mail
mail size. Send- size has been exceeded.
ing E-mail has
been cancelled.
Check [Max. Email Size] in
Scanner Features.
• Increase the size of [Max. E-mail Size].
4
• Set [Divide & Send E-mail] to [Yes (per
Page)] or [Yes (per Max. Size)].
See “Send Settings”, General Settings
Guide.
Sending the data
has failed. The
data will be resent later.
A network error has occurred and a file was not
sent correctly.
Wait until sending is retried automatically after the preset interval. If sending fails
again, contact the network administrator.
Transmission has
failed. To check
the current status, press
[Scanned Files
Status].
While a file was being
sent, a network error occurred and the file could
not be sent correctly.
Try the operation once more. If the message is still shown, the network may be
crowded. Contact the administrator.
Press [Scanned Files Status] to display the
transmission results, and then check
which job has not been sent. See “Confirmation Displays”, Scanner Reference.
49
Troubleshooting When Using the Scanner Function
Message
4
50
Cause
Solution
Transmission has
failed. Insufficient memory in
the destination
hard disk. To
check the current
status, press
[Scanned Files
Status].
Transmission has failed. Allocate sufficient space.
There was not enough
free space on the hard
disk of the SMTP server,
FTP server, or client computer at the destination.
Output buffer is
full. Sending the
data has been
cancelled. Please
try again later.
Too many jobs are in
standby state, and sending was cancelled.
Retry sending after sending jobs in
standby state completes.
Exceeded max.
number of pages
per file. Do you
want to store the
scanned pages as
1 file?
The file being stored has
exceeded the max.
number of pages for one
file.
Specify whether to use the data or not.
Scan the pages that were not scanned
and store them as a new file. See “Storing Files Using the Scanner Function”,
Scanner Reference.
Exceeded maximum
number of file to
store. Delete all
unnecessary
files.
Too many files are waiting to be delivered.
Select fewer files for transmission, or delete some unneeded files. For details
about the number of files that you can
store, see “Storage Function”, Scanner
Reference.
Too many files are waitExceeded max.
number of stored ing to be delivered.
files. Cannot
send the scanned
data as capturing
files is unavailable.
Select fewer files for transmission, or delete some unneeded files. For details
about the number of files that you can
store, see “Storage Function”, Scanner
Reference.
Exceeded max.
number of files
which can be used
in Document Server at the same
time.
The maximum number
of files that can be stored
in the document server
has been exceeded.
Check the files stored, and then delete
unneeded files. See “Document Server”,
Copy/Document Server Reference or
“Storing Files Using the Scanner Function”, Scanner Reference.
Entered protection code for
destination is
incorrect. Please
re-enter.
The correct protect destina- Make sure the protection code is correct,
tion code was not entered. and then enter it again. See “Registering
a Protection Code”, General Settings
Guide.
Password entered
is not correct.
Please re-enter.
You have entered an incorrect password.
Check the authentication settings, and
then enter a correct password.
When a Message Appears
Message
Cause
Solution
Exceeded max.
number of alphanumeric characters.
The maximum enterable
Make sure the maximum number of
number of alphanumeric
characters which can be entered, and
characters has been exceeded. then enter it again. See “Values of Various Set Items for Transmission/Storage/Delivery Function”, Scanner
Reference.
Authentication
has failed.
The entered login user
name or login password
is incorrect.
Check the login user name and login
password. The machine is unable to authenticate. Contact an administrator.
The entered path
is not correct.
Please re-enter.
The entered path format
is incorrect.
Confirm the destination computer and
the path, and then enter it again.
Reduce the number of pages in the transCaptured file ex- The maximum number
of pages per file has been mitted file, and then resend the file. See
ceeded max.
exceeded.
“Storage Function”, Scanner Reference.
number of pages
per file. Cannot
send the scanned
data.
4
Original is being The machine is using an- Retry scanning after the operation with
the other function is completed.
scanned by anoth- other function such as
copying.
er function.
Please wait.
[Copier][Document Server]...
Original is being The machine is using anscanned by anoth- other function such as
copying.
er function.
Switch to the
following function, then press
the Stop key to
cancel scanning
or press the
Start key to continue.
Switch to another function such as Copier, Document Server, etc., and then press
either the {Clear/Stop} key to cancel scanning or the {Start} key to continue.
[Copier][Document Server]...
Specify destination(s) and set
original(s).
Destination(s) is not
specified.
Specify destination(s), and then set original(s).
Specify the next
destination, then
set original.
The next destination is
not specified.
Specify the next destination, and then
set original.
51
Troubleshooting When Using the Scanner Function
Message
4
Cause
Solution
E-mail address
entered is not
correct. Please
re-enter.
The entered e-mail address is incorrect.
Make sure the e-mail address is correct,
and then enter it again.
Memory is full.
Press [Send] to
send the current
scanned data, or
press [Cancel] to
delete.
Because there is not
enough free hard disk
space in the machine for
delivering or sending by
e-mail while storing in
the Document Server,
only some of the pages
could be scanned.
Specify whether to use the data or not.
Memory is full.
Cannot scan. The
scanned data will
be deleted.
Because of insufficient
hard disk space, the first
page could not be
scanned.
Try one of the following measures:
• Wait for a while, and then retry the
scan operation.
• Reduce the scan area or scanning resolution. See “Scan Settings”, Scanner
Reference.
• Delete unneeded stored files. See
“Deleting a Stored File”, Scanner
Reference.
Memory is full.
Do you want to
store scanned
file?
Because there is not
enough free hard disk
space in the machine for
storing in the Document
Server, only some of the
pages could be scanned.
Specify whether to use the data or not.
No paper is set in the
No paper. Load
specified paper tray.
paper of one of
the following
sizes, then press
[Start Printing].
A3K, B4K,
A4K...
Load paper of the sizes listed in the message.
The scanned original
Exceeded max.
was too large, or its oridata capacity.
entation was not correct.
Set Original Orientation to “R”
then press the
Start key again.
Specify the scan size and resolution again.
Note that it may not be possible to scan
very large originals at a high resolution.
Re-loading the original in a different orientation may enable the machine to scan
large originals.
See “Relationship between Resolution
and Scan Size”, Scanner Reference.
52
When a Message Appears
Message
Cause
Solution
Exceeded max.
data capacity.Check scanning
resolution, then
press Start key
again.
The scanned data exceeded maximum data
capacity.
Specify the scan size and resolution
again. Note that it may not be possible to
scan very large originals at a high resolution. See “Relationship between Resolution and Scan Size”, Scanner
Reference.
Exceeded max.
page capacity per
file. Press
[Send] to send
the scanned data,
or press [Cancel]
to delete.
The number of scanned
pages exceeded maximum page capacity.
Select whether to send the data so far.
Cannot display
preview of this
page.
The size of the image you
want to preview is larger
than A2 (C).
Images larger than A2 (C) cannot be previewed.
4
Specify A2 (C) or a smaller image, or
scan again at A2 (C) or smaller.
Reference
“Turning On the Power”, About This Machine
When a Message Appears on the Client Computer
This section explains likely causes of and possible solutions for the main error
messages displayed on the client computer when using the TWAIN driver.
Important
❒ If a message not described here appears, act according to the message. For information about how to turn off the main power switch, see “Turning On the
Power”, About This Machine.
Message
Paper misfeed has
occurred.
Cause
A paper misfeed has
occurred.
Solution
Remove jammed originals, and place
them again.
Check whether the originals are suitable
to be scanned by the machine.
The scanning area
does not match
the original.
The specified area to be
scanned differs from the
actual scanned area of
the original.
Check the location of the original.
The start position of the scanning area does
not match the
original.
The specified area to be
scanned differs from the
actual scanned area of
the original.
Check the location of the original.
53
Troubleshooting When Using the Scanner Function
Message
Standby time
reached.
Cause
An original was not
loaded within the specified time limit.
Solution
Load an original within the time limit
specified in [Standby Time].
Please call your An unrecoverable error has Contact your service representative.
service represen- occurred in the machine.
tative.
The TWAIN scanner
Scanner is not
available on the function cannot be used
specified device. on this machine.
Scanner is not
available. Check
the scanner connection status.
4
• The machine's main
power switch is off.
• The machine is not
connected to the network correctly.
Contact your service representative.
• Set the main power switch to “On”.
• Check whether the machine is connected to the network correctly.
• Deselect the personal firewall function of the client computer.
• Use an application such as telnet to
make sure SNMPv1 or SNMPv2 is
set as the machine's protocol. See
“Network Settings”, General Settings Guide and “Using telnet”, Network Guide.
54
Cannot find the
scanner. Check
the scanner main
power switch.
The machine's main
power switch is off.
Check that the cable is securely plugged
into the power outlet and the machine.
Set the main power switch to “On”.
Error has occurred on the
scanner. Scanning
will be cancelled.
The application-speciCheck whether the scanning settings
fied scan conditions have made with the application exceed the
exceeded the setting
setting range of the machine.
range of the machine.
Fatal error has
occurred in the
scanner.
An unrecoverable error has An unrecoverable error has occurred in the
occurred on the machine.
machine. Call your service representative.
Scanner is not
ready. Check the
scanner and the
options.
The original cover is
open.
Check whether the original cover is
closed.
When a Message Appears
Message
Cause
Insufficient mem- Scanner memory is
insufficient.
ory.Reduce the
scanning area.
Solution
• Reset the scan size.
• Lower the resolution.
• Set with no compression. See
TWAIN Driver help.
The problem may be due to the following cause:
• “The Relationship between the Resolution and the Scanning Area” chart
in Help for halftone scanning might
not always apply. Scanning cannot
be performed if large values are set
for brightness when using halftone
or high resolution.
Error has occurred within the
scanner driver.
An error has occurred in
the driver.
4
• Check whether the network cable is
connected correctly to the client
computer.
• Check whether the Ethernet board of
the client computer is recognized
correctly by Windows.
• Check whether the client computer
can use the TCP/IP protocol.
Scanner is in use
by another function.
A function of the machine other than the
scanner function is being
used such as the copier
function.
Insufficient mem- The computer does not
ory. Reduce reso- have enough memory.
lution, original
size, or scanning
area.
Wait for a while and reconnect.
Reduce the resolution or size of scanning. Alternately, try scanning again after closing any other applications in use.
No User Code is
registered. Consult your system
administrator.
Access is restricted with
user codes.
Contact the administrator of the machine.
Any of Login User
Name, Login Password or Driver
Encryption Key is
incorrect.
The entered login user
• Check the login user name, login
name, password, or drivpassword, and driver encryption
er encryption key was
key.
invalid.
• Permission to use this function has not
been granted. Contact the administrator.
Reference
“Turning On the Power”, About This Machine
55
Troubleshooting When Using the Scanner Function
4
56
5. Adding Paper and Toner
This chapter explains troubleshooting procedures that are applicable to all the
machine's functions.
Loading Paper
This section explains what to do when paper runs out and needs reloading.
R CAUTION:
• Be careful when replacing the roll paper or removing misfed paper by following the operating instructions properly. Otherwise, an injury may result from
the paper cutter inside.
R CAUTION:
• The fusing section of this machine might be very hot. Caution should be taken when removing misfed paper.
R CAUTION:
• When replacing or loading the paper roll, do not put the paper roll on the upper
of the paper roll tray. Otherwise the tray may fall and an injury may result.
• Hold the paper rolls horizontally with both hands. When you grab the paper
holder and hold the paper roll vertically, the paper roll may fall off and an injury may result.
R CAUTION:
• When replacing or loading the paper, or clearing paper jams, pull out the cut
paper tray slowly with both hands. Do not pull out the cut paper tray with a
single hand. Otherwise the rear of the cut paper tray may fall and an injury
may result.
Important
❒ When removing paper rolls, lift the paper holders on either side of the paper
roll before removing. Do not lift one side only. This could damage the machine.
ATJ012S
57
Adding Paper and Toner
Note
❒ If the original hanger (optional) is installed, remove it before pulling out the
paper roll tray or cut paper tray.
❒ For paper types and sizes that can be loaded in the paper roll tray and cut paper tray, see “Recommended Paper Sizes and Types”, About This Machine.
❒ For details about changing the paper size in the paper roll tray or cut paper
tray, see “Changing the Paper Size”.
❒ To load paper in the bypass tray, see “Copying from the Bypass Tray”,
Copy/Document Server Reference.
Reference
p.61 “Changing the Paper Size”
“Recommended Paper Sizes and Types”, About This Machine
“Copying from the Bypass Tray”, Copy/Document Server Reference
5
58
Loading Paper
Loading the Paper Roll
The following procedure explains loading the paper roll.
5
ATK003S
Note
❒ When you use the printer function, set the paper volume again after loading
the paper roll. See “Tray Paper Settings”, General Settings Guide.
❒ When you change the paper size or paper type, make the paper size or type
settings under System Settings. See “Tray Paper Settings”, General Settings
Guide.
59
Adding Paper and Toner
Reference
“Tray Paper Settings”, General Settings Guide
Loading Cut Paper
The following procedure explains loading cut paper.
5
ATK004S
Note
❒ Fan the paper before loading.
❒ Straighten curled or warped paper before loading.
❒ Extend the side-end fences when changing to a larger paper size such as A3.
See “Changing the Paper Size in the Cut Paper Tray”.
Reference
p.63 “Changing the Paper Size in the Cut Paper Tray”
60
Changing the Paper Size
Changing the Paper Size
This section explains how to change a paper size.
Procedures for changing the paper size differ depending on the tray. Make sure
you are following the appropriate procedure before you begin.
Note
❒ Be sure to select the paper size with System Settings. If you do not, misfeeds
might occur. See, “Tray Paper Settings”, General Settings Guide.
❒ For details about paper sizes and types, see “Copy Paper”, About This Machine.
Reference
“Copy Paper”, About This Machine
“Tray Paper Settings”, General Settings Guide
Changing the Paper Size in the Paper Roll Tray
5
The following procedure explains how to change a paper size in the paper roll
tray.
Removing the roll holder
The following procedure explains removing the roll holder.
Important
❒ Always follow the instructions below when adjusting the roll holder. Do not
force the roll holder by pulling or sliding it strongly. This could damage it.
ATK005S
61
Adding Paper and Toner
Setting the roll holder
The following procedure explains setting the roll holder.
5
ATK006S
Note
❒ For procedures about loading the paper, see “Loading Paper”.
❒ Confirm paper width using the paper roll tray's scale.
Reference
p.57 “Loading Paper”
62
Changing the Paper Size
Changing the Paper Size in the Cut Paper Tray
The following procedure explains how to change a paper size in the cut paper
tray.
5
ATK007S
Note
❒ This procedure is required for loading A3K, B4 JISK, 11" × 17"K, or 12" × 18"K
size paper.
❒ If you want to load A4K, 81/2" × 11"K paper sizes, see “Loading Cut Paper”.
❒ When you change the paper size or paper type, make the paper size or type
settings under System Settings. See “Tray Paper Settings”, General Settings
Guide.
❒ Fan the paper before loading.
❒ Straighten curled or warped paper before loading.
Reference
p.60 “Loading Cut Paper”
“Tray Paper Settings”, General Settings Guide
63
Adding Paper and Toner
Adding Toner
This section explains adding and storing toner.
R WARNING:
• Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open flame. Dispose of used toner containers
in accordance with local regulations.
R CAUTION:
• Keep toner (used or unused) and toner containers out of reach of children.
R CAUTION:
• If toner or used toner is inhaled, gargle with plenty of water and move into a
fresh air environment. Consult a doctor if necessary.
R CAUTION:
• If toner or used toner gets into your eyes, flush immediately with large
amounts of water. Consult a doctor if necessary.
5
R CAUTION:
• If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary.
R CAUTION:
• Avoid getting toner on your clothes or skin when removing a paper jam or
replacing toner. If your skin comes into contact with toner, wash the affected
area thoroughly with soap and water.
• If toner gets on your clothing, wash with cold water. Hot water will set the
toner into the fabric and may make removing the stain impossible.
R CAUTION:
• Do not open toner containers forcefully. Toner can spill, dirtying your clothes
or hands, and possibly resulting in accidental ingestion.
Important
❒ Fault may occur if you use toner other than the recommended type.
❒ When adding toner, do not turn off the operation switch. If you do, settings
will be lost.
❒ Always add toner when the machine instructs you.
❒ When a message “DAdd Toner” is shown on the display, replace the applicable toner.
❒ Store toner containers in a cool, dry place free from direct sunlight.
❒ Store on a flat surface.
64
Adding Toner
Note
❒ You can check name of the required toner name and the replacement procedure using the “DAdd Toner” screen.
❒ Press [System Status] to check contact number where you can order supplies.
See “Checking Machine Status and Settings”.
Reference
p.5 “Checking Machine Status and Settings”
Inserting Toner
The following describes how to replace toner.
Important
❒ Do not shake the removed toner cartridge. The remaining toner might scatter.
5
ATK008S
Note
❒ The waste toner bottle makes a noise when toner is added. This noise does not
indicate a malfunction.
65
Adding Paper and Toner
Sending Scanned Documents When Toner Has Run Out
When the machine has run out of toner, the indicator on the display lights. Note
that even if there is no toner left, you can still send scanned documents.
A Make sure that the machine is in scanner mode.
B Press [Exit], and then perform transmission operation.
The error message disappears.
Note
❒ If the scanner screen does not appear in step A, press the {Scanner} key.
Used Toner
Toner cannot be re-used.
Bring the stored used container to your sales or service representative for recycling through our recycling system. If you discard it on your own, treat it as general plastic waste material.
5
66
6. Clearing Misfeeds
This chapter explains what to do when paper or originals misfeed (become
jammed inside the machine).
Removing Jammed Paper
R CAUTION:
• The fusing section of this machine might be very hot. Caution should be taken when removing misfed paper.
R CAUTION:
• Be careful when replacing the roll paper or removing misfed paper by following the operating instructions properly. Otherwise, an injury may result from
the paper cutter inside.
R CAUTION:
• When replacing or loading the paper, or clearing paper jams, pull out the cut
paper tray slowly with both hands. Do not pull out the cut paper tray with a
single hand. Otherwise the rear of the cut paper tray may fall and an injury
may result.
R CAUTION:
• Keep your hands clear of the paper exit area and the inside of the folding
finisher. You can trap your fingers if you do not.
Important
❒ When clearing misfeeds, do not turn off the operation switch. If you do, your
settings will be lost.
❒ To prevent misfeeds, do not leave any torn scraps of paper inside the machine.
❒ Contact your service representative if misfeeds occur frequently.
Note
❒ For details about how to locate and remove misfeeds, see “Locating Jammed
Paper” or “Removing Jammed Paper”.
❒ On the original cover, paper output exit cover, or paper roll tray, there is a
sticker explaining how to remove misfed paper.
Reference
p.68 “Locating Jammed Paper”
p.69 “Removing Jammed Paper”
67
Clearing Misfeeds
Locating Jammed Paper
If a misfeed happens, remove the misfed paper or original by following the procedures
shown on the diagrams on the original cover, paper output exit cover, or paper roll tray.
A misfeed has occurred in the place corresponding to the letter displayed on the
control panel.
ATK009S
6
A Press the key of the section from where you want to remove the jammed paper.
B After each step is complete, press [Next]. To go back to the previous step,
press [Previous].
C When all jammed paper are removed, restore the machine to the original state.
Note
❒ More than one misfeed may be indicated. When this happens, check all the
areas indicated.
68
Removing Jammed Paper
Removing Jammed Paper
The following procedure explains how to remove jammed paper.
Important
❒ The internal parts of the machine may be hot. Wait for the fusing unit to cool
down before clearing a paper jam in the unit.
❒ When removing jammed paper from the fusing section, touch only the areas
explicitly specified in this manual.
❒ Do not remove the fusing unit. Doing so can result in reduced print quality.
Note
❒ On the original cover, paper output exit cover, or paper roll tray, there is a
sticker explaining how to remove misfed paper.
❒ If a detailed removal instruction appears on the right of the screen, follow it.
❒ You can also use the procedure indicated in [System Status] to remove jammed
paper.
When A1 is lit
6
ATK010S
69
Clearing Misfeeds
When A2 is lit
6
ATK011S
70
Removing Jammed Paper
When B is lit
ATK012S
When C is lit
6
ATK013S
When P is lit
ATK014S
71
Clearing Misfeeds
When N1 - N7 is lit
❖ When N1 is lit
ATK015S
❖ When N3 is lit
6
ATK016S
❖ When N5 is lit
ATK017S
72
Removing Jammed Paper
❖ When N7 is lit
ATK018S
6
73
Clearing Misfeeds
6
74
7. Remarks
This chapter describes how to maintain and operate the machine.
Where to Put Your Machine
This section provides precautions for installation, movement and disposal.
Machine Environment
Choose your machine's location carefully.
Environmental conditions greatly affect its performance.
Moving
The following describes precautions when moving the machine.
R CAUTION:
• Contact your service representative if you need to lift the machine (such as
when relocating it to another floor). Do not attempt to lift the machine without
the assistance of your service representative. The machine will be damaged
if it topples or is dropped, resulting in malfunction and risk of injury to users.
The machine's various handling areas are for service engineer use only. Do
not touch these areas.
R CAUTION:
• Before moving the machine, be sure to disconnect all external connections,
especially the power cord from the wall outlet. Damaged power cords are a
fire and electric shock hazard.
R CAUTION:
• Unplug the power cord from the wall outlet before you move the machine.
While moving the machine, you should take care that the power cord will not
be damaged under the machine.
Important
❒ Be careful when moving the machine. Take the following precautions:
• Turn off the main power.
• Unplug the power cord from the wall outlet. When you pull out the plug
from the socket, grip the plug to avoid damaging the cord, thereby reducing the risk of fire or electric shock.
• Close all covers and trays, including the front cover and bypass tray.
❒ Keep the machine level and carry it carefully, taking care not to jolt or tip it.
Rough handling may cause a malfunction or damage the hard disk or memory, resulting in loss of stored files.
75
Remarks
❒ Do not take off the holding stand.
❒ Protect the machine from strong shocks. Impact can damage the hard disk
and cause stored files to be lost. As a precautionary measure, files should be
copied to another computer.
Note
❒ For details about how to turn the main power off, see “Turning On the Power”, About This Machine.
Reference
“Turning On the Power”, About This Machine
Optimum environmental conditions
The following describes precautions when locating the machine.
R CAUTION:
• Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur.
• Do not place the machine on an unstable or tilted surface. If it topples over,
an injury might occur.
R CAUTION:
• After you move the machine, use the caster fixture to fix it in place. Otherwise the machine might move or come down to cause an injury.
7
R CAUTION:
• Make sure the room where you are using the machine is well ventilated and
spacious. Good ventilation is especially important when the machine is used
heavily.
Temperature: 10 - 30 °C (50 - 86 °F)
Humidity: 15 - 90%
A strong and level base.
The machine must be level within 5 mm, 0.2 inches: both front to rear and left
to right.
• To avoid possible buildup of ozone, make sure to locate this machine in a large
well ventilated room that has an air turnover of more than 30 m3/hr/person.
•
•
•
•
76
Where to Put Your Machine
Environments to avoid
• Locations exposed to direct sunlight or other sources of strong light (more
than 1,500 lux).
• Locations directly exposed to cool air from an air conditioner or heated air
from a heater. (Sudden temperature changes can cause condensation to form
inside the machine.)
• Locations close to machines generating ammonia, such as a diazo copy machine.
• Places where the machine will be subject to frequent strong vibration.
• Dusty areas.
• Areas with corrosive gases.
Access to the machine
Place the machine near the power source, providing the clearance areas shown.
❖ Clearance required for the machine only
7
ATK019S
1. Rear: 60 cm (23.6") or more
2. Right: 60 cm (23.6") or more
3. Front: 100 cm (39.4") or more
4. Left: 60 cm (23.6") or more
❖ Clearance required for the machine and the optional folding finisher
ATK020S
1. Rear: 100 cm (39.4") or more
2. Right: 80 cm (31.5") or more
3. Front: 100 cm (39.4") or more
4. Left: 80 cm (31.5") or more
77
Remarks
Power Connection
The following explains power supply.
R WARNING:
• Connect the machine only to the power source described on the inside
front cover of this manual. Connect the power cord directly into a wall
outlet and do not use an extension cord.
• Do not damage, break or make any modifications to the power cord.
Do not place heavy objects on it. Do not pull it hard nor bend it more
than necessary. These actions could cause an electric shock or fire.
R WARNING:
• If the power cord is damaged (exposure of the core, disconnection,
etc.), contact your service representative to change a new one. Operating the machine with a damaged power cord may cause an electric
shock or fire.
R CAUTION:
• When you disconnect the power plug from the wall outlet, always pull the
plug (not the cable).
R CAUTION:
• To disconnect the power code, pull it out by plug. Do not drag the code itself.
Doing so may result in damage to the code, leading to fire or electric shock.
7
•
•
•
•
78
When you unplug the power cord, the anti-condensation heaters go off.
Make sure the plug is inserted firmly in the wall outlet.
