advertisement
▼
Scroll to page 2
of 624
Operating Instructions About This Machine 1 Getting Started 2 Entering Text 3 Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in this manual before using the machine. Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Important Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. Notes: Some illustrations in this manual might be slightly different from the machine. Certain options might not be available in some countries. For details, please contact your local dealer. Depending on which country you are in, certain units may be optional. For details, please contact your local dealer. Notes: The model names of the machines do not appear in the following pages. Check the type of your machine before reading this manual. (For details, see p.15 “Machine Types”.) • Type 1: 2404WD/GWD2004/LW324/Aficio MP W2400 • Type 2: 2406WD/GWD2006/LW326/Aficio MP W3600 Certain types might not be available in some countries. For details, please contact your local dealer. Two kinds of size notation are employed in this manual. With this machine refer to the inch version. For good copy quality, the supplier recommends that you use genuine toner from the supplier. The supplier shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the supplier with your office products. Power Source 120V, 60Hz, 15A or more Please be sure to connect the power cord to a power source as above. For details about power source, see Troubleshooting. Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important ❒ Media differ according to manual. ❒ The printed and electronic versions of a manual have the same contents. ❒ Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files. ❒ Depending on which country you are in, there may also be html manuals. To view these manuals, a Web browser must be installed. ❒ For details about the functions of RW-3600, refer to the manuals for this option. ❖ About This Machine Be sure to read the Safety Information in this manual before using the machine. This manual provides an introduction to the functions of the machine. It also explains the control panel, preparation procedures for using the machine, how to enter text, and how to install the CD-ROMs provided. ❖ General Settings Guide Explains User Tools settings, and Address Book procedures such as registering e-mail addresses, and user codes. Also refer to this manual for explanations on how to connect the machine. ❖ Troubleshooting Provides a guide to solving common problems, and explains how to replace paper, toner, and other consumables. ❖ Security Reference This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered with, or prevent the machine from unauthorized use. Also refer to this manual for the procedures for registering administrators, as well as setting user and administrator authentication. ❖ Copy/Document Server Reference Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to place originals. ❖ Printer Reference Explains Printer functions and operations. ❖ Scanner Reference Explains Scanner functions and operations. ❖ Network Guide Explains how to configure and operate the machine in a network environment, and use the software provided. i ❖ Other manuals • PostScript 3 Supplement • UNIX Supplement • Manuals for DeskTopBinder Lite • DeskTopBinder Lite Setup Guide • DeskTopBinder Introduction Guide • Auto Document Link Guide Note ❒ Manuals provided are specific to machine types. ❒ For “UNIX Supplement”, please visit our Web site or consult an authorized dealer. ❒ “PostScript 3 Supplement” and “UNIX Supplement” include descriptions of functions and settings that might not be available on this machine. ❒ The following software products are referred to using general names: Product name General name DeskTopBinder Lite and DeskTopBinder Professional *1 ScanRouter EX Professional er EX Enterprise *1 *1 ii Optional *1 DeskTopBinder and ScanRout- the ScanRouter delivery software What You Can Do with This Machine This section introduces the features of this machine. Note ❒ For details about options, see “Options”. ❒ For functions of printer (Printer Controller RW-3600) and scanner (RW-3600 Scanner Option), see manuals that come with those options. ❒ Scanner functions stated below apply to Scanner Option Type W3600 only. Reference p.22 “Options” Copier, Printer, and Scanner Functions This machine provides copier, printer (optional), and scanner (optional) functions. ATZ002S • You can make copies of originals. See Copy Reference. • You can print documents created in applications. See Printer Reference. You can print documents from Windows 95/98/Me (TCP/IP, IPP), Windows 2000 (TCP/IP, IPP), Windows XP/Server 2003 (TCP/IP, IPP), Windows NT 4.0 (TCP/IP, IPP), NetWare, UNIX (TCP/IP), and Macintosh (AppleTalk) environments because the machine supports all these. (multi-protocol) • You can print HP-GL, HP-GL/2 (HP-RTL), TIFF, and CALS files directly using the GL/2 & TIFF filter. See Printer Reference. • You can scan originals and send scan files to a computer. See Scanner Reference. iii Utilizing Stored Documents You can store files scanned in copier, printer, or scanner mode on the machine's hard disk. With DeskTopBinder (optional) or Web Image Monitor, you can use your computer to search for, view, print, delete, and send stored files via the network. You can also change print settings and print multiple documents (Document Server). ATZ003S • You can also retrieve stored documents scanned in scanner mode. For details, see Scanner Reference. • Using File Format Converter (optional), you can download documents stored in copier, document server, or printer mode to your computer. For details, see Copy/Document Server Reference, and Printer Reference. • For details about machine's settings, see “Network Settings”, General Settings Guide. • For details about document server in printer mode, see “Saving and Printing Using the Document Server”, Printer Reference. • For details about document server in scanner mode, see “Storing Files Using the Scanner Function”, Scanner Reference. • For details about document server, see “Document Server”, Copy/Document Server Reference. • For details about DeskTopBinder, see the DeskTopBinder manuals. iv Using the Scanner in a Network Environment You can use a scanner over the network. ATZ004S • You can send scan files to a specified destination using e-mail (Sending scan file by e-mail). See “Sending Scan Files by E-mail”, Scanner Reference. • You can send scan files directly to folders (Sending scan file by Scan to Folder) See “Sending Scan Files to Folders”, Scanner Reference. • You can use this machine as a delivery scanner for the ScanRouter delivery application (Network delivery scanner). You can save scan files in the delivery server or send them to a folder in a computer on the same network. For details about the machine's settings, see “Network Settings”, General Settings Guide. For details about how to use the function, see “Delivering Scan Files”, Scanner Reference. v Administrating the Machine/Protecting Documents (Security Functions) You can prevent information leakage by managing the machine and protecting documents. ATZ005S • You can protect documents from unauthorized access and stop them from being copied without permission. See Security Reference. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization. See Security Reference. • By setting passwords, you can prevent unauthorized access via the network. See Security Reference. • You can erase the data on the hard disk to prevent the information from leaking out. See the manual for the DataOverWriteSecurity Unit (optional) and Security Reference. vi Monitoring the Machine Via Computer You can change the machine's settings and monitor its status from a connected computer. ATZ006S Web Image Monitor lets you configure and operate the machine using a Web browser on a computer. You can also install SmartDeviceMonitor for Admin on a computer to configure and operate the machine. Using Web Image Monitor, you can register information in the address book, specify the machine’s settings, and check the machine’s status with ease. Using Web Image Monitor, you can check and specify the initial settings (system settings, printer features, network settings, security settings/certificate management, and E-mail Notification), control print jobs, display the print job journal, and protect the data in the machine using authentication. You can also use SmartDeviceMonitor for Admin to register information in the address book. vii TABLE OF CONTENTS Manuals for This Machine ......................................................................................i What You Can Do with This Machine..................................................................iii Copier, Printer, and Scanner Functions .................................................................... iii Utilizing Stored Documents....................................................................................... iv Using the Scanner in a Network Environment ........................................................... v Administrating the Machine/Protecting Documents (Security Functions) ................. vi Monitoring the Machine Via Computer..................................................................... vii Notice ......................................................................................................................1 Important ....................................................................................................................1 Notes To Wireless LAN Interface (optional) Users ....................................................1 For Users in the State of California ............................................................................3 How to Read This Manual .....................................................................................4 Symbols .....................................................................................................................4 Names of Major Options ............................................................................................5 Terms .........................................................................................................................5 Safety Information .................................................................................................6 Safety During Operation.............................................................................................6 Positions of RWARNING and RCAUTION labels ..............................................9 ENERGY STAR Program .....................................................................................13 Specifications ...........................................................................................................14 Recycled Paper........................................................................................................14 Machine Types .....................................................................................................15 1. Getting Started Guide to Components .........................................................................................17 Options.....................................................................................................................22 Control Panel........................................................................................................25 Display Panel........................................................................................................27 Simplified Display.....................................................................................................28 When the Authentication Screen is Displayed..................................................29 User Code Authentication (Using the Control Panel)...............................................29 User Code Authentication (Using a Printer Driver) ..................................................30 Login (Using the Control Panel) ...............................................................................30 Logout (Using the Control Panel).............................................................................31 Login (Using a Printer Driver)...................................................................................32 Login (Using Web Image Monitor) ...........................................................................32 Logout (Using Web Image Monitor) .........................................................................32 Changing Modes ..................................................................................................33 System Reset...........................................................................................................34 Turning On the Power .........................................................................................35 Turning On the Main Power .....................................................................................35 Turning On the Power ..............................................................................................36 Turning Off the Power ..............................................................................................36 Turning Off the Main Power .....................................................................................37 Saving Energy..........................................................................................................38 Anti-humidity Heater Switch .....................................................................................39 viii 2. Entering Text Entering Text ........................................................................................................41 Available Characters ................................................................................................41 Keys .........................................................................................................................41 How to Enter Text ....................................................................................................42 3. Appendix Dos and Don'ts.....................................................................................................45 Software and Utilities Included on the CD-ROM ...............................................47 Viewing the Contents of the CD-ROM .....................................................................47 Printer Drivers for This Machine...............................................................................48 TWAIN Driver ...........................................................................................................49 DeskTopBinder Lite..................................................................................................50 SmartDeviceMonitor for Admin ................................................................................51 DeskTopBinder-SmartDeviceMonitor for Client .......................................................52 Installing the Operating Instructions .................................................................53 PDF Manuals ...........................................................................................................54 Opening the Installed Operating Instructions...................................................55 Opening from the Icon..............................................................................................55 Opening from the [Start] Menu .................................................................................55 Opening from the CD-ROM......................................................................................56 Specifications for the Main Unit .........................................................................57 Specifications for Options ..................................................................................61 Roll Feeder Type 240 A or 240 B.............................................................................61 Paper Cassette Type 240 ........................................................................................61 Table Type 240 ........................................................................................................62 Carrier Sheet............................................................................................................62 IEEE 802.11b Interface Unit Type H ........................................................................62 USB Host Interface Unit Type 7300 .........................................................................63 Gigabit Ethernet Board Type A ................................................................................63 Copy Paper ...........................................................................................................64 Recommended Paper Sizes and Types...................................................................64 Unusable Paper .......................................................................................................68 Paper Storage ..........................................................................................................70 Handling Paper ........................................................................................................70 INDEX......................................................................................................... 71 ix x Notice Important Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its completeness or accuracy. If you have any questions concerning the legality of copying or printing certain items, consult with your legal advisor. Notes To Wireless LAN Interface (optional) Users Notes to users It is strictly forbidden to use antenna(s) except designated. The antenna used for this transmitter must be installed to provide a separation distance of at least 2.5 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. Notes to users in the United States of America This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. Notice: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. 1 This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Warning Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. Note to users in Canada Note: This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: (1) This device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. IEEE 802.11b Interface Unit Type H: This device complies with RSS-210 of Industry Canada. The term “IC:” before the certification/registration number only signifies that the Industry Canada technical specifications were met. To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication. This device has been designed to operate with an antenna having a maximum gain of [0.00] dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is [50] ohms. 2 Remarque concernant les utilisateurs au Canada Avertissement: Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. L'utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l'utilisateur du dispositif doit être prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. IEEE 802.11b Interface Unit Type H: Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada. L'expression <<IC:>> avant le numéro d'homologation/enregistrement signifie seulement que les spécifications techniques d'Industrie Canada ont été respectées. Pour empêcher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit être utilisé à l'intérieur et devrait être placé loin des fenêtres afin de fournir un écran de blindage maximal. Si le matériel (ou son antenne d'émission) est installé à l'extérieur, il doit faire l'objet d'une licence. Afin de réduire le risque d'interférence aux autres utilisateurs, le type d'antenne et son gain doivent être choisis de façon à ce que la puissance isotrope rayonnée équivalente (p.i.r.e.) ne soit pas supérieure au niveau requis pour obtenir une communication satisfaisante. Ce dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximal de [0.00] dBi. Une antenne ayant un gain plus élevé est strictement interdite par les réglements d'Industrie Canada. L'impédance d'antenne requise est [50] ohms. For Users in the State of California Perchlorate Material - special handling may apply, See www.dtsc.ca.gov/hazardouswaste/perchlorate 3 How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the “Safety Information” section of this manual. Indicates important safety notes. Ignoring these notes could result in moderate or minor injury, or damage to the machine or to property. Be sure to read these notes. They can be found in the “Safety Information” section of this manual. Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors. This symbol is located at the end of sections. It indicates where you can find further relevant information. [] Indicates the names of keys that appear on the machine’s display panel. {} Indicates the names of keys on the machine’s control panel. 4 Names of Major Options This section explains the names of the major options described in this manual. Major options for this machine are referred to as follows: • Roll Feeder Type 240A → Paper roll tray 1 • Roll Feeder Type 240B → Paper roll tray 2 • Paper Cassette Type 240 → Cut paper tray • Table Type 240 → Table • Folder FD6500A → Folding finisher Terms This section explains the meanings of terms used in this manual. • Long length original/paper Original/paper length longer than 1,189 mm, 46.8". 5 Safety Information When using this machine, the following safety precautions should always be followed. Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury. Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or moderate injury or damage to property. R WARNING: • Disconnect the power plug (by pulling the plug, not the cable) if the power cable or plug becomes frayed or otherwise damaged. • To avoid hazardous electric shock, do not remove any covers or screws other than those specified in this manual. • Turn off the power and disconnect the power plug (by pulling the plug, not the cable) if any of the following occurs: • You spill something into the machine. • You suspect that your machine needs service or repair. • The external housing of your machine has been damaged. • Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open flame. • Disposal can take place at our authorized dealer. • Dispose of used toner containers in accordance with local regulations. • Keep the machine away from flammable liquids, gases, and aerosols. A fire or an electric shock might occur. • Connect the machine only to the power source described on the inside front cover of this manual. Connect the power cord directly into a wall outlet and do not use an extension cord. • Do not damage, break or make any modifications to the power cord. Do not place heavy objects on it. Do not pull it hard nor bend it more than necessary. These actions could cause an electric shock or fire. • If the power cord is damaged (exposure of the core, disconnection, etc.), contact your service representative to change a new one. Operating the machine with a damaged power cord may cause an electric shock or fire. • This machine emits a weak magnetic field. People using a pacemaker should stay away from the machine if abnormalities are felt. They should then consult a doctor. 6 R CAUTION: • Protect the machine from dampness or wet weather, such as rain and snow. • Contact your service representative if you need to lift the machine (such as when relocating it to another floor). Do not attempt to lift the machine without the assistance of your service representative. The machine will be damaged if it topples or is dropped, resulting in malfunction and risk of injury to users. The machine's various handling areas are for service engineer use only. Do not touch these areas. • Unplug the power cord from the wall outlet before you move the machine. While moving the machine, you should take care that the power cord will not be damaged under the machine. • When you disconnect the power plug from the wall outlet, always pull the plug (not the cable). • Do not allow paper clips, staples, or other small metallic objects to fall inside the machine. • Keep toner (used or unused) and toner containers out of reach of children. • For environmental reasons, do not dispose of the machine or expended supply waste at household waste collection points. Disposal can take place at an authorized dealer. • The inside of the machine could be very hot. Do not touch the parts with a label indicating the “hot surface”. Otherwise, an injury might occur. • The fusing section of this machine might be very hot. Caution should be taken when removing misfed paper. • Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur. • Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur. • Do not use aluminum foil, carbon paper, or similar conductive paper to avoid a fire or machine failure. • Make sure the room where you are using the machine is well ventilated and spacious. Good ventilation is especially important when the machine is used heavily. • Do not open toner cartridges forcefully. Toner can spill, dirtying your clothes or hands, and possibly resulting in accidental ingestion. • If toner or used toner is inhaled, gargle with plenty of water and move into a fresh air environment. Consult a doctor if necessary. • If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult a doctor if necessary. • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary. 7 R CAUTION: • Avoid getting toner on your clothes or skin when removing paper jam or replacing toner. If your skin comes into contact with toner, wash the affected area thoroughly with soap and water. • If toner gets on your clothing, wash with cold water. Hot water will set the toner into the fabric and may make removing the stain impossible. • Do not look into the lamp. It can damage your eyes. • When loading paper, take care not to trap or injure your fingers. • During operation, rollers for transporting the paper and originals revolve. A safety device is being installed so that the machine can be operated safely. But take care not to touch the machine during operation. An injury might occur. • Fire and breakdown can result from heavy accumulation of dust inside this machine. Consult your service representative for details about and charges for cleaning the machine’s interior. • There is a cutter blade inside the paper roll tray. When replacing or loading the paper roll, or clearing paper jams, do not touch the parts a label indicates. Otherwise an injury may result. • When replacing or loading the paper roll, do not put the paper roll on the upper of the paper roll tray. Otherwise the tray may fall and an injury may result. • Hold the paper roll horizontally with both hands. When you grab the paper holder and hold the paper roll vertically, the paper roll may fall off and an injury may result. • When replacing or loading the paper, or clearing paper jams, pull out the cut paper tray slowly with both hands. Do not pull out the cut paper tray with a single hand. Otherwise the rear of the cut paper tray may fall and an injury may result. 8 Positions of RWARNING and RCAUTION labels This machine has labels for RWARNING and RCAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated. ATZ008S ATZ035D Do not touch the parts a label indicates. The inside of the machine could be very hot. Caution should be taken when removing misfed paper. ATZ036D Do not touch the parts a label indicates. The inside of the machine could be very hot. Caution should be taken when removing misfed paper. ATZ037D Do not touch the parts a label indicates. The inside of the machine could be very hot. Caution should be taken when removing misfed paper. 9 ATZ009S ATZ040D The inside of the machine could be very hot. Do not touch the parts a label indicates. Otherwise, an injury might occur. ATZ038S The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. ATZ039D Do not touch the parts a label indicates. The inside of the machine could be very hot. Caution should be taken when removing misfed paper. The higher temperature (145°C) applies to plain paper. Translucent paper can cause the indicated part to reach 160°C. ATZ088D The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. 10 ATZ041S The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. ATZ033S ATZ042D The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. ATY016D There is a cutter blade inside. When replacing or loading the paper roll, or clearing paper jams, do not touch the parts this label indicates. Otherwise an injury may result. ATZ044S When replacing or loading the paper roll, do not put the paper roll on the upper of the paper roll tray. Otherwise the tray may fall and an injury may result. ATZ045D Hold the paper roll horizontally with both hands. When you grab the paper holder and hold the paper roll vertically, the paper roll may fall off and an injury may result. 11 ATZ046S The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. ATZ034S ATZ047S When replacing or loading the paper, or clearing paper jams, pull out the cut paper tray slowly with both hands. Do not pull out the cut paper tray with a single hand. Otherwise the rear of the cut paper tray may fall and an injury may result. 12 ENERGY STAR Program ENERGY STAR® Program The ENERGY STAR® Program encourages energy conservation by promoting energy efficient computers and other office equipment. The program backs the development and dissemination of products that feature energy saving functions. It is an open program in which manufacturers participate voluntarily. Targeted products are computers, monitors, printers, facsimiles, copiers, scanners, and multifunction devices. Energy Star standards and logos are internationally uniform. ❖ Low power mode This product automatically lowers its power consumption 7 minutes after the last copy or print job is completed. Printing is possible in this mode, but to use the copier, press the {Energy Saver} key. ❖ Sleep mode To conserve energy, this product automatically turns off 14 minutes after the last copy or print job is completed. Printing is possible in this mode, but to use the copier, press the operation switch. 13 Specifications Low power mode Sleep mode Power consumption 130 W Default interval 7 minutes Recovery time 83 seconds Power consumption 29 W Default interval 14 minutes Recovery time 120 seconds Note ❒ For details about changing how long the machine waits before switching to Low power mode, see “Timer Settings”, General Settings Guide. ❒ For details about changing how long the machine waits before switching to Auto Off, see “Timer Settings”, General Settings Guide. Reference “Timer Settings”, General Settings Guide Recycled Paper We recommend use of recycled paper which is environmentally friendly. Please contact your sales representative for recommended paper. 14 Machine Types This machine comes in two models which vary in copy/print speed. To ascertain which model you have, see the inside front cover. Type 1 Copy/print speed 2 sheets/minute (A0 (E)K), 4 sheets/minute (A1 (D)L) Type 2 3 sheets/minute (A0 (E)K), 6 sheets/minute (A1 (D)L) 15 16 1. Getting Started This section describes how to start using this machine. Guide to Components This section introduces the names and functions of the components. Important ❒ Do not leave the main unit open for more than 10 minutes, otherwise image quality may deteriorate. ❒ Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a failure might occur. 17 Getting Started ❖ Front 1 ATY040S 1. Original switching lever 8. Main power switch Use to copy or scan folded originals. Use to turn the main power on or off. If you will not use the machine for a long time, disconnect the power cord. Normally, the machine should be left on. If the machine does not operate after turning on the operation switch, check the main power switch is also turned on. If off, turn it on. 2. Upper output stacker When the upper output is selected, output paper is stacked here. 3. Original stacker Originals are stacked here. 4. Original cover Open to clear jammed originals. 5. Ventilation holes Prevent overheating. 6. Main unit Open when paper jam or toner runs out. 7. Main unit opening lever Use to open the main unit. 18 9. Paper roll tray (optional) Load a paper roll here. 10. Operation switch Press to turn the power on (the operation switch indicator lights up). To turn the power off, press again (the operation switch indicator goes off). See “Turning On the Power”. Guide to Components 11. Control panel 16. Bypass tray See “Control Panel”. Use to feed paper in manually. Load paper print side up. 12. {Scanner Stop} key Use if originals are feeding in slanted, or to cancel scanning while an original is feeding in. 17. Bypass tray's paper guide 13. Original guide 18. Cut paper tray (optional) Set to the width of your originals. Load cut paper here. 14. Original table 19. Lower output stacker Place originals here scanning side down. When the lower output is selected, output paper is stacked here. 15. Main unit front cover Open when toner runs out. 1 Set to the width of the paper for bypass copying. 20. Lower output auxiliary guide Pull this out to insert rolled paper or long originals. Note ❒ Do not pull out the lower output auxiliary guide when lower output is selected. Otherwise, output paper may not be stacked properly. 19 Getting Started ❖ Rear 1 ATZ011S 1. Upper output guide 6. Upper output exit Takes delivered paper to the upper output stacker. When the upper output is selected, output paper is delivered here with the print side facing the user. 2. Original exit switching lever Takes originals to the original output guide, and switches delivery to the rear output. 7. Original output guide 3. Original exit When the lower output is selected, output paper is delivered here with the print side up. Originals are delivered here. 4. Ventilation holes 8. Lower output exit Prevent overheating. 9. Lower output guides 5. Anti-humidity heater switch (optional) Prevent delivered paper being stacked at an angle when the lower output is selected. When humidity is high, paper in the paper roll or cut paper trays may absorb moisture, which can affect image quality. The anti-humidity heater prevents this. Turn this switch on when humidity is high. 20 Stacks originals delivered to the rear output. 10. Lower output tray (optional) Delivers paper from the lower output exit, and then sends them to the lower output stacker. Guide to Components Note ❒ Use the lower output guides if A0K or A1K sheets are being delivered to the lower output exit. 1 Reference p.22 “Options” p.25 “Control Panel” p.39 “Anti-humidity Heater Switch” “Original Output Locations”, Copy/Document Server Reference “Copy Output Locations”, Copy/Document Server Reference “Setting Folded Originals (the Original Switching Lever)”, Copy/Document Server Reference 21 Getting Started Options This section introduces the names and functions of main optional parts. 1 External Options This section provides explanations about external options. ATY015S 1. Paper roll tray 1 5. Folding finisher You can load one paper roll. Automatically folds paper like fans or accordion. 2. Paper roll tray 2 6. Rear stacker You can load two paper rolls. Allows you to stack paper delivered to the lower output exit. 3. Table Put the main unit on this table. You can store cut paper and so on inside it. 4. Cut paper tray Load cut paper here. You can load up to 250 A3 sheets. 22 7. Original hanger Allows you to hang originals. Guide to Components ❖ Paper roll tray This illustration shows the paper roll tray 2. 1 ATZ068S 1. Paper roll 1 2. Paper roll 2 3. Cutter knob Use to manually cut paper if there are paper jams in the cutter area of the machine. Always return the cutter knob to the left or right end. 4. Paper holder The two paper holders grip the paper roll and are mounted on the paper roll tray's roll holder. 5. Paper feed knob Use when loading paper rolls or clearing paper jams. 6. Roll holder Adjust this to the size of the paper roll you are using. Note ❒ The paper roll tray is required to install the cut paper tray. ❒ If the rear stacker is installed, the lower output stacker, lower output tray, lower output guides, and folding finisher cannot be used. Reference p.23 “Other Options” p.61 “Roll Feeder Type 240 A or 240 B” “Loading Paper”, Troubleshooting “Clearing Misfeeds”, Troubleshooting “Changing the Paper Size in the Paper Roll Tray”, Troubleshooting Other Options This section provides explanations about other options. • Printer unit Allows you to use the printer function. You can install either Type W3600 or RW-3600 printer unit. • Scanner unit Allows you to use the scanner function. 23 Getting Started • USB host board (For Type W3600) Allows you to connect a variety of external devices. • IEEE 802.11b wireless LAN board (For Type W3600) Allows you to install a wireless LAN interface. • Gigabit Ethernet (1000BASE-TX) (For Type W3600) Allows you to communicate with 1000BASE-TX. • File Format Converter Allows you to download stored documents scanned in copier, document server, or printer mode. See Copy/Document Server Reference, and Printer Reference. • DataOverWriteSecurity Unit Allows you to erase data on the hard disk. • Carrier sheet Use to load bent, folded, creased, thin or pasted originals. 1 ZEDP020J • Paper holder Use to set a paper roll in the paper roll tray's roll holder. This is useful to change quickly to a different size paper roll from the paper holder. ZEDP030J Note ❒ You cannot install both of the options below at the same time: IEEE 802.11b wireless LAN board, and Gigabit Ethernet (1000BASE-TX). Reference “Setting the Carrier Sheet”, Copy/Document Server Reference 24 Printer Reference Control Panel Control Panel This section introduces the names and functions of the components on the control panel. This illustration shows the control panel of the machine with options fully installed. 