Voltage must not fluctuate by more than 10%.
The wall outlet shall be installed near the machine and shall be easily accessible.
Maintaining Your Machine
Maintaining Your Machine
If the exposure glass, or platen plate is dirty, copy clarity may be reduced. Clean
these parts if they are dirty.
Important
❒ Do not use chemical cleaners or organic solvents, such as thinner or benzene.
If such substances get inside the machine or melt plastic parts, a failure might
occur.
❒ Do not clean parts other than those explicitly specified in this manual. Other
parts should only be cleaned by your service representative.
❖ How to maintain
Cleaning the machine: Wipe the machine with a soft, dry cloth. If this does not
remove the dirt, wipe the machine with a damp and tightly wrung cloth. If a
damp cloth still does not remove the dirt, try using a mild detergent. Wipe the
machine with a dry cloth to remove the moisture, after using a damp cloth.
Cleaning Inside the Original Cover
If you open the original cover, you can access the exposure glass and original
feed mechanism.
A Open the original cover while holding it on both sides.
7
ATJ038S
B Wipe the exposure glass with soft, dry cloth.
ATJ039S
79
Remarks
C Wipe the platen plate with a soft, dry cloth.
ATJ040S
D Wipe the original feed guides with a soft, dry cloth.
7
ATJ041S
E Close the original cover gently.
ATJ042S
Note
❒ If there is paper dust or fluff inside, remove it.
80
Maintaining Your Machine
Cleaning the Main Unit
Clean off toner that may have collected on the imaging area.
Important
❒ Do not leave the main unit more than 10 minutes, otherwise copy quality may
deteriorate.
A Lift the main unit opening levers on either side and open the main unit.
ATJ043S
B Wipe it with a soft, dry cloth.
7
ATJ044S
C Close the main unit cover gently.
81
INDEX
A
Access to the machine, 77
Adding Paper, 57
Adding Paper and Toner, 57
Adding Toner, 64
Alert Messages, 31
C
Cannot Browse the Network to
Send a Scan File, 44
Cannot Make Clear Copies, 20
Cannot Make Copies As Wanted, 23
Cannot Print, 34
Cannot Send Scanned Files, 44
Changing the Paper Size, 61
Changing the Paper Size in the
Cut Paper Tray, 63
Changing the Paper Size in the
Paper Roll Tray, 61
Checking Machine Status and Settings, 5
Checking the Error Log, 33
Cleaning Inside the Original Cover, 79
Cleaning the Main Unit, 81
Clearing Misfeeds, 67
Combine, 23
Copy Function, 17
D
Data Storage, 5
Document Server, 9
E
Edit, 23
Environment, 75
Environments to avoid, 77
Error Log, 33
F
Folding finisher, 23, 37
Function Compatibility, 14
H
How to Read This Manual, 1
82
I
If prints are not clear, 37
If USB Connection Fails, 29
Indicators, 3
Indicator to the Right of a Function Key Is Lit, 8
Inquiry, 5
Inserting Toner, 65
J
Job Is Not Performed, 14
L
Loading Cut Paper, 60
Loading Paper, 57
Loading the Paper Roll, 59
Locating Jammed Paper, 68
M
Machine Address Info, 5
Machine Does Not Operate As Wanted, 3
Machine Environment, 75
Maintaining Your Machine, 79
Maintenance Info, 5
Manuals for This Machine, i
Memory Is Full, 26
Message Appears, 17, 30, 46
Message Appears During Installation of
the Printer Driver, 27
Message Appears on the Client Computer, 53
Message Appears on the Control Panel, 46
Moving, 75
Multi-accessing, 14
N
Names of Major Options, 2
Network Delivery Function Cannot Be Used, 45
O
Operations Are Not Possible When
Messages Appear, 45
Optimum environmental conditions, 76
Other Printing Problems, 37
P
Panel Tone, 4
Power Connection, 78
Printer Function, 27
Problems Operating the Machine, 9
Put Your Machine, 75
R
Remarks, 75
Removing Jammed Paper, 67, 69
Removing the roll holder, 61
S
Scanner Function, 43
Scanning Is Not Done As Expected, 43
Sending Scanned Documents When
Toner Has Run Out, 66
Setting the roll holder, 62
Status Messages, 30
Stored Files Cannot Be Accessed, 44
Stored Files Cannot Be Edited, 45
Symbols, 1
T
Toner, 64
TWAIN, 44, 53
TWAIN Driver Cannot Be Started, 44
U
Used Toner, 66
W
When A1 is lit, 69
When A2 is lit, 70
When B is lit, 71
When C is lit, 71
When N1 is lit, 72
When N3 is lit, 72
When N5 is lit, 72
When N7 is lit, 72
When paper does not feed in properly, 37
When P is lit, 71
When printer driver settings are required, 37
Windows 2000, 27
Windows 95/98/Me, 27
Windows NT 4.0, 27
Windows Server 2003, 28
Windows XP Home Edition, 28
Windows XP Professional, 28
83
84
EN
USA
B286-7757
In accordance with IEC 60417, this machine uses the following symbols for the main power switch:
a means POWER ON.
c means STAND BY.
In accordance with IEC 60417, this machine uses the following symbols for the anti-humidity heater
switch:
a means POWER ON.
b means POWER OFF.
Trademarks
Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the
United States and/or other countries.
TrueType is registered trademarks of Apple Computer, Inc.
Adobe®, PostScript®, Acrobat®, are registered trademarks of Adobe Systems Incorporated.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
•
The product name of Windows® 95 is Microsoft® Windows® 95
•
The product name of Windows® 98 is Microsoft® Windows® 98
•
The product name of Windows® Me is Microsoft® Windows® Millennium Edition (Windows Me)
•
The product names of Windows® 2000 are as follows:
Microsoft® Windows® 2000 Advanced Server
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Professional
•
The product names of Windows® XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
•
The product names of Windows Server® 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
•
The product names of Windows NT® are as follows:
Microsoft® Windows NT® Server 4.0
Microsoft® Windows NT® Workstation 4.0
Copyright © 2007
Operating Instructions Troubleshooting
Type for 2404WD/GWD2004/LW324/Aficio MP W2400
Type for 2406WD/GWD2006/LW326/Aficio MP W3600
EN USA B286-7757
Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81%
Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm
Operating Instructions Security Reference
Operating Instructions Security Reference
Printed in the Netherlands
GB GB B286-7900
Operating Instructions
Security Reference
1
Getting Started
2
Authentication and its Application
3
Preventing Information Leaks
4
Managing Access to the Machine
5
Enhanced Network Security
6
Specifying the Extended Security Functions
7
Troubleshooting
8
Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
* &$%'
Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81%
Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm
Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain items, consult with your legal advisor.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine.
Trademarks
Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the
United States and/or other countries.
AppleTalk, EtherTalk, are registered trademarks of Apple Computer, Inc.
Bonjour is a trademark of Apple Computer Inc.
PostScript® and Acrobat® are registered trademarks of Adobe Systems, Incorporated.
NetWare is a registered trademarks of Novell, Inc.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
•
The product name of Windows® 95 is Microsoft® Windows 95.
•
The product name of Windows® 98 is Microsoft® Windows 98.
•
The product name of Windows® Me is Microsoft® Windows Millennium Edition (Windows Me).
•
The product names of Windows® 2000 are as follows:
Microsoft® Windows® 2000 Advanced Server
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Professional
•
The product names of Windows® XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
•
The product names of Windows Server® 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
•
The product names of Windows NT® 4.0 are as follows:
Microsoft® Windows NT® Server 4.0
Microsoft® Windows NT® Workstation 4.0
Notes
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Two kinds of size notation are employed in this manual. With this machine refer to the metric version.
Copyright © 2006
Manuals for This Machine
Refer to the manuals that are relevant to what you want to do with the machine.
Important
• Media differ according to manual.
• The printed and electronic versions of a manual have the same contents.
• Adobe Acrobat Reader/Adobe Reader must be installed in order to view
the manuals as PDF files.
• Depending on which country you are in, there may also be html manuals.
To view these manuals, a Web browser must be installed.
• For details about the functions of RW-3600, refer to the manuals for this option.
❖ About This Machine
Be sure to read the Safety Information in this manual before using the machine.
This manual provides an introduction to the functions of the machine. It also
explains the control panel, preparation procedures for using the machine,
how to enter text, and how to install the CD-ROMs provided.
❖ General Settings Guide
Explains User Tools settings, and Address Book procedures such as registering e-mail addresses, and user codes. Also refer to this manual for explanations on how to connect the machine.
❖ Troubleshooting
Provides a guide to solving common problems, and explains how to replace
paper, toner, and other consumables.
❖ Security Reference (This manual)
This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered
with, or prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.
❖ Copy/ Document Server Reference
Explains Copier and Document Server functions and operations. Also refer to
this manual for explanations on how to place originals.
❖ Printer Reference
Explains Printer functions and operations.
❖ Scanner Reference
Explains Printer functions and operations.
i
❖ Network Guide
Explains how to configure and operate the machine in a network environment, and use the software provided.
❖ Other manuals
• Manuals for This Machine
• Safety Information
• Quick Reference Copy Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• PostScript3 Supplement
• UNIX Supplement
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
Note
❒ Manuals provided are specific to machine types.
❒ For "UNIX Supplement", please visit our Web site or consult an authorized
dealer.
❒ "PostScript3 Supplement" and "UNIX Supplement" include descriptions of
functions and settings that might not be available on this machine.
Product name
DeskTopBinder Lite
Professional
*1
and DeskTopBinder
ScanRouter EX Professional
er EX Enterprise *1
*1
ii
Optional
General name
*1
DeskTopBinder
and ScanRout- The ScanRouter delivery software
TABLE OF CONTENTS
Manuals for This Machine ...................................................................................... i
How to Read This Manual ..................................................................................... 1
Symbols .....................................................................................................................1
1. Getting Started
Enhanced Security................................................................................................. 3
Glossary .....................................................................................................................4
Setting Up the Machine..............................................................................................5
Security Measures Provided by this Machine..................................................... 7
Using Authentication and Managing Users ................................................................7
Preventing Information Leaks ....................................................................................8
Limiting and Controlling Access .................................................................................9
Enhanced Network Security.....................................................................................10
2. Authentication and its Application
Administrators and Users ................................................................................... 11
Administrators ..........................................................................................................12
User..........................................................................................................................13
The Management Function .................................................................................14
About Administrator Authentication..........................................................................15
About User Authentication .......................................................................................16
Enabling Authentication......................................................................................17
Authentication Setting Procedure.............................................................................17
Administrator Authentication .............................................................................18
Specifying Administrator Privileges..........................................................................19
Registering the Administrator...................................................................................22
Logging on Using Administrator Authentication .......................................................25
Logging off Using Administrator Authentication .......................................................28
Changing the Administrator......................................................................................29
Using Web Image Monitor........................................................................................31
Using Web Printing Tool ..........................................................................................32
User Authentication.............................................................................................33
User Code Authentication ........................................................................................34
Basic Authentication.................................................................................................38
Windows Authentication...........................................................................................47
LDAP Authentication ................................................................................................55
Integration Server Authentication.............................................................................63
If User Authentication is Specified..................................................................... 74
User Code Authentication (Using the Control Panel)...............................................74
User Code Authentication (Using a Printer Driver) ..................................................75
Login (Using the Control Panel) ...............................................................................75
Log Off (Using the Control Panel) ............................................................................77
Login (Using a Printer Driver)...................................................................................78
Login (Using Web Image Monitor) ...........................................................................78
Log Off (Using Web Image Monitor) ........................................................................78
Auto Logout..............................................................................................................79
Authentication using an external device...................................................................80
iii
3. Preventing Information Leaks
Printing a Confidential Document ...................................................................... 81
Choosing a Locked Print file ....................................................................................81
Printing a Locked Print File ......................................................................................82
Deleting Locked Print Files ......................................................................................84
Changing Passwords of Locked Print Files..............................................................85
Unlocking Locked Print Files....................................................................................87
Specifying Access Permission for Stored Files ...............................................88
Assigning Users and Access Permission for Stored Files .......................................89
Specifying Access Privileges for Files Stored using the Scanner Function .............92
Assigning the User and the Access Permission for the User’s Stored Files ............95
Specifying Passwords for the Stored Files...............................................................98
Unlocking Files.......................................................................................................100
Preventing Data Leaks Due to Unauthorized Transmission.......................... 102
Restrictions on Destinations...................................................................................102
Protecting the Address Book ...........................................................................105
Address Book Access Permission .........................................................................105
Encrypting the Data in the Address Book .............................................................. 108
Deleting Data on the Hard Disk ........................................................................ 111
Overwriting the Data on the Hard Disk................................................................... 111
4. Managing Access to the Machine
Preventing Modification of Machine Settings .................................................121
Menu Protect ...................................................................................................... 122
Menu Protect..........................................................................................................122
Limiting Available Functions ............................................................................ 125
Specifying Which Functions are Available .............................................................125
Managing Log Files ...........................................................................................127
Specifying Delete All Logs .....................................................................................128
Transfer Log Setting...............................................................................................129
5. Enhanced Network Security
Preventing Unauthorized Access.....................................................................131
Enabling/Disabling Protocols .................................................................................131
Access Control .......................................................................................................133
Specifying Network Security Level.........................................................................134
Encrypting Transmitted Passwords.................................................................137
Driver Encryption Key ............................................................................................ 138
Group Password for PDF files................................................................................140
IPP Authentication Password.................................................................................141
Protection Using Encryption ............................................................................ 142
SSL (Secure Sockets Layer) Encryption................................................................ 143
User Settings for SSL (Secure Sockets Layer) ...................................................... 148
Setting the SSL / TLS Encryption Mode.................................................................149
SNMPv3 Encryption ...............................................................................................151
iv
6. Specifying the Extended Security Functions
Changing the Extended Security Functions ................................................... 153
Changing the Extended Security Functions ........................................................... 153
Settings .................................................................................................................. 155
Other Security Functions ..................................................................................160
Scanner Function ................................................................................................... 160
Limiting Machine Operation to Customers Only ............................................161
Settings .................................................................................................................. 161
7. Troubleshooting
Authentication Does Not Work Properly .........................................................165
A Message Appears...............................................................................................165
Machine Cannot Be Operated................................................................................167
8. Appendix
Supervisor Operations ......................................................................................171
Logging on as the Supervisor ................................................................................172
Logging off as the Supervisor ................................................................................173
Changing the Supervisor........................................................................................173
Resetting an Administrator’s Password .................................................................175
Machine Administrator Settings.......................................................................176
System Settings .....................................................................................................176
Copier / Document Server Features ......................................................................178
Printer Features .....................................................................................................179
Scanner Features................................................................................................... 180
Extended Feature Setting Menu ............................................................................180
Settings via Web Image Monitor ............................................................................181
Settings via SmartDeviceMonitor for Admin........................................................... 183
Network Administrator Settings .......................................................................184
System Settings .....................................................................................................184
Scanner Features................................................................................................... 185
Extended Feature Setting Menu ............................................................................185
Settings via Web Image Monitor ............................................................................186
Settings via SmartDeviceMonitor for Admin........................................................... 188
File Administrator Settings ...............................................................................189
System Settings .....................................................................................................189
Printer Features .....................................................................................................189
Extended Feature Setting Menu ............................................................................190
Settings via Web Image Monitor ............................................................................191
User Administrator Settings ............................................................................. 192
System Settings .....................................................................................................192
Extended Feature Setting Menu ............................................................................193
Settings via Web Image Monitor ............................................................................194
Settings via SmartDeviceMonitor for Admin........................................................... 194
Document Server File Permissions..................................................................195
The Privilege for User Account Settings in the Address Book ..................... 196
v
User Settings...................................................................................................... 199
Copier / Document Server Features ......................................................................200
Printer Functions ....................................................................................................202
Scanner Features................................................................................................... 204
System Settings .....................................................................................................205
Web Image Monitor Setting.................................................................................... 210
Functions That Require Options ......................................................................221
INDEX....................................................................................................... 222
vi
How to Read This Manual
Symbols
This manual uses the following symbols:
Indicates important safety notes.
Ignoring these notes could result in serious injury or death. Be sure to read these
notes. They can be found in the "Safety Information" section of About This Machine.
Indicates important safety notes.
Ignoring these notes could result in moderate or minor injury, or damage to the
machine or to property. Be sure to read these notes. They can be found in the
"Safety Information" section of About This Machine.
Indicates points to pay attention to when using the machine, and explanations
of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure
to read these explanations.
Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine’s display panel.
{}
Indicates the names of keys on the machine’s control panel.
1
2
1. Getting Started
Enhanced Security
This machine's security function can be enhanced through the management of
the machine and its users using the improved authentication functions.
By specifying access limits on the machine’s functions and the documents and
data stored in the machine, you can prevent information leaks and unauthorized
access.
Data encryption can prevent unauthorized data access and tampering via the
network.
Note
❒ In this manual, explanations of printer/scanner security functions are applicable to Printer Option Type W3600.
❖ Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To
enable authentication, information about both administrators and users must
be registered in order to authenticate users via their login user names and
passwords.
Four types of administrator manage specific areas of machine usage, such as
settings and user registration.
Access limits for each user are specified by the administrator responsible for
user access to machine functions and documents and data stored in the machine.
Reference
For details, see p.12 “Administrators”.
❖ Encryption Technology
This machine can establish secure communication paths by encrypting transmitted data and passwords.
3
Getting Started
Glossary
❖ Administrator
There are four types of administrator: machine administrator, network administrator, file administrator, and user administrator. We recommend only
one person take each administrator role. A single administrator can perform
the tasks of multiple administrators.
Basically, administrators make machine settings and manage the machine;
they cannot perform normal operations, such as copying and printing.
1
❖ User
A user performs normal operations on the machine, such as copying and
printing.
❖ File Creator (Owner)
This is a user who can store files in the machine and authorize other users to
view, edit, or delete those files.
❖ Registered User
This is a user whose personal information is registered in the address book.
The registered user is the user who knows the login user name and password.
❖ Administrator Authentication
Administrators are authenticated by means of the login user name and login
password supplied by the administrator when specifying the machine’s settings or accessing the machine over the network.
❖ User Authentication
Users are authenticated by means of the login user name and login password
supplied by the user when specifying the machine’s settings or accessing the
machine over the network.
The user’s login user name and password, as well as personal information
items as e-mail address, are stored in the machine’s address book. The personal information can be obtained from the Windows domain controller
(Windows authentication), LDAP Server (LDAP authentication), or Integration Server (Integration Server Authentication) connected to the machine via
the network.
❖ Login
This action is required for administrator authentication and user authentication.
Enter your login user name and login password on the machine’s control panel.
A login user name and login password may also be supplied when accessing
the machine over the network or using such utilities as Web Image Monitor
and SmartDeviceMonitor for Admin.
4
❖ Logout
This action is required with administrator and user authentication. This action is required when you have finished using the machine or changing the
settings.
Enhanced Security
Setting Up the Machine
If you want higher security, make the following setting before using the machine:
1
A Turn the machine on.
B Press the {User Tools/Counter} key.
C Press [System Settings].
D Press [Interface Settings].
E Specify IP Address.
For details, see the General Settings Guide.
F Connect the machine to the network.
G Start the Web Image Monitor, and then log on to the machine as the administrator.
For details, see p.78 “Login (Using Web Image Monitor)”.
H Install the server certificate.
For details, see p.142 “Protection Using Encryption”.
I Enable secure sockets layer (SSL).
5
Getting Started
J Enter the administrator’s user name and password.
During steps F to I, the administrator’s default account (user name: admin,
password: blank) in unencrypted form will be vulnerable to network interception, and this account may be used for breaking into the machine over the
network.
If you consider this risky, we recommend that you specify a temporary administrator password between steps A and F.
1
Reference
p.31 “Using Web Image Monitor”
6
Security Measures Provided by this Machine
Security Measures Provided by this Machine
Using Authentication and Managing Users
1
❖ Enabling Authentication
To control administrators’ and users’ access to the machine, perform administrator authentication and user authentication using login user names and
login passwords. To perform authentication, the authentication function
must be enabled.
Reference
For details, see p.17 “Enabling Authentication”.
❖ Specifying Authentication Information to Log on
Users are managed using the personal information managed in the machine’s
address book.
By enabling user authentication, you can allow only people registered in the
address book to use the machine. Users can be managed in the address book
by the user administrator.
Reference
For details, see p.44 “Specifying Authentication Information to Log on”.
❖ Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By making this setting, you can limit the functions
available to users.
Reference
For details, see p.125 “Specifying Which Functions are Available”.
7
Getting Started
Preventing Information Leaks
❖ Printing confidential files
Using the printer’s Locked Print, you can store files in the machine as confidential files and then print them. You can print a file using the machine’s control panel and collect it on the spot to prevent others from seeing it.
1
Reference
For details, see p.81 “Printing a Confidential Document”.
❖ Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files
in Document Server. You can prevent activities such as the printing of stored
files by unauthorized users.
Reference
For details, see p.88 “Specifying Access Permission for Stored Files”.
❖ Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files
in Document Server. You can prevent such activities as the sending and
downloading of stored files by unauthorized users.
Reference
For details, see p.88 “Specifying Access Permission for Stored Files”.
❖ Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the address book which users are allowed to send files using the scanner.
You can also limit the direct entry of destinations to prevent files from being
sent to destinations not registered in the address book.
Reference
For details, see p.102 “Preventing Data Leaks Due to Unauthorized Transmission”.
❖ Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the address book. You
can prevent the data in the address book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data
in the address book.
To protect the data from unauthorized reading, you can also encrypt the data
in the address book.
Reference
For details, see p.105 “Protecting the Address Book”.
8
Security Measures Provided by this Machine
❖ Managing Log Files
You can improve data security by deleting log files stored in the machine. By
transferring the log files, you can check the history data and identify unauthorized access.
To transfer the log data, the log collection server is required.
1
Reference
For details, see p.127 “Managing Log Files”.
❖ Overwriting the Data on the Hard Disk
Before disposing of the machine, make sure all data on the hard disk is deleted. Prevent data leakage by automatically deleting transmitted printer jobs
from memory.
To overwrite the hard disk data, the optional DataOverwriteSecurity unit is
required.
Reference
For details, see p.111 “Overwriting the Data on the Hard Disk”.
Limiting and Controlling Access
❖ Preventing Modification or Deletion of Stored Data
You can specify who is allowed to access stored scan files and files stored in
Document Server.
You can permit selected users who are allowed to access stored files to modify
or delete the files.
Reference
For details, see p.88 “Specifying Access Permission for Stored Files”.
❖ Preventing Modification of Machine Settings
The machine settings that can be modified according to the type of administrator account.
Register the administrators so that users cannot change the administrator settings.
Reference
For details, see p.121 “Preventing Modification of Machine Settings”.
❖ Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access
each of the machine’s functions.
Reference
For details, see p.125 “Limiting Available Functions”.
9
Getting Started
Enhanced Network Security
❖ Preventing Unauthorized Access
You can limit IP addresses or disable ports to prevent unauthorized access
over the network and protect the address book, stored files, and default settings.
1
Reference
For details, see p.131 “Preventing Unauthorized Access”.
❖ Encrypting Transmitted Passwords
Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission.
Also, encrypt the login password for administrator authentication and user
authentication.
Reference
For details, see p.137 “Encrypting Transmitted Passwords”.
❖ Safer Communication Using SSL
When you access the machine using a Web Image Monitor or IPP, you can establish encrypted communication using SSL. When you access the machine
using an application such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL.
To protect data from interception, analysis, and tampering, you can install a
server certificate in the machine, negotiate a secure connection, and encrypt
transmitted data.
Note
❒ To establish encrypted communication using SSL, the machine must have
the printer and scanner functions.
Reference
For details, see p.142 “Protection Using Encryption”.
10
2. Authentication and its
Application
Administrators and Users
When controlling access using the authentication specified by an administrator,
select the machine’s administrator, enable the authentication function, and then
use the machine.
The administrators manage access to the allocated functions, and users can use
only the functions they are permitted to access. To enable the authentication
function, the login user name and login password are required in order to use
the machine.
Specify administrator authentication, and then specifying user authentication.
Important
❒ If user authentication is not possible because of a problem with the hard disk
or network, you can use the machine by accessing it using administrator authentication and disabling user authentication. Do this if, for instance, you
need to use the machine urgently.
Reference
For details, see p.42 “Specifying Login User Name and Login Password”.
11
Authentication and its Application
Administrators
There are four types of administrator: machine administrator, network administrator, file administrator, and user administrator.
By sharing the administrative work among different administrators, you can
spread the workload and limit unauthorized operation by a single administrator. You can also specify a supervisor who can change each administrator’s password. Administrators are limited to managing the machine’s settings and
controlling user access. so they cannot use functions such as copying and printing. To use such functions, you need to register a user in the address book and
then be authenticated as the user.
2
Reference
For details, see p.22 “Registering the Administrator”.
For details, See p.171 “Supervisor Operations”.
❖ User Administrator
This is the administrator who manages personal information in the address book.
A user administrator can register/delete users in the address book or change
users’ personal information.
Users registered in the address book can also change and delete their own information. If any of the users forget their password, the user administrator can
delete it and create a new one, allowing the user to access the machine again.
❖ Machine Administrator
This is the administrator who mainly manages the machine’s default settings.
You can set the machine so that the default for each function can only be specified by the machine administrator. By making this setting, you can prevent
unauthorized people from changing the settings.
❖ Network Administrator
This is the administrator who manages the network settings. You can set the
machine so that network settings such as the IP address and settings for sending and receiving e-mail can only be specified by the network administrator. By
making this setting, you can prevent unauthorized users from changing the settings and disabling the machine, and thus ensure correct network operation.
❖ File Administrator
This is the administrator who manages permission to access stored files. You
can specify passwords to allow only registered and permitted users to view
and edit files stored in Document Server. By making this setting, you can prevent data leaks and tampering due to unauthorized users viewing and using
the registered data.
12
❖ Supervisor
The supervisor can delete an administrator’s password and specify a new
one. The supervisor cannot specify defaults or use normal functions. However, if any of the administrators forget their password and cannot access the
machine, the supervisor can provide support.
Administrators and Users
User
Users are managed using the personal information in the machine’s address
book.
By enabling user authentication, you can allow only people registered in the address book to use the machine. Users can be managed in the address book by the
user administrator.
2
Reference
For details about registering users in the address book, see General Settings
Guide, the SmartDeviceMonitor for Admin Help, or the Web Image Monitor
Help.
13
Authentication and its Application
The Management Function
The machine has an authentication function requiring a login user name and
login password. By using the authentication function, you can specify access
limits for individual users and groups of users. Using access limits, you cannot
only limit the machine’s available functions but also protect the machine settings
and files and data stored in the machine.
2
Important
❒ If you have enabled [Administrator Authentication Management], make sure not to
forget the administrator login user name and login password. If an administrator login user name or login password is forgotten, a new password must
be specified using the supervisor’s authority.
❒ Be sure not to forget the supervisor login user name and login password. If
you do forget them, a service representative will to have to return the machine to its default state. This will result in all data in the machine being lost
and the service call may not be free of charge.
Reference
For details, see p.171 “Supervisor Operations”.
14
The Management Function
About Administrator Authentication
There are four types of administrator: user administrator, machine administrator, network administrator, and file administrator.
2
AYJ002S
1. User Administrator
4. File Administrator
This administrator manages personal information in the address book. You can
register/delete users in the address book
or change users’ personal information.
This administrator manages permission
to access stored files. You can specify
passwords for the files stored in the Document Server so only authorized users
can view and change them.
2. Machine Administrator
This administrator manages the machine’s default settings. It is possible to
enable only the machine administrator to
set data security for copying, log deletion
and other default.
3. Network Administrator
This administrator manages the network
settings. You can set the machine so that
network settings such as the IP address
and settings for sending and receiving email can be specified by the network administrator only.
5. Authentication
Administrators must enter their login
user name and password to be authenticated.
6. This machine
7. Administrators manage the machine’s settings and access limits.
For details about each administrator,
see p.12 “Administrators”.
15
Authentication and its Application
About User Authentication
This machine has an authentication function to prevent unauthorized access.
By using login user name and login password, you can specify access limits for
individual users and groups of users.
2
AYJ001S
1. User
6. Access Limit
A user performs normal operations on
the machine, such as copying and printing.
Using authentication, unauthorized users are prevented from accessing the machine.
2. Group
7. Authorized users and groups can
use only those functions permitted
by the administrator.
A group performs normal operations on
the machine, such as copying and printing.
3. Unauthorized User
4. Authentication
Using a login user name and password,
user authentication is performed.
5. This Machine
16
Enabling Authentication
Enabling Authentication
To control administrators’ and users’ access to the machine, perform administrator or user authentication using login user names and passwords. To perform
authentication, the authentication function must be enabled. To specify authentication, you need to register administrators.
2
Reference
For details, see p.22 “Registering the Administrator”.
Authentication Setting Procedure
Specify administrator authentication and user authentication according to the
following chart:
Note
❒ To specify Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication, you must first specify administrator authentication.
❒ You can specify User Code Authentication without specifying administrator
authentication.
Administrator Authentication
Specifying Administrator Privileges
See p.19 “Specifying Administra- See p.19 “Specifying Administrator Privileges”.
tor Privileges”.
Registering the Administrator
See p.22 “Registering the Administrator”.
User Authentication
Specifying User Authentication
See p.17 “Enabling Authentication”.
A Authentication that requires only the machine:
• User Code Authentication
See p.34 “User Code Authentication”.
• Basic Authentication
See p.38 “Basic Authentication”.
B Authentication that requires external devices:
• Windows Authentication
See p.47 “Windows Authentication”.
• LDAP Authentication
See p.55 “LDAP Authentication”.
• Integration Server Authentication
See p.63 “Integration Server Authentication”.
17
Authentication and its Application
Administrator Authentication
Administrators are handled differently from the users registered in the address
book. When registering an administrator, you cannot use a login user name already registered in the address book. Windows Authentication, LDAP Authentication and Integration Server Authentication are not performed for an
administrator, so an administrator can log on even if the server is unreachable
because of a network problem.
Each administrator is identified by a login user name. One person can act as
more than one type of administrator if multiple administrator authority is granted to a single login user name.
You can specify the login user name, login password, and encryption password
for each administrator.
The encryption password is a password for performing encryption when specifying settings using Web Image Monitor or SmartDeviceMonitor for Admin.
The password registered in the machine must be entered when using applications such as SmartDeviceMonitor for Admin.
Administrators are limited to managing the machine’s settings and controlling
user access. so they cannot use functions such as copying and printing. To use
such functions, you need to register a user in the address book and then be authenticated as the user.
2
Note
❒ Administrator authentication can also be specified via Web Image Monitor.
For details see the Web Image Monitor Help.
18
Administrator Authentication
Specifying Administrator Privileges
To specify administrator authentication, set Administrator Authentication Management to [On]. You can also specify whether or not to manage the items in System Settings as an administrator.
To log on as an administrator, use the default login user name and login password.
The defaults are "admin" for the login name and blank for the password.
2
Important
❒ If you have enabled [Administrator Authentication Management], make sure not to
forget the administrator login user name and login password. If an administrator login user name or login password is forgotten, a new password must
be specified using the supervisor’s authority.
Reference
For details, see p.171 “Supervisor Operations”.
Note
❒ For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
19
Authentication and its Application
D Press [Administrator Authentication Management].
2
E Press the [User Management], [Machine Management], [Network Management], or
[File Management] key to select which settings to manage.
F Set "Admin. Authentication" to [On].
[Available Settings] appears.
20
Administrator Authentication
G Select the settings to manage from "Available Settings".
2
The selected settings will be unavailable to users.
[Available Settings] varies depending on the administrator.
For details about Available Settings, see p.121 “Managing Access to the Machine”
Note
❒ To specify administrator authentication for more than one category, repeat
steps E to G.
H Press [OK].
I Press [Exit] twice.
21
Authentication and its Application
Registering the Administrator
If administrator authentication has been specified, it is recommended to assign
each administrator role to a different person.
By sharing the administrative work among different administrators, you can
spread the workload and limit unauthorized operation by a single administrator. You can register up to four login user names (Administrators 1 to 4) to which
you can grant administrator privileges.
Administrator authentication can also be specified via Web Image Monitor. For
details see the Web Image Monitor Help.
2
Preparation
Log on using a registered administrator name and password. The administrator defaults are "admin" for the login name and blank for the password. For
details about logging on and logging off with administrator authentication,
see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging
off Using Administrator Authentication”.
Note
❒ You can use up to 32 alphanumeric characters and symbols when registering
login user names and login passwords. Keep in mind that passwords are
case-sensitive.
❒ User names cannot contain numbers only, spaces, semicolons (;), or quotes ("),
nor can they be left blank.
❒ Do not use Japanese, Traditional Chinese, Simplified Chinese, or Hangul
double-byte characters when entering the login user name or password. If
you use multi-byte characters when entering the login user name or password, you cannot authenticate using Web Image Monitor.
A Press the {User Tools/Counter} key.
B Press [System Settings].
22
Administrator Authentication
C Press [Administrator Tools].
2
D Press [Program / Change Administrator].
E In the line for the administrator whose authority you want to specify, press
[Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then
press [Change].
If you allocate each administrator’s authority to a different person, the screen
appears as follows:
23
Authentication and its Application
F Press [Change] for "Login user name".
2
G Enter the login user name, and then press [OK].
H Press [Change] for "Login password".
I Enter the login password, and then press [OK].
Follow the password policy to make the login password more secure.
For details about the password policy, see p.158 “Password Policy”.
J If a password reentry screen appears, enter the login password, and then
press [OK].
K Press [Change] for "Encryption password".
24
Administrator Authentication
L Enter the encryption password, and then press [OK].
2
M If a password reentry screen appears, enter the encryption password, and
then press [OK].
N Press [OK] twice.
You will be automatically logged off.
O Press the {User Tools/Counter} key.
Logging on Using Administrator Authentication
If administrator authentication has been specified, log on using an administrator’s user name and password. This section describes how to log on.
Note
❒ To log on as an administrator, enter the administrator’s login user name and
login password.
❒ When logging on using administrative authentication, the name of the administrator will appear. If logging on under a user name with multiple administrator authentications, one of the names of those administrators will
appear.
❒ If you try to log on from an operating screen, "Selected function cannot be
used." appears. Press the {User Tools/Counter} key to change the default.
A Press the {User Tools/Counter} key.
B Press the {Login/Logout} key.
AQI007S
25
Authentication and its Application
C Press [Enter] for "Login User Name".
2
D Enter the login user name, and then press [OK].
Note
❒ When you log on to the machine for the first time as the administrator, enter "admin".
E Press [Enter] for "Login Password".
Note
❒ If assigning the administrator for the first time, proceed to step G without
pressing [Enter].
26
Administrator Authentication
F Enter the login password, and then press [OK].
2
G Enter [Login].
"Authenticating... Please wait." appears, followed by the screen for specifying
the default.
27
Authentication and its Application
Logging off Using Administrator Authentication
If administrator authentication has been specified, be sure to log off after completing settings. This section explains how to log off after completing settings.
A Press the {Login/Logout}key.
2
AQI007S
B Press [Yes].
28
Administrator Authentication
Changing the Administrator
Change the administrator’s login user name and login password. You can also
assign each administrator’s authority to the login user names "Administrator 1"
to "Administrator 4" To combine the authorities of multiple administrators, assign multiple administrators to a single administrator.
For example, to assign machine administrator authority and user administrator
authority to [Administrator 1], press [Administrator 1] in the lines for the machine
administrator and the user administrator.
2
Preparation
For details about logging on with administrator authentication, see p.25
“Logging on Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
29
Authentication and its Application
C Press [Administrator Tools].
2
D Press [Program / Change Administrator].
E In the line for the administrator you want to change, press [Administrator 1],
[Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change].
F Press [Change] for the setting you want to change, and re-enter the setting.
G Press [OK].
H Press [OK] twice.
You are logged off automatically.
I Press the {User Tools/Counter} key.
30
Administrator Authentication
Using Web Image Monitor
Using Web Image Monitor, you can log on to the machine and change the administrator settings. This section describes how to access the Web Image Monitor.
A Start your Web browser.
B Enter "http://(machine's address)/" in the address bar of a Web browser.
2
Top page of Web Image Monitor appears.
C Click [Login].
D Enter the login name and password of an administrator, and then click
[Login]
E Make setting as desired.
Note
❒ When logging on as an administrator use the login name and password of
an administrator set in the machine. The default login name is “admin”
and the password is blank.
❒ For details about Web Image Monitor, see the Web Image Monitor Help.
31
Authentication and its Application
Using Web Printing Tool
Administrative settings for GL/2 & TIFF Filter can be changed, system logs can
be collected, etc. using Web Printing Tool.
A Start your Web browser.
B Enter “http://(machine's address)/webprint/” in the Web browser’s address
2
bar.
Top page of Web Printing Tool appears.
C Click the link to the administrator’s page in the header area on the upperright hand of the screen.
To change administrative settings (GL/2 & TIFF Initial Configuration) click
To collect system logs click .
.
D Enter the administrator password, and then click [OK].
E Make setting as desired.
Note
❒ When logging in to Web Printing Tool the default password is set as “admin”. To differentiate from the administrator password set in the machine,
use a password unique to Web Printing Tool for login.
❒ If the password authentication fails three times in a row, you will be returned to the Web Printing Tool top page. To return to the login page
again, click the link in the header area on the upper-right hand of the
screen.
❒ The password can be changed in "Change the administrator password" under the "Administrator Password" tab on the administrator settings (GL/2
& TIFF Initial Configuration) screen. Click [On] to activate the password
entry fields. The password must be 4 to 8 characters long.
❒ For details about Web Printing Tool, see the Web Printing Tool Help.
32
User Authentication
User Authentication
There are five types of user authentication method: user code authentication, basic authentication, Windows authentication, Integration Server Authentication,
and LDAP authentication. To use user authentication, select an authentication
method on the control panel, and then make the required settings for the authentication. The settings depend on the authentication method.
2
Note
❒ User code authentication is used for authenticating on the basis of the user
code, and basic authentication, Windows authentication, LDAP authentication, and Integration Server Authentication are used for authenticating individual users.
❒ The user code account, that has no more than eight digits and is used for User
Code authentication, can be carried over and used as a login user name even
after the authentication method has switched from User Code authentication
to BASIC authentication, Windows authentication, LDAP authentication, or
Integration Server authentication. In this case, since the User Code authentication does not have a password, the login password is set as a blank account.
When the authentication method switches to an external authentication (Windows authentication, LDAP authentication, or Integration Server authentication), authentication will not occur, unless the external authentication device
has previously registered the carried over user code account. However, the
user code account will remain in the Address Book of the machine in spite of
the authentication failure. From a security perspective, when switching from
User Code authentication to another authentication method, we recommend
that you delete accounts you are not going to use, or set up a login password.
For details about deleting accounts, see General Settings Guide. For details
about changing passwords, see p.42 “Specifying Login User Name and Login
Password”.
❒ You cannot use more than one authentication method at the same time.
❒ User authentication can also be specified via Web Image Monitor. For details
see the Web Image Monitor Help.
❒ When enabling “user authentication,” all users in the address book can access
and change all the settings on the GL/2 & TIFF screen.
33
Authentication and its Application
User Code Authentication
This is an authentication method for limiting access to functions according to the
user code. The same user code can be used by more than one user. For details
about specifying user codes, see General Settings Guide.
Limitation
❒ To control the use of DeskTopBinder for the delivery of files stored in the machine, select Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication.
2
Reference
For details about specifying the user code for the printer driver, see Printer
Reference or Printer driver Help.
For details about specifying the TWAIN driver user code, see TWAIN driver
Help.
Specifying User Code Authentication
This can be specified by the machine administrator.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
34
User Authentication
D Press [User Authentication Management].
2
E Select [User Code Auth.].
Note
❒ If you do not want to use user authentication management, select [Off].
F Select which of the machine’s functions you want to limit.
User Code Authentication will be applied to the selected functions.
Unselected functions will not be affected.
For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”.
35
Authentication and its Application
G Select the "Printer Job Authentication" level.
Limitation
❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job
Authentication".
Note
❒ If you select [Entire], you cannot print using a printer driver or a device that
does not support authentication. To print under an environment that does
not support authentication, select [Simple (All)]or[Simple (Limitation)].
❒ If you select [Simple (Limitation)], you can specify clients for which printer
job authentication is not required. Specify [Parallel Interface: Simple], [USB:
Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is
required for printing with non-specified devices.
❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to
print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note
that, because the machine does not require authentication in this case, it
may be used by unauthorized users.
If you select [Entire], proceed to step L.
If you select [Simple (All)] or [Simple (Limitation)], proceed to step H.
2
Reference
For details, see p.71 “Printer Job Authentication Levels and Printer Job
Types”.
H Press [Simple (Limitation)]
36
User Authentication
I Press [Change].
2
J Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
You can specify the IPv4 address range to which this setting is applied, and
whether or not to apply the setting to the parallel and USB interfaces.
K Press [Exit].
L Press [OK].
M Press [Exit].
N Press [Yes].
You are logged off.
O Press the {User Tools/Counter} key.
37
Authentication and its Application
Basic Authentication
Specify this authentication when using the machine’s address book to authenticate for each user. Using basic authentication, you cannot only manage the machine’s available functions but also limit access to stored files and to the personal
data in the address book. Under basic authentication, the administrator must
specify the functions available to each user registered in the address book.
2
Specifying Basic Authentication
This can be specified by the machine administrator.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
38
User Authentication
D Press [User Authentication Management].
2
E Select [Basic Auth.].
Note
❒ If you do not want to use user authentication management, select [Off].
F Select which of the machine’s functions you want to permit.
Basic Authentication will be applied to the selected functions.
Users can use the selected functions only.
For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”.
39
Authentication and its Application
G Select the "Printer Job Authentication" level.
Limitation
❒ If Printer Controller RW-3600 is installed, [Simple (Limitation)] will not be accepted.
Note
❒ If you select [Entire], you cannot print using a printer driver or a device that
does not support authentication. To print under an environment that does
not support authentication, select [Simple (All)]or [Simple (Limitation)].
❒ If you select [Simple (Limitation)], you can specify clients for which printer
job authentication is not required. Specify [Parallel Interface: Simple], [USB:
Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is
required for printing with non-specified devices.
❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to
print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note
that, because the machine does not require authentication in this case, it
may be used by unauthorized users.
If you select [Entire], proceed to step L.
If you select [Simple (All)] or [Simple (Limitation)], proceed to step H.
2
Reference
For details, see p.71 “Printer Job Authentication Levels and Printer Job
Types”.
H Press [Simple (Limitation)]
40
User Authentication
I Press [Change].
2
J Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
You can specify the IPv4 address range to which this setting is applied, and
whether or not to apply the setting to the parallel and USB interfaces.
K Press [Exit].
L Press [OK].
M Press the {User Tools/Counter} key.
Authentication Information Stored in the Address Book
This can be specified by the user administrator.
If you have specified [User Authentication], you can specify access limits for individual users and groups of users. Specify the setting in the address book for each
user.
User authentication can also be specified via SmartDeviceMonitor for Admin or
Web Image Monitor.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
You need to register a user in the address book. For details about the address
book, see General Settings Guide.
See p.125 “Limiting Available Functions”.
41
Authentication and its Application
Specifying Login User Name and Login Password
In [User Authentication Management], specify the login user name and password.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
D Press [Address Book Management].
2
E Select the user or group.
F Press [Auth. Info].
42
User Authentication
G Press [Change] for “Login User Name”.
2
H Enter a login user name, and then press [OK].
I Press [Change] for “Login Password”.
J Enter a login password, and then press [OK].
K If a password reentry screen appears, enter the login password, and then
press [OK].
L Press [OK].
M Press [Exit] twice.
N Press the {User Tools/Counter} key.
43
Authentication and its Application
Specifying Authentication Information to Log on
The login user name and password specified in [User Authentication Management]
can be used as the login information for "SMTP Authentication", "Folder Authentication", and "LDAP Authentication".
For details about specifying login user name and login password, see p.42 “Specifying Login User Name and Login Password”.
If you use a login user name and password other than the one specified in [User
Authentication Management] for "SMTP Authentication", "Folder Authentication",
or "LDAP Authentication", see General Settings Guide.
2
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
44
User Authentication
D Press [Address Book Management].
2
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
E Select the user or group.
F Press [Auth. Info].
G Specify the login user name and password.
45
Authentication and its Application
H Select [Use Auth. Info at Login] in "SMTP Authentication".
2
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
Limitation
❒ When using [Use Auth. Info at Login] for "SMTP Authentication", "Folder Authentication", or "LDAP Authentication", a user name other than "other" ,
"admin" , "supervisor" or "HIDE***" must be specified. The symbol "***"
represents any character.
❒ To use [Use Auth. Info at Login] for SMTP authentication, a login password
up to 128 characters in length must be specified.
Note
❒ For folder authentication, select [Use Auth. Info at Login] in "Folder Authentication".
❒ For LDAP authentication, select [Use Auth. Info at Login] in "LDAP Authentication".
I Press [OK].
J Press the {User Tools/Counter} key.
46
User Authentication
Windows Authentication
Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot
be authenticated if they do not have their accounts in the directory server. Under
Windows authentication, you can specify the access limit for each group registered in the directory server. The address book stored in the directory server can
be registered to the machine, enabling user authentication without first using the
machine to register individual settings in the address book. If you can obtain
user information, the sender’s address (From:) is fixed to prevent unauthorized
access when sending e-mails under the scanner function.
2
Important
❒ During Windows Authentication, data registered in the directory server, such
as the user’s e-mail address, is automatically registered in the machine. If user
information on the server is changed, information registered in the machine
may be overwritten when authentication is performed.
❖ Operational Requirements for Windows Authentication
• To specify Windows authentication, the following requirements must be
met:
• The Printer/Scanner unit must be installed.
• A domain controller has been set up in a designated domain.
• This function is supported by the operating systems listed below. NTLM
authentication is used for Windows authentication. To obtain user information when running Active Directory, use LDAP. If SSL is being used,
this requires a version of Windows that supports TLS v1, SSL v2, or SSL v3.
• Windows NT 4.0 Server
• Windows 2000 Server
• Windows Server 2003
Limitation
❒ Users managed in other domains are subject to user authentication, but they
cannot obtain items such as e-mail addresses.
❒ If you have created a new user in the domain controller and selected [User
must change password at next logon], log on to the machine from the computer
to change the password before logging on from the machine’s control panel.
❒ If the machine has Printer Controller RW-3600 installed, it will not accept the
Windows Authentication under the printer function. However, you can complete Windows Authentication when using the scanner function through the
Printer Controller RW-3600 and Printer Option Type W3600.
❒ For details about Windows Authentication methods using Printer Controller
RW-3600, refer to the Printer Controller RW-3600 user manual.
47
Authentication and its Application
Note
❒ The first time you access the machine, you can use the functions available to
your group. If you are not registered in a group, you can use the functions
available under [*Default Group]. To limit which functions are available to
which users, first make settings in advance in the address book.
❒ When accessing the machine subsequently, you can use all the functions
available to your group and to you as an individual user.
❒ Enter the login password correctly, keeping in mind that it is case-sensitive.
❒ Users who are registered in multiple groups can use all the functions available to those groups.
❒ A user registered in two or more global groups can use all the functions available to members of those groups.
❒ If the "Guest" account on the Windows server is enabled, even users not registered in the domain controller can be authenticated. When this account is
enabled, users are registered in the address book and can use the functions
available under [*Default Group].
2
Specifying Windows Authentication
This can be specified by the machine administrator.
Note
❒ Under Windows Authentication, you can select whether or not to use secure
sockets layer (SSL) authentication.
❒ To automatically register user information such as e-mail addresses under
Windows authentication, it is recommended that communication between
the machine and domain controller be encrypted using SSL.
❒ Under Windows Authentication, you do not have to create a server certificate
unless you want to automatically register user information such as e-mail addresses using SSL.
A Press the {User Tools/Counter} key.
B Press [System Settings].
48
User Authentication
C Press [Administrator Tools].
2
D Press [User Authentication Management].
E Select [Windows Auth.].
Note
❒ If you do not want to use user authentication management, select [Off].
49
Authentication and its Application
F Press [Change] for "Domain Name".
2
G Enter the name of the domain controller to be authenticated, and then press
[OK].
H Select the "Printer Job Authentication" level.
Limitation
❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job
Authentication".
Note
❒ If you select [Entire], you cannot print using a printer driver or a device that
does not support authentication. To print under an environment that does
not support authentication, select [Simple (All)] or [Simple (Limitation)].
❒ If you select [Simple (Limitation)], you can specify clients for which printer
job authentication is not required. Specify [Parallel Interface: Simple], [USB:
Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is
required for printing with non-specified devices.
❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to
print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note
that, because the machine does not require authentication in this case, it
may be used by unauthorized users.
50
User Authentication
If you select [Entire], proceed to step M.
If you select [Simple (All)] or [Simple (Limitation)], proceed to step I.
Reference
For details, see p.71 “Printer Job Authentication Levels and Printer Job
Types”.
I Press [Simple (Limitation)]
2
J Press [Change].
K Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
You can specify the IPv4 address range to which this setting is applied, and
whether or not to apply the setting to the parallel and USB interfaces.
L Press [Exit].
51
Authentication and its Application
M Press [On] for "Use Secure Connection(SSL)".
2
If you are not using secure sockets layer (SSL) for authentication, press [Off].
If global groups have been registered under Windows server, you can limit
the use of functions for each global group.
You need to create global groups in the Windows server in advance and register in each group the users to be authenticated.
You also need to register in the machine the functions available to the global
group members.
Create global groups in the machine by entering the names of the global
groups registered in the Windows Server. (Keep in mind that group names
are case sensitive.) Then specify the machine functions available to each
group.