1 ATY041S 1. Screen contrast knob 5. {Program} key (copier, document Adjusts display panel brightness. server, and scanner mode) 2. {User Tools/Counter} key Press to register frequently used settings, or to recall registered settings. • User Tools Press to change the default and conditions to meet your requirements. See “Accessing User Tools”, General Settings Guide. • Counter Press to check or print the counter value. See “Counter”, General Settings Guide. • Inquiry Press to find out where to order expendable supplies and where to call when a malfunction occurs. You can also print these details. See “Inquiry”, General Settings Guide. 3. Display panel Displays keys for each function, operation status, or messages. See “Display Panel”. 4. {Clear Modes} key Press to clear the current settings. 6. {Interrupt} key (copier, document server, and scanner mode) Press to make interrupt copies during copying or scanning. See “Interrupt Copy”, Copy/Document Server Reference. 7. {Energy Saver} key Press to switch to and from Energy Saver mode. See “Saving Energy”. 8. Main power indicator The main power indicator goes on when you turn on the main power switch. Do not turn off the main power switch while the operation switch indicator is lit or blinking. Doing so may damage the hard disk. 9. Operation switch Press to turn the power on (the operation switch indicator goes on). To turn the power off, press again (the operation switch indicator goes off). See “Turning On the Power”. 25 Getting Started 10. {Login/Logout} key 15. {Clear/Stop} key Press this to log in or log out. • Clear Press to delete a number entered. • Stop Press to stop a job in progress, such as scanning, or printing. 11. {Simplified Display} key Press this to switch to the Simplified Display. 1 12. {Sample Copy} key Press to make a single set of copies or prints to check print quality before making multiple sets. See “Sample Copy”, Copy/Document Server Reference. 13. {Start} key Press to start copying. Start scanning or printing documents stored using the Document Server function. 14. {q} key (Enter key) Press to confirm values entered or items specified. 16. Number keys Use to enter the numbers for copies, and data for the selected function. 17. Function keys Press to display the operation screen of one of the following functions: copier, document server, printer, or scanner. The indicator of the selected function goes on. See “Changing Modes”. 18. Alert indicator Lights continuously if an error has occurred. 19. Data In indicator (printer mode) Blinks continuously if the machine has received a print job. Reference p.27 “Display Panel” p.28 “Simplified Display” p.33 “Changing Modes” p.35 “Turning On the Power” p.38 “Saving Energy” “Accessing User Tools”, General Settings Guide “Counter”, General Settings Guide “Inquiry”, General Settings Guide “Interrupt Copy”, Copy/Document Server Reference “Sample Copy”, Copy/Document Server Reference 26 Display Panel Display Panel The display panel shows machine status, error messages, and function menus. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing them. When you select or specify an item on the display panel, it is highlighted like . Keys appearing as cannot be used. 1 Important ❒ Don't apply strong impact or force to the screen. Or it may be damaged. Maximum force allowable is approx. 30N (approx. 3 kgf). (N = Newton, kgf = Kilogram force. 1 kgf = 9.8N.) The copy display is set as the default screen when the machine is turned on. The following display is of a machine with the options fully installed. 27 Getting Started Simplified Display This section explains how to switch to the simplified display. When you press the {Simplified Display} key, the screen changes from the initial display to the simplified display. Letters and keys are displayed at a larger size, making operations easier. 1 ATY042S ❖ Example of a simplified display This illustration shows the copier function's simplified display. ATY043S 1. [Key Color] Press to increase screen contrast. This is available only for the simplified display. Note ❒ To return to the initial display, press the {Simplified Display} key again. ❒ Certain keys do not appear on the simplified display. 28 When the Authentication Screen is Displayed When the Authentication Screen is Displayed 1 When Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is enabled, the authentication screen appears on the screen. The machine only becomes operable after entering your own login user name and login password. If user code authentication is enabled, you cannot use the machine until you enter the user code. If you can use the machine, you can say that you are logged in. When you go out of the operable state, you can say that you are logged out. After logging in the machine, be sure to log out of it to prevent unauthorized usage. Important ❒ Ask the user administrator for the login user name, login password, and user code. For details about user authentication, contact your administrator. ❒ User code to enter on User Code Authentication is the numerical value registered in the address book as “login user name”. Note ❒ If authentication fails, the “Authentication has failed.” message appears. Check that the login user name and login password are correct. User Code Authentication (Using the Control Panel) When user authentication is set, the following screen appears: Enter a user code (up to eight digits), and then press [OK]. Note ❒ To log out, do one of the following: • Press the operation switch. • Press the {User Tools/Counter} key, press [System Settings], and then press the {User Tools/Counter} key. • Press the {Energy Saver} key after jobs are completed. 29 Getting Started User Code Authentication (Using a Printer Driver) When user authentication is set, specify the user code in the printer properties of the printer driver. For details, see the printer driver Help. 1 Note ❒ When logged in through User Code Authentication, you do not have to log out. Login (Using the Control Panel) Follow the procedure below to log in when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set. A Press [Enter] for [Login User Name]. B Enter a login user name, and then press [OK]. C Press [Enter] for [Login Password]. D Enter a login password, and then press [OK]. E Press [Login]. When the user is authenticated, the screen for the function you are using appears. 30 When the Authentication Screen is Displayed Note ❒ If authentication fails, the “Authentication has failed.” message appears. Check that the login user name and login password are correct. ❒ If user code authentication has been specified, a different screen appears. See “Authentication Information”, General Settings Guide. 1 Reference “Authentication Information”, General Settings Guide Logout (Using the Control Panel) Follow the procedure below to log out when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set. Important ❒ To prevent use of the machine by unauthorized persons, always log out when you have finished using the machine. A Press the {Login/Logout} key. ATY044S B Press [Yes]. 31 Getting Started Login (Using a Printer Driver) When Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set, make encryption settings in the printer properties of the printer driver, and then specify a login user name and password. For details, see the printer driver Help. 1 Note ❒ When logged in using a printer driver, you do not have to log out. Login (Using Web Image Monitor) This section explains how to log in the machine via Web Image Monitor. A Click [Login]. B Enter a login user name and password, and then click [Login]. Note ❒ For user code authentication, enter a user code in [User Name], and then click [OK]. Logout (Using Web Image Monitor) This section explains how to log out the machine via Web Image Monitor. A Click [Logout] to log out. Note ❒ Delete the cache memory of a Web browser after logging out. 32 Changing Modes Changing Modes This section explains how to change modes. 1 ATY045S Note ❒ You cannot switch modes in any of the following situations: • When accessing User Tools / Counter / Inquiry • During interrupt copying • While scanning an original ❒ The copy display is set as the default screen when the machine is turned on. You can change this default setting. For the setting procedure, see “System Settings”, General Settings Guide. Reference “System Settings”, General Settings Guide 33 Getting Started System Reset The machine returns automatically to its initial condition when the job is finished, after a certain period of time has elapsed. This function is called “System Reset”. See “System Settings”, General Settings Guide. You can change the System Reset time. See “Timer Settings”, General Settings Guide. 1 Reference “System Settings”, General Settings Guide “Timer Settings”, General Settings Guide 34 Turning On the Power Turning On the Power This section discusses how to turn on/off the power. 1 ❖ Operation switch This machine has two power switches: operation switch and main power switch. • Operation switch (right side of the control panel) Press to activate the machine. When the machine has finished warming up, you can make use of each function. • Main power switch (left side of the machine) Turning off this switch makes the main power indicator on the right side of the control panel go off. When this is done, machine power is completely off. Use this switch only when necessary. Note ❒ This machine automatically enters Energy Saver mode or turns itself off if you do not use it for a while. See “Timer Settings”, General Settings Guide. Reference “Timer Settings”, General Settings Guide Turning On the Main Power Turn on the main power as follows: Important ❒ Do not turn off the main power switch immediately after turning it on. Doing so may result in damage to the hard disk or memory, leading to malfunctions. A Make sure the power cord is firmly plugged into the wall outlet. B Turn on the main power switch. The main power indicator goes on. ATY049S 35 Getting Started Note ❒ To start using the folding finisher, turn its main power switch on before turning on the main unit's main power switch. ❒ After you switch the main power on, a screen may appear to indicate that the machine is initializing. Do not switch the power off during this process. Initialization takes about three minutes. 1 Turning On the Power Turn on the power as follows: A Press the operation switch. The operation switch indicator goes on. ATY046S Note ❒ If the power does not come on when the operation switch is pressed, check the main power switch is on. If it is off, turn it on. Turning Off the Power Turn off the power as follows: A Press the operation switch. The operation switch indicator goes off. ATY046S 36 Turning On the Power Note ❒ Even if you press the operation switch, the operation switch indicator does not go out, but blinks in the following cases: • During communication with external equipment. • When the hard disk is active. 1 Turning Off the Main Power Turn off the main power as follows: Important ❒ Do not turn off the main power switch when the operation switch indicator is lit or blinking. Doing so may result in damage to the hard disk or memory. ❒ Make sure to turn off the main power switch before pulling out the power plug. Not doing so may result in damage to the hard disk or memory. A Make sure the operation switch indicator is not lit. B Turn off the main power switch. The main power indicator goes out. Note ❒ To power down the folding finisher, turn off the main power switch of the main unit first, and then turn off the folding finisher's main power switch. 37 Getting Started Saving Energy This machine has the following energy saving functions. 1 ❖ Energy Saver If you do not use the machine for a certain period after an operation, or when you press the {Energy Saver} key, the display disappears and the machine goes into Energy Saver mode. When you press the {Energy Saver} key again, the machine returns to the ready condition. The machine uses less electricity in Energy Saver mode. You can change the amount of time the machine waits before switching to Energy Saver mode after copying has finished or the last operation is performed. See “Timer Settings”, General Settings Guide. ❖ Low power mode If you do not use the machine for a certain period, it automatically lowers its power consumption. When you press the {Energy Saver} key, the machine returns to standby. You can change the amount of time the machine waits before switching to the Low power mode. See “Timer Settings”, General Settings Guide. ❖ Auto Off The machine automatically turns itself off when the job is finished, after a certain period of time has elapsed. This function is called “Auto Off”. You can change the Auto Off time. See “Timer Settings”, General Settings Guide. Note ❒ The Energy Saver, Low power mode, and Auto Off function will not operate in the following cases: • • • • • • • • • • • • When a warning message appears When the service call message appears When paper is jammed When the cover is open When the “Add Toner” message appears When toner is being replenished When the User Tools / Counter / Inquiry screen is displayed When fixed warm-up is in progress When the printer, or other functions are active When operations are suspended during printing When the Data In indicator is on or blinking When the screen of stored document under the printer function is displayed Reference “Timer Settings”, General Settings Guide 38 Turning On the Power Anti-humidity Heater Switch This section explains the anti-humidity heater switch. During winter or humid periods when there can be sudden changes in temperature and humidity, the paper in the paper roll tray, or the cut paper tray can absorb moisture. This may cause image quality to deteriorate. To prevent this, the machine has a built-in anti-humidity heater. There is a switch for the anti-humidity heater on the right side of the paper roll tray. Turn this switch on if the humidity level becomes high and image quality is affected. Turn the switch off at other times. 1 ATZ019S Reference p.70 “Handling Paper” 39 Getting Started 1 40 2. Entering Text This section describes how to enter characters. Entering Text When you enter a character, it appears at the position of the cursor. If there is a character already at the cursor position, the entered character appears before that. Available Characters This section explains which characters are available. You can enter the following characters: • Alphabetic characters • Symbols • Numerals 0123456789 Keys This section explains the entry screen and the keys displayed on it. You can change the entry screen using the keys below. ATY047S 41 Entering Text Note ❒ When entering uppercase or lowercase letters continuously, use [Shift Lock] to lock the case. ❒ You can also use the number keys to enter numbers, regardless of mode. Reference p.43 “Adding user text” 2 How to Enter Text This section explains text entry more specifically. Entering letters A Press [Shift] to switch between uppercase and lowercase. B Press the letters you want to enter. Deleting characters A Press [Backspace] or [Delete All] to delete characters. 42 Entering Text Adding user text You can select and use a User Text that is registered in [Program / Change / Delete User Text]. For details about registering User Texts, see “System Settings”, General Settings Guide. A Press [User Text]. 2 B Select the User Text you want to use. Reference “System Settings”, General Settings Guide 43 Entering Text 2 44 3. Appendix This section describes Dos and Don'ts, the provided CD-ROMs, specifications, and copy paper. Dos and Don'ts The following items should be followed during use of this machine. R CAUTION: • Keep the machine away from flammable liquids, gases, and aerosols. A fire or an electric shock might occur. R CAUTION: • Unplug the power cord from the wall outlet before you move the machine. While moving the machine, you should take care that the power cord will not be damaged under the machine. Important ❒ Do not turn the power off while the operation switch indicator is lit or blinking. Doing so may damage the hard disk. ❒ Before unplugging the power cord or turning off the main power switch, make sure remaining memory space is at 100%, as shown on the screen. See “Turning Off the Power”, “Turning Off the Main Power”. ❒ Do not touch areas on or around the fusing unit. These areas get hot. ❒ When you use this machine for a long time in a poorly ventilated confined space, you may detect an odd smell. To keep the workplace comfortable, we recommend good ventilation. ❒ The area around the ventilation hole might feel warm. This is caused by exhaust air and is not a malfunction. ❒ If the machine is moved from a cold to a warm place, condensation may form inside it. After moving the machine, do not use it for at least an hour. The machine requires this time to adapt to its new environment. ❒ The machine will malfunction if its internal temperature becomes too high. Be sure not to block the intake and exhaust vents. ❒ Do not turn off the power while the machine is in operation. See “Turning Off the Power”, “Turning Off the Main Power”. ❒ Do not move or tilt the machine when the power is on. ❒ Do not allow small objects such as paperclips to fall into or become stuck inside the machine. ❒ Do not knock the machine while it is operating (for instance, do not use the machine's surfaces to knock stacks of paper into square). 45 Appendix ❒ Depending on the ambient temperature and humidity, steam may come from the exhaust vent behind the control panel during printing. This is water vapour from the paper, not a sign of malfunction. ❒ Do not open the main unit cover, the paper roll tray, or the cut paper tray when the machine is in operation. If you do, misfeeds might occur. ❒ Do not leave the main unit open for more than 10 minutes, otherwise image quality may deteriorate. ❒ If you do not use the machine for a long time, remove the paper from the paper roll tray, or the cut paper tray and place it in its storage bag. ❒ Condensation can lead to image deterioration. To prevent this, this machine has an anti-condensation function. Even when the main power switch is in the standby position, the anti-condensation heater is active, keeping the machine body slightly warm. ❒ The paper roll tray has the anti-humidity function. Even when the main power switch is in the standby position, the anti-humidity heater is active if it is turned on. ❒ Be sure to make a note of the registered machine settings in case they are lost due to accident or malfunction. ❒ The supplier shall not be liable for any loss or damage resulting from a failure of the machine, loss of settings, or use of the machine. 