If global groups are not specified, users can use the available functions specified in [*Default Group]. If global groups are specified, users not registered in
global groups can use the available functions specified in [*Default Group]. By
default, all functions are available to [*Default Group] members. Specify the
limitation on available functions according to user needs.
N Under "Group", press [Program / Change], and then press [* Not Programmed].
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
52
User Authentication
O Under "Group Name", press [Change], and then enter the group name.
2
P Press [OK].
Q Select which of the machine’s functions you want to permit.
Windows Authentication will be applied to the selected functions.
Users can use the selected functions only.
For details about "Limiting Available Functions", see p.125 “Limiting Available Functions”.
Limitation
❒ If Printer Controller RW-3600 is installed, [Printer] will not be accepted.
R Press [OK] twice.
S Press the {User Tools/Counter} key.
53
Authentication and its Application
-Installing Internet Information Services (IIS) and Certificate services
Specify this setting if you want the machine to automatically obtain e-mail addresses registered in Active Directory.
We recommended you install Internet Information Services (IIS) and Certificate
services as the Windows components.
Install the components, and then create the server certificate.
If they are not installed, install them as follows:
A Select [Add/Remove Programs] on the [Control Panel].
B Select [Add/Remove Windows Components].
C Select the [Internet Information Services (IIS)] check box.
D Select the [Certificate Services] check box, and then click [Next].
E Installation of the selected Windows components starts, and a warning message appears.
F Click [Yes].
G Click [Next].
H Select the Certificate Authority, and then click [Next].
On the displayed screen, [Enterprise root CA] is selected.
I Enter the Certificate Authority name (optional) in [CA Identifying Information],
and then click [Next].
J Leave [Data Storage Location] at its default, and then click [Next].
Internet Information Services and Certificate services are installed.
2
-Creating the Server Certificate
After installing Internet Information Services (IIS) and Certificate services Windows components, create the Server Certificate as follows:
A Start [Internet Services Manager].
B Right-click [Default Web Site], and then click [Properties].
C On the [Directory Security] tab, click [Server Certificate].
Web Server Certificate Wizard starts.
D Click [Next].
E Select [Create a new certificate], and then click [Next].
F Select [Prepare the request now, but send it later], and then click [Next].
G Enter the required information according to the instructions given by Web
Server Certificate Wizard.
H Check the specified data, which appears as Request File Summary, and then click [Next].
The server certificate is created.
54
User Authentication
LDAP Authentication
Specify this authentication when using the LDAP server to authenticate users
who have their accounts on the LDAP server. Users cannot be authenticated if
they do not have their accounts on the LDAP server. The address book stored in
the LDAP server can be registered to the machine, enabling user authentication
without first using the machine to register individual settings in the address
book. When using LDAP Authentication, to prevent the password information
being sent over the network unencrypted, it is recommended that communication between the machine and LDAP server be encrypted using SSL. You can
specify on the LDAP server whether or not to enable SSL. To enable this, you
must create a server certificate for the LDAP server.
Using Web Image Monitor, you can specify whether or not to check the reliability of the SSL server being connected to.
For details see the Web Image Monitor Help.
2
Important
❒ During LDAP Authentication, the data registered in the LDAP server, such as
the user’s e-mail address, is automatically registered in the machine. If user
information on the server is changed, information registered in the machine
may be overwritten when authentication is performed.
❖ Operational Requirements for LDAP Authentication
To specify LDAP authentication, the following requirements must be met:
• The network configuration must allow the machine to detect the presence
of the LDAP server.
• When SSL is being used, TLSv1, SSLv2, or SSLv3 can function on the LDAP
server.
• The LDAP server must be registered in the machine.
For details about registration, see Network Guide.
• When registering the LDAP server, the following setting must be specified.
• Server Name
• Serch Base
• Port No.
• SSL Communication
• Authentication
• Serch Conditions(Name, E-mail Address)
When specifying "SSL Communication", [On] must be specified.
When specifying "Authentication", [On] or [High Security] must be specified.
For details about registration, see General Settings Guide.
55
Authentication and its Application
Limitation
❒ Under LDAP authentication, you cannot specify access limits for groups registered in the LDAP Server.
❒ When using LDAP Authentication, you cannot use reference functions in
LDAP Search for servers using SSL.
❒ Enter the user’s login user name using up to 32 characters and login password
using up to 128 characters.
❒ Do not use double-byte Japanese, Traditional Chinese, Simplified Chinese, or
Hangul characters when entering the login user name or password. If you use
double-byte characters , you cannot authenticate using Web Image Monitor.
❒ If the machine has Printer Controller RW-3600 installed, it will not accept the
LDAP Authentication under the printer function. However, you can complete LDAP Authentication when using the scanner function through the
Printer Controller RW-3600 and Printer Option Type W3600.
❒ For details about LDAP Authentication methods using Printer Controller
RW-3600, refer to the Printer Controller RW-3600 user manual.
2
Note
❒ Under LDAP Authentication, if “Anonymous Authentication” in the LDAP
server’s settings is not set to "Prohibit", users who do not have an LDAP server account might still be able to gain access.
❒ If the LDAP server is configured using Windows Active Directory, Anonymous Authentication might be available. If Windows Authentication is available, we recommend you use it.
❒ The first time an unregistered user accesses the machine after LDAP authentication has been specified, the user is registered in the machine and can use
the functions available under [Available Functions] during LDAP Authentication.
❒ To limit the available functions for each user, register each user and corresponding [Available Functions] setting in the address book, or specify [Available
Functions] for each registered user. The [Available Functions] setting becomes effective when the user accesses the machine subsequently.
56
User Authentication
Specifying LDAP Authentication
This can be specified by the machine administrator.
A Press the {User Tools/Counter} key.
B Press [System Settings].
2
C Press [Administrator Tools].
D Press [User Authentication Management].
57
Authentication and its Application
E Select [LDAP Auth.].
2
Note
❒ If you do not want to use user authentication management, select [Off].
F Select the LDAP server to be used for LDAP authentication.
58
User Authentication
G Select the "Printer Job Authentication" level.
You can specify the IPv4 address range to which this setting is applied, and
whether or not to apply the setting to the parallel and USB interfaces.
Limitation
❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job
Authentication".
2
Note
❒ If you select [Entire], you cannot print using a printer driver or a device that
does not support authentication. To print under an environment that does
not support authentication, select [Simple (All)] or [Simple (Limitation)].
❒ If you select [Simple (Limitation)], you can specify clients for which printer
job authentication is not required. Specify [Parallel Interface: Simple], [USB:
Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is
required for printing with non-specified devices.
❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to
print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note
that, because the machine does not require authentication in this case, it
may be used by unauthorized users.
If you select [Entire], proceed to step L.
If you select [Simple (All)] or [Simple (Limitation)], proceed to step H.
Reference
For details, see p.71 “Printer Job Authentication Levels and Printer Job
Types”.
H Press [Simple (Limitation)]
59
Authentication and its Application
I Press [Change].
2
J Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
You can specify the IPv4 address range to which this setting is applied, and
whether or not to apply the setting to the parallel and USB interfaces.
K Press [Exit].
L Select which of the machine’s functions you want to permit.
LDAP Authentication will be applied to the selected functions.
Authentication will be applied to the selected functions.
For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”.
Limitation
❒ If Printer Controller RW-3600 is installed, [Printer] will not be accepted.
60
User Authentication
M Press [Change] for "Login Name Attribute".
2
N Enter the login name attribute , and then press [OK].
Note
❒ You can use the Login Name Attribute as a search criterion to obtain information about an authenticated user. You can create a search filter based on
the Login Name Attribute, select a user, and then retrieve the user information from the LDAP server so it is transferred to the machine’s address
book. The method for selecting the user name depends on the server environment. Check the server environment and enter the user name accordingly.
O Press [Change] for "Unique attribute".
61
Authentication and its Application
P Enter the unique attribute and then press [OK].
2
Note
❒ Specify Unique Attribute on the machine to match the user information in
the LDAP server with that in the machine. By doing this, if the Unique Attribute of a user registered in the LDAP server matches that of a user registered in the machine, the two instances are treated as referring to the
same user. You can enter an attribute such as "serialNumber" or "uid". Additionally, you can enter "cn" or "employeeNumber", provided it is unique.
If you do not specify the Unique Attribute, an account with the same user
information but with a different login user name will be created in the machine.
Q Press [OK].
R Press the {User Tools/Counter} key.
62
User Authentication
Integration Server Authentication
To use Integration Server Authentication, you need a server on which ScanRouter software that supports authentication is installed.
For external authentication, the Integration Server Authentication collectively
authenticates users accessing the server over the network, providing a server-independent centralized user authentication system that is safe and convenient.
For example, if the delivery server and the machine share the same Integration
Server Authentication, single sign-on is possible using DeskTopBinder.
To use [Integration Svr. Auth.], the machine must have access to a server on which
ScanRouter System or Web SmartDeviceMonitor software is installed.
For details about the software, contact your local dealer.
Using Web Image Monitor, you can specify whether or not to check the reliability of the SSL server being connected to.
For details see the Web Image Monitor Help.
2
Important
❒ During Integration Server Authentication, the data registered in the server,
such as the user’s e-mail address, is automatically registered in the machine.
If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed.
Limitation
❒ If the machine has Printer Controller RW-3600 installed, it will not accept the
Integration Server Authentication under the printer function. However, you
can complete Integration Server Authentication when using the scanner function through the Printer Controller RW-3600 and Printer Option Type W3600.
❒ For details about Integration Sever Authentication methods using Printer
Controller RW-3600, refer to the Printer Controller RW-3600 user manual.
Note
❒ The built-in default administrator name is "Admin" on the Server and "admin" on the machine.
63
Authentication and its Application
Specifying Integration Server Authentication
This can be specified by the machine administrator.
This section explains how to specify the machine settings.
For details, see the Authentication Manager manual.
A Press the {User Tools/Counter} key.
B Press [System Settings].
2
C Press [Administrator Tools].
D Press [User Authentication Management].
64
User Authentication
E Select [Integration Svr. Auth.].
2
Note
❒ If you do not wish to use User Authentication Management, select [Off].
F Press [Change] for "Server Name".
Specify the name of the server for external authentication.
G Enter the server name, and then press [OK].
Enter the IPv4 address or host name.
65
Authentication and its Application
H In "Authentication Type", select the authentication system for external authentication.
2
Select an available authentication system.
Note
❒ For general usage, select [Default].
I Press [Change] for "Domain Name".
J Enter the domain name, and then press [OK].
Note
❒ You cannot specify a domain name under an authentication system that
does not support domain login.
66
User Authentication
K Press [Obtain URL].
2
The machine obtains the URL of the server specified in [Server Name].
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
If [Server Name] or the setting for enabling SSL is changed after obtaining the
URL, the "URL" is "Not Obtained".
L Press [OK]
If you set "Authentication Type" to "Windows", you can use the global group.
If you set "Authentication Type" to "Notes", you can use the Notes group. If
you set "Authentication Type" to "Basic (Integration Server)", you can use the
groups created using the Authentication Manager.
M Under "Group", press [Program / Change], and then press [* Not Programmed].
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
67
Authentication and its Application
N Under "Group Name", press [Change], and then enter the group name.
2
O Press [OK].
P Select which of the machine’s functions you want to permit.
Authentication will be applied to the selected functions.
Users can use the selected functions only.
For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”.
Limitation
❒ If Printer Controller RW-3600 is installed, [Printer] will not be accepted.
Q Press [OK] twice.
R Select the "Printer Job Authentication" level.
Limitation
❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job
Authentication".
68
User Authentication
Note
❒ If you select [Entire], you cannot print using a printer driver or a device that
does not support authentication. To print under an environment that does
not support authentication, select [Simple (All)] or [Simple (Limitation)].
❒ If you select [Simple (Limitation)], you can specify clients for which printer
job authentication is not required. Specify [Parallel Interface: Simple], [USB:
Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is
required for printing with non-specified devices.
❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to
print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note
that, because the machine does not require authentication in this case, it
may be used by unauthorized users.
If you select [Entire], proceed to step W.
If you select [Simple (All)] or [Simple (Limitation)], proceed to step S.
2
Reference
For details, see p.71 “Printer Job Authentication Levels and Printer Job
Types”.
S Press [Simple (Limitation)]
T Press [Change].
69
Authentication and its Application
U Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
2
You can specify the IPv4 address range to which this setting is applied, and
whether or not to apply the setting to the parallel and USB interfaces.
V Press [Exit].
W Press [On] for “Use Secure Connection(SSL)”.
To not use secure sockets layer (SSL) for authentication, press [Off].
X Press [OK].
Y Press the {User Tools/Counter} key.
70
User Authentication
❖ Printer Job Authentication Levels and Printer Job Types
This section explains the relationship between printer job authentication levels and printer job types.
Depending on the combination of printer job authentication level and printer
job type, the machine may not print properly. Set an appropriate combination
according to the operating environment.
User authentication is supported by the RPCS printer driver.
Machine Settings (displayed on the control panel)
Printer Job Types
[User Authentication
Management]
[Printer Job Authentication]
[Restrict Use of
Simple Encryption]
A
B
C
D
E
F
G
[Off]
—
—
✩
✩
✩
✩
✩
✩
✩
[User Code Auth.],
[Basic Auth.],
[Windows Auth.],
[LDAP Auth.],
[Integration Svr. Auth.]
[Simple (All)]
[Off]
$ ❍
×
✩
✩
✩
❍
×
❍
×
×
❍
[On]
[Entire]
[Off]
[On]
2
×
$ ❍
×
✩: Printing is possible regardless of user authentication.
❍: Printing is possible if user authentication is successful. If user authentication fails, the print job is reset.
$: Printing is possible if user authentication is successful and [Driver Encryption Key] for the printer driver and machine match.
×: Printing is not possible regardless of user authentication, and the print job
is reset.
Limitation
❒ If Printer Controller RW-3600 is installed, you cannot specify Printer Job
Authentication and Printer Job Types.
Reference
For details about [Restrict Use of Simple Encryption], see p.153 “Changing the
Extended Security Functions”.
71
Authentication and its Application
❖ [Printer Job Authentication]
• [Entire]
The machine authenticates all printer jobs and remote settings, and cancels
jobs and settings that fail authentication.
Printer Jobs: Job Reset
Settings: Disabled
• [Simple (All)]
The machine authenticates printer jobs and remote settings that have authentication information, and cancels the jobs and settings that fail authentication.
Printer jobs and settings without authentication information are performed without being authenticated.
• [Simple (Limitation)].
You can specify the range to apply [Simple (Limitation)] to by specifying [Parallel Interface: Simple], [USB: Simple], and the client’s IPv4 address.
2
❖ Printer Job Types
A In the RPCS printer driver dialog box, the [Confirm authentication information
when printing] and [Encrypt] check boxes are selected.
Personal authentication information is added to the printer job.
The printer driver applies advanced encryption to the login passwords.
The printer driver encryption key, enables the driver encryption to prevent
the login password being stolen.
B In the RPCS printer driver dialog box, the [Confirm authentication information
when printing] check box is selected.
Personal authentication information is added to the printer job.
The printer driver applies simple encryption to login passwords.
C In the RPCS printer driver dialog box, the [Confirm authentication information
when printing] check box is not selected.
Personal authentication information is added to the printer job and is disabled.
D When using the PostScript 3 printer driver, the printer job contains user
code information.
Personal authentication information is not added to the printer job but the
user code information is.
E
Note
❒ This type also applies to recovery/parallel printing using an RPCS
printer driver that does not support authentication.
When using the PostScript 3 printer driver, the printer job does not contain
user code information.
Neither personal authentication information nor user code information is
added to the printer job.
Note
❒ Type 5 also applies to recovery/parallel printing using an RPCS printer
driver that does not support authentication.
72
User Authentication
F
G
A printer job or PDF file is sent from a host computer without a printer
driver and is printed via LPR.
Personal authentication information is not added to the printer job.
A PDF file is printed via ftp.
Personal authentication is performed using the user ID and password used
for logging on via ftp. However, the user ID and password are not encrypted.
2
73
Authentication and its Application
If User Authentication is Specified
When user authentication (User Code Authentication, Basic Authentication,
Windows Authentication, LDAP Authentication, or Integration Server Authentication) is set, the authentication screen is displayed. Unless a valid user name
and password are entered, operations are not possible with the machine. Log on
to operate the machine, and log off when you are finished operations. Be sure to
log off to prevent unauthorized users from using the machine. When auto logout
timer is specified, the machine automatically logs you off if you do not use the
control panel within a given time. Additionally, you can authenticate using an
external device. For details, see p.80 “Authentication using an external device”.
2
Note
❒ Consult the User Administrator about your login user name, password, and
user code.
❒ For user code authentication, enter a number registered in the address book
as [User Code].
User Code Authentication (Using the Control Panel)
When user authentication is set, the following screen appears.
Enter a user code, and then press the [OK] key.
Note
❒ To log off, do one of the following:
• Press the Operation switch.
• Press the {Energy Saver} key after jobs are completed.
• Press the {Clear/Stop} key and the {Reset} key at the same time.
74
If User Authentication is Specified
User Code Authentication (Using a Printer Driver)
When user authentication is set, specify the user code in the printer properties
of a printer driver. For details, see the printer driver Help.
Login (Using the Control Panel)
2
Follow the procedure below to log on when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
A Press [Enter] for “Login User Name”.
B Enter a login user name, and then press [OK].
C Press [Enter] for “Login Password”.
75
Authentication and its Application
D Enter a login password, and then press [OK].
2
E Press [Login].
When the user is authenticated, the screen for the function you are using appears.
76
If User Authentication is Specified
Log Off (Using the Control Panel)
Follow the procedure below to log off when Basic Authentication, Windows Authentication, or LDAP Authentication is set.
A Press the {Login/Logout} key.
2
AQI007S
B Press [Yes].
Note
❒ You can log off using following procedures also.
• Press the {Power} key.
• Press the {Energy Saver} key.
77
Authentication and its Application
Login (Using a Printer Driver)
When Basic Authentication, Windows Authentication, or LDAP Authentication
is set, make encryption settings in the printer properties of a printer driver, and
then specify a login user name and password. For details, see the printer driver
Help.
2
Note
❒ When logged on using a printer driver, logging off is not required.
Login (Using Web Image Monitor)
This section explains how to log onto the machine via Web Image Monitor.
A Click [Login] at the toppage on the Web Image Monitor.
B Enter a login user name and password, and then click [Login].
Note
❒ For user code authentication, enter a user code in [User Name], and then
click [OK].
❒ The procedure may differ depending on the Web Image Monitor used.
Log Off (Using Web Image Monitor)
A Click [Logout] to log off.
Note
❒ Delete the cache memory in the Web Image Monitor after logging off.
78
If User Authentication is Specified
Auto Logout
This can be specified by the machine administrator.
When using user authentication management, the machine automatically logs
you off if you do not use the control panel within a given time. This feature is
called "Auto Logout". Specify how long the machine is to wait before performing
Auto Logout.
2
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Timer Settings].
D Press [Auto Logout Timer].
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
79
Authentication and its Application
E Select [On].
2
Note
❒ If you do not want to specify [Auto Logout Timer], select [Off].
F Enter "60" to "999" (seconds) using the number keys, and then press [q].
G Press the {User Tools/Counter} key.
Authentication using an external device
If you authenticate using an external device, see the Kit manual.
For details, contact your local dealer.
80
3. Preventing Information Leaks
Printing a Confidential Document
Depending on the location of the machine, it is difficult to prevent unauthorized
persons from viewing prints lying in the machine’s output trays. When printing
confidential documents, use the Locked Print function.
❖ Locked Print
• Using the printer’s Locked Print function, store files in the machine as
Locked Print files and then print them from the control panel and retrieve
them immediately, preventing others from viewing them.
• Confidential documents can be printed regardless of the User Authentication settings.
Note
❒ To store files temporarily, select [Stored Print] under the printer driver. If you
select [Share stored print files], also, you can share these files.
Choosing a Locked Print file
Using the printer driver, specify a Locked Print file.
If user authentication has been enabled, you must enter the login user name and
login password using the printer driver. For details see the printer driver Help.
A Open the printer driver dialog box.
B Set [Job type] to [Locked Print].
C Click [Details...].
D Enter the user ID and password.
Note
❒ The password entered here let you use the Locked Print function.
❒ To print a Locked Print file, enter the same password on the control panel.
Limitation
❒ Enter the user ID using up to 8 alphanumeric characters.
❒ Enter the password using 4 to 8 numbers.
E Click [OK].
A confirmation message appears.
F Confirm the password by re-entering it.
G Click [OK].
81
Preventing Information Leaks
H Perform Locked Print.
Reference
For details, see the printer driver Help.
Printing a Locked Print File
Print Locked Print files using the control panel.
The Document Administrator can change the password if a user has forgotten it.
This can also be specified via Web Image Monitor.
For details see the Web Image Monitor Help.
3
Preparation
For details about logging on and logging off with user authentication, see p.75
“Login (Using the Control Panel)”, p.77 “Log Off (Using the Control Panel)”.
A Press the {Printer} key.
B Press [Print Jobs].
C Press [Locked Print Job List].
Only Locked Print files belonging to the user who has logged on appear.
D Select the Locked Print file to print.
82
Printing a Confidential Document
E Press [Print].
3
F Enter the password for the Locked print file, and then press [OK].
Note
❒ Enter the password specified in step D on p.81 “Choosing a Locked Print
file”.
G Press [Yes].
83
Preventing Information Leaks
Deleting Locked Print Files
This can be specified by the file creator (owner).
To delete Locked Print files, you must enter the password for the files. If the
password has been forgotten, ask the file administrator to change the password.
This can also be specified via Web Image Monitor.
For details see the Web Image Monitor Help.
Note
❒ Locked Print files can also be deleted by the file administrator.
3
A Press the {Printer} key.
B Press [Print Jobs].
C Press [Locked Print Job List].
D Select the file.
84
Printing a Confidential Document
E Press [Delete].
3
F Enter the password for the Locked Print file, and then press [OK].
G Press [Yes].
Changing Passwords of Locked Print Files
This can be specified by the file creator (owner) or file administrator.
If the password has been forgotten, the file administrator change the password.
This can also be specified via Web Image Monitor.
For details see the Web Image Monitor Help.
A Press the {Printer}key.
B Press [Print Jobs].
C Press [Locked Print Job List].
D Select the file.
85
Preventing Information Leaks
E Press [Change Password].
3
F Enter the password for the stored file, and then press [OK].
The machine administrator does not need to enter the password.
G Enter the new password for the stored file, and then press [OK].
H If a password reentry screen appears, enter the login password, and then
press [OK].
86
Printing a Confidential Document
Unlocking Locked Print Files
If you specify [On] for "Enhance File Protection", the file will be locked and become inaccessible if an invalid password is entered ten times. This section explains how to unlock files.
Only the file administrator can unlock files.
This can also be specified via Web Image Monitor.
For details see the Web Image Monitor Help.
For details about "Enhance File Protection", see p.153 “Changing the Extended
Security Functions”.
3
Note
❒ You can use the same procedure to unlock stored print files also.
A Press the {Printer} key.
B Press [Print Jobs].
C Press [Locked Print Job List].
D Select the file.
E Press [Unlock File].
F Press [Yes].
87
Preventing Information Leaks
Specifying Access Permission for Stored Files
You can specify who is allowed to access stored scan files and files stored in the
Document Server.
This can prevent activities such as printing or sending of stored files by unauthorized users.
You can also specify which users can change or delete stored files.
❖ Access Permission
To limit the use of stored files, you can specify four types of access permission.
3
Read-only
In addition to checking the content of and information about stored files, you can also
print and send the files.
Edit
You can change the print settings for stored
files. This includes permission to view files.
Edit / Delete
You can delete stored files.
This includes permission to view and edit
files.
Full Control
You can specify the user and access permission. This includes permission to view, edit,
and edit / delete files.
Note
❒ Files can be stored by any user who is allowed to use the Document Server,
copy function, or scanner function.
❒ Using Web Image Monitor, you can check the content of stored files. For
details, see the Web Image Monitor Help.
❒ Access permission to documents sent from the printer driver and stored on
the machine can only be set on Web Image Moniter.
❒ The default access permission for the file creator (owner) is "Read-only".
You can also specify the access permission.
❖ Password for Stored Files
• Passwords for stored files can be specified by the file creator (owner) or file
administrator.
• You can obtain greater protection against the unauthorized use of files.
For details, see p.98 “Specifying Passwords for the Stored Files”
• Even if User Authentication is not set, passwords for stored files can be set.
For details, see the relevant manuals.
88
Specifying Access Permission for Stored Files
Assigning Users and Access Permission for Stored Files
This can be specified by the file creator (owner) or file administrator.
Specify the users and their access permissions for each stored file.
By making this setting, only users granted access permission can access stored
files.
This can also be specified via Web Image Monitor.
Important
❒ If files become inaccessible, reset their access permission as the file creator
(owner). This can also be done by the file administrator. If you want to access
a file but do not have access permission, ask the file creator (owner).
3
A Press the {Document Server} key.
B Select the file.
C Press [File Management].
89
Preventing Information Leaks
D Press [Change Access Priv.].
3
E Press [Program/Change/Delete].
F Press [New Program].
90
Specifying Access Permission for Stored Files
G Select the users or groups you want to assign permission to.
You can select more than one users.
By pressing [All Users], you can select all the users.
3
H Press [Exit].
I Select the user who you want to assign an access permission to, and then
select the permission.
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control].
J Press [Exit].
K Press [OK].
91
Preventing Information Leaks
Specifying Access Privileges for Files Stored using the Scanner
Function
If user authentication is set for the scanner function, you can specify access privileges for stored files when storing them in the Document Server. You can also
change the access privileges for the file.
Specifying Access Privileges When Storing Files
This section explains how to specify the access privileges and then store a file in
the Document Server under the scanner function.
3
A Press [Store File].
B Press [Access Privileges].
C Press [New Program].
92
Specifying Access Permission for Stored Files
D Select the users or groups you want to assign permission to. You can select
more than one users.
By pressing [All Users], you can select all the users.
E Press [Exit].
Select the user who you want to assign an access permission to, and then select the permission.
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control].
F Press [Exit].
G Press [OK].
H Store files in the Document Server.
3
Changing Access Privileges for Previously Stored Files
This section explains the authentication process for accessing a file stored in the
Document Server under the scanner function.
A Press [Select Stored File].
B Select the file.
C Press[Manage / Delete File].
93
Preventing Information Leaks
D Press [Change Access Priv.].
3
E Press [Program/Change/Delete].
F Press [New Program].
G Select the users or groups you want to assign permission to.
You can select more than one users.
By pressing [All Users], you can select all the users.
H Press [Exit].
Select the user who you want to assign an access permission to, and then select the permission.
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control].
I Press [Exit].
J Press [OK].
94
Specifying Access Permission for Stored Files
Assigning the User and the Access Permission for the User’s
Stored Files
This can be specified by the file creator (owner) or user administrator.
Specify the users and their access permission to files stored by a particular user.
Only those users granted access permission can access stored files.
This makes the management of access permission easier than it is when permission is specified for each stored file.
3
Important
❒ If files become inaccessible, be sure to enable the user administrator, and then
reset the access permission for the files in question.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
95
Preventing Information Leaks
D Press [Address Book Management].
3
E Select the user or group.
F Press [Protection].
96
Specifying Access Permission for Stored Files
G Under "Protect File(s)", press [Program/Change/Delete] for "Permissions for
Users/Groups".
3
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
H Press [New Program].
I Select the users or groups to register.
You can select more than one users.
By pressing [All Users], you can select all the users.
J Press [Exit].
97
Preventing Information Leaks
K Select the user who you want to assign an access permission to, and then
select the permission.
3
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control].
L Press [Exit].
M Press [OK].
N Press [Exit].
O Press the {User Tools/Counter} key.
Specifying Passwords for the Stored Files
This can be specified by the file creator (owner) or file administrator.
Specify passwords for the stored files.
Provides increased protection against unauthorized use of files.
A Press the {Document Server} key.
B Select the file.
98
Specifying Access Permission for Stored Files
C Press [File Management].
3
D Press [Change Password].
E Enter the password using the number keys.
You can use 4 to 8 numbers as the password for the stored file.
F Press [OK].
G Confirm the password by re-entering it using the number keys.
H Press [OK].
I Press [OK].
99
Preventing Information Leaks
Unlocking Files
If you specify [On] for "Enhance File Protection", the file will locked and become
inaccessible if an invalid password is entered 10 times. This section explains how
to unlock files.
Only the file administrator can unlock files.
For details about "Enhance File Protection", see p.153 “Changing the Extended
Security Functions”.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
3
A Press the {Document Server} key.
B Select the file.
C Press [File Management].
100
Specifying Access Permission for Stored Files
D Press [Unlock File].
3
E Press [Yes].
F Press [OK].
101
Preventing Information Leaks
Preventing Data Leaks Due to Unauthorized
Transmission
If user authentication is specified, the user who has logged on will be designated
as the sender to prevent data from being sent by an unauthorized person masquerading as the user.
You can also limit the direct entry of destinations to prevent files from being sent
to destinations not registered in the address book.
3
Restrictions on Destinations
This can be specified by the user administrator.
Make the setting to disable the direct entry of e-mail addresses under the scanner function.
By making this setting, the destinations can be restricted to addresses registered
in the address book.
If you set [Restrict Use of Destinations] to [On], you can prohibit users from directly
entering telephone numbers, e-mail addresses, or Folder Path in order to send
files. If you set [Restrict Use of Destinations] to [Off], [Restrict Adding of User Destinations] appears. In [Restrict Adding of User Destinations], you can restrict users from
registering data in the address book.
If you set [Restrict Adding of User Destinations] to [Off], users can directly enter destination e-mail addresses and Folder Path in [Program Dest.] on the scanner
screen. If you set [Restrict Adding of User Destinations] to [On], users can specify destinations directly, but cannot use [Program Dest.] to register data in the address
book. When this setting is made, only the user administrator can change the address book.
For details, see p.153 “Changing the Extended Security Functions”.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
102
Preventing Data Leaks Due to Unauthorized Transmission
A Press the {User Tools/Counter} key.
B Press [System Settings].
3
C Press [Administrator Tools].
D Press [Extended Security].
E Press [On] for "Restrict Use of Destinations".
103
Preventing Information Leaks
F Press [OK].
G Press the {User Tools/Counter} key.
Reference
This can also be specified using Web Image Monitor or SmartDeviceMonitor for Admin. For details, see the Help for each application.
3
104
Protecting the Address Book
Protecting the Address Book
If user authentication is specified, the user who has logged on will be designated
as the sender to prevent data from being sent by an unauthorized person masquerading as the user.
To protect the data from unauthorized reading, you can also encrypt the data in
the address book.
Address Book Access Permission
3
This can be specified by the registered user. The access permission can also be
specified by a user granted full control or the user administrator.
You can specify who is allowed to access the data in the address book.
By making this setting, you can prevent the data in the address book being used
by unregistered users.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
105
Preventing Information Leaks
D Press [Address Book Management].
3
E Select the user or group.
F Press [Protection].
G Under "Protect Destination", press [Program/Change/Delete] for "Permissions
for Users/Groups".
106
Protecting the Address Book
H Press [New Program].
3
I Select the users or groups to register.
You can select more than one users.
By pressing [All Users], you can select all the users.
J Press [Exit].
K Select the user who you want to assign an access permission to, and then
select the permission.
Select the permission, from [Read-only], [Edit], [Edit / Delete], or [Full Control].
L Press [Exit].
M Press [OK].
N Press [Exit].
O Press the {User Tools/Counter} key.
107
Preventing Information Leaks
Encrypting the Data in the Address Book
This can be specified by the user administrator.
Encrypt the data in the address book.
Reference
See p.153 “Changing the Extended Security Functions”.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
3
Note
❒ If you register additional users after encrypting the data in the address book,
those users are also encrypted.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
108
Protecting the Address Book
D Press [Extended Security].
3
E Press [On] for "Encrypt Address Book".
F Press [Change] for “Encryption Key”.
G Enter the encryption key, and then press [OK].
Enter the encryption key using up to 32 alphanumeric characters.
H Press [Encrypt / Decrypt].
109
Preventing Information Leaks
I Press [Yes].
Do not switch the main power off during encryption, as doing so may corrupt
the data.
Encrypting the data in the address book may take a long time.
The time it takes to encrypt the data in the address book depends on the
number of registered users.
The machine cannot be used during encryption.
Normally, once encryption is complete, [Exit] appears.
If you press [Stop] during encryption, the data is not encrypted.
If you press [Stop] during decryption, the data stays encrypted.
3
J Press [Exit].
K Press [OK].
L Press the {User Tools/Counter} key.
110
Deleting Data on the Hard Disk
Deleting Data on the Hard Disk
A
B
Hard Disk
The machine’s hard disk lets you store data under the copy, printer, scanner,
and document server functions, as well as the address book and counters
stored under each user code.
Data Not Overwritten in the Hard Disk
The machine’s memory lets you store data transmitted using network
TWAIN scanner. Even if you delete the data on the hard disk, this data remains intact.
3
Overwriting the Data on the Hard Disk
To use this function, the optional DataOverwriteSecurity unit must be installed.
To prevent data on the hard disk being leaked before disposing of the machine,
you can overwrite all data stored on the hard disk. You can also automatically
overwrite temporarily-stored data.
Note
❒ Depending on the hard disk capacity and the method of erasing the data, this action may take a few hours. Once you start the Erase All Memory function, no other
machine operation is possible until the function completes or you quit the function.
❖ Auto Erase Memory Setting
To erase selected data on the hard disk, specify [Auto Erase Memory Setting].
❖ Erase All Memory
To erase all the data on the hard disk, using [Erase All Memory].
❖ Methods of Erasing the Data
You can select the method of erasing the data from the following:
The default is "NSA".
NSA *1
Overwrites the data on the hard disk twice
with random numbers and once with zeros.
DoD *2
Overwrites the data with a number, its complement, and random numbers, and then
checks the result.
Random Numbers
Overwrites the data with random numbers
the specified number of times.
You can specify between 1 and 9 as the
number of times the data is overwritten with
random numbers. The default is 3 times.
*1
*2
National Security Agency
Department of Defense
Reference
For details, see the manual supplied with the DataOverwriteSecurity unit.
111
Preventing Information Leaks
"Auto Erase Memory Setting"
This can be specified by the machine administrator.
A document scanned in Copier or Scanner mode, or print data sent from a printer driver is temporarily stored on the machine's hard disk.
Even after the job is completed, it remains in the hard disk as temporary data.
Auto Erase Memory erases the temporary data on the hard disk by writing over it.
Overwriting starts automatically once the job is completed.
The Copier and Printer functions take priority over the Auto Erase Memory function. If a copy or print job is in progress, overwriting will only be done after the job
is completed.
3
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
112
Deleting Data on the Hard Disk
D Press [Auto Erase Memory Setting].
3
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
E Press [On], and then select the method of erasing the data.
Select the method of erasing the data from [NSA], [DoD], or [Random Numbers].
If you select [Random Numbers], proceed to step F.
If you select [NSA] or [DoD], proceed to step H.
F Press [Change].
113
Preventing Information Leaks
G Enter the number of times that you want to overwrite using the number
keys, and then press [q].
3
H Press [OK].
Auto Erase Memory is set.
Important
❒ When Auto Erase Memory is set to "On", temporary data that remained on
the hard disk when Auto Erase Memory was "Off" might not be overwritten.
Note
❒ Should the main power switch of the machine be turned off before overwriting is completed, the temporary data will remain on the hard disk until the main power switch is next turned on and overwriting is resumed.
❒ If the overwriting method is changed while overwriting is in progress, the
remainder of the temporary data will be overwritten using the method set
originally.
Canceling Auto Erase Memory
A Follow steps A to D in "Auto Erase Memory Setting".
B Press [Off].
C Press [OK].
Auto Erase Memory is disabled.
Note
❒ To set Auto Erase Memory to "On" again, repeat the procedure in "Auto Erase
Memory Setting".
114
Deleting Data on the Hard Disk
Types of Data that Can or Cannot Be Overwritten
The following table shows the types of data that can or cannot be overwritten by
Auto Erase Memory.
Data overwritten by Auto
Erase Memory
Copier
• Copy jobs
Printer
• Print Jobs
• Sample Print/Locked
Print/Stored Print Jobs *1
• Spool Printing jobs
3
• PDF Direct Print data
Scanner
*2
• Scanned files sent by email
• Files sent by Scan to Folder
• Documents sent using
DeskTopBinder, the ScanRouter delivery software
or a Web Image Monitor
Data not overwritten by Auto
Erase Memory
Documents stored by the user in the Document Server using
the Copier, Printer or Scanner functions *3
Information registered in the Address Book *4
Counters stored under each user code
*1
*2
*3
*4
A Sample Print, Locked Print, or Stored Print job can only be overwritten after it has
been executed. Stored print jobs can be overwritten by Auto Erase Memory only if
they have been deleted in advance.
Data scanned with network TWAIN scanner will not be overwritten by Auto Erase
Memory.
A stored document can only be overwritten after it has been printed or deleted from
the Document Server.
Data stored in the Address Book can be encrypted for security. For details, see p.108
“Encrypting the Data in the Address Book”.
115
Preventing Information Leaks
"Erase All Memory"
This can be specified by the machine administrator.
You can erase all the data on the hard disk by writing over it. This is useful if you
relocate or dispose of your machine.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
3
Important
❒ If you select Erase All Memory, the following are also deleted: user codes,
counters under each user code, user stamps, data stored in the Address Book,
printer fonts downloaded by users, applications using Embedded Software
Architecture, SSL server certificates, and the machine’s network settings.
Note
❒ Before erasing the hard disk, you can back up user codes, counters for each
user code, and Address Book data using SmartDeviceMonitor for Admin. For
details, see SmartDeviceMonitor for Admin Help.
A Disconnect communication cables connected to the machine.
B Press the {User Tools/Counter} key.
C Press [System Settings].
D Press [Administrator Tools].
116
Deleting Data on the Hard Disk
E Press [Erase All Memory].
3
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
F Select the method of erasing the data.
Select the method of erasing the data from [NSA], [DoD], or [Random Numbers].
If you select [Random Numbers], proceed to step G.
If you select [NSA] or [DoD], proceed to step I.
G Press [Change].
117
Preventing Information Leaks
H Enter the number of times that you want to overwrite using the number
keys, and then press [q].
3
I Press [OK].
J Press [Yes].
K When overwriting is completed, press [Exit], and then turn off the power.
Reference
Before turning the power off, see "Turning On the Power", About This Machine.
Important
❒ Should the main power switch of the machine be turned off before Erase
All Memory is completed, overwriting is canceled.
❒ Make sure the main power switch is not turned off during overwriting.
Note
❒ If the main power is turned off when Erase All Memory is in progress,
overwriting will start again when you next turn on the main power.
❒ If an error occurs before overwriting is completed, turn off the main power.
Turn it on again, and then repeat from stepB.
118
Deleting Data on the Hard Disk
Canceling Erase All Memory
A Press [Cancel] while Erase All Memory is in progress.
B Press [Yes].
Erase All Memory is canceled.
Note
❒ If you stop this before completion, the data is not fully erased. Execute
[Erase All Memory] again to erase the data.
3
C Turn off the main power.
Note
❒ To resume overwriting after power off, turn on the main power of the machine, and then repeat the procedure in "Erase All Memory".
119
Preventing Information Leaks
3
120
4. Managing Access to the
Machine
Preventing Modification of Machine
Settings
Administrator type determines which machine settings can be modified. Users
cannot change the administrator settings. In [Admin. Authentication], [Available Settings], the administrator can select which settings users cannot specify.
Register the administrators before using the machine.
❖ Type of Administrator
Register the administrator on the machine, and then authenticate the administrator using the administrator’s login user name and password. The administrator can also specify [Available Settings] in [Admin. Authentication] to prevent
users from specifying certain settings. Administrator type determines which
machine settings can be modified. The following types of administrator are
available:
• User Administrator
• Network Administrator
• Machine Administrator
• File Administrator
Reference
For details, see p.12 “Administrators”.
For details, see p.18 “Administrator Authentication”.
For details, see p.176 “Machine Administrator Settings”.
For details, see p.184 “Network Administrator Settings”.
For details, see p.189 “File Administrator Settings”.
For details, see p.12 “User Administrator”.
❖ Menu Protect
Use this function to specify the permission level for users to change those settings accessible by non-administrators.
You can specify Menu Protect for the following settings:
• Copier / Document Server Features
• Printer Features
• Scanner Features
Reference
For details, see p.199 “User Settings”.
121
Managing Access to the Machine
Menu Protect
The administrator can also limit users’ access permission to the machine’s settings. The machine’s System Settings menu and the printer’s regular menus can
be locked so they cannot be changed. This function is also effective when management is not based on user authentication.
To change the menu protect setting, you must first enable administrator authentication.
Reference
For details about the menu protect level for each function, see p.199 “User Settings”.
4
Menu Protect
You can set menu protect to [Off], [Level 1], or [Level 2]. If you set it to [Off], no
menu protect limitation is applied. To limit access to the fullest extent, select
[Level 2]. For details about the menu protect level for each function, see p.199
“User Settings”.
Copying Functions
To specify [Menu Protect] in [Copier / Document Server Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in
[System Settings].
A Press the {User Tools/Counter} key.
B Press [Copier / Document Server Features].
C Press [Administrator Tools].
D Press [Menu Protect].
122
Menu Protect
E Select the menu protect level, and then press [OK].
F Press the {User Tools/Counter} key.
4
Printer Functions
To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On] in
[Administrator Authentication Management] in [Administrator Tools] in [System Settings].
A Press the {User Tools/Counter} key.
B Press [Printer Features].
C Press [Maintenance].
D Press [Menu Protect].
E Select the menu protect level, and then press [OK].
123
Managing Access to the Machine
F Press the {User Tools/Counter} key.
Scanner Functions
To specify [Menu Protect] in [Scanner Features], set [Machine Management] to [On] in
[Administrator Authentication Management] in [Administrator Tools] in [System Settings].
A Press the {User Tools/Counter} key.
B Press [Scanner Features].
4
C Press [Initial Settings].
D Press [Menu Protect].
E Select the menu protect level, and then press [OK].
F Press the {User Tools/Counter} key.
124
Limiting Available Functions
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access
each of the machine’s functions.
❖ Available Functions
Specify the available functions from the copier, Document Server, scanner
and printer function.
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available
to registered users. By making this setting, you can limit the functions available
to users.
4
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Administrator Tools].
D Press [Address Book Management].
125
Managing Access to the Machine
E Select the user.
F Press [Auth. Info].
G In [Available Functions], select the functions you want to specify.
4
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
H Press [OK].
I Press [Exit].
J Press the {User Tools/Counter} key.
126
Managing Log Files
Managing Log Files
A
Log information
To view the log, the log collection server is required.
The following log information is stored in the machine’s memory and on its
hard disk:
• Job log
Stores information about workflow related to user files, such as copying,
printing, and scan file delivery
• Access log
Stores information about access, such as logging on and off, creating and
deleting files, scanning data security for copying documents, administrator procedures *1 , and customer engineer procedures. *2
*1
*2
B
C
4
Deleting all log information
Formatting the hard disk
Deleting log information
To delete the log, the log collection server is required.
By deleting the log stored in the machine, you can free up space on the hard
disk.
Transferring log information
To transfer the log, the log collection server is required.
You can transfer the log information, which indicates who tried to gain access
and at what time.
By transferring the log files, you can check the history data and identify unauthorized access.
127
Managing Access to the Machine
Specifying Delete All Logs
This can be specified by the machine administrator.
By deleting the log stored in the machine, you can free up space on the hard disk.
A Press the {User Tools/Counter} key.
B Press [System Settings].
4
C Press [Administrator Tools].
D Press [Delete All Logs].
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
A confirmation message appears.
E Press [Yes].
F Press [Exit].
G Press the {User Tools/Counter}key.
128
Managing Log Files
Transfer Log Setting
The machine administrator can select [On] from the log server only.
When using the machine’s control panel, you can change the setting to [Off] only
if it is set to [On].
You can check and change the transfer log setting. This setting lets you transfer
log files to the log server to check the history data and identify unauthorized access.
For details about log collection server, contact your local dealer.
For details about the transfer log setting, see log collection server help.
A Press the {User Tools/Counter}key.
B Press [System Settings].
4
C Press [Administrator Tools].
129
Managing Access to the Machine
D Press [Transfer Log Setting].
If the setting to be specified does not appear, press [TNext] to scroll down to other settings.
4
E Press [Off].
F Press [OK].
G Press the {User Tools/Counter}key.
130
5. Enhanced Network Security
Preventing Unauthorized Access
You can limit IP addresses, disable ports and protocols, or use Web Image Monitor to specify the network security level to prevent unauthorized access over the
network and protect the address book, stored files, and default settings.
Enabling/Disabling Protocols
This can be specified by the network administrator.
Specify whether to enable or disable the function for each protocol.
By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
C Press [Interface Settings].
131
Enhanced Network Security
D Press [Effective Protocol].
E Press [Inactive] for the protocol you want to disable.
5
F Press [OK].
G Press the {User Tools/Counter} key.
Reference
Advanced network settings can be specified using Web Image Monitor.
For details, see the Web Image Monitor Help.
132
Preventing Unauthorized Access
Access Control
This can be specified by the network administrator.
The machine can control TCP/IP access.
Limit the IP addresses from which access is possible by specifying the access
control range.
For example, if you specify the access control range as [192.168.15.16][192.168.15.20], the client PC addresses from which access is possible will be from
192.168.15.16 to 192.168.15.20.
Limitation
❒ Using access control, you can limit access involving LPR, RCP/RSH, FTP,
IPP, DIPRINT, Web Image Monitor, SmartDeviceMonitor for Client or DeskTopBinder. You cannot limit the Monitoring of SmartDeviceMonitor for Client.
❒ You cannot limit access involving telnet, or monitoring SmartDeviceMonitor
for Admin.
5
A Open a Web browser.
B Enter "http://(machine's-address)/" in the address bar to access the machine.
C Click [Login].
The network administrator can log on using the appropriate login user name
and login password.
D Click [Configuration], under [Security], click [Access Control].
The [Access Control] page appears.
E To specify the IPv4 Address, in [Access Control Range], enter an IP address
that has access to the machine. To specify the IPv6 Address, in [Access Control Range] - [Range], enter an IP address that has access to the machine, or in
[Mask], enter an IP address from which access to the machine and specify
the [Mask Length].
F Click [OK].
Access control is set.
G Click [Logout].
Reference
For details, see the Web Image Monitor Help.
133
Enhanced Network Security
Specifying Network Security Level
This can be specified by the network administrator.
This setting lets you change the security level to limit unauthorized access.
Set the security level to [Level 0], [Level 1], or [Level 2].
Select [Level 2] for maximum security to protect confidential information.
Select [Level 1] for moderate security. Use this setting if the machine is connected
to the office local area network (LAN).
Select [Level 0] to use this setting if no information needs to be protected.
You can specify the entire network security level setting the machine’s control
panel.
Reference
For details about logging on and logging off with user authentication, see p.25
“Logging on Using Administrator Authentication”, p.28 “Logging off Using
Administrator Authentication”.
5
A Press the {User Tools/Counter}key.
B Press [System Settings].
C Press [Administrator Tools].
134
Preventing Unauthorized Access
D Press [Network Security Level].
If the setting you want to specify does not appear, press [TNext] to scroll
down to other settings.
E Select the network security level.
5
Select [Level 0], [Level 1], or [Level 2].
F Press [OK].
G Press [Exit].
H Press the {User Tools/Counter}key.
-Status of Functions under each Network Security Level
❍= Available
— = Unavailable
U = Port is open.
| = Port is closed.
✩ = Automatic
★ = Ciphertext Only
× = Ciphertext Priority
135
Enhanced Network Security
Function
Network Security Level
Level 0
TCP/IP
❍
❍
❍
U
U
U
Port 443
U
U
U
Port 631
U
U
|
Port
7443/7444
U
U
U
Port 80
U
U
U
Port 631
U
U
|
Port 443
U
U
U
DIPRINT
❍
❍
-
LPR
❍
❍
-
IPP
5
FTP
Port 21
U
U
U
ssh
Port 22
U
U
U
U
U
U
U
U
U
RSH/RCP
❍
❍
-
SNMP
❍
❍
❍
sftp
RFU
SNMP v1v2
Port 10021
Setting
❍
-
-
Browse
❍
❍
-
❍
❍
❍
✩
✩
★
❍
-
-
U
U
|
SNMP v3
SNMP
Encryption
TELNET
SSDP
Port 1900
NBT
Port 137/138
U
U
|
❍
❍
❍
×
×
★
DNS
❍
❍
-
SMB
❍
❍
-
NetWare
NetWare
❍
❍
-
AppleTalk
AppleTalk
❍
❍
-
SSL
SSL / TLS
Encryption
Mode
136
Level 2
Port 80
TCP/IP
HTTP
Level 1
Encrypting Transmitted Passwords
Encrypting Transmitted Passwords
Prevent login passwords, group passwords for PDF files, and IPP authentication
passwords being revealed by encrypting them for transmission.
Also, encrypt the login password for administrator authentication and user authentication.
❖ Driver Encryption Key
Encrypt the password transmitted when specifying user authentication.
To encrypt the login password, specify the driver encryption key on the machine and on the printer driver installed in the user’s computer.
Reference
See p.153 “Changing the Extended Security Functions”.
❖ Group Passwords for PDF Files
DeskTopBinder Lite’s PDF Direct Print function allows a PDF group password to be specified to enhance security.
5
❖ Password for IPP Authentication
To encrypt the IPP Authentication password on the Web Image Monitor, set
[Authentication] to [DIGEST], and then specify the IPPAuthentication password
set on the machine.