3 Reference p.36 “Turning Off the Power” p.37 “Turning Off the Main Power” p.39 “Anti-humidity Heater Switch” 46 Software and Utilities Included on the CD-ROM Software and Utilities Included on the CDROM Three CD-ROMs come with this machine: “Printer Drivers and Utilities”, “Scanner Driver and Utilities”, and “Manuals”. In “Manuals”, operating instructions are stored in PDF format and HTML format. The following are included in the three separate CD-ROMs: ❖ Font Manager 2000 For installing new screen fonts, or organizing and managing fonts already in the system. For details about Font Manager 2000, see the manual on the CDROM labeled “Printer Drivers and Utilities”. 3 ❖ SmartDeviceMonitor for Admin For the system administrator to manage network printers. ❖ DeskTopBinder-SmartDeviceMonitor for Client For users to manage their network print status. ❖ Printer Utility for Mac This utility allows users to download and manage a variety of fonts as well as manage printers. For details about this utility, see PostScript 3 Supplement. Note ❒ Documentation about using the machine is included on the CD-ROM in PDF format. For details about using Acrobat Reader, see Acrobat Reader online Help. Reference SmartDeviceMonitor for Admin Help DeskTopBinder-SmartDeviceMonitor for Client Help Acrobat Reader online Help Viewing the Contents of the CD-ROM Follow the procedure below to view the contents of the CD-ROMs. A Insert the CD-ROM into the CD-ROM drive. The installer starts. B Click [Browse This CD-ROM]. Explorer starts and displays the contents of the CD-ROM. 47 Appendix Printer Drivers for This Machine Printing requires installation of a printer driver for your operating system. The following drivers are included on the CD-ROM labeled “Printer Drivers and Utilities”. Printer Language 3 RPCS PostScript 3 HDI driver Windows 95 *1 OK OK OK Windows 98 *2 OK OK OK Windows Me *3 OK OK OK Windows 2000 *4 OK OK OK Windows XP *5 OK OK OK Windows Server 2003 *6 OK OK OK Windows NT 4.0 *7 – – OK Mac OS *8 – OK – Mac OS X *9 – OK – *1 *2 *3 *4 *5 *6 *7 *8 *9 Microsoft Windows 95 operating system Microsoft Windows 98 operating system Microsoft Windows Millennium Edition Microsoft Windows 2000 Advanced Server Microsoft Windows 2000 Server Microsoft Windows 2000 Professional Microsoft Windows XP Professional Microsoft Windows XP Home Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows NT Server operating system version 4.0, Microsoft Windows NT Workstation operating system version 4.0 in a computer using x86 processors. Versions 8.6 to 9.2 of the Mac OS (Mac OS X Classic mode is supported.) Mac OS X 10.1 or later (Native mode) ❖ RPCS printer driver This printer driver allows the computer to communicate with the printer using a printer language. In addition to the conventional user interface, another preset user interface is provided. ❖ Adobe PostScript Printer Drivers and PPD files Adobe PostScript printer drivers allow the computer to communicate with the printer using a printer language. PPD files allow the printer driver to enable specific printer functions. ❖ PPD files PPD files allow the printer driver to enable specific printer functions. 48 Software and Utilities Included on the CD-ROM ❖ HDI driver The HDI driver for the AutoCAD 2000 series is provided to work specifically with the AutoCAD 2000 series of CAD applications. Using the HDI driver reduces data size during print out, enabling faster print out. Also, the HDI driver is specially designed for use in environments where AutoCAD 2000 applications are running. Reference “Preparing the Machine”, Printer Reference “Using the HDI Driver for AutoCAD”, Printer Reference PostScript 3 Supplement 3 TWAIN Driver This section describes the file path and system requirements of the TWAIN driver. This driver is required to scan an original using a scanner. To use the machine as a network TWAIN scanner, this driver must be installed. ❖ File path The driver is included in the following folder on the CD-ROM labeled “Scanner Driver and Utilities” provided with this machine: \DRIVERS\TWAIN ❖ System requirements • Hardware PC/AT-compatible machines that support the following operating system properly • Operating system Microsoft Windows 95/98/Me Microsoft Windows 2000/XP Microsoft Windows NT 4.0 Microsoft Windows Server 2003 • Display resolution 800×600 pixels, 256 colors or higher Note ❒ Under Windows NT with RISC-based processors (MIPS R series, Alpha AXP, or PowerPC), this driver is not supported. 49 Appendix DeskTopBinder Lite This section explains the file path and system requirements of DeskTopBinder Lite. DeskTopBinder is to be installed on the client computers for integration and management of various kinds of files such as scan files, files created with applications, and existing scan files. This software allows you to use various functions for stored scan files such as viewing stored files. Also, with the ScanRouter delivery software, you can view the files stored in in-trays of the delivery server, or use other functions for stored files. For details about the software installed with DeskTopBinder Lite, see “DeskTopBinder Lite”, Scanner Reference. 3 ❖ File path The software is included in the following folder on the CD-ROM labeled “Scanner Driver and Utilities” provided with this machine: \UTILITY\DESKV2 ❖ System requirements • Hardware PC/AT-compatible machines that support the operating system properly • Operating system When installing all functions of Desk Navigator Microsoft Windows 98SE/Me/2000 Professional SP1 or later/2000 Server SP1 or later/2000 Advanced Server SP1 or later/XP Professional/XP Home Edition When installing only SmartDeviceMonitor for Client Microsoft Windows 95 SP1/98/98SE/Me/2000 Professional SP1 or later/2000 Server SP1 or later/XP Professional/XP Home Edition Microsoft Windows NT 4.0 SP5 or later Reference Scanner Reference 50 Software and Utilities Included on the CD-ROM SmartDeviceMonitor for Admin SmartDeviceMonitor for Admin is an application that uses TCP/IP and IPX/SPX to monitor network printers. It can monitor multiple network printers using IPv4 address. We recommend that network administrators use this application. ❖ File path SmartDeviceMonitor for Admin is stored in the following folder in the CDROM labeled “Printer Drivers and Utilities”: NETWORK\DEVMON\ADMIN\DISK1 Operating system Windows 95 / 98 / Me 3 Protocol stack TCP/IP provided with Windows 95 / 98 / Me IPX/SPX provided with Windows 95 / 98 / Me NetWare Client provided with Windows 95 / 98 Novell Client provided with Windows 95 / 98 Windows 2000 TCP/IP provided with Windows 2000 IPX/SPX provided with Windows 2000 NetWare Client provided with Windows 2000 Novell Client provided with Windows 2000 or Windows NT Windows XP TCP/IP provided with Windows XP IPX/SPX provided with Windows XP NetWare Client provided with Windows XP Novell Client provided with Windows XP Windows Server 2003 TCP/IP provided with Windows Server 2003 IPX/SPX provided with Windows Server 2003 NetWare Client provided with Windows Server 2003 Novell Client provided with Windows Server 2003 Windows NT 4.0 TCP/IP provided with Windows NT IPX/SPX provided with Windows NT Client Service for NetWare provided with Windows NT Novell Client provided with Windows 2000 or Windows NT ❖ Available functions SmartDeviceMonitor for Admin has the functions to check the followings: • Printer supplies such as paper or ink • Results of print jobs executed from the computer Reference Network Guide SmartDeviceMonitor for Admin Help 51 Appendix DeskTopBinder-SmartDeviceMonitor for Client DeskTopBinder-SmartDeviceMonitor for Client allows you to manage and print various data such as files created with an application, images scanned with a scanner, and existing images as one document. ❖ File path DeskTopBinder-SmartDeviceMonitor for Client is stored in the following folder on the CD-ROM labeled “Printer Drivers and Utilities”: NETWORK\DEVMON\CLIENT\DISK1 3 ❖ Operating environment of the printer driver • Applicable computer Machines which properly work with the applicable OS below. PC/AT compatible machine. • Applicable OS Microsoft Windows 95/98/Me Microsoft Windows 2000/XP Microsoft Windows NT 4.0 Microsoft Windows Server 2003 Note ❒ See “DeskTopBinder Lite”, Scanner Reference or Help of DeskTopBinderSmartDeviceMonitor for Client. ❒ DeskTopBinder includes SmartDeviceMonitor for Client. See Help of DeskTopBinder-SmartDeviceMonitor for Client. 52 Installing the Operating Instructions Installing the Operating Instructions The supplied “Manuals” CD-ROM contains HTML format manuals. Install the manuals you want to use. Important ❒ The system requirements for installing the manuals are as follows: • Operating System: Windows 95/98/Me, Windows 2000/XP, Windows Server 2003, or Windows NT4.0 • Minimum Display Resolution: 800×600 pixels ❒ Recommended Browser: • Microsoft Internet Explorer 4.01 SP2 or later • Netscape 6.2 or later ❒ A simplified manual is displayed if you are using Internet Explorer 3.02 or Netscape Navigator 4.05 or later versions. ❒ HTML manuals can also be viewed on a Macintosh. 3 A Select a language and a product, and then click [OK]. B Click [Install manuals]. If you want to read manuals from the CD-ROM, click [Read HTML manuals] or [Read PDF manuals]. C Install the manual you require according to the displayed instructions. D When installation is complete, click [Finish]. E Click [Finish]. Note ❒ If you cannot install a manual, copy the “Manual” folder to your computer’s hard drive, and then run “Setup.exe”. ❒ To delete an installed manual, on the [Start] menu, click [Programs], then [Product Name], and then uninstall the data. ❒ If you are installing the manuals on a Macintosh, open the “Manuals.htm” file on the CD-ROM. 53 Appendix PDF Manuals The supplied “Manuals” CD-ROM contains PDF versions of the HTML user manuals. ❖ File path The PDF manuals are in the following folder on the CD-ROM: MANUAL_PDF\ENGLISH Note ❒ To view the PDF manuals, you need to have Adobe Acrobat or Adobe Reader installed on your computer. 3 54 Opening the Installed Operating Instructions Opening the Installed Operating Instructions This section explains how to open installed manuals. 3 Opening from the Icon This section explains how to open a manual using its desktop icon. A Double-click the icon on your desktop. The browser opens and the manual appears. Opening from the [Start] Menu This section explains how to open a manual from the [Start] menu. A On the [Start] menu, point to [Programs] (Windows XP: [All Programs]), then [Product Name], and then click the manual you want to view. The browser opens, and then the manual appears. Note ❒ Depending on the settings made during installation, menu folder names may differ. 55 Appendix Opening from the CD-ROM This section explains how to open a manual from the supplied “Manuals” CDROM. A Click [Read manuals]. B Click the title of the manual you want to view. The browser opens, and then the manual appears. 3 56 Specifications for the Main Unit Specifications for the Main Unit ❖ Configuration: Desktop ❖ Photosensitivity type: OPC drum ❖ Original scanning: Original feed image scanning over fixed contact image sensor 3 ❖ Copy process: Dry electrostatic transfer system ❖ Development: Dry two-component magnetic brush development system ❖ Fusing: Heating roll pressure system ❖ Resolution: 600 dpi ❖ Original reference position: Center ❖ Warm-up time: Less than 2 minutes (23°C) ❖ Originals: Sheet ❖ Original size (W × L): • Metric version: Size that can be placed: 210 × 182 mm-960 × 15000 mm Scan size: 210 × 210 mm-914 × 15000 mm • Inch version: Size that can be placed: 81/2" × 7" -371/2" × 590" (49.2 ft.) Scan size: 81/2" × 81/2"-36" × 590" (49.2 ft.) 57 Appendix ❖ Paper size (W × L): • Metric version: Paper roll: 210 × 279 mm-914 × 15000 mm Bypass tray: 210 × 257 mm-914 × 2000 mm Cut paper: A3K, B4 JIS (Japanese Industrial Standard)K, A4K • Inch version: EK-AK Paper roll: 81/2" × 11"-36" × 590" Bypass tray: 81/2" × 10"-36" × 78" Cut paper: 12" × 18"K, 11" × 17"K, 8 1/2" × 14"K, 8 1/2" × 13"K, 8 1/2" × 11"K 3 ❖ Paper weight: 52.3 - 110 g/m2 (13.9 - 29.3 lb.) ❖ Non-reproduction area (Copier): • Metric version: • Top: 8 mm • Bottom: 8 mm • Left and Right: 2 ± 2 mm (less than 5 mm on either side) • Inch version: • Top: 0.32" • Bottom: 0.32" • Left and Right: 0.08" ± 0.08" (less than 0.20" on either side) ❖ First copy time: • Metric version: 18 seconds (A1L, paper roll tray), 19 seconds (A3K, cut paper tray) • Inch version: 18 seconds (DL, paper roll tray), 19 seconds (BK, cut paper tray) ❖ Copying speed (full-size copying): • Type 1: 2 copies/minute (A0 (E)K), 4 copies/minute (A1 (D)L) • Type 2: 3 copies/minute (A0 (E)K), 6 copies/minute (A1 (D)L) 58 Specifications for the Main Unit ❖ Reproduction ratio: • Metric version: Full-size: 100% Reduce: 25.0%, 35.4%, 50.0%, 70.7% Enlarge: 141.4%, 200.0%, 282.8%, 400.0% Zoom: 25.0-400.0% (0.1% increments) • Inch version (Engineering): Full-size: 100% Reduce: 25.0%, 32.4%, 50.0%, 64.7% Enlarge: 129.4%, 200.0%, 258.8%, 400.0% Zoom: 25.0-400.0% (0.1% increments) • Inch version (Architecture): Full-size: 100% Reduce: 25.0%, 33.3%, 50.0%, 66.7% Enlarge: 133.3%, 200.0%, 266.7%, 400.0% Zoom: 25.0-400.0% (0.1% increments) 3 ❖ Maximum continuous copy run: 99 sheets ❖ Copy paper feed method: Bypass tray ❖ Power consumption: Type 1 (Full system *1 ) Type 2 (Full system *1 ) Warm-up 1.4 kw 1.4 kw Stand-by (Anti-humidity heater = OFF) 0.110 kw 0.110 kw Stand-by (Anti-humidity heater = ON) 0.190 kw 0.190 kw Copying 0.94 kw 0.96 kw Maximum 1.5 kw 1.5 kw *1 Main unit with the Roll Feeder Type 240B, Paper Cassette Type 240, Printer Option Type W3600, Scanner Option Type W3600, File Format Converter Type C, USB Host Interface Unit Type 7300, and Gigabit Ethernet Board Type A ❖ Dimensions (W×D×H): 1080 × 637 × 580 mm, 43" × 25" × 23" ❖ Space for main unit (W × D): 2280 × 1237 mm, 89.8" × 48.8" 59 Appendix ❖ Noise emission: Sound power level: Stand-by Less than 40 dB(A) Copying Less than 68 dB(A) Sound pressure level: Stand-by Less than 30 dB(A) Copying Less than 57 dB(A) • Sound power level and sound pressure level are actual values measured in accordance with ISO 7779. • Sound power level and sound pressure level are measured from the position of the bystander. 3 ❖ Weight: Approx. 107 kg, 235.9 lb. ❖ HDD: 80 GB or more • Capacity for Document Server 26 GB • Capacity for memory sorting 14 GB • Capacity for others 0.8 GB or more 60 Specifications for Options Specifications for Options Roll Feeder Type 240 A or 240 B ❖ Paper sizes: Width: 210 – 914 mm, length: 150 m (diameter: 175 mm) ❖ Paper widths: • Metric version 210 mm, 257 mm, 297 mm, 364 mm, 420 mm, 440 mm, 490 mm, 515 mm, 594 mm, 620 mm, 625 mm, 660 mm, 680 mm, 707 mm, 728 mm, 800 mm, 841 mm, 880 mm, 914 mm • Inch version 81/2", 9", 11", 12", 17", 18", 22", 24", 30", 34", 36" 3 ❖ Power consumption 90 W (supplied by main unit) ❖ Dimensions (W × D × H): 1080 × 700 × 720 mm, 43" × 27" × 28" ❖ Weight: Approx. 70 kg (Type 240 A), 72 kg (Type 240 B) Paper Cassette Type 240 ❖ Paper weight: 64 – 105 g/m2. ❖ Paper sizes: A3K, B4 JISK, A4K, 12" × 18"K, 11" × 17"K, 8 1/2" × 14"K, 8 1/2" × 13"K, 8 1/2" × 11"K ❖ Power consumption (Max): Approx. 20 W (supplied by main unit) ❖ Paper capacity: 250 sheets ❖ Dimensions (W × D × H): 620 × 570 × 130 mm, 24" × 22" × 5" ❖ Weight: Approx. 6 kg 61 Appendix Table Type 240 ❖ Dimensions (W × D × H): 1080 × 700 × 720 mm, 43" × 27" × 28" ❖ Weight: Approx. 34 kg Carrier Sheet 3 Allows you to load bent, folded, creased, thin, or pasted originals using this sheet. IEEE 802.11b Interface Unit Type H ❖ Transmission spec.: Based on IEEE 802.11b (wireless LAN) ❖ Protocol: TCP/IP, IPX/SPX, AppleTalk Note ❒ SmartDeviceMonitor and Web Image Monitor are supported. ❖ Data transfer speed: Auto select from the following speed 1 Mbps, 2 Mbps, 5.5 Mbps, 11 Mbps ❖ Frequency range: • Inch version: 2412 - 2462 MHz (1 - 11 channels) • Metric version: 2412 - 2472 MHz (1 - 13 channels) ❖ Transmittable distance: 1 Mbps: 400 m 2 Mbps: 270 m 5.5 Mbps: 200 m 11 Mbps: 140 m Note ❒ These figures are a guideline for outdoor use. In general, the transmittable distance indoors is 10 - 100 m, depending on environment. ❖ Transmission mode: Ad hoc, and infrastructure mode 62 Specifications for Options USB Host Interface Unit Type 7300 ❖ Interface Connector: USB 1.1 host interface A type ❖ Data Transmission Speed: 12 Mbps (Full speed) ❖ Distance Between Devices: 2.5 m 3 Gigabit Ethernet Board Type A ❖ Interface Connector: • Ethernet (10Base-T, 100Base-TX, 1000Base-T) • USB 2.0 It requires a USB computer port and cable that support USB 2.0. ❖ Data Transmission Speed: • Ethernet: 1000 Mbps, 100 Mbps, 10 Mbps • USB: 480 Mbps (High speed: USB 2.0), 12 Mbps (Full speed) ❖ Protocol: TCP/IP, IPX/SPX, AppleTalk ❖ Distance Between Devices: • Ethernet: 100 m • USB: 5 m 63 Appendix Copy Paper This section describes recommended paper sizes and types, unusable paper, paper storage, and handling paper. Recommended Paper Sizes and Types The following limitations apply to each tray: Important ❒ If you use damp or curled paper, a paper jam may occur. 