Note
❒ You can use Telnet or FTP to manage passwords for IPP authentication, although it is not recommended.
137
Enhanced Network Security
Driver Encryption Key
This can be specified by the network administrator.
Specify the driver encryption key on the machine.
By making this setting, you can encrypt login passwords for transmission to prevent them from being analyzed.
Reference
See p.153 “Changing the Extended Security Functions”.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
5
C Press [Administrator Tools].
138
Encrypting Transmitted Passwords
D Press [Extended Security].
E For [Driver Encryption Key], press [Change].
5
F Enter the driver encryption key, and then press [OK].
Enter the driver encryption key using up to 32 alphanumeric characters.
Note
❒ The network administrator must give users the driver encryption key
specified on the machine so they can register it on their computers. Make
sure to enter the same driver encryption key as that specified on the machine.
G Press [OK].
H Press the {User Tools/Counter} key.
Reference
See the printer driver Help.
See the TWAIN driver Help.
139
Enhanced Network Security
Group Password for PDF files
This can be specified by the network administrator.
On the machine, specify the group password for PDF files.
By using a PDF group password, you can enhance security and so protect passwords for PDF files from being analyzed.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
Note
❒ The network administrator must give users the group password for PDF files
that are already registered on the machine. The users can then register it in
DeskTopBinder on their computers. For details, see the DeskTopBinder Help.
❒ Be sure to enter the same character string as that specified on the machine for
the group password for PDF files.
❒ The group password for PDF files can also be specified using Web Image
Monitor. For details, see the Web Image Monitor Help.
5
A Press the {User Tools/Counter} key.
B Press [Printer Features].
C Press [PDF Menu], and then press [PDF Group Password].
If the setting to be specified does not appear, press [TNext].
D For [Current Password], press [Enter].
E Enter the password, and then press [OK].
Enter the group password for PDF files using up to 32 alphanumeric characters.
F Press [OK].
G For [New Password], press [Enter].
140
Encrypting Transmitted Passwords
H Enter the password, and then press [OK].
I For [Confirm New Password], press [Enter].
J Enter the password and press [OK].
K Press [OK].
L Press the {User Tools/Counter} key.
IPP Authentication Password
This can be specified by the network administrator.
Specify the IPP authentication passwords for the machine using Web Image
Monitor.
By making this setting, you can encrypt IPP authentication passwords for transmission to prevent them from being analyzed.
5
Note
❒ When using the IPP port under Windows XP or Windows Server 2003, you
can use the operating system’s standard IPP port.
A Open a Web Image Monitor.
B Enter "http://(machine's-address)/" in the address bar to access the machine.
C Log onto the machine.
The network administrator can log on. Enter the login user name and login
password.
D Click [Configuration], click [Security], and then click [IPP Authentication].
The [IPP Authentication] page appears.
E Select [DIGEST] from the [Authentication] list.
F Enter the user name in the [User Name] box.
G Enter the password in the [Password] box.
H Click [Apply].
IPP authentication is specified.
I Log off from the machine.
141
Enhanced Network Security
Protection Using Encryption
When you access the machine using a Web Image Monitor or IPP, you can establish encrypted communication using SSL. When you access the machine using
an application such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL.
To protect data from interception, analysis, and tampering, you can install a server certificate in the machine, negotiate a secure connection, and encrypt transmitted data.
❖ SSL (Secure Sockets Layer)
5
AUS001 S
A
B
C
D
142
To access the printer from a user’s computer, request for the SSL server certificate and public key.
The server certificate and public key are sent from the printer to the user’s
computer.
Create shared key from the user’s computer, and then encrypt it using
public key.
The encrypted shared key is sent to the printer.
Protection Using Encryption
E
F
The encrypted shared key is decrypted in the machine using private key.
Transmit the encrypted data using the shared key, and then decrypt the
data at the machine to attain secure transmission.
SSL (Secure Sockets Layer) Encryption
This can be specified by the network administrator.
To protect the communication path and establish encrypted communication,
create and install the server certificate.
There are two ways of installing a server certificate: create and install a self-certificate using the machine, or request a certificate from a certificate authority and
install it.
❖ Configuration flow (self-signed certificate)
A Creating and installing the server certificate
Install the server certificate using Web Image Monitor.
B Enabling SSL
Enable the [SSL/TLS] setting using Web Image Monitor.
5
❖ Configuration flow (certificate issued by a certificate authority)
A Creating the server certificate
Create the server certificate using Web Image Monitor.
The application procedure after creating the certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.
B Installing the server certificate
Install the server certificate using Web Image Monitor.
C Enabling SSL
Enable the [SSL/TLS] setting using Web Image Monitor.
Creating and Installing the Server Certificate (Self-Signed Certificate)
Create and install the server certificate using Web Image Monitor.
Note
❒ To confirm whether SSL configuration is enabled, enter https://(machine’saddress) in your Web Image Monitor’s address bar to access this machine. If
the "The page cannot be displayed" message appears, check the configuration
as the SSL configuration is invalid.
143
Enhanced Network Security
Creating and Installing the Self-Signed Certificate
Create and install the server certificate using Web Image Monitor.
This section explains the use of a self-certificate as the server certificate.
A Open a Web Image Monitor.
B Enter "http://(machine's-address)/" in the address bar to access the printer.
C Log onto the machine.
The network administrator can log on.
Enter the login user name and login password.
D Click [Configuration], under [Security], click [Device Certificate].
E Click [Create].
F Make the necessary settings.
5
Reference
For details about the displayed items and selectable items, see Web Image
Monitor Help.
G Click [OK].
The setting is changed.
H Click [OK].
A security warning dialog box appears.
I Check the details, and then click [OK].
[Installed] appears under [Certificate Status] to show that a server certificate for
the printer has been installed.
J Log off from the machine.
Note
❒ Click [Delete] to delete the server certificate from the machine.
144
Protection Using Encryption
Creating the Server Certificate (Certificate Issued by a Certificate Authority)
Create the server certificate using Web Image Monitor.
This section explains the use of a certificate issued by a certificate authority as
the server certificate.
A Open a Web Image Monitor.
B Enter "http://(machine's-address)/" in the address bar to access the printer.
C Log onto the machine.
The network administrator can log on.
Enter the login user name and login password.
D Click [Configuration], under [Security], click [Device Certificate].
The [Device Certificate] page appears.
E Select the Server Certificate Number that you want to create.
F Click [Request].
G Make the necessary settings.
5
Reference
For details about the displayed items and selectable items, see Web Image
Monitor Help.
H Click [OK].
[Requesting] appears for [Certificate Status] in the Certificates area.
I Log off from the machine.
J Apply to the certificate authority for the server certificate.
The application procedure depends on the certificate authority. For details,
contact the certificate authority.
For the application, click the Web Image Monitor Details icon and use the information that appears in Certificate Details.
Note
❒ Using Web Image Monitor, you can create the contents of the server certificate but you cannot send the application.
❒ Click [Cancel Request] to cancel the request for the server certificate.
145
Enhanced Network Security
Installing the Server Certificate (Certificate Issued by a Certificate Authority)
Install the server certificate using Web Image Monitor.
This section explains the use of a certificate issued by a certificate authority as
the server certificate.
Enter the server certificate contents issued by the certificate authority.
A Open a Web Image Monitor.
B Enter "http://(machine's-address)/" in the address bar to access the printer.
C Log onto the machine.
The network administrator can log on.
Enter the login user name and login password.
D Click [Configuration], under [Security], click [Device Certificate].
The [Device Certificate] page appears.
5
E Select Server Certificate Number that you are going to install.
F Click [Install].
G Enter the contents of the server certificate.
In the [Certificate Request] box, enter the contents of the server certificate received from the certificate authority.
Reference
For details about the displayed items and selectable items, see Web Image
Monitor Help.
H Click [OK].
[Installed] appears under [Certificate Status] to show that a server certificate for
the machine has been installed.
I Log off from the machine.
146
Protection Using Encryption
Enabling SSL
After installing the server certificate in the machine, enable the SSL setting.
This procedure is used for a self-signed certificate or a certificate issued by a certificate authority.
A Open a Web Image Monitor.
B Enter "http://(machine's-address)/" in the address bar to access the printer.
C Log onto the machine.
The network administrator can log on.
Enter the login user name and login password.
D Click [Configuration], under [Security], click [SSL/TLS].
The [SSL/TLS] page appears.
E Click [Enable] for the protocol version used in [SSL/TLS].
F Select the encryption communication mode for [Permit SSL/TLS Communica-
5
tion].
G Click [OK].
The SSL setting is enabled.
H Click [OK].
I Log off from the machine.
Note
❒ If you set [Permit SSL/TLS Communication] to [Ciphertext Only], enter "https://(machine's address)/" to access the machine.
147
Enhanced Network Security
User Settings for SSL (Secure Sockets Layer)
If you have installed a server certificate and enabled SSL (Secure Sockets Layer),
you need to install the certificate on the user’s computer.
The network administrator must explain the procedure for installing the certificate to users.
If a warning dialog box appears while accessing the machine using the Web Image Monitor or IPP, start the Certificate Import Wizard and install a certificate.
A When the [Security Alert] dialog box appears, click [View Certificate].
The [Certificate] dialog box appears.
To be able to respond to inquiries from users about such problems as expiry
of the certificate, check the contents of the certificate.
B On the [General] tab, click [Install Certificate...].
Certificate Import Wizard starts.
5
C Install the certificate by following the Certificate Import Wizard instructions.
Note
❒ For details about how to install the certificate, see the Web Image Monitor
Help.
❒ If a certificate issued by a certificate authority is installed in the printer,
confirm the certificate store location with the certificate authority.
Reference
For details about where to store the certificate when accessing the machine
using IPP, see the SmartDeviceMonitor for Client Help.
148
Protection Using Encryption
Setting the SSL / TLS Encryption Mode
By specifying the SSL/TLS encrypted communication mode, you can change the
security level.
❖ Encrypted Communication Mode
Using the encrypted communication mode, you can specify encrypted communication.
Ciphertext Only
Allows encrypted communication only.
If encryption is not possible, the machine
does not communicate.
Ciphertext Priority
Performs encrypted communication if encryption is possible.
If encryption is not possible, the machine
communicates without it.
Ciphertext / Clear Text
Communicates with or without encryption,
according to the setting.
5
Setting the SSL / TLS Encryption Mode
This can be specified by the network administrator.
After installing the server certificate, specify the SSL/TLS encrypted communication mode. By making this setting, you can change the security level.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
149
Enhanced Network Security
C Press [Interface Settings].
D Press [Permit SSL/TLS Communication]
5
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
E Select the encrypted communication mode.
Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext/Clear Text] as the encrypted communication mode.
F Press [OK].
G Press the {User Tools/Counter} key.
Note
❒ The SSL/TLS encrypted communication mode can also be specified using
Web Image Monitor. For details, see the Web Image Monitor Help.
150
Protection Using Encryption
SNMPv3 Encryption
This can be specified by the network administrator.
When using SmartDeviceMonitor for Admin or another application to make
various settings, you can encrypt the data transmitted.
By making this setting, you can protect data from being tampered with.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
5
C Press [Interface Settings].
151
Enhanced Network Security
D Press [Permit SNMPv3 Communication].
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
E Press [Encryption Only].
5
F Press [OK].
G Press the {User Tools/Counter} key.
Note
❒ To use SmartDeviceMonitor for Admin for encrypting the data for specifying settings, you need to specify the network administrator’s [Encryption
Password] setting and [Encryption Key] in [SNMP Authentication Information] in
SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMPv3
Communication] on the machine.
❒ If network administrator’s [Encryption Password] setting is not specified, the
data for transmission may not be encrypted or sent.
Reference
For details about specifying the network administrator’s [Encryption Password] setting, see p.22 “Registering the Administrator”.
152
6. Specifying the Extended
Security Functions
Changing the Extended Security
Functions
As well as providing basic security through user authentication and the machine
access limits specified by the administrators, you can increase security by, for instance, encrypting transmitted data and data in the address book. If you need extended security, specify the machine’s extended security functions before using
the machine.
This section outlines the extended security functions and how to specify them.
For details about when to use each function, see the corresponding chapters.
Changing the Extended Security Functions
To change the extended security functions, display the extended security screen
as follows:
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
Procedure for Changing the Extended Security Functions
A Press the {User Tools/Counter} key.
B Press [System Settings].
153
Specifying the Extended Security Functions
C Press [Administrator Tools].
D Press [Extended Security].
6
E Press the setting you want to change, and change the setting.
F Press [OK].
G Press the {User Tools/Counter} key.
154
Changing the Extended Security Functions
Settings
❖ Driver Encryption Key
This can be specified by the network administrator. Encrypt the password
transmitted when specifying user authentication. The Driver Encryption Key
must match the encryption key set on the machine.
Reference
See the printer driver Help.
See the TWAIN driver Help.
❖ Encrypt Address Book
This can be specified by the user administrator. Encrypt the data in the machine’s address book.
Reference
See p.108 “Encrypting the Data in the Address Book”.
• On
• Off
6
Note
❒ Default: Off
❖ Restrict Use of Destinations
This can be specified by the user administrator.
The available scanner destinations are limited to the destinations registered
in the address book.
Reference
See p.33 “You cannot use more than one authentication method at the
same time.”.
A user cannot directly enter the destinations for transmission.
Limitation
❒ If you specify the setting to receive e-mails via SMTP, you cannot use [Restrict Use of Destinations].
Note
❒ The destinations searched by "Search LDAP" can be used.
• On
• Off
Note
❒ Default: Off
155
Specifying the Extended Security Functions
❖ Restrict Adding of User Destinations
This can be specified by the user administrator.
When "Restrict Use of Destinations" is set to [Off]. After entering a scanner destination directly, you can register it in the address book by pressing [Program
Dest.]. If [On] is selected for this setting, [Program Dest.] does not appear. If you
set [Restrict Adding of User Destinations] to [On], users can specify destinations directly, but cannot use [Program Dest.] to register data in the address book. When
this setting is made, only the user administrator can change the address book.
• On
• Off
Note
❒ Default: Off
❖ Restrict Display of User Information
This can be specified if user authentication is specified. When the job history
is checked using a network connection for which authentication is not available, all personal information can be displayed as "********". For example,
when someone not authenticated as an administrator checks the job history
using SNMP in SmartDeviceMonitor for Admin, personal information can be
displayed as "********" so users cannot be identified. Because no information
identifying registered users can be viewed, unauthorized users can be prevented from obtaining information about the registered files.
• On
• Off
6
Note
❒ Default: Off
❖ Enhance File Protection
This can be specified by the file administrator. By specifying a password, you
can limit operations such as printing, deleting, and sending files, and can prevent unauthorized people from accessing the files. However, it is still possible
for the password to be cracked.
By specifying "Enhance File Protection", files are locked and so become inaccessible if an invalid password is entered ten times. This can protect the files from
unauthorized access attempts in which a password is repeatedly guessed.
The locked files can only be unlocked by the file administrator. When "Enhance File Protection" is specified, ( ) appears at the screen.
Note
❒ If files are locked, you cannot select them even if the correct password is
entered.
• On
• Off
Note
❒ Default: Off
156
Changing the Extended Security Functions
❖ Settings by SNMPv1 and v2
This can be specified by the network administrator. When the machine is accessed using the SNMPv1, v2 protocol, authentication cannot be performed,
allowing machine administrator settings such as the paper setting to be
changed. If you select [Prohibit], the setting can be viewed but not specified
with SNMPv1, v2.
• Prohibit
• Do not Prohibit
Note
❒ Default: Do not Prohibit
❖ Restrict Use of Simple Encryption
This can be specified by the network administrator.
For example, this setting is set to [On] and you want to edit the address book
in User Management Tool or Address Management Tool in SmartDeviceMonitor for Admin, or you want to access the machine using DeskTopBinder
or the ScanRouter delivery software, enable SSL/TLS for encrypted communication. For details about specifying SSL/TLS, see p.149 “Setting the SSL /
TLS Encryption Mode”.
If you select [On], specify the encryption setting using the printer driver.
• On
• Off
6
Note
❒ Default: Off
Reference
For details, see the Printer driver Help.
For details, see the TWAIN driver Help.
157
Specifying the Extended Security Functions
❖ Authenticate Current Job
This can be specified by the machine administrator.
This setting lets you specify whether or not authentication is required for operations such as canceling jobs under the copier and printer functions.
If you select [Login Privilege], authorized users and the machine administrator
can operate the machine. When this is selected, authentication is not required
for users who logged on to the machine before [Login Privilege] was selected.
If you select [Access Privilege], users who canceled a copy or print job in
progress and the machine administrator can operate the machine.
Limitation
❒ Even if you select [Login Privilege] and log onto the machine, you cannot
cancel a copy or print job in progress if you are not authorized to use the
copy and printer functions.
❒ You can specify [Authenticate Current Job] only if [User Authentication Management] was specified.
• Login Privilege
• Access Privilege
• Off
6
Note
❒ Default: Off
❖ Password Policy
This can be specified by the user administrator.
The password policy setting is effective only if [Basic Auth.] is specified.
This setting lets you specify [Complexity Setting] and [Minimum Character No.] for
the password. By making this setting, you can limit the available passwords
to only those that meet the conditions specified in [Complexity Setting] and [Minimum Character No.].
If you select [Level 1], specify the password using a combination of two types
of characters selected from upper-case letters, lower-case letters, decimal
numbers, and symbols such as #.
If you select [Level 2], specify the password using a combination of three types
of characters selected from upper-case letters, lower-case letters, decimal
numbers, and symbols such as #.
• Level 1
• Level 2
• Off
• Minimum Character No.
Note
❒ Default: Off (0)
158
Changing the Extended Security Functions
❖ @Remote Service
This can be specified by the machine administrator.
Communication via HTTPS for @Remote Service cannot be received when
[Prohibit] is selected. If you select [Prohibit], you must inform your service representative.
• Prohibit
• Do not Prohibit
Note
❒ Default: Do not Prohibit
6
159
Specifying the Extended Security Functions
Other Security Functions
This section explains settings for preventing information leaks, and functions
that you can restrict to further increase security.
Scanner Function
❖ Print & Delete Scanner Journal
To prevent personal information in the transmission/delivery history being
printed automatically, set user authentication and the journal will specify [Do
not Print: Disable Send] automatically. If you do this, the scanner is autmatically
disabled when the journal history exceeds 250 transmissions/deliveries.
When this happens, click [Print Scanner Journal] or [Delete Scanner Journal]. To
print the scanner journal automatically, set [On] for "Print & Delete Scanner
Journal".
6
160
Limiting Machine Operation to Customers Only
Limiting Machine Operation to Customers
Only
The machine can be set so that operation is impossible without administrator authentication.
The machine can be set to prohibit operation without administrator authentication and also prohibit remote registration in the address book by a service representative.
We maintain strict security when handling customers data. Administrator authentication prevents us operating the machine without administrator permission.
Use the following settings.
• Service Mode Lock
Settings
❖ Service Mode Lock
This can be specified by the machine administrator. Service mode is used by
a customer engineer for inspection or repair. If you set the service mode lock
to [On], service mode cannot be used unless the machine administrator logs
onto the machine and cancels the service mode lock to allow the customer engineer to operate the machine for inspection and repair. This ensures that the
inspection and repair are done under the supervision of the machine administrator.
6
Specifying Service Mode Lock
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
161
Specifying the Extended Security Functions
C Press [Administrator Tools].
D Press [Service Mode Lock].
6
E Press [On] and then [OK].
A confirmation message appears.
F Press [Yes].
G Press the {User Tools/Counter} key.
162
Limiting Machine Operation to Customers Only
Canceling Service Mode Lock
For a customer engineer to carry out inspection or repair in service mode, the
machine administrator must log onto the machine and cancel the service mode
lock.
Preparation
For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”.
A Press the {User Tools/Counter} key.
B Press [System Settings].
6
C Press [Administrator Tools].
D Press [Service Mode Lock].
163
Specifying the Extended Security Functions
E Press [Off] and then press [OK].
F Press the {User Tools/Counter} key.
The customer engineer can switch to service mode.
6
164
7. Troubleshooting
Authentication Does Not Work Properly
This section explains what to do if a user cannot operate the machine because of
a problem related to user authentication. Refer to this section if a user comes to
you with such a problem.
A Message Appears
This section explains how to deal with problems if a message appears on the
screen during user authentication.
The most common messages are explained. If some other message appears, deal
with the problem according to the information contained in the message.
Messages
Causes
Solutions
You do not have the
privileges to use
this function.
The authority to use the function is not specified.
• If this appears when trying
to use a function:
The function is not specified in the address book
management setting as being available. The user administrator must decide
whether to authorize use
of the function and then
assign the authority.
• If this appears when trying
to specify a default setting:
The administrator differs
depending on the default
settings you wish to specify. Using the list of settings, the administrator
responsible must decide
whether to authorize use
of the function.
165
Troubleshooting
Messages
Causes
Solutions
Failed to obtain
URL.
The machine cannot connect
to the server or cannot establish communication.
Make sure the server's settings, such as the IP Address
and host name, are specified
correctly on the machine.
Make sure the host name of
the UA Server (Integration
Server) is specified correctly.
Authentication has
failed.
The machine is connected to
the server, but the UA service
is not responding properly.
Make sure the user authentication service is specified correctly.
SSL is not specified correctly
on the server.
Specify SSL using Authentication Manager.
Server authentication failed.
Make sure server authentication is specified correctly on
the machine.
The entered login user name
or login password is not correct
Inquire the user administrator
for the correct login user name
and login password.
Delete unnecessary user adThe number of users registered in the address book has dresses.
reached the maximum limit
allowed by Windows Authentication or , LDAP Authentication, or Integration Server
Authentication, so you cannot
register additional users.
7
166
Cannot access the authentication server when using Windows authentication , LDAP
Authentication, or Integration
Server Authentication.
A network or server error may
have occurred. Confirm with
the LAN administrator of the
network in use.
The selected file(s) You have tried to delete files
without the authority to do so.
contained file(s)
without access privileges. Only file(s)
with access privileges will be deleted.
Files can be deleted by the file
creator (owner) or file administrator. To delete a file which
you are not authorized to delete, contact the file creator
(owner).
Authentication Does Not Work Properly
Machine Cannot Be Operated
If the following conditions arise while users are operating the machine, provide
instructions on how to deal with them.
Condition
Cause
Solution
Cannot print using the printer
driver or connect using the
TWAIN driver.
User authentication has been
rejected.
Enter the login user name and
login password in the printer
driver.
Confirm the user name and
login name with the administrator of the network in use if
using Windows Authentication, LDAP Authentication, or
Integration Server Authentication.
Confirm with the user administrator if using basic authentication.
Cannot authenticate using the
TWAIN driver.
The encryption key specified
in the driver does not match
the machine’s driver encryption key.
Specify the driver encryption
key registered in the machine.
The values for SNMPv3 account, password and encryption algorithm on the printer
driver do not match the values
set on the machine.
Make sure settings for
SNMPv3 account, password
and encryption algorithm under the Network Connections
Tool are matched to those on
the machine.
Another user is logging on to
the machine.
Wait for the user to log off.
Authentication is taking time
because of operating conditions.
Make sure the LDAP server
setting is correct.
Authentication is not possible
while the machine is editing
the address book data.
Wait until editing of the address book data is complete.
See p.138 “Driver Encryption
Key”.
7
Make sure the network settings are correct.
167
Troubleshooting
Condition
Cause
Solution
After starting [User Management Tool] or [Address Management Tool] in
SmartDeviceMonitor for Admin and entering the correct
login user name and password, a message appears to
notify that an incorrect password has been entered.
"Restrict Simple Encryption"
is not set correctly. Alternatively, [SSL/TLS] has been enabled although the required
certificate is not installed in
the computer.
Set "Restrict Simple Encryption" to [On]. Alternatively,
enable [SSL/TLS], install the
server certificate in the machine, and then install the certificate in the computer.
Reference
See p.157 “Restrict Use of
Simple Encryption”.
Cannot log on to the machine
using [Document Server: Authentication/Encryption] in DeskTopBinder.
See p.149 “Setting the SSL
/ TLS Encryption Mode”.
Cannot access the machine using ScanRouter EX Professional V3 / ScanRouter EX
Enterprise V2.
Cannot connect to the ScanRouter delivery software.
The ScanRouter delivery software may not be supported by
the machine.
Update to the latest version of
the ScanRouter delivery software.
Cannot access the machine us- ScanRouter EX Professional V2 does not support user authentication.
ing ScanRouter EX Professional V2.
7
Cannot log off when using the
copying or scanner functions.
The original has not been
scanned completely.
When the original has been
scanned completely, press
[q], remove the original, and
then log off.
[Program Dest.] does not appear on the scanner screen for
specifying destinations.
[Restrict Adding of User Destinations] is set to [Off] in [Restrict
Use of Destinations] in [Extended
Security], so only the user administrator can register destinations in the address book.
Registration must be done by
the user administrator.
Stored files do not appear.
User authentication may have
been disabled while [All Users]
is not specified.
Re-enable user authentication,
and then enable [All Users] for
the files that did not appear.
For details about enabling [All
Users], see p.88 “Specifying
Access Permission for Stored
Files”.
Destinations specified using
the machine do not appear.
User authentication may have
been disabled while [All Users]
is not specified.
Re-enable user authentication,
and then enable [All Users] for
the destinations that did not
appear.
For details about enabling [All
Users], see p.105 “Protecting
the Address Book”.
168
Authentication Does Not Work Properly
Condition
Cause
Solution
Cannot print when user authentication has been specified.
User authentication may not
be specified in the printer
driver.
Specify user authentication in
the printer driver.
If you try to interrupt a job
while copying or scanning, an
authentication screen appears.
With this machine, you can
log off while copying or scanning. If you try to interrupt
copying or scanning after logging off, an authentication
screen appears.
Only the user who executed a
copying or scanning job can
interrupt it. Wait until the job
has completed or consult an
administrator or the user who
executed the job.
After you execute [Encrypt Address Book] the [Exit] message
does not appear.
The hard disk may be faulty.
Contact your service representative.
The file may be corrupt.
For details, see the printer
driver Help.
7
169
Troubleshooting
7
170
8. Appendix
Supervisor Operations
The supervisor can delete an administrator’s password and specify a new one.
If any of the administrators forget their passwords or if any of the administrators
change, the supervisor can assign a new password. If logged on using the supervisor’s user name and password, you cannot use normal functions or specify defaults. Log on as the supervisor only to change an administrator’s password.
Important
❒ The default login user name is "supervisor" and the login password is blank.
We recommend changing the login user name and login password.
❒ When registering login user names and login passwords, you can specify up
to 32 alphanumeric characters and symbols. Keep in mind that user names
and passwords are case-sensitive.
❒ Be sure not to forget the supervisor login user name and login password. If
you do forget them, a service representative will to have to return the machine to its default state. This will result in all data in the machine being lost
and the service call may not be free of charge.
Note
❒ You cannot specify the same login user name for the supervisor and the administrators.
❒ Using Web Image Monitor, you can log on as the supervisor and delete an administrator’s password or specify a new one.
171
Appendix
Logging on as the Supervisor
If administrator authentication has been specified, log on using the supervisor
login user name and login password. This section describes how to log on.
A Press the {Login/Logout} key.
AQI007S
B Press [Enter] for [Login User Name].
C Enter a login user name, and then press [OK].
Note
❒ When you assign the administrator for the first time, enter "supervisor".
D Press [Enter] for [Login Password].
E Enter a login password, and then press [OK].
8
Note
❒ When you assign the administrator for the first time, proceed to step F
without pressing [Enter].
F Press [Login].
172
Supervisor Operations
Logging off as the Supervisor
If administrator authentication has been specified, be sure to log off after completing settings. This section explains how to log off after completing settings.
A Press the {Login/Logout} key.
AQI007S
B Press [Yes].
Changing the Supervisor
A Press the {User Tools/Counter} key.
B Press [System Settings].
8
C Press [Administrator Tools].
D Press [Program / Change Administrator].
173
Appendix
E Under "Supervisor", click [Change].
F Press [Change] for the login user name.
G Enter the login user name, and then press [OK].
H Press [Change] for the login password.
I Enter the login password, and then press [OK].
J If a password reentry screen appears, enter the login password, and then
8
press [OK].
K Press [OK] twice.
L Press the {User Tools/Counter} key.
174
Supervisor Operations
Resetting an Administrator’s Password
Preparation
For details about logging on and logging off as the supervisor, see p.172 “Logging on as the Supervisor”, p.173 “Logging off as the Supervisor”.
A Press the {Login/Logout} key.
AQI007S
B Log on as the supervisor.
You can log on in the same way as an administrator.
C Press [System Settings].
D Press [Administrator Tools].
E Press [Program / Change Administrator].
F Press [Change] for the administrator you wish to reset.
G Press [Change] for the login password.
H Enter the login password, and then press [OK].
I If a password reentry screen appears, enter the login password, and then press [OK].
J Press [OK].
K Press [OK].
L Press the {User Tools/Counter} key.
8
175
Appendix
Machine Administrator Settings
The machine administrator settings that can be specified are as follows:
System Settings
The following settings can be specified.
❖ General Features
All the settings can be specified.
❖ Tray Paper Settings
All the settings can be specified.
❖ Timer Settings
All the settings can be specified.
❖ File Transfer
The following settings can be specified.
• Delivery Option
• SMTP Authentication
SMTP Authentication
User Name
E-mail Address
Password
Encryption
• POP before SMTP
Wait Time after Authent.
User Name
E-mail Address
Password
• Reception Protocol
• POP3 / IMAP4 Settings
Server Name
Encryption
• Administrator's E-mail Address
• Default User Name / Password (Send)
SMB User Name / SMB Password
FTP User Name / FTP Password
NCP User Name / NCP Password
• Program / Change / Delete E-mail Message
8
176
Machine Administrator Settings
❖ Administrator Tools
• Display / Print Counter
• Display / Clear / Print / Counter per User
Display Counter per User
Print Counter per User
• User Authentication Management
You can specify which authentication to use.
You can also edit the settings for each function.
• Administrator Authentication Management
Machine Management
• Program / Change Administrator
Machine Administrator
You can change the user name and the full-control user’s authority.
• Key Counter Management
• Extended Security
Restrict Display of User Information
Authentication Current Job
@Remote Service
• Capture Priority *1
Capture: Ownership
Capture: Public Priority
Capture: Owner Defaults
• Extended Features
• Program / Change / Delete LDAP Server
Name
Server Name
Search Base
Port Number
Use Secure Connection (SSL)
Authentication
Search Conditions
Search Options
• LDAP Search
• Service Mode Lock
• Auto Erase Memory Setting *2
• Erase All Memory *2
• Transfer Log Setting
• Fixed USB Port
*1
*2
8
File Format Converter option must be installed.
The DataOverwriteSecurity unit option must be installed.
177
Appendix
Copier / Document Server Features
The following settings can be specified.
❖ General Features
All the settings can be specified.
❖ Reproduction Ratio
All the settings can be specified.
❖ Edit
All the settings can be specified.
❖ Stamp
All the settings can be specified.
❖ Input / Output
All the settings can be specified.
❖ Administrator Tools
All the settings can be specified.
8
178
Machine Administrator Settings
Printer Features
The following settings can be specified.
❖ List / Test Print
All the settings can be specified.
❖ Maintenance
• Menu Protect
• List / Test Print Lock
❖ System
• Print Error Report
• Auto Continue
• Memory Overflow
• Rotate by 180 Degrees
• Initial Print Job List
• Memory Usage
• Copies
• Blank Page Print
• Reserved Job Waiting Time
• Printer Language
• Sub Paper Size
• Bypass Tray Setting Priority
• Edge to Edge Print
• Default Printer Language
• Tray Switching
8
❖ Host Interface
All the settings can be specified.
❖ PS Menu
All the settings can be specified.
❖ PDF Menu
All the settings can be specified.
179
Appendix
Scanner Features
The following settings can be specified.
❖ General Settings
All the settings can be specified.
❖ Scan Settings
All the settings can be specified.
❖ Send Settings
All the settings can be specified.
❖ Initial Settings
All the settings can be specified.
Extended Feature Setting Menu
The following settings can be specified.
❖ Extended Feature Settings
• Startup Setting
• Install
• Uninstall
• Change Allocation
• Extended Feature Info
8
❖ GL/2 & TIFF
• General Settings
All the settings can be specified.
• GL/2 Print Settings
All the settings can be specified.
❖ TIFF / CALS Settings
• All the settings can be specified.
180
Machine Administrator Settings
Settings via Web Image Monitor
The following settings can be specified.
❖ Top Page
• Reset Printer Job
• Reset Device
❖ Device Settings
• System
Spool Printing
Protect Printer Display Panel
Print Priority
Function Priority
Permit Firmware Update
Display IP Address on Device Display Panel
Paper Tray Priority (Copier)
Paper Tray Priority (Printer)
• Paper
All the settings can be specified.
• Timer
All the settings can be specified.
• Date/Time
All the settings can be specified.
• E-mail
All the settings can be specified.
• Auto E-mail Notification
All the settings can be specified.
• On demand E-mail Notification
All the settings can be specified.
• File Transfer
All the settings can be specified.
• User Authentication Management
All the settings can be specified.
• Administrator Authentication Management
Machine Administrator Authentication
Available Settings for Machine Administrator
• Program/Change Administrator
You can specify the following administrator settings as the machine administrator.
Login User Name
Login Password
Change Encryption Password
8
181
Appendix
• LDAP Server
All the settings can be specified.
• Firmware Update
Update
❖ Printer
• System
Print Error Report
Auto Continue
Memory Overflow
Initial Print Job List
Rotate by 180 Degrees
Copies
Black Page print
Reserved Job Waiting Time
Printer Language
Sub paper Size
Bypass Tray Setting Priority
Edge to Edge Print
Default Printer Language
Tray Switching
List / Test Print lock
I/O Buffer
I/O Timeout
Data Format
Resolution (PS Settings)
Resolution (PDF Settings)
Tray Parameters (PCS)
Tray Parameters (PS)
PDF Group Password
PDF Fixed Password
• Host Interface
All the settings can be specified.
8
❖ Interface Settings
• Parallel Interface
• USB
❖ Network
• SNMPv3
182
Machine Administrator Settings
❖ RC Gate
• Setup RC Gate
Confirm
• Remote Communication Gate proxy Server
Remote Communication Gate proxy Server
proxy Address
Port Number
User Name
Password
❖ Webpage
• Download Help File
OS
language
Settings via SmartDeviceMonitor for Admin
The following settings can be specified.
❖ Device Properties
• Reset Device
• Reset Current Job
• Reset All Jobs
❖ User Management Tool
The following settings can be specified.
• User Page Count
• Access Control List
• Reset User Counters
8
183
Appendix
Network Administrator Settings
The network administrator settings that can be specified are as follows:
System Settings
The following settings can be specified.
❖ Interface Settings
• Network
All the settings can be specified.
• IEEE 802.11b *1
All the settings can be specified.
Note
❒ If DHCP is set to [On], the settings that are automatically obtained via
DHCP cannot be specified.
*1
The IEEE802.11b interface unit option must be installed.
❖ File Transfer
• SMTP Server
Server Name
Port No.
• E-mail Communication Port
POP3
IMAP4
• E-mail Reception Interval
• Scanner Resend Interval Time
• Number of Scanner Recsends
• Auto Specify Sender Name
• Max. Reception E-mail size
• E-mail Storage in Server
8
184
❖ Administrator Tools
• Administrator Authentication Management
Network Management
• Program / Change Administrator
Network Administrator
You can specify the user name and change the full-control user’s authority.
• Extended Security
Driver Encryption Key
Settings by SNMP V1 and V2
Restrict Use of Simple Encryption
• Network Security Level
Network Administrator Settings
Scanner Features
The following settings can be specified.
❖ Send Settings
• Max. E-mail Size
• Divide & Send E-mail
Extended Feature Setting Menu
The following settings can be specified.
❖ Extended Feature Settings
• Startup Setting
• Install
• Uninstall
• Change Allocation
• Extended Feature Info
❖ GL/2 & TIFF
• General Settings
All the settings can be specified.
• GL/2 Print Settings
All the settings can be specified.
8
❖ TIFF / CALS Settings
• All the settings can be specified.
185
Appendix
Settings via Web Image Monitor
The following settings can be specified.
❖ Device Settings
• System
Device Name
Comment
Location
• E-mail
All the settings can be specified.
• Auto E-mail Notification
Groups to Notify
• Program/Change Administrator
You can specify the following administrator settings for the machine administrator.
Login User Name
Login Password
Change Encryption Password
• Administrator Authentication Management
Network Administrator Authentication
Available Settings for Network Administrator
❖ Interface
• Change Interface
• Wireless LAN *1
Communication Mode
SSID
Channel
Security Type
8
*1
186
The IEEE802.11b interface unit option must be installed.
Network Administrator Settings
❖ Network
• IPv4
All the settings can be specified.
• IPv6
All the settings can be specified.
• NetWare
All the settings can be specified.
• AppleTalk
All the settings can be specified.
• SMB
All the settings can be specified.
• SNMP
All the settings can be specified.
• SNMPv3
All the settings can be specified.
• SSDP
All the settings can be specified.
• Bonjour
Bonjour
Computer Name
Location
Print Order Priority (DIPRINT)
Print Order Priority (LPR)
Print Order Priority (IPP)
8
❖ Webpage
All the settings can be specified.
❖ Security
• Network Security
All the settings can be specified.
• Access Control
All the settings can be specified.
• IPP Authentication
All the settings can be specified.
• SSL/TLS
All the settings can be specified.
• ssh
All the settings can be specified.
• Site Certificates
All the settings can be specified.
• Device Certificates
All the settings can be specified.
187
Appendix
Settings via SmartDeviceMonitor for Admin
The following settings can be specified.
❖ NIB Setup Tool
All the settings can be specified.
8
188
File Administrator Settings
File Administrator Settings
The file administrator settings that can be specified are as follows:
System Settings
The following settings can be specified.
❖ Administrator Tools
• Administrator Authentication Management
File Management
• Program / Change Administrator
File Administrator
• Extended Security
Enhance File Protection
• Auto Delete File in Document Server
• Delete All Files in Document Server
Printer Features
The following settings can be specified.
❖ Maintenance
• Delete All Temporary Print Jobs
• Delete All Stored Print Jobs
8
❖ System
• Auto Delete Temporary Print Jobs
• Auto Delete Stored Print Jobs
189
Appendix
Extended Feature Setting Menu
The following settings can be specified.
❖ Extended Feature Settings
• Startup Setting
• Install
• Uninstall
• Change Allocation
• Extended Feature Info
❖ GL/2 & TIFF
• General Settings
All the settings can be specified.
• GL/2 Print Settings
All the settings can be specified.
❖ TIFF / CALS Settings
• All the settings can be specified.
8
190
File Administrator Settings
Settings via Web Image Monitor
The following settings can be specified.
❖ Top Page
Reset Printer Job
❖ Document Server
All the settings can be specified.
❖ Printer: Print Jobs
• Printer
Print Jobs *1
*1
The file administrator can select [Delete], [Delete Password], and [Unlock Job]. The
file administrator cannot print files.
❖ Device Settings
• Auto E-mail Notification
Groups to Notify
• Administrator Authentication Management
File Administrator Authentication
Available Settings for File Administrator
• Program/Change Administrator
You can specify the following administrator settings for the file administrator.
Login User Name
Login Password
Change Encryption Password
• Administrator Authentication Management
File Administrator Authentication
Available Settings for File Administrator
8
❖ Printer
• Auto Delete Temporary Print Jobs
• Auto Delete Stored Print Jobs
❖ Webpage
• Download Help File
191
Appendix
User Administrator Settings
The user administrator settings that can be specified are as follows:
System Settings
The following settings can be specified.
❖ Administrator Tools
• Administrator Authentication Management
User Management
• Program / Change Administrator
User Administrator
• Extended Security
Restrict Use of Destinations
Restrict Adding of User Destinations
Encrypt Address Book
Password Policy
• Print Address Book: Destination List
• Address Book Management
• Address Book: Program / Change / Delete Group
• Address Book: Program / Change / Delete Transfer Request
• Address Book: Change Order
• Address Book: Edit Title
• Address Book: Switch Title
8
192
User Administrator Settings
Extended Feature Setting Menu
The following settings can be specified.
❖ Extended Feature Settings
• Startup Setting
• Install
• Uninstall
• Change Allocation
• Extended Feature Info
❖ GL/2 & TIFF
• General Settings
All the settings can be specified.
• GL/2 Print Settings
All the settings can be specified.
❖ TIFF / CALS Settings
• All the settings can be specified.
8
193
Appendix
Settings via Web Image Monitor
The following settings can be specified.
❖ Address Book
All the settings can be specified.
❖ Device Settings
• Auto E-mail Notification
Groups to Notify
• Administrator Authentication Management
File Administrator Authentication
Available Settings for File Administrator
• Program/Change Administrator
The user administrator settings that can be specified are as follows:
Login User Name
Login Password
Change Encryption Password
❖ Webpage
• Download Help File
❖ Extended Feature Settings
• Startup Settings
• Extended Feature Info
• Install
• Uninstall
• Change Allocation
• Administrator Tools
• Copy Extended Features
8
Settings via SmartDeviceMonitor for Admin
The following settings can be specified.
❖ Address Management Tool
All the settings can be specified.
❖ User Management Tool
• Restrict Access To Device
• Add New User
• Delete User
• User Properties
194
Document Server File Permissions
Document Server File Permissions
The authorities for using the files stored in Document Server are as follows:
The authority designations in the list indicate users with the following authorities.
• Read-only
This is a user assigned "Read-only" authority.
• Edit
This is a user assigned "Edit" authority.
• Edit / Delete
This is a user assigned "Edit / Delete" authority.
• Full Control
This is a user granted full control.
• Owner
This is a user who can store files in the machine and authorize other users to
view, edit, or delete those files.
• File Administrator
This is the file administrator.
❍ =Granted authority to operate.
- =Not granted authority to operate.
User
Viewing
Details
about
Stored
Files
Print/
ViewTransing
Thumb- mission
nails
Changing
Information
about
Stored
Files
Deleting
Files
Specifying
File
Password
Specify- Unlocking
ing
Permis- Files
sions
for
Users/
Groups
Readonly
❍
❍
❍
-
-
-
-
-
Edit
❍
❍
❍
❍
-
-
-
-
Edit /
Delete
❍
❍
❍
❍
❍
-
-
-
Full
Control
❍
❍
❍
❍
❍
-
❍
-
Owner
❍ *1
❍ *1
❍ *1
❍ *1
❍ *1
❍
❍
-
File
Administrator
❍
❍
-
-
❍
❍
❍
❍
*1
8
This setting can be specified by the owner.
195
Appendix
The Privilege for User Account Settings in
the Address Book
The authorities for using the address book are as follows:
The authority designations in the list indicate users with the following authorities.
• Read-only
This is a user assigned "Read-only" authority.
• Edit
This is a user assigned "Edit" authority.
• Edit / Delete
This is a user assigned "Edit / Delete" authority.
• Full Control
This is a user granted full control.
• Registered User
There are users with personal information registered in the address book
have a ligin password and user name.
• User Administrator
This is the user administrator.
8
196
The Privilege for User Account Settings in the Address Book
❍ =You can view and change the setting.
U =You can view the setting.
- =You cannot view or specify the setting.
Settings
User
Readonly
Edit
Edit /
Delete
RegisUser
Adminis- tered
User
trator
Full
Control
Registration No.
U
❍
❍
❍
❍
❍
Key Display
U
❍
❍
❍
❍
❍
Name
U
❍
❍
❍
❍
❍
Select Title
U
❍
❍
❍
❍
❍
User Code
-
-
-
❍
-
-
Login User
Name
-
-
-
❍
❍
-
Login
Password
-
-
-
❍ *1
❍ *1
-
SMTP
Authentication
-
-
-
❍ *1
❍ *1
-
Folder
Authentication
U
❍
❍
❍
❍
-
LDAP
Authentication
-
-
-
❍ *1
❍ *1
-
Available
Functions
-
-
-
❍
U
-
Use
Name as
U
U
U
❍
❍
U
Protection Code
-
-
-
❍ *1
❍ *1
-
Protection
Object
U
U
U
❍
❍
U
Protect
Dest.:
Permissions for
Users/
Groups
-
-
-
❍
❍
❍
Protect
File(s):
Permissions for
Users/
Groups
-
-
-
❍
❍
❍
Auth.
Info
Protection
8
197
Appendix
Settings
User
Readonly
198
Edit /
Delete
RegisUser
Adminis- tered
User
trator
Full
Control
E-mail
Address
E-mail
Address
U
❍
❍
❍
❍
❍
Folder
Destination
SMB/
FTP/NCP
U
❍
❍
❍
❍
❍
SMB:
Path
U
❍
❍
❍
❍
❍
FTP:
Port No.
U
❍
❍
❍
❍
❍
FTP:
Server
Name
U
❍
❍
❍
❍
❍
FTP: Path
U
❍
❍
❍
❍
❍
NCP:
Path
U
❍
❍
❍
❍
❍
NCP:
Connection type
U
❍
❍
❍
❍
❍
*1
8
Edit
You can only enter the password.
User Settings
User Settings
If you have specified administrator authentication, the available functions and
settings depend on the menu protect setting.
The following settings can be specified by someone who is not an administrator.
❍ =You can view and change the setting.
U =You can view the setting.
- =You cannot view or specify the setting.
Note
❒ Settings that are not in the list can only be viewed, regardless of the menu protect level setting.
8
199
Appendix
Copier / Document Server Features
The default for [Menu Protect] is [Level 2].
Tab Names
Settings
Menu Protect
Off
General Features Auto Image Density Priority
Reproduction
Ratio
Edit
8
200
Level 1 Level 2
❍
U
U
Copy Quality
❍
❍
U
Image Density
❍
❍
U
Max. Copy Quantity
❍
U
U
Auto Tray Switching
❍
U
U
Job End Call
❍
U
U
User Reduce / Enlarge Ratio
❍
U
U
Reproduction Ratio
❍
U
U
Reduce / Enlarge Ratio Priority
❍
U
U
User Auto Reduce / Enlarge A0–A4
❍
U
U
User Auto Reduce / Enlarge B1–B4
❍
U
U
Adjust Position
❍
U
U
Erase Border Width
❍
U
U
Erase Original Shadow in Combine
❍
❍
U
Image Repeat Separation Line
❍
❍
U
Double Copies Separation Line
❍
❍
U
Separation Line in Combine
❍
❍
U
Copy Order in Combine
❍
❍
U
Program / Delete Format
❍
❍
U
Margin Adjustment Priority
❍
U
U
Partial Copy Size
❍
U
U
User Settings
Tab Names
Settings
Menu Protect
Off
Stamp
Level 1 Level 2
BackSize
ground
Density
Numbering
❍
❍
U
❍
❍
U
Preset
Stamp
❍
❍
U
❍
U
U
❍
❍
U
❍
❍
U
❍
❍
U
❍
❍
U
❍
❍
U
❍
❍
U
Stamp Language
Stamp Priority
Stamp Format: COPY
*1
Stamp Format: URGENT
*1
Stamp Format: PRIORITY *1
Stamp Format: For Your Info. *1
Stamp Format: PRELIMINARY
*1
Stamp Format: For Internal Use Only
❍
❍
U
*1
❍
❍
U
Program / Delete Stamp
❍
❍
U
Stamp Format: 1
❍
❍
U
Stamp Format: 2
❍
❍
U
Stamp Format: 3
❍
❍
U
Stamp Format: 4
❍
❍
U
Format
❍
U
U
Font
❍
❍
U
Size
❍
❍
U
Superimpose
❍
❍
U
Stamp Setting *1
❍
❍
U
Stamp Format: CONFIDENTIAL
Stamp Format: DRAFT
User
Stamp
Date
Stamp
*1
*1
8
201
Appendix
Tab Names
Settings
Menu Protect
Off
Stamp
Page
Numbering
Stamp Format
❍
U
U
Font
❍
❍
U
Size
❍
❍
U
Page Numbering in Combine
❍
❍
U
Stamp Position: P1, P2… *1
❍
❍
U
Stamp Position: 1/5, 2/5… *1
❍
❍
U
Stamp Position: -1-, -2-…
*1
❍
❍
U
Stamp Position: P.1,P.2...
*1
❍
❍
U
❍
❍
U
❍
❍
U
Superimpose
❍
❍
U
Page Numbering Initial Letter
❍
❍
U
Rotate Sort: Auto Paper Continue
❍
U
U
Stamp Position: 1, 2…
*1
Stamp Position: 1-1, 1-2…
Input / Output
*1
Level 1 Level 2
*1
You can adjust the print position but not specify it.
Printer Functions
The default for [Menu Protect] is [Level 2].
8
❖ Normal Printer Screen
Functions
Menu Protect
Off
202
Level 1 Level 2
Print Jobs
❍
❍
❍
Displaying a list of Spool Jobs
❍
❍
❍
User Settings
❖ Printer Features
Tab Names
Settings
Menu Protect
Off
Maintenance
List/Test Print
System
Host Interface
PS Menu
PDF Menu
Level 1 Level 2
Delete All Temporary Print Jobs
-
-
-
Delete All Stored Print Jobs
-
-
-
Multiple Lists
❍
❍
❍
Configuration Page
❍
❍
❍
Error log
❍
❍
❍
Menu List
❍
❍
❍
PS Configuration / Front Page
❍
❍
❍
PDF Configuration / Front Page
❍
❍
❍
Hex Dump
❍
❍
❍
Print Error Report
❍
U
U
Auto Continue
❍
U
U
Memory Overflow
❍
U
U
Rotate by 180 Degrees
❍
U
U
Auto Delete Temporary Print Jobs
❍
U
U
Auto Delete Stored Print Jobs
❍
U
U
Initial Print Job List
❍
U
U
Memory Usage
❍
U
U
Copies
❍
U
U
Blank Page Print
❍
U
U
Reserved Job Waiting Time
❍
U
U
Printer Language
❍
U
U
Sub Paper Size
❍
U
U
Bypass Tray Setting Priority
❍
U
U
Edge to Edge Print
❍
U
U
Default Printer Language
❍
U
U
Tray Switching
❍
U
U
I/O Buffer
❍
U
U
I/O Timeout
❍
U
U
Data Format
❍
U
U
Resolution
❍
U
U
Change PDF Password
❍
U
U
PDF Group Password
❍
U
U
Resolution
❍
U
U
8
203
Appendix
Scanner Features
The default for [Menu Protect] is [Level 2].