3 ❖ Metric version Where paper is placed Paper roll tray (optional) Paper type Paper roll Plain paper 52.3 – 110 g/m (13.9 – 29.3 lb) Paper size 2 Number of sheets that can be placed – Diameter: less than 175 mm Core: 75.7 mm – 77 mm Width: 210, 257, 297, 364, 420, 440, 490, 515, 594, 620, 625, 660, 680, 707, 728, 800, 841, 880, 914 mm Roll length: less than 150 m Paper roll tray (optional) Translucent paper Paper roll – Diameter: less than 175 mm Core: 75.7 mm – 77 mm Width: 210, 257, 297, 364, 420, 440, 490, 515, 594, 620, 625, 660, 680, 707, 728, 800, 841, 880, 914 mm Roll length: less than 150 m Paper roll tray (optional) Recycled paper Paper roll – Diameter: less than 175 mm Core: 75.7 mm – 77 mm Width: 210, 257, 297, 364, 420, 440, 490, 515, 594, 620, 625, 660, 680, 707, 728, 800, 841, 880, 914 mm Roll length: less than 150 m Paper roll tray (optional) Film Paper roll Diameter: less than 175 mm Core: 75.7 mm – 77 mm Width: 210, 257, 297, 364, 420, 440, 490, 515, 594, 620, 625, 660, 680, 707, 728, 800, 841, 880, 914 mm Roll length: less than 150 m 64 – Copy Paper Where paper is placed Paper type Cut paper tray (optional) Plain paper Cut paper tray (optional) Bypass tray Paper size Number of sheets that can be placed A3K, B4 JISK, A4K 250 sheets Recycled paper A3K, B4 JISK, A4K 250 sheets Plain paper A0K, A1KL, A2KL 1 sheet g/m2 52.3-110 (13.9-29.3 lb) 52.3-110 g/m (13.9-29.3 lb) 2 3 A3KL, A4K, B1 JISK, B2 JISKL, B3 JISKL, B4 JISKL Paper width: 210 – 914 mm Paper length: 257 – 2000 mm Bypass tray Translucent paper A0K, A1KL, A2KL 1 sheet A3KL, A4K, B1 JISK, B2 JISKL, B3 JISKL, B4 JISKL Paper width: 210 – 914 mm Paper length: 257 – 2000 mm Bypass tray Film A0K, A1KL, A2KL 1 sheet A3KL, A4K, B1 JISK, B2 JISKL, B3 JISKL, B4 JISKL Paper width: 210 – 914 mm Paper length: 257 – 2000 mm 65 Appendix ❖ Inch version Where paper is placed Paper roll tray (optional) Paper type Paper roll Plain paper 52.3 – 110 g/m (13.9 – 29.3 lb) Paper size 2 Number of sheets that can be placed – Diameter: 6.7" or less Internal diameter: 2.98" - 3.03" Width: 81/2", 9", 11", 12", 17", 18", 22", 24", 34", 36" 3 Roll length: 590" (49.2 ft.) or less Paper roll tray (optional) Translucent paper (vellum) Paper roll – Diameter: 6.7" or less Internal diameter: 2.98" - 3.03" Width: 81/2", 9", 11", 12", 17", 18", 22", 24", 34", 36" Roll length: 590" (49.2 ft.) or less Paper roll tray (optional) Film Paper roll – Diameter: 6.7" or less Internal diameter: 2.98" - 3.03" Width: 81/2", 9", 11", 12", 17", 18", 22", 24", 34", 36" Roll length: 590" (49.2 ft.) or less Cut paper tray (optional) Plain paper g/m2 52.3-110 (13.9-29.3 lb) 12" × 18"K, 11" × 17"K, 81/2"×14"K, 81/2"×13"K, 81/2"×11"K 250 sheets Cut paper tray (optional) Recycled paper 12" × 18"K, 11" × 17"K, 81/2"×14"K, 81/2"×13"K, 81/2"×11"K 250 sheets Bypass tray Plain paper • Engineering E (34"×44")K, D (22"×34")KL, C (17"×22")KL, B (11"×17")KL, A (81/2"×11")K 1 sheet g/m2 52.3-110 (13.9-29.3 lb) • Architecture E (36"×48")K, D (24"×36")KL, C (18"×24")KL, B (12"×18")KL, A (9"×12")K 66 Copy Paper Where paper is placed Bypass tray Paper type Translucent paper (vellum) Paper size • Engineering E (34"×44")K, D (22"×34")KL, C (17"×22")KL, B (11"×17")KL, A (81/2"×11")K Number of sheets that can be placed 1 sheet • Architecture E (36"×48")K, D (24"×36")KL, C (18"×24")KL, B (12"×18")KL, A (9"×12")K Bypass tray Film • Engineering E (34"×44")K, D (22"×34")KL, C (17"×22")KL, B (11"×17")KL, A (81/2"×11")K 3 1 sheet • Architecture E (36"×48")K, D (24"×36")KL, C (18"×24")KL, B (12"×18")KL, A (9"×12")K Note ❒ Load paper into the cut paper tray with the print side down. ❒ Load paper into the bypass tray with the print side up. ❒ You must manually specify the size of custom size paper when loading it on the bypass tray. ❒ If multiple-sheet jams occur, load the paper sheet by sheet. ❒ Do not use paper designed for inkjet printers, as these may stick to the fusing unit and cause a misfeed. ❒ If you load paper of the same size in the same orientation in two or more trays, the machine automatically shifts to the other tray - except the bypass tray - when the first tray in use runs out of paper. This function is called “Auto Tray Switching”. (However, if one tray has recycled or special paper, the settings of the other trays must be the same for Auto Tray Switching to work.) This saves interrupting a copy run to replenish paper when making a large number of copies. See “Copier / Document Server Features”, and “Tray Paper Settings”, General Settings Guide. Reference “Copier / Document Server Features”, General Settings Guide “Tray Paper Settings”, General Settings Guide 67 Appendix Paper roll • If humidity is high, and the paper roll has expanded due to moisture, be sure to cut off approximately 1000 mm (40"), before making copies or printing. • Use a paper roll that has a black core. • When a paper roll of 90 g/m2 (24 lb) or 110 g/m2 (29.3 lb) paper is used and there is little paper left on the roll, image may be faint near the leading and/or trailing edge, or an image may be doubled. To prevent this, set 3-5 mm (0.11"0.19") margins from the leading and trailing edges. 3 Reference “Margin Adjustment”, Copy/Document Server Reference Notes on using translucent paper Smooth out any curls in the paper before loading it. Load translucent paper lengthways when possible. Hemmed paper When using hemmed paper, wrinkles and other problems may occur on paper. Use the following procedure when copying or printing onto hemmed paper: • Use the bypass tray. • Make sure the paper is straight, and align the paper guides of the bypass tray to the paper size. • Load only one sheet at a time. • Remove each paper from the output tray and place it on a flat surface. Note ❒ Due to the thickness of hemmed paper, image may be faint, blurred, or wrinkled, and paper jams may occur. You may be able to prevent this by copying or printing on the rear surface of the paper or feeding the bottom of the paper in first. Reference “Copying from the Bypass Tray”, Copy/Document Server Reference Unusable Paper This section describes paper unusable on this machine. R CAUTION: • Do not use aluminum foil, carbon paper, or similar conductive paper to avoid a fire or machine failure. 68 Copy Paper Important ❒ To prevent faults, do not use any of the following kinds of treated paper: • Paper for inkjet printers • Thermal fax paper • Art paper • Aluminum foil • Carbon paper • Conductive paper • OHP transparencies for color copying • Paper with perforated lines • Tab stock • Envelopes ❒ Faults can occur if you copy or print onto sides that are already printed. Take care to copy or print onto unprinted sides only. 3 Note ❒ To prevent misfeeds, do not use the following kinds of paper: • Bent, folded, or creased paper • Torn paper • Slippery paper • Perforated paper • Rough paper • Thin paper with little stiffness • Paper with a dusty surface • Adhesive labels • OHP transparencies ❒ If you copy or print on to rough grain paper, the output image might be blurred. ❒ When using non-recommended paper (especially chemically treated paper, hemmed paper, film), paper jams may occur, paper wrinkle, or output image deteriorate. ❒ Do not use paper that has already been copied or printed on. ❒ Do not copy or print on both sides of paper. ❒ If you use paper roll that is not marked with a black core, paper jams might occur when the paper ends. ❒ Do not use paper printed onto with an inkjet printer, as it may become entangled or jammed, which may damage the machine. In the worst event, this may cause fire, depending on paper and ink type combination. 69 Appendix Paper Storage This section describes how to store paper. • When storing paper, the following precautions should always be followed: • Do not store paper where it will be exposed to direct sunlight. • Avoid storing paper in humid areas (humidity: 70% or less). • Store on a flat surface. • Do not store paper vertically. • Under high temperature and humidity conditions, or low temperature and humidity conditions, store paper in plastic bags. 3 Reference p.70 “Handling Paper” Handling Paper This section describes handling paper. Depending on the humidity of the storage environment, handle paper as follows: ATY039S Note ❒ If humidity is above 70%, turn on the anti-humidity heater. Reference p.39 “Anti-humidity Heater Switch” 70 INDEX A Alert indicator, 25 Anti-humidity heater switch, 17, 39 Authentication Screen, 29 Auto Off, 38 Available Characters, 41 F File Format Converter, 23 Folding finisher, 22 Function keys, 25 G Gigabit Ethernet (1000BASE-TX), 23, 63 B Bypass tray, 17 Bypass tray's paper guide, 17 H Handling paper, 70 HDI driver, 48 How to Enter Text, 42 C Carrier sheet, 23, 62 CAUTION, 6, 9 Changing Modes, 33 Clear Modes key, 25 Clear/Stop key, 25 Computer, vii Control Panel, 29, 30, 31 Copier, iii Copy Paper, 64 Cut paper tray, 17, 22, 61 D DataOverWriteSecurity Unit, 23 Date-in indicator, 25 DeskTopBinder Lite, 50 DeskTopBinder-SmartDeviceMonitor for Client, 52 Display panel, 25, 27 Document Server, iv Dos and Don'ts, 45 E Energy Saver, 38 Energy Saver key, 25 Energy-saving, 13 ENERGY STAR Program, 13 Entering Text, 41 Enter key (# key), 25 Entry screen, 41 Error indicator, 25 External Options, 22 I IEEE 802.11b wireless LAN board, 23, 62 Installing the Operating Instructions, 53 Interrupt key, 25 K Key arrangement, 41 L Login, 30, 32 Login/Logout key, 25 Logout, 31, 32 Lower output auxiliary guide, 17 Lower output exit, 17 Lower output stacker, 17 Lower output tray, 17 Low power mode, 13, 38 M Main power, 35 Main power indicator, 25 Main power switch, 17 Main unit, 17, 57 Main unit front cover, 17 Main unit opening lever, 17 Manuals for This Machine, i N Names of major options, 5 Network, v Number keys, 25 71 O Opening from the CD-ROM, 56 Opening from the Icon, 55 Opening from the Start Menu, 55 Opening the Installed Operating Instructions, 55 Operation switch, 17, 25 Options, 22, 61 Original cover, 17 Original exit, 17 Original exit switching lever, 17 Original guide, 17 Original hanger, 22 Original output guide, 17 Original switching lever, 17 Original table, 17 Other Options, 23 P Paper holder, 23 Paper roll tray, 17, 61 Paper roll tray 1, 22, 61 Paper roll tray 2, 22, 61 Paper Sizes, 64 Paper Storage, 70 Paper Types, 64 PDF Manuals, 54 Positions of WARNING and CAUTION labels, 9 PostScript 3, 48 Power, 35 PPD, 48 Printer, iii Printer Driver, 30, 32, 48 Printer unit, 23 Program key, 25 R Rear stacker, 22 Recommended Paper Sizes and Types, 64 RPCS, 48 S Sample Copy key, 25 Scanner, iii, v Scanner Stop key, 17 Scanner unit, 23 Screen contrast knob, 25 Simplified Display, 28 Simplified Display key, 25, 28 Sleep mode, 13 SmartDeviceMonitor for Admin, 51 SmartDeviceMonitor for Client, 52 Software and Utilities Included on the CD-ROM, 47 Specifications for Options, 61 Specifications for the Main Unit, 57 Start key, 25 Symbols, 4 System Reset, 34 T Table, 22, 62 Terms, 5 Turning Off the Main Power, 37 Turning Off the Power, 36 Turning On the Main Power, 35 Turning On the Power, 36 Turn off, 35 Turn on, 35 TWAIN Driver, 49 U Unusable Paper, 68 Upper original stacker, 17 Upper output exit, 17 Upper output guide, 17 Upper output stacker, 17 USB host board, 23, 63 User Code Authentication, 29, 30 User Text, 43 User Tools/Counter key, 25 V Ventilation holes, 17 W WARNING, 6, 9 Web Image Monitor, vii, 32 72 EN USA B286-7787 In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. c means STAND BY. In accordance with IEC 60417, this machine uses the following symbols for the anti-humidity heater switch: a means POWER ON. b means POWER OFF. Trademarks Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. Adobe®, PostScript®, Acrobat®, are registered trademarks of Adobe Systems Incorporated. NetWare is a registered trademark of Novell, Inc. AppleTalk, Macintosh, and Mac OS are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. PowerPC® is a trademark of International Business Machines Corporation in the United States, other countries, or both. Other product names used herein are for identification purposes only and might be trademarks of their respective companies. We disclaim any and all rights to those marks. The proper names of the Windows operating systems are as follows: • The product name of Windows® 95 is Microsoft® Windows® 95 • The product name of Windows® 98 is Microsoft® Windows® 98 • The product name of Windows® Me is Microsoft® Windows® Millennium Edition (Windows Me) • The product names of Windows® 2000 are as follows: Microsoft® Windows® 2000 Advanced Server Microsoft® Windows® 2000 Server Microsoft® Windows® 2000 Professional • The product names of Windows® XP are as follows: Microsoft® Windows® XP Professional Microsoft® Windows® XP Home Edition • The product names of Windows Server® 2003 are as follows: Microsoft® Windows Server® 2003 Standard Edition Microsoft® Windows Server® 2003 Enterprise Edition Microsoft® Windows Server® 2003 Web Edition • The product names of Windows NT® are as follows: Microsoft® Windows NT® Server 4.0 Microsoft® Windows NT® Workstation 4.0 Copyright © 2007 Operating Instructions About This Machine Type for 2404WD/GWD2004/LW324/Aficio MP W2400 Type for 2406WD/GWD2006/LW326/Aficio MP W3600 EN USA B286-7787 Operating Instructions General Settings Guide 1 Connecting the Machine 2 System Settings 3 Copier / Document Server Features 4 Printer Features 5 Scanner Features 6 Registering Addresses and Users for Scanner Functions 7 Other User Tools 8 Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine" before using the machine. Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Important Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. Notes: Some illustrations in this manual might be slightly different from the machine. Certain options might not be available in some countries. For details, please contact your local dealer. Depending on which country you are in, certain units may be optional. For details, please contact your local dealer. Caution: Use of controls or adjustments or performance of procedures other than those specified in this manual might result in hazardous radiation exposure. Notes: The model names of the machines do not appear in the following pages. Check the type of your machine before reading this manual. • Type 1: 2404WD/GWD2004/LW324/Aficio MP W2400 • Type 2: 2406WD/GWD2006/LW326/Aficio MP W3600 Certain types might not be available in some countries. For details, please contact your local dealer. Two kinds of size notation are employed in this manual. With this machine refer to the inch version. Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important ❒ Media differ according to manual. ❒ The printed and electronic versions of a manual have the same contents. ❒ Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files. ❒ Depending on which country you are in, there may also be html manuals. To view these manuals, a Web browser must be installed. ❒ For details about the functions of RW-3600, refer to the manuals for this option. ❖ About This Machine Be sure to read the Safety Information in this manual before using the machine. This manual provides an introduction to the functions of the machine. It also explains the control panel, preparation procedures for using the machine, how to enter text, and how to install the CD-ROMs provided. ❖ General Settings Guide Explains User Tools settings, and Address Book procedures such as registering e-mail addresses and user codes. Also refer to this manual for explanations on how to connect the machine. ❖ Troubleshooting Provides a guide to solving common problems, and explains how to replace paper, toner, and other consumables. ❖ Security Reference This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered with, or prevent the machine from unauthorized use. Also refer to this manual for the procedures for registering administrators, as well as setting user and administrator authentication. ❖ Copy/ Document Server Reference Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to place originals. ❖ Printer Reference Explains Printer functions and operations. ❖ Scanner Reference Explains Scanner functions and operations. i ❖ Network Guide Explains how to configure and operate the machine in a network environment, and use the software provided. ❖ Other manuals • PostScript3 Supplement • UNIX Supplement • Manuals for DeskTopBinder Lite DeskTopBinder Lite Setup Guide DeskTopBinder Introduction Guide Auto Document Link Guide Note ❒ Manuals provided are specific to machine types. ❒ For "UNIX Supplement", please visit our Web site or consult an authorized dealer. ❒ "PostScript3 Supplement" and "UNIX Supplement" include descriptions of functions and settings that might not be available on this machine. Product name General name DeskTopBinder Lite and DeskTopBinder Professional*1 DeskTopBinder ScanRouter EX Professional*1 and ScanRouter EX Enterprise*1 the ScanRouter delivery software *1 Optional ii TABLE OF CONTENTS Manuals for This Machine ......................................................................................i How to Read This Manual .....................................................................................1 Symbols .....................................................................................................................1 Display Panel..........................................................................................................2 Accessing User Tools ...........................................................................................3 Changing Default Settings .........................................................................................3 Quitting User Tools ....................................................................................................4 Menu Protect..............................................................................................................4 1. Connecting the Machine Connecting to the Interfaces ................................................................................5 Connecting to the Ethernet Interface .........................................................................6 Connecting to the USB Interface................................................................................8 Connecting to the IEEE 802.11b (Wireless LAN) Interface........................................9 Network Settings..................................................................................................12 Settings Required to Use the Printer........................................................................12 Settings Required to Use E-mail Function ...............................................................15 Settings Required to Use Scan to Folder Function ..................................................18 Settings Required to Use the Network Delivery Scanner.........................................20 Settings Required to Use Network TWAIN Scanner ................................................22 Settings Required to Use Document Server ............................................................24 Using Utilities to Make Network Settings .................................................................26 2. System Settings General Features..................................................................................................35 Output tray settings ..................................................................................................40 Tray Paper Settings .............................................................................................41 Timer Settings ......................................................................................................46 Interface Settings.................................................................................................48 Network ....................................................................................................................48 IEEE 802.11b ...........................................................................................................51 Print List ...................................................................................................................53 File Transfer .........................................................................................................54 Administrator Tools.............................................................................................59 Programming the LDAP server...........................................................................68 To program / change the LDAP server ....................................................................68 To enter an identification name................................................................................68 To enter a server name............................................................................................69 To enter the search base .........................................................................................69 To enter a port number ............................................................................................69 To start SSL communication ....................................................................................70 To set authentication................................................................................................70 To enter the user name and password ....................................................................71 To test the connection..............................................................................................71 To set search conditions ..........................................................................................72 To set search options...............................................................................................72 To delete the programmed LDAP server .................................................................74 iii 3. Copier / Document Server Features General Features..................................................................................................75 Reproduction Ratio..............................................................................................78 Edit ........................................................................................................................81 Stamp ....................................................................................................................86 Background Numbering ...........................................................................................86 Preset Stamp ...........................................................................................................86 User Stamp ..............................................................................................................88 Date Stamp ..............................................................................................................89 Page Numbering ......................................................................................................90 Input/Output .........................................................................................................92 Program / Delete Overlay Format .......................................................................93 Programming an Overlay Format.............................................................................93 Overwriting a Stored format .....................................................................................94 Deleting a Stored format ..........................................................................................95 Settings for the Document Server......................................................................96 4. Printer Features List / Test Print .....................................................................................................97 Printing the Configuration Page ...............................................................................98 Maintenance ....................................................................................................... 100 System ................................................................................................................ 101 Host Interface ..................................................................................................... 104 PS Menu.............................................................................................................. 105 PDF Menu ...........................................................................................................106 5. Scanner Features General Settings ................................................................................................107 Scan Settings ..................................................................................................... 109 Send Settings ..................................................................................................... 110 6. Registering Addresses and Users for Scanner Functions Address Book..................................................................................................... 113 Managing names in the Address Book ..................................................................116 Sending e-mail by Quick Dial .................................................................................116 Sending scanned files to a shared folder directly...................................................116 Preventing unauthorized user access to shared folders from the machine ...........117 Managing users and machine usage .....................................................................117 Registering Names ............................................................................................ 118 Registering Names.................................................................................................118 Changing a Registered Name................................................................................120 Deleting a Registered Name ..................................................................................121 iv Authentication Information ............................................................................... 122 Registering a User Code........................................................................................123 Changing a User Code...........................................................................................124 Deleting a User Code.............................................................................................126 Displaying the Counter for Each User....................................................................127 Printing the Counter for Each User ........................................................................128 Printing the Counter for All Users...........................................................................129 Clearing the Number of Prints................................................................................130 E-mail Destination.............................................................................................. 132 Registering an E-mail Destination..........................................................................132 Changing an E-mail Destination.............................................................................134 Deleting an E-mail Destination...............................................................................135 Registering Folders ........................................................................................... 137 Using SMB to Connect...........................................................................................138 Using FTP to Connect............................................................................................145 Using NCP to Connect ...........................................................................................150 Registering Names to a Group ......................................................................... 156 Registering a Group ...............................................................................................156 Registering Names to a Group...............................................................................158 Adding a Group to Another Group .........................................................................160 Displaying Names Registered in a Group ..............................................................162 Removing a Name from a Group ...........................................................................163 Deleting a Group Within Another Group ................................................................164 Changing a Group Name .......................................................................................166 Deleting a Group ....................................................................................................167 Registering a Protection Code ......................................................................... 168 Registering a Protection Code to a Single User.....................................................168 Registering a Protection Code to a Group User.....................................................170 Registering SMTP and LDAP Authentication.................................................. 172 SMTP Authentication .............................................................................................172 LDAP Authentication ..............................................................................................174 7. Other User Tools Changing the Display Language ...................................................................... 177 Inquiry ................................................................................................................. 178 Counter ............................................................................................................... 180 Displaying the Total Counter..................................................................................180 v 8. Appendix Copyrights ..........................................................................................................181 expat ......................................................................................................................181 NetBSD ..................................................................................................................182 Sablotron................................................................................................................184 JPEG LIBRARY .....................................................................................................184 SASL ......................................................................................................................185 MD4........................................................................................................................186 MD5........................................................................................................................186 Samba(Ver 3.0.4)...................................................................................................187 RSA BSAFE® .........................................................................................................187 Open SSL...............................................................................................................188 Open LDAP ............................................................................................................193 LibTIFF...................................................................................................................195 INDEX....................................................................................................... 196 vi How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the "Safety Information" section of About This Machine. Indicates important safety notes. Ignoring these notes could result in moderate or minor injury, or damage to the machine or to property. Be sure to read these notes. They can be found in the "Safety Information" section of About This Machine. Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors. This symbol is located at the end of sections. It indicates where you can find further relevant information. [] Indicates the names of keys that appear on the machine’s display panel. {} Indicates the names of keys on the machine’s control panel. 1 Display Panel The display panel shows machine status, error messages, and function menus. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing them. When you select or specify an item on the display panel, it is highlighted like . Keys appearing as cannot be used. Important ❒ A force or impact of more than 30 N (about 3 kgf) will damage the display panel. To display the following screen, press the {User Tools/Counter} key to display the User Tools menu, and then press [System Settings]. Using the System Settings menu screen as an example, this section explains how to use the machine’s display panel. ATM007S 1. The menu tabs for various settings appear. To display the setting you want to specify or change, press the appropriate menu tab. 2. A list of settings appears. To specify or change a setting, press the appropriate key in the list. 3. Press this to quit the User Tools menu. 2 Accessing User Tools This section describes how to access User Tools menu. User Tools allow you to change or set defaults. Note ❒ Operations for system settings differ from normal operations. Always quit User Tools when you have finished. ❒ Any changes you make with User Tools remain in effect even if the main power switch or operation switch is turned off, or the {Energy Saver} or {Clear Modes} key is pressed. Reference p.4 “Quitting User Tools” Changing Default Settings This section describes how to change the settings of User Tools. Important ❒ If Administrator Authentication Management is specified, contact your administrator. A Press the {User Tools/Counter} key. ATM006S B Select the menu. To change the System Settings, press [System Settings]. To change the Copier / Document Server Features, press [Copier / Document Server Features]. To change the Printer Features, press [Printer Features]. To change the Scanner Features, press [Scanner Features]. To change the language used on the display, press [Español]. To check the telephone numbers to contact for repairs, or to order consumables, press [Inquiry]. To check the counter, press [Counter]. C Select the user tool you want to change. 3 D Change settings by following instructions on the display, and then press [OK]. Note ❒ To cancel changes made to settings and return to the initial display, press the {User Tools/Counter} key. Reference p.35 “System Settings” p.75 “Copier / Document Server Features” p.97 “Printer Features” p.107 “Scanner Features” p.177 “Other User Tools” Quitting User Tools This section describes how to end User Tools. A Press the {User Tools/Counter} key. ATM006S Note ❒ You can also quit User Tools by pressing [Exit]. Menu Protect Using Menu Protect, you can prevent unauthenticated users from changing the user tools. Menu Protect can be specified for each of the following user tools menus. • Copier / Document Server Features • Printer Features • Scanner Features For details, consult your administrator. 4 1. Connecting the Machine This chapter describes how to connect the machine to the network and specify the network settings. Connecting to the Interfaces This section describes how to identify the machine’s interface and connect the machine according to the network environment. ATM001S 1. 10BASE-T/100BASE-TX port Port for connecting the 10BASE-T or 100BASE-TX cable 2. USB2.0 port Port for connecting the USB2.0 interface cable 3. Wireless LAN port (optional) Port for using the wireless LAN Note ❒ You cannot install these two options at the same time: IEEE 802.11b wireless LAN board, Gigabit Ethernet board. ❒ If the optional GigaBit Ethernet board is installed, only the Ethernet interface and USB interface on the board can be used. 5 Connecting the Machine Connecting to the Ethernet Interface This section describes how to connect 10BASE-T or 100BASE-TX cable to the Ethernet interface. 1 Important ❒ If the main power switch is on, turn it off. A A ferrite core for the Ethernet cable is supplied with this machine. Make a loop in the cable about 4.5 cm (1.8") (1) from the machine end of the cable. Attach the ferrite core. AEV047S B Make sure the main power switch of the machine is off. C Connect the Ethernet interface cable to the 10BASE-T/100BASE-TX port. ATL012S D Connect the other end of the Ethernet cable to a network connection device such as a hub. 6 Connecting to the Interfaces E Turn on the main power switch of the machine. 1 ATM002S Note ❒ For details about installing the printer driver, see "Preparing the Machine", Printer Reference. Reference "Turning On the Power", About This Machine "Preparing the Machine", Printer Reference 7 Connecting the Machine Connecting to the USB Interface This section describes how to connect the USB2.0 interface cable to the USB2.0 port. 1 A Connect the USB2.0 interface cable to the USB2.0 port. ATL013S B Connect the other end to the USB2.0 port on the host computer. Note ❒ This machine does not come with a USB interface cable. Make sure you purchase the appropriate cable for the machine and your computer. ❒ The USB2.0 interface board is supported by Windows Me / 2000 / XP, Windows Server 2003, Mac OS X 10.3.3 or higher. • For Windows Me: Make sure to install “USB Printing Support". When used with Windows Me, only a speed equal to that of USB1.1 is possible. • For Mac OS: When used with Mac OS X 10.3.3 or higher, a transfer speed of USB2.0 is supported. ❒ For details about installing the printer driver, see "Preparing the Machine", Printer Reference. Reference "Preparing the Machine", Printer Reference 8 Connecting to the Interfaces Connecting to the IEEE 802.11b (Wireless LAN) Interface This section describes how to connect to the IEEE 802.11b (wireless LAN) interface. 1 Note ❒ Check the settings of the IPv4 address and subnet mask of this machine. ❒ For details about how to set the IPv4 address and subnet mask from the control panel of the machine, see "Interface Settings". ❒ Before using this machine with an IEEE 802.11b (Wireless LAN) connection, you must select [IEEE 802.11b] in [LAN Type]. Reference p.48 “Network” Setup Procedure This section describes how to setup IEEE 802.11b (wireless LAN) interface. Set up IEEE 802.11b (wireless LAN) according to the following procedure: ARH007S 9 Connecting the Machine Note ❒ Select [802.11 Ad-hoc Mode] mode when connecting Windows XP as a wireless LAN client using Windows XP standard driver or utilities, or when not using the infrastructure mode. 1 ❒ You can specify either "WEP" or "WPA" to the Security Method. ❒ Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode]. ❒ If you select the [WPA] option for Security Method, select one of the following: [WPA-PSK], [WPA], [WPA2-PSK], or [WPA2]. If you select [WPA-PSK] or [WPA2PSK], enter your PSK. ❒ For details about how to specify wireless LAN settings from the control panel on the machine, see "IEEE 802.11b". ❒ For details about how to specify wireless LAN settings from other than the control panel on the machine, see "Using Utilities to Make Network Settings". ❒ For details about the setting items, see "IEEE 802.11b". Reference p.26 “Using Utilities to Make Network Settings” p.51 “IEEE 802.11b” Checking the Connection This section describes how to check the wireless LAN connection. Make sure the LED of the IEEE 802.11b interface unit is lit. ❖ When using in infrastructure mode ATL008S 1. If [LAN Type] on the [Interface Settings] / [Network] screen is not set to [IEEE 802.11b], it does not light, even if the main power is on. 2. If it is connected properly to the network, the LED is green when in infrastructure mode. If the LED is blinking, the machine is searching for devices. 10 Connecting to the Interfaces ❖ When using in ad hoc mode / 802.11 ad hoc mode 1 ATL008S 1. If the IEEE 802.11b interface unit is functioning, the LED lights up in orange. 2. If it is connected properly to the network, the LED is green when in ad hoc mode or 802.11 ad hoc mode. If the LED is blinking, the machine is searching for devices. The LED will light after a few seconds. Print the configuration page to verify settings. Note ❒ For more information about printing a configuration page, see "Print List". Reference p.98 “Printing the Configuration Page” Checking the Signal This section describes how to check the machine's radio wave status. When using in infrastructure mode, you can check the machine's radio wave status using the control panel. A Press [System Settings]. B Press [Interface Settings]. C Press [IEEE 802.11b]. D Press [Wireless LAN Signal]. The machine's radio wave status appears. E After checking radio wave status, press [Exit]. F Press the {User Tools/Counter} key. Reference p.26 “Using Utilities to Make Network Settings” p.51 “IEEE 802.11b” 11 Connecting the Machine Network Settings This section describes the network settings you can change with User Tools (System Settings). Make settings according to functions you want to use and the interface to be connected. 1 Important ❒ These settings should be made by the system administrator, or with the advice of the system administrator. Settings Required to Use the Printer This section lists the settings required for using the printer function. Ethernet This section lists the settings required for using the printer function with an Ethernet connection. For details about how to specify the settings, see "Interface Settings". Menu 12 User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network Machine IPv6 Address As required Interface Settings/Network IPv6 Gateway Address As required Interface Settings/Network IPv6 Stateless Address Autoconfiguration As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Interface Settings/Network NCP Delivery Protocol As required Interface Settings/Network NW Frame Type As required Interface Settings/Network LAN Type Interface Settings/Network SMB Computer Name As required Interface Settings/Network SMB Work Group As required Interface Settings/Network Ethernet Speed As required Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Necessary Necessary Network Settings Menu Interface Settings/Network User Tool Machine Name Setting Requirements As required Note ❒ IPv6 can be used only for the printer function. ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN board is installed. If Ethernet and IEEE 802.11b (wireless LAN) are both connected, the selected interface has priority. 1 Reference p.48 “Interface Settings” IEEE 802.11b (wireless LAN) This section lists the settings required for using the printer function with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network Machine IPv6 Address As required Interface Settings/Network IPv6 Gateway Address As required Interface Settings/Network IPv6 Stateless Address Autoconfiguration As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Interface Settings/Network NCP Delivery Protocol As required Interface Settings/Network NW Frame Type As required Interface Settings/Network LAN Type Interface Settings/Network SMB Computer Name As required Interface Settings/Network SMB Work Group As required Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/Network Machine Name As required Necessary Necessary 13 Connecting the Machine Menu 1 User Tool Setting Requirements Interface Settings/ IEEE 802.11b Communication Mode Necessary Interface Settings/ IEEE 802.11b SSID Setting As required Interface Settings/ IEEE 802.11b Channel As required Note ❒ IPv6 can be used only for the printer function. ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. Reference p.48 “Interface Settings” 14 Network Settings Settings Required to Use E-mail Function This section lists the settings required for sending e-mail. 1 Ethernet This section lists the settings required for sending e-mail with an Ethernet connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Interface Settings/Network Ethernet Speed Interface Settings/Network LAN Type Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required File Transfer SMTP Server File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer Reception Protocol As required File Transfer POP3 / IMAP4 Settings As required File Transfer Administrator's E-mail Address As required File Transfer E-mail Communication Port As required File Transfer Program / Change / Delete E-mail Message As required File Transfer Scanner Resend Interval Time As required File Transfer Number of Scanner Resends As required Necessary As required Necessary Necessary 15 Connecting the Machine Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. ❒ When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3 / IMAP4 Settings. ❒ When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port. 1 Reference p.48 “Interface Settings” p.54 “File Transfer” IEEE 802.11b (wireless LAN) This section lists the settings required for sending e-mail with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu 16 User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/ IEEE 802.11b Communication Mode Interface Settings/ IEEE 802.11b SSID Setting As required Interface Settings/ IEEE 802.11b Channel As required Interface Settings/ IEEE 802.11b Security Method As required Necessary Network Settings Menu User Tool Setting Requirements Interface Settings/ IEEE 802.11b Transmission Speed As required File Transfer SMTP Server File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer Reception Protocol As required File Transfer POP3 / IMAP4 Settings As required File Transfer Administrator's E-mail Address As required File Transfer E-mail Communication Port As required File Transfer Program / Change / Delete E-mail Message As required File Transfer Scanner Resend Interval Time As required File Transfer Number of Scanner Resends As required Necessary 1 Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. ❒ When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3 / IMAP4 Settings. ❒ When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port. Reference p.48 “Interface Settings” p.54 “File Transfer” 17 Connecting the Machine Settings Required to Use Scan to Folder Function This section lists the settings required for sending files. 1 Ethernet This section lists the settings required for sending files with an Ethernet connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Interface Settings/Network Ethernet Speed Interface Settings/Network LAN Type Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required File Transfer Default User Name / Password (Send) As required File Transfer Scanner Resend Interval Time As required File Transfer Number of Scanner Resends As required Necessary As required Necessary Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. Reference p.48 “Interface Settings” p.54 “File Transfer” 18 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for sending files with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool 1 Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/ IEEE 802.11b Communication Mode Interface Settings/ IEEE 802.11b SSID Setting As required Interface Settings/ IEEE 802.11b Channel As required Interface Settings/ IEEE 802.11b Security Method As required Interface Settings/ IEEE 802.11b Transmission Speed As required File Transfer Default User Name / Password (Send) As required File Transfer Scanner Resend Interval Time As required File Transfer Number of Scanner Resends As required Necessary Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. Reference p.48 “Interface Settings” p.54 “File Transfer” 19 Connecting the Machine Settings Required to Use the Network Delivery Scanner This section lists the settings required for delivering data to network. 1 Ethernet This section lists the settings required for delivering data to network with an Ethernet connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Interface Settings/Network Ethernet Speed Interface Settings/Network LAN Type Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required File Transfer Delivery Option As required File Transfer Scanner Resend Interval Time As required File Transfer Number of Scanner Resends As required Necessary As required Necessary Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. ❒ If Delivery Option is set to [On], check that IPv4 Address is specified. Reference p.48 “Interface Settings” p.54 “File Transfer” 20 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for delivering data to network with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool 1 Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Interface/Settings/ IEEE 802.11b Communication Mode Interface/Settings/ IEEE 802.11b SSID Setting As required Interface/Settings/ IEEE 802.11b Channel As required Interface/Settings/ IEEE 802.11b Security Method As required Interface/Settings/ IEEE 802.11b Transmission Speed As required File Transfer Delivery Option As required File Transfer Scanner Resend Interval Time As required File Transfer Number of Scanner Resends As required Necessary Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. ❒ If Delivery Option is set to [On], check that IPv4 Address is specified. 21 Connecting the Machine Reference p.48 “Interface Settings” p.54 “File Transfer” 1 Settings Required to Use Network TWAIN Scanner This section lists the settings required for using TWAIN Scanner under the network environment. Ethernet This section lists the settings required for using network TWAIN Scanner with an Ethernet connection. For details about how to specify the settings, see "Interface Settings". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Ethernet Speed As required Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. Reference p.48 “Interface Settings” 22 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for using network TWAIN Scanner with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings". Menu User Tool 1 Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/ IEEE 802.11b Communication Mode Interface Settings/ IEEE 802.11b SSID Setting As required Interface Settings/ IEEE 802.11b Channel As required Interface Settings/ IEEE 802.11b Security Method As required Interface Settings/ IEEE 802.11b Transmission Speed As required Necessary Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. Reference p.48 “Interface Settings” 23 Connecting the Machine Settings Required to Use Document Server This section lists the settings required for using Document Server function under the network environment. 1 Ethernet This section lists the settings required for using Document Server function with the Ethernet connection. For details about how to specify the settings, see "Interface Settings". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Interface Settings/Network Ethernet Speed Interface Settings/Network LAN Type Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Necessary As required Necessary Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. Reference p.48 “Interface Settings” 24 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for using Document Server function with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings". Menu User Tool 1 Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address As required Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL/TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/ IEEE 802.11b Communication Mode Interface Settings/ IEEE 802.11b SSID Setting As required Interface Settings/ IEEE 802.11b Channel As required Interface Settings/ IEEE 802.11b Security Method As required Interface Settings/ IEEE 802.11b Transmission Speed As required Necessary Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [IEEE 802.11b] and [LAN Type] are displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected interface takes precedence. Reference p.48 “Interface Settings” 25 Connecting the Machine Using Utilities to Make Network Settings This section describes how to make network settings using utilities. You can also specify network settings using utilities such as Web Image Monitor, SmartDeviceMonitor for Admin, and telnet. 1 Note ❒ For details about using Web Image Monitor, see "Using Web Image Monitor", Network Guide. ❒ For details about using SmartDeviceMonitor for Admin, see "Using SmartDeviceMonitor for Admin", Network Guide. ❒ For Details about using telnet, see "Remote Maintenance", Network Guide. Reference "Using Web Image Monitor", Network Guide "Using SmartDeviceMonitor for Admin", Network Guide "Remote Maintenance by telnet", Network Guide Interface Settings This section describes how to make Interface settings using utilities. Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin, and telnet. ❖ [Network] → [Machine IPv4 Address] → [Auto-Obtain (DHCP)] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Machine IPv4 Address] → [Specify] → [IPv4 Address] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Machine IPv4 Address] → [Specify] → [Sub-net Mask] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [IPv4 Gateway Address] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. 26 Network Settings ❖ [Network] → [Machine IPv6 Address] → [Manual Configuration Address] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 1 ❖ [Network] → [IPv6 Gateway Address] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [IPv6 Stateless Address Autoconfiguration] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [DNS Configuration] → [Auto-Obtain (DHCP)] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [DNS Configuration] → [Specify] → "DNS Server 1-3" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [DDNS Configuration] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Domain Name] → [Auto-Obtain (DHCP)] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Domain Name] → [Specify] → [Domain Name] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 27 Connecting the Machine ❖ [Network] → [WINS Configuration] → [On] → "Primary WINS Server" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 1 ❖ [Network] → [WINS Configuration] → [On] → "Secondary WINS Server" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [WINS Configuration] → [On] → "Scope ID" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [WINS Configuration] → [Off] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Effective Protocol] → "IPv4" • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: You can specify the TCP/IP settings if SmartDeviceMonitor for Admin is communicating with the machine using IPX/SPX. • telnet: Can be used for specifying the setting. ❖ [Network] → [Effective Protocol] → "IPv6" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Effective Protocol] → "NetWare" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: You can specify the IPX/SPX settings if SmartDeviceMonitor for Admin is communicating with the machine using TCP/IP. • telnet: Can be used for specifying the setting. 28 ❖ [Network] → [Effective Protocol] → "SMB" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. Network Settings ❖ [Network] → [Effective Protocol] → "AppleTalk" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. 1 ❖ [Network] → [NCP Delivery Protocol] → [IPX Priority] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [NCP Delivery Protocol] → [TCP / IP Priority] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [NCP Delivery Protocol] → [IPX Only] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [NCP Delivery Protocol] → [TCP / IP Only] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [NW Frame Type] → [Auto Select] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [NW Frame Type] → [Ethernet II] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [NW Frame Type] → [Ethernet 802.2] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 29 Connecting the Machine ❖ [Network] → [NW Frame Type] → [Ethernet 802.3] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 1 ❖ [Network] → [NW Frame Type] → [Ethernet SNAP] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [SMB Computer Name] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [SMB Work Group] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Ethernet Speed] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [LAN Type] → [Ethernet] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [LAN Type] → [IEEE 802.11b] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Ping Command] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. 30 Network Settings ❖ [Network] → [Permit SNMPv3 Communication] → [Encryption Only] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 1 ❖ [Network] → [Permit SNMPv3 Communication] → [Encryption / Clear Text] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Permit SSL / TLS Communication] → [Ciphertext Only] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [Permit SSL / TLS Communication] → [Ciphertext Priority] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [Permit SSL / TLS Communication] → [Ciphertext / Clear Text] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [Network] → [Host Name] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [Network] → [Machine Name] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [IEEE 802.11b] → [Communication Mode] → [802.11 Ad-hoc Mode] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 31 Connecting the Machine ❖ [IEEE 802.11b] → [Communication Mode] → [Ad-hoc Mode] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 1 ❖ [IEEE 802.11b] → [Communication Mode] → [Infrastructure Mode] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [IEEE 802.11b] → [SSID Setting] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [IEEE 802.11b] → [Channel] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [IEEE 802.11b] → [Security Method] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖ [IEEE 802.11b] → [Transmission Speed] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. 32 Network Settings File Transfer Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin, and telnet. 1 ❖ [File Transfer] → [SMTP Server] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [SMTP Authentication] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [POP before SMTP] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [Reception Protocol] → [POP3] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [Reception Protocol] → [IMAP4] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [Reception Protocol] → [SMTP] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [POP3 / IMAP4 Settings] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. 33 Connecting the Machine ❖ [File Transfer] → [Administrator's E-mail Address] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. 1 ❖ [File Transfer] → [E-mail Communication Port] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [E-mail Reception Interval] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [Max. Reception E-mail Size] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [E-mail Storage in Server] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [Default User Name / Password (Send)] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [Scanner Resend Interval Time] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖ [File Transfer] → [Number of Scanner Resends] • Web Image Monitor: Cannot be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. 34 2. System Settings This chapter describes user tools in the System Settings menu. For details on how to access System Settings, see "Accessing User Tools". General Features This section describes the user tools in the General Features menu under System Settings. Default settings are shown in bold type. ❖ Program / Change / Delete User Text You can register text phrases you often use when specifying settings, such as ".com" and "Regards". You can register up to 40 entries. Program / Change: A Press [System Settings]. B Check that [General Features] is selected. C Press [Program / Change / Delete User Text]. D Check that [Program / Change] is selected. E Select the user text you want to change. To program new user text, press [Not Programmed]. F Enter the user text, and then press [OK]. Enter the user text using up to 80 characters. G Press [Exit]. H Press the {User Tools/Counter} key. Delete: A Press [System Settings]. B Check that [General Features] is selected. C Press [Program / Change / Delete User Text]. D Press [Delete]. E Select the user text you want to delete. F Press [Yes]. G Press [Exit]. H Press the {User Tools/Counter} key. ❖ Panel Key Sound The beeper (key tone) sounds when a key is pressed. The default setting is On. 35 System Settings ❖ Warm-up Beeper (copier/Document Server) You can have the beeper sound when the machine becomes ready to copy after leaving Energy Saver mode, or when the power is turned on. The default setting is On. If the Panel Tone setting is [Off], the beeper does not sound, whatever the Warm Up Notice setting. ❖ Copy Count Display (copier/Document Server) The copy counter can be set to show the number of copies made (count up) or the number of copies yet to be made (count down). The default setting is Up. 2 ❖ Function Priority Specify the mode to be displayed immediately after the operation switch is turned on, or when System Reset mode is turned on. The default setting is Copier. ❖ Print Priority Print Priority is given to the mode selected. The default setting is Display Mode. When [Interleave] is selected, the current print job will be interrupted after a maximum of five sheets. ❖ Function Reset Timer You can set the length of time the machine waits before changing modes when using the multi-access function. This is useful if you are making many copies and have to change settings for each copy. If you set a longer reset period, you can prevent interruption from other functions. The default setting is Set Time. When you select [Set Time], enter the time (3–30 seconds, in 1 second increments) using the number keys. The default setting for Function Reset Time is 3 second(s). The Function Reset Timer setting is ignored if Interleave is set for Print Priority. ❖ Interleave Print You can set the timing for changing modes when [Print Priority] has been set to [Interleave]. The default setting is 10 sheet(s). You can set the number from 1 to 20 sheets using the number keys. ❖ Output: Document Server Specify a tray to which documents are delivered. The default setting is Upper Paper Exit. ❖ Output: Printer Specify a tray to which documents are delivered. The default setting is Upper Paper Exit. 36 General Features ❖ Original Feed Delay 1 Specify the duration of delay before an original is fed into the machine after being set. If originals frequently feed in slanted, or you are using special originals, set the delay accordingly. The default setting is 1 second(s). The time can be set from 0 to 5 seconds. ❖ Original Feed Delay 2 Specify the duration of the pause immediately after originals are first fed into the machine. If originals frequently feed in slanted, or you are using special originals, set the delay accordingly. The default setting is 1 second(s). The time can be set from 1 to 5 seconds. 2 ❖ Feed Start Method Specify whether feeding starts automatically or after pressing the {Start} Key. The default setting is Auto. ❖ Fine Ratio Adjustment: Copier Depending on paper type, environment, and humidity, copy paper can expand or shrink slightly. This means that the size of the copy and the original do not match. if this happens, specify the vertical and horizontal correction ratio. You can specify this setting for each paper type (plain, translucent, film and recycled paper) ABB009S The default setting is Vertical: 0.0% / Horizontal: 0.0%. Specify the ratio between –1.0% and 1.0% (in 0.1% increments) 37 System Settings To set the Fine Ratio setting, measure the length of the original and the copy image to calculate the ratio. 2 ZEDG010E ❖ Fine Ratio Adjustment: Printer Specify the fine ratio when the optional printer is installed. Depending on paper type, environment, and humidity, copy paper can expand or shrink slightly. This means that the size of the copy and the original do not match. When the horizontal ratios are almost the same and there are differences between the vertical ratios, you can specify the vertical correction ratio. You can make this setting for each paper type (plain, translucent, film and recycled paper). The default setting is 0.0%. Specify the ratio between –1.0% and 1.0% (in 0.1% increments). For details about how to set the fine ratio, see "Fine Ratio Adjustment: Copier". ❖ Adjust Scan Position You can adjust the position of the scan area. The default setting is 0. Specify the scan position between –10 and +10 (in 1 increments). ❖ System Status/Job List Display Time Specify how long to display the System Status and Job List display for. The default setting is On, 15 second(s). By selecting [On], you can specify a display time between 10 and 999 seconds. ❖ Key Repeat You can enable or disable repetition of an operation if a key on the screen or control panel is pressed continuously. The default setting is Normal. 38 General Features ❖ Fold Width Fine Adjustment Adjusts the fan fold width. "Adjustment Value (Fan Folding Finisher)" adjusts the Fan Fold width (shown as A, B, and C in the figure below). This menu appears only when the folding finisher is installed. 2 ATM008S The default setting is 0.0 mm (Metric version) / 0.00 inch (Inch version). Enter a value in 0.5 mm units in the ranging from -6.0 mm (-0.24 inch) to 6.0 mm (0.24 inch). 39 System Settings ❖ Margin Fold Margin Adjustment Adjusts the margin width ((1) in the figure below) when [Fan Fold 81/2inch (Margin Fold)] is selected. 2 ATL011S This menu appears only when the folding finisher is installed. The default setting is 40 mm (Metric version) / 1.50 inch (Inch version). Use the number keys to enter a value in 1 mm units in the ranging from 35 mm (1.00 inch) to 40 mm (1.50inch). Reference p.3 “Accessing User Tools” "Function Compatibility", Copy/Document Server Reference Output tray settings When the folding finisher is installed and a folding option is selected, either the lower paper exit or the folding finisher will be used for paper output, regardless of the current paper exit setting. If the folding finisher is used for paper output, the tray used will differ, depending on the fold type selected. 40 Tray Paper Settings Tray Paper Settings This section describes the user tools in the Tray Paper Settings menu under System Settings. Default settings are shown in bold type. Important ❒ If the specified paper size differs from the actual size of the paper loaded in the paper tray, a misfeed might occur because the correct paper size was not detected. 2 ❖ Paper Tray Priority: Copier (copier/Document Server) Specify the tray to supply paper for output. The default setting is Tray 1. When optional cut paper tray is installed, the default setting will be the cut paper tray. When optional paper roll tray or optional cut paper tray is installed, [Tray 2] is displayed. When optional two paper rolls tray and cut paper tray are installed, [Tray 3] is displayed. ❖ Paper Tray Priority: Printer Specify the tray to supply paper for output. The default setting is Tray 1. When optional paper roll tray or optional cut paper tray is installed, [Tray 2] is displayed. When optional two paper rolls tray and cut paper tray are installed, [Tray 3] is displayed. 41 System Settings ❖ Tray Paper Size: Tray 1 Select the size of the paper loaded in the paper tray. Metric version: • A Series: A0 Width (841 mm), A1 Width (594 mm), A2 Width (420 mm), A3 Width (297 mm), A4 Width (210 mm) • JIS B Series: B1 JIS Width (728 mm), B2 JIS Width (515 mm), B3 JIS Width (364 mm), B4 JIS Width (257 mm) • Others: 880 mm, 800 mm, 707 mm, 660 mm, 625mm, 620mm, 440 mm 2 Inch version: • Engineering: 34 inch, 22 inch, 17 inch, 11 inch, 81/2 inch • Architecture: 36 inch / 914 mm, 24 inch, 18 inch, 12 inch, 9 inch • Others: 30 inch The default setting is A0 Width (841 mm) (Metric version) / 36 inch / 914 mm (Inch version). 42 Tray Paper Settings ❖ Tray Paper Size: Tray 2 Select the size of the paper loaded in the paper tray. • When two paper rolls tray is installed Metric version: • A Series: A0 Width (841 mm), A1 Width (594 mm), A2 Width (420 mm), A3 Width (297 mm), A4 Width (210 mm) • JIS B Series: B1 JIS Width (728 mm), B2 JIS Width (515 mm), B3 JIS Width (364 mm), B4 JIS Width (257 mm) • Others: 880 mm, 800 mm, 707 mm, 660 mm, 625 mm, 620 mm, 440 mm Inch version: • Engineering: 34 inch, 22 inch, 17 inch, 11 inch, 81/2 inch • Architecture: 36 inch/914 mm, 24 inch, 18 inch, 12 inch, 9 inch • Others: 30 inch The default setting is A2 Width (420 mm) (Metric version) / 18 inch (Inch version). • When paper roll tray and cut paper tray are installed A3K, B4 JISK, A4K, 12" × 18"K, 11" × 17"K, 81/2" × 14"K, 81/2" × 13"K, 81/2" × 11"K The default setting is A4K (Metric version) / 12" × 18"K (Inch version). 2 ❖ Tray Paper Size: Tray 3 Select the size of the paper loaded in the paper tray. A3K, B4 JISK, A4K, 12" × 18"K, 11" × 17"K, 81/2" × 14"K, 81/2" × 13"K, 81/2" × 11"K The default setting is A4K (Metric version) / 12" × 18"K (Inch version). ❖ Printer Bypass Paper Size Specify the size of the paper in the paper bypass when printing data from the computer. A0K, B1 JISK, A1K, A1L, B2 JISK, B2 JISL, A2K, A2L, B3 JISK, B3 JISL, A3K, A3L, B4 JISK, B4 JISL, A4K, 36" × 48"K, 34" × 44"K, 30" × 42"K, 24" × 36"K, 24" × 36"L, 22" × 34"K, 22" × 34"L, 18" × 24"K, 18" × 24"L, 17" × 22"K, 17" × 22"L, 12" × 18"K, 12" × 18"L, 11" × 17"K, 11" × 17"L, 9" × 12"K, 81/2" × 14"K, 81/2" × 11"K, Custom Size You can specify a custom size of between 257.0 - 2000.0 mm (10.12" - 78.74") vertically, and between 210.0 - 914.4 mm (8.27" - 36.00") horizontally. 43 System Settings ❖ Paper Type: Paper Bypass Sets the display so you can see what type of paper is loaded in the paper bypass. • The paper types you can set for the paper bypass are as follows: No Display, Recycled Paper, Translucent Paper, Film The default setting is No Display. ❖ Paper Type: Tray 1–3 Sets the display so you can see what type of paper is loaded in each paper tray. The print function uses this information to automatically select the paper tray. • The paper types you can set for the paper bypass are as follows: No Display, Recycled Paper, Translucent Paper, Film The default setting for "Paper Type" is No Display. The default setting for "Apply Auto Paper Select" is Yes. A mark appears next to the paper tray if [No] is selected in Auto Paper Select. When cut paper tray is installed, you cannot select [Translucent Paper] and [Film]. 2 ❖ Paper Thickness: Paper Tray Specify the thickness of paper loaded in the paper trays. If the copy image blurs or the translucent paper loosens, changing the paper thickness level may improve results. The default setting for "Plain Paper" is 3. The default setting for "Recycled Paper" is 3. The default setting for "Translucent Paper" is 2. The default setting for "Film" is 3. Refer to the chart below when selecting the mode for the paper thickness. Thickness Paper type 1 2 3 4 5 Plain Paper 110 g/m2 90 g/m2 70 g/m2 60 g/m2 50 g/m2 (29.3 lb) (23.9 lb) (18.6 lb) (15.9 lb) (13.3 lb) 110 g/m2 90 g/m2 70 g/m2 60 g/m2 50 g/m2 (29.3 lb) (23.9 lb) (18.6 lb) (15.9 lb) (13.3 lb) 70–90 g/m2 70–80 g/m2 70–80 g/m2 50–70 g/m2 (18.6–23.9 lb) (18.6–21.3 lb) (18.6–21.3 lb) (13.3–18.6 lb) Hemmed paper 0.07–0.095 mm 0.07–0.095 mm 0.07–0.095 mm 0.07–0.095 mm (2.8–3.7 Mil) (2.8–3.7 Mil) (2.8–3.7 Mil) (2.8–3.7 Mil) Recycled Paper Translucent Paper Film 44 — When Plain Paper is used for printing in a low-temperature environment (temperature 10 °C, humidity 15%), change the thickness level from 3 to 2. If the paper becomes loose when [Translucent Paper] is selected with a thickness level of 2, change the thickness level to 1. These settings do not apply for hemmed paper. Depending on paper type, operating conditions (low temperature and humidity), and paper feeding settings (multiple copies on paper of 542 mm, 22" width or less), toner fusing conditions vary. To improve toner fusing, change the thickness level to 3 → 2 → 1. Tray Paper Settings When using thin, soft, or limp paper, toner fusing may appear wrinkled or the image may be blurred. If this happens, change the thickness level to 3 → 4 → 5. When level 1 or 2 are selected for translucent paper, and you change the paper type from plain or film to translucent, it may take longer for the machine to get ready for copying (up to two minutes). When level 1 or 2 are selected for translucent paper, and you make copies on paper of size A1 or above continuously, the interval between each copying may take longer. Even if you make copy on one sheet only, it may takes 1 minute until the next copy job starts. 2 ❖ Paper Thickness: Paper Bypass Specify the thickness of paper placed in the paper bypass. If the copy image blurs or the translucent paper becomes loose, changing the paper thickness level may improve the situation. The default setting for "Plain Paper" is 3. The default setting for "Recycled Paper" is 3. The default setting for "Translucent Paper" is 2. The default setting for "Film" is 3. For information on the available settings, see the table titled "Paper Thickness: Paper Tray." ❖ Paper Volume Specify the initial remaining volume of roll paper to be displayed for each paper tray. The system monitors the amount of paper used, and automatically determines the remaining volume, based on the specified initial remaining volume. We recommend that you specify an appropriate remaining volume each time a paper tray is loaded. Select "New (Full)" when a paper tray is loaded with a new 150 m roll of paper. The default setting is New (Full). Reference p.3 “Accessing User Tools” 45 System Settings Timer Settings This section describes the user tools in the Timer Settings menu under System Settings. Default settings are shown in bold type. ❖ Auto Off Timer After a specified period has passed, following job completion, the machine automatically turns off, in order to conserve energy. This function is called "Auto Off". The machine status after the Auto Off operation is referred to as "Off mode", or "Sleep mode". For the Auto Off Timer, specify the time to elapse before Auto Off. The default setting is 14 min.. The time can be set between 10 seconds and 240 minutes, using the number keys. The machine takes about 2 minutes to reach operation readiness after turning the power on or leaving sleep mode. Auto Off may not work when error messages appear. 2 ❖ Energy Saver Timer Set the amount of time the machine waits before switching to lower-power mode after copying has finished or the last operation is performed. The default setting is 7 min.. The time can be set from 1 to 240 minutes, using the number keys. ❖ Panel Off Timer Set the amount of time the machine waits before switching the panel off after copying has finished or the last operation is performed. The warm up time for making a copy from standby mode is 3 seconds for Panel off Level 1 and 15 seconds for Panel off Level 2. The default setting is On, 1 min.. The time can be set between 10 seconds and 240 minutes, using the number keys. ❖ System Auto Reset Timer The System Reset setting automatically switches the screen to that of the function set in Function Priority when no operations are in progress, or when an interrupted job is cleared. This setting determines the system reset interval. The default setting is On, 60 second(s). The time can be set from 10 to 999 seconds, using the number keys. ❖ Copier / Document Server Auto Reset Timer Specifies the time to elapse before copier and Document Server modes reset. The default setting is On, 60 second(s). The time can be set from 10 to 999 seconds, using the number keys. If [Off] is selected, the machine does not automatically switch to the user code entry screen. 46 Timer Settings ❖ Printer Auto Reset Timer Specifies the time to elapse before the printer function resets. The default setting is On, 60 second(s). The time can be set from 10 to 999 seconds, using the number keys. ❖ Scanner Auto Reset Timer Specifies the time to elapse before the scanner function resets. The default setting is On, 60 second(s). The time can be set from 10 to 999 seconds, using the number keys. If [Off] is selected, the machine will not automatically switch to the user code entry screen. 2 ❖ Set Date Set the date for the copier's internal clock using the number keys. To change between year, month, and day, press [ ← ] and [ → ]. ❖ Set Time Set the time for the copier's internal clock using the number keys. Enter the time using the 24-hour format (in 1 second increments). To change between hours, minutes and seconds, press [ ← ] and [ → ]. ❖ Auto Logout Timer Specify whether or not