Tab Names
Settings
Menu Protect
Off
General Settings
8
204
Level 1 Level 2
Switch Title
❍
U
Update Delivery Server Destination List
❍
❍
-
Search Destination
❍
U
U
TWAIN Standby Time
❍
U
U
Destination List Display Priority 1
❍
U
U
Destination List Display Priority 2
❍
U
U
Print & Delete Scanner Journal
❍
U
U
Print Scanner Journal
❍
-
-
Delete Scanner Journal
❍
-
-
U
Scan Settings
Next Original Wait Setting
❍
U
U
Send Settings
Compression (Black & White)
❍
❍
U
Insert Additional E-mail Info.
❍
❍
U
No. of Digits for Single Page File
❍
❍
U
Stored File E-mail Method
❍
❍
U
User Settings
System Settings
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to the
user depend on whether or not "Available Settings" has been specified.
Tab Names
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Availa"Available Setble Settings" has tings" has
been
not been
specified. specified.
❍
❍
U
Panel Key Sound
❍
❍
U
Warm-up Beeper
❍
❍
U
Copy Count Display
❍
❍
U
Function Priority
❍
❍
U
Print Priority
❍
❍
U
Function Reset Timer
❍
❍
U
Interleave Print
❍
❍
U
Output: Printer
❍
❍
U
Original Feed Delay 1
❍
❍
U
Original Feed Delay 2
❍
❍
U
Feed Start Method
❍
❍
U
Fine Ratio Adjustment : Copier
❍
❍
U
Fine Ratio Adjustment : Printer
❍
❍
U
Adjust Scan Position
❍
❍
U
System Status / Job List Display Time
❍
❍
U
Key Repeat
❍
❍
U
General Features Program / Change / Delete User Text
8
205
Appendix
Tab Names
Tray Paper
Settings
Timer Settings
8
Interface
Settings
Network
Administrator
authentication
has not
been
specified.
Settings
"Availa"Available Setble Settings" has tings" has
been
not been
specified. specified.
Paper Tray Priority: Copier
❍
❍
U
Paper Tray Priority: Printer
❍
❍
U
Tray Paper Size: Tray 1-3
❍
❍
U
Printer Bypass Paper Size
❍
❍
U
Paper Type: Paper Bypass
❍
❍
U
Paper Type: Tray 1-3
❍
❍
U
Paper Thickness : Paper Tray
❍
❍
U
Paper Thickness : Paper Bypass
❍
❍
U
Paper Volume
❍
❍
U
Auto Off Timer
❍
❍
U
Energy Saver Timer
❍
❍
U
Panel Off Timer
❍
❍
U
System Auto Reset Timer
❍
❍
U
Copier/ Document Server Auto Reset Timer
❍
❍
U
Printer Auto Reset Timer
❍
❍
U
Scanner Auto Reset Timer
❍
❍
U
Set Date
❍
❍
U
Set Time
❍
❍
U
Auto Logout Timer
❍
❍
U
Machine IPv4 Address *1
❍
❍
U
IPv4 Gateway Address
❍
❍
U
❍
❍
U
IPv6 Gateway Address
❍
❍
U
IPv6 Stateless Address Autoconfiguration
❍
❍
U
*1
❍
❍
U
DDNS Configuration
❍
❍
U
❍
❍
U
❍
❍
U
Effective Protocol
❍
❍
U
NCP Delivery Protocol
❍
❍
U
Machine IPv6 Address
DNS Configuration
Domain Name
*1
WINS Configuration
206
Administrator authentication has
been specified.
*1
*1
User Settings
Tab Names
Interface
Settings
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Availa"Available Setble Settings" has tings" has
been
not been
specified. specified.
NW Frame Type
❍
❍
U
SMB Computer Name
❍
❍
-
SMB Work Group
❍
❍
-
Ethernet Speed
❍
❍
U
LAN Type
❍
❍
U
Ping Command
❍
❍
U
Permit SNMP v3 Communication
❍
❍
U
Permit SSL / TLS Communication
❍
❍
U
Host Name
❍
❍
-
Machine Name
❍
❍
-
Parallel Timing
❍
❍
U
Parallel Communication Speed
❍
❍
U
Selection Signal Status
❍
❍
U
Input Prime
❍
❍
U
Bidirectional Communication
❍
❍
U
Signal Control
❍
❍
U
Communication Mode
IEEE
802.11b
Transmission Speed
*5
❍
❍
U
❍
❍
U
SSID Setting
❍
❍
U
Restore Factory Defaults
❍
❍
-
Channel
❍
❍
U
Security Method
❍
❍
U
❍
❍
U
Network
Parallel
Interface *7
Print List
8
207
Appendix
Tab Names
File Transfer
Administrator
authentication
has not
been
specified.
Settings
❍
U
❍
❍
U
❍
❍
U
POP before SMTP
❍
❍
U
Reception Protocol
❍
❍
U
POP3 / IMAP4 Settings
❍
❍
U
Administrator's E-mail Address
❍
❍
-
E-mail Communication Port
❍
❍
U
E-mail Reception Interval
❍
❍
U
Max. Reception E-mail Size
❍
❍
U
❍
❍
U
SMTP Authentication
*4
E-mail Storage in Server
❍
❍
U
Program / Change / Delete E-mail Message
❍
❍
U
Auto Specify Sender Name
❍
❍
U
Scanner Resend Interval Time
❍
❍
U
Number of Scanner Resends
❍
❍
U
Address Book Management
❍
❍
U
Address Book: Program / Change / Delete
Group
❍
❍
U
Address Book: Change Order
❍
❍
U
Print Address Book: Destination List
❍
❍
U
Address Book: Edit Title
❍
❍
U
Address Book: Switch Title
❍
❍
U
Back Up / Restore Address Book
❍
❍
U
Display / Print Counter
❍
❍
U
Display / Clear / Print Counter per User
❍
❍
U
User Authentication Management
❍
❍
U
Administrator Authentication Management
❍
❍
U
Key Counter Management
❍
❍
U
External Charge Unit Management
❍
❍
U
Enhanced External Charge Unit Management
❍
❍
U
Default User Name / Password (Send)
Administrator
Tools
208
"Availa"Available Setble Settings" has tings" has
been
not been
specified. specified.
❍
Delivery Option *3
SMTP Server
8
Administrator authentication has
been specified.
*4
User Settings
Tab Names
Administrator
Tools
Administrator
authentication
has not
been
specified.
Settings
❍
❍
U
Auto Delete File in Document Server
❍
❍
U
Delete All Files in Document Server
❍
❍
-
*6
❍
❍
U
❍
❍
U
Program / Change / Delete LDAP Server *4
❍
❍
U
LDAP Search
❍
❍
U
Firmware Version
❍
❍
U
Auto Erase Memory Setting *8
❍
❍
U
Erase All Memory *8
❍
❍
U
Transfer Log Setting
❍
❍
U
Fixed USB Port
❍
❍
U
Capture: Delete All Unsent Files
*2
*3
*4
*5
*6
*7
*8
"Availa"Available Setble Settings" has tings" has
been
not been
specified. specified.
Extended Security
Capture Priority
*1
Administrator authentication has
been specified.
*6
If you select [Auto-Obtain (DHCP)], you can only view the setting.
You can only view the encryption setting.
You can only view Main Delivery Server IP Address and Sub Delivery Server IP Address.
You can only specify the password.
The IEEE802.11b interface unit option must be installed.
File Format Converter option must be installed.
The IEEE 1284 interface board option must be installed.
The data overwrite security unit option must be installed.
8
209
Appendix
Web Image Monitor Setting
❖ Device Settings
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to
the user depend on whether or not "Available Settings" has been specified.
Category
System
8
Paper
210
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
Device Name
❍
❍
U
Comment
❍
❍
U
Location
❍
❍
U
Spool Printing
❍
❍
U
Protect Printer Display Panel
❍
-
-
Print Priority
❍
-
-
Function Reset Timer
❍
-
-
Permit Firmware Update
❍
-
-
Display IP Adress on Display Panel
❍
-
-
Paper Tray Priority : Copier
❍
❍
U
Paper Tray Priority : Printer
❍
❍
U
Tray1 - Paper Size
❍
❍
U
Tray1 - Paper Type
❍
❍
U
Tray1 - Apply Auto Paper Select
❍
❍
U
Tray2 - Paper Size
❍
❍
U
Tray2 - Paper Type
❍
❍
U
Tray2 - Apply Auto Paper Select
❍
❍
U
Tray3 - Paper Size
❍
❍
U
Tray3 - Paper Type
❍
❍
U
Tray3 - Apply Auto Paper Select
❍
❍
U
Bypass Tray - Paper Size
❍
❍
U
Bypass Tray - Custom Paper Size
❍
❍
U
Bypass Tray - Paper Type
❍
❍
U
User Settings
Category
Date/Time
Timer
Logs
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
Set Date
❍
❍
U
Set Time
❍
❍
U
SNTP Server Address
❍
❍
U
SNTP Polling Interval
❍
❍
U
Time Zone
❍
❍
U
Auto Off Timer
❍
❍
U
Energy Saver Timer
❍
❍
U
Panel Off Timer
❍
❍
U
System Auto Reset Timer
❍
❍
U
Copier/ Document Server Auto Reset Timer
❍
❍
U
Scanner Auto Reset Timer
❍
❍
U
Printer Auto Reset Timer
❍
❍
U
Auto Logout Timer
❍
❍
U
Collect Job Logs
❍
❍
U
Collect Access Logs
❍
❍
U
8
211
Appendix
Category
E-mail
8
212
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
Administrator E-mail Address
❍
❍
U
Reception Protocol
❍
❍
U
E-mail Reception Interval
❍
❍
U
Max. Reception E-mail Size
❍
❍
U
E-mail Storage in Server
❍
❍
U
SMTP Server Name
❍
❍
U
SMTP Port No.
❍
❍
U
SMTP Authentication
❍
❍
U
SMTP Auth. E-mail Address
❍
❍
U
SMTP Auth. User Name
❍
❍
-
SMTP Auth. Password *1
❍
❍
-
SMTP Auth. Encryption
❍
❍
U
POP before SMTP
❍
❍
U
POP E-mail Address
❍
❍
U
POP User Name
❍
❍
-
POP Password *1
❍
❍
-
Timeout setting after POP Auth.
❍
❍
U
POP3/IMAP4 Server Name
❍
❍
U
POP3/IMAP4 Encryption
❍
❍
U
POP3 Reception Port No.
❍
❍
U
IMAP4 Reception Port No.
❍
❍
U
SMTP Reception Port No.
❍
❍
U
E-mail Notification E-mail Address
❍
❍
U
Receive E-mail Notification
❍
❍
-
E-mail Notification User Name
❍
❍
-
E-mail Notification Password
❍
❍
-
User Settings
Category
Auto E-mail
Notification
On-demand
E-mail
Notification
File Transfer
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
Notification Message
❍
❍
U
Group 1–4 Address List
❍
❍
U
Call Service
❍
❍
U
Out of Toner
❍
❍
U
Toner Almost Empty
❍
❍
U
Waste Toner Bottle is Full
❍
❍
U
Waste Toner Bottle is Almost Full
❍
❍
U
Paper Misfeed
❍
❍
U
Cover Open
❍
❍
U
Out of Paper
❍
❍
U
Paper Tray Error
❍
❍
U
Output Tray Full
❍
❍
U
Detailed Settings of Each Item
❍
❍
U
Notification Subject
❍
❍
U
Notification Message
❍
❍
U
Restriction to System Config. Info.
❍
❍
U
Restriction to Network Config. Info.
❍
❍
U
Restriction to Printer Config. Info.
❍
❍
U
Restriction to Supply Info.
❍
❍
U
Restriction to Device Status Info.
❍
❍
U
Receivable E-mail Address/Domain Name
❍
❍
U
E-mail Language
❍
❍
U
SMB User Name
❍
❍
-
SMB Password *1
❍
❍
-
FTP User Name
❍
❍
-
*1
❍
❍
-
NCP User Name
❍
❍
-
NCP Password *1
❍
❍
-
FTP Password
8
213
Appendix
Category
User
Authentication
Management
8
*1
214
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
User Authentication Management
❍
❍
U
User Code Authentication - Printer Job Authentication
❍
❍
U
User Code - Available Functions
❍
❍
U
Basic Authentication - Printer Job Authentication
❍
❍
U
Basic Authentication - Available Functions
❍
❍
U
Windows Authentication - Printer Job Authentication
❍
❍
U
Windows Authentication - Domain Name
❍
❍
U
Windows Authentication - Group Settings
for Windows Authentication
❍
❍
U
Windows Authentication - SSL
❍
❍
U
LDAP Authentication - Printer Job Authentication
❍
❍
U
LDAP Authentication - LDAP Authentication
❍
❍
U
LDAP Authentication - Login Name Attribute
❍
❍
U
LDAP Authentication - Unique Attribute
❍
❍
U
LDAP Authentication - Available Functions
❍
❍
U
Integration Server Authentication - Printer
Job Authentication
❍
❍
U
Integration Server Authentication - SSL
❍
❍
U
Integration Server Authentication - Integration Server Name
❍
❍
U
Integration Server Authentication - Authentication Type
❍
❍
U
Integration Server Authentication - Obtain
URL
❍
❍
U
Integration Server Authentication - Domain
Name
❍
❍
U
Integration Server Authentication - Group Settings for Integration Server Authentication
❍
❍
U
You can only specify the password.
User Settings
❖ Printer
The default for [Menu Protect] is [Level 2].
Category
Settings
Menu Protect
System
Print Error Report
❍
U
U
Auto Continue
❍
U
U
Memory Overflow
❍
U
U
Memory Usage
❍
U
U
Auto Delete Temporary Print Job
❍
U
U
Auto Delete Stored Print Job
❍
U
U
Initial Print Job List
❍
U
U
Rotate By 180 Degrees
❍
U
U
Copies
❍
U
U
Blank Page Print
❍
U
U
Reserved Job Waiting Time
❍
U
U
Printer Language
❍
U
U
Sub Paper Size
❍
U
U
Default Printer Language
❍
U
U
Bypass Tray Setting Priority
❍
U
U
Edge to Edge Print
❍
U
U
Off
Level 1 Level 2
Tray Switching
❍
U
U
Host Interface
I/O Buffer
❍
U
U
I/O Timeout
❍
U
U
PS Settings
Data Format
❍
U
U
Resolution
❍
U
U
PDF Settings
Resolution
❍
-
-
PDF Temporary
Password
❍
❍
❍
PDF Temporary Password
❍
❍
❍
PDF Group
Password
Current PDF Group Password
❍
-
-
PDF Fixed
Password
New PDF Group Password
❍
-
-
Confirm PDF Group Password
❍
-
-
Current PDF Fixed Password
❍
-
-
New PDF Fixed Password
❍
-
-
Confirm PDF Fixed Password
❍
-
-
8
215
Appendix
❖ Interface
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to
the user depend on whether or not "Available Settings" has been specified.
Category
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
Network
Change Interface
U
U
-
Wireless LAN
Setting *1
Change Interface
❍
❍
-
8
Parallel
Interface *2
USB
*1
*2
216
Settings
Communication Mode
❍
❍
U
SSID
❍
❍
U
Channel
❍
❍
U
Security Type
-
-
U
WEP Authentication
❍
❍
U
WEP Key
❍
❍
U
WPA - PSK / WPA2 - PSK
❍
❍
U
WPA / WPA2 User Name
❍
❍
U
WPA / WPA2 Domain Name
❍
❍
U
WPA Cliant Certification
U
U
-
Password
-
-
-
Phase 2 User Name
-
-
-
Server ID
❍
❍
U
Parallel Timing
❍
❍
U
Parallel Communication Speed
❍
❍
U
Selection Signal Status
❍
❍
U
Input Prime
❍
❍
U
Bidirectional Communication
❍
❍
U
USB
❍
❍
U
The IEEE802.11b interface unit option must be installed.
The IEEE 1284 interface board option must be installed.
User Settings
❖ Network
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to
the user depend on whether or not "Available Settings" has been specified.
Category
IPv4
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
IPv4
❍
❍
U
Host Name
❍
❍
U
DHCP
❍
❍
U
Domain Name
❍
❍
U
IPv4 Address
❍
❍
U
Subnet Mask
❍
❍
U
DDNS
❍
❍
U
WINS
❍
❍
U
Primary WINS Server
❍
❍
U
Secondary WINS Server
❍
❍
U
Scope ID
❍
❍
U
Default Gateway Address
❍
❍
U
DNS Server
❍
❍
U
LPR
❍
❍
U
RSH/RCP
❍
❍
U
DIPRINT
❍
❍
U
FTP
❍
❍
U
sftp
❍
❍
U
IPP
❍
❍
U
IPP Timeout
❍
❍
U
8
217
Appendix
Category
IPv6
8
NetWare
AppleTalk
218
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
IPv6
❍
❍
U
Host Name
❍
❍
U
Domain Name
❍
❍
U
Stateless Address Autoconfiguration
❍
❍
U
Manual Configuration Address
❍
❍
U
Default Gateway Address
❍
❍
U
DDNS
❍
❍
U
DNS Server
❍
❍
U
LPR
❍
❍
U
RSH/RCP
❍
❍
U
DIPRINT
❍
❍
U
FTP
❍
❍
U
sftp
❍
❍
U
IPP
❍
❍
U
IPP Timeout
❍
❍
U
NetWare
❍
❍
U
Print Server Name
❍
❍
U
Logon Mode
❍
❍
U
File Server Name
❍
❍
U
NDS Tree
❍
❍
U
NDS Context Name
❍
❍
U
Operation Mode
❍
❍
U
Remote Printer No.
❍
❍
U
Job Timeout
❍
❍
U
Frame Type
❍
❍
U
Print Server Protocol
❍
❍
U
NCP Delivery Protocol
❍
❍
U
AppleTalk
❍
❍
U
Printer Name
❍
❍
U
Zone Name
❍
❍
U
User Settings
Category
SMB
SNMP
SNMPv3
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
SMB
❍
❍
U
Workgroup Name
❍
❍
U
Computer Name
❍
❍
U
Comment
❍
❍
U
Notify Print Completion
❍
❍
U
SNMP
❍
-
-
IPv4
❍
-
-
IPv6
❍
-
-
IPX
❍
-
-
SNMPv1 / v2 Function
❍
-
-
SNMPv1 Trap Communication
❍
-
-
SNMPv2 Trap Communication
❍
-
-
Permit Settings by SNMPv1 and v2
❍
-
-
Community
❍
-
-
SNMP
❍
-
-
IPv4
❍
-
-
IPv6
❍
-
-
IPX
❍
-
-
SNMPv3 Function
❍
-
-
SNMPv3 Trap Communication
❍
-
-
Context Name
U
-
-
Authentication Algorithm
❍
-
-
Permit SNMPv3 Communication
❍
-
-
SNMPv3 Trap Communication Setting
❍
-
-
Account Name (User)
❍
-
-
Authentication Password (User)
❍
-
-
Encryption Password (User)
❍
-
-
Access Type (User)
❍
-
-
Access Type (Network Administrator)
❍
-
-
Access Type (Machine Administrator)
❍
-
-
8
219
Appendix
Category
Bonjour
8
220
Settings
Administrator
authentication
has not
been
specified.
Administrator authentication has
been specified.
"Available Settings" has
not been
specified.
"Available Settings" has
been
specified.
Bonjour
❍
❍
U
Computer Name
❍
❍
U
Location
❍
❍
U
DIPRINT
❍
❍
U
LPR
❍
❍
U
IPP
❍
❍
U
Functions That Require Options
Functions That Require Options
The following functions require certain options and additional functions.
• Hard Disk overwrite erases function
DataOverwriteSecurity unit
8
221
INDEX
A
Access Control, 133
Access Permission, 88
Address Book, 194
Address Management Tool, 194
Administrator, 4
Administrator Authentication, 4
Administrator Tools, 177, 178, 184, 189, 192
AppleTalk, 187
Authenticate Current Job, 158
Authentication and Access Limits, 3
Auto Erase Memory Setting, 111
Available Functions, 125
B
Bonjour, 187
C
Configuration flow (certificate issued by a
certificate authority), 143
Configuration flow (self-signed
certificate), 143
D
Device Properties, 183
Device Settings, 181, 186, 191, 194, 210
Document Server, 191
Driver Encryption Key, 137, 138, 155
E
Edit, 178, 195, 196
Edit / Delete, 195, 196
Encrypt Address Book, 155
Encrypted Communication Mode, 149
Encryption Technology, 3
Enhance File Protection, 156
Erase All Memory, 111
Extended Feature Setting Menu, 180, 185,
190, 193
F
File Administrator, 12, 121, 195
File Creator (Owner), 4
File Transfer, 176, 184
Full Control, 195, 196
222
G
General Features, 176, 178
General Settings, 180
Group Passwords for PDF Files, 137
H
Host Interface, 179
I
Initial Settings, 180
Input / Output, 178
Interface, 216
Interface Settings, 182, 184, 186
IPv4, 187
IPv6, 187
J
Job, 191
L
List / Test Print, 179
Locked Print, 81
Login, 4
Logout, 4
M
Machine Administrator, 12, 121
Maintenance, 179, 189
Menu Protect, 121, 122
Methods of Erasing the Data, 111
N
NetWare, 187
Network, 182, 187, 217
Network Administrator, 12, 121
NIB Setup Tool, 188
O
Operational Requirements for Windows
Authentication, 47
Owner, 195
P
Password for IPP Authentication, 137
Password for Stored Files, 88
Password Policy, 158
PDF Menu, 179
Print & Delete Scanner Journal, 160
Printer, 182, 191, 215
Printer Job Authentication, 71
PS Menu, 179
R
RC Gate, 183
Read-only, 195, 196
Registered User, 4, 196
@Remote Service, 159
Reproduction Ratio, 178
Reset Device, 181
Reset Printer Job, 181
Restrict Adding of User Destinations, 156
Restrict Display of User Information, 156
Restrict Use of Destinations, 155
Restrict Use of Simple Encryption, 157
T
Timer Settings, 176
Top Page, 181, 191
Tray Paper Settings, 176
Type of Administrator, 121
U
User, 4
User Administrator, 12, 121, 196
User Authentication, 4
User Management Tool, 183
W
Webpage, 183, 187, 191, 194
S
Scan Settings, 180
Security, 187
Send Settings, 180, 185
Service Mode Lock, 161
Settings by SNMPv1 and v2, 157
SMB, 187
SNMP, 187
SNMPv3, 187
SSDP, 187
SSL (Secure Sockets Layer), 142
Stamp, 178
Supervisor, 12
System, 179, 189
System Settings, 184
223
MEMO
224
MEMO
225
MEMO
226
GB
GB
B286-7900
Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81%
Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm
Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain items, consult with your legal advisor.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine.
Trademarks
Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the
United States and/or other countries.
AppleTalk, EtherTalk, are registered trademarks of Apple Computer, Inc.
Bonjour is a trademark of Apple Computer Inc.
PostScript® and Acrobat® are registered trademarks of Adobe Systems, Incorporated.
NetWare is a registered trademarks of Novell, Inc.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
•
The product name of Windows® 95 is Microsoft® Windows 95.
•
The product name of Windows® 98 is Microsoft® Windows 98.
•
The product name of Windows® Me is Microsoft® Windows Millennium Edition (Windows Me).
•
The product names of Windows® 2000 are as follows:
Microsoft® Windows® 2000 Advanced Server
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Professional
•
The product names of Windows® XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
•
The product names of Windows Server® 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
•
The product names of Windows NT® 4.0 are as follows:
Microsoft® Windows NT® Server 4.0
Microsoft® Windows NT® Workstation 4.0
Notes
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Two kinds of size notation are employed in this manual. With this machine refer to the metric version.
Copyright © 2006
Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81%
Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm
Operating Instructions Security Reference
Operating Instructions Security Reference
Printed in the Netherlands
GB GB B286-7900
Operating Instructions
Security Reference
1
Getting Started
2
Authentication and its Application
3
Preventing Information Leaks
4
Managing Access to the Machine
5
Enhanced Network Security
6
Specifying the Extended Security Functions
7
Troubleshooting
8
Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
* &$%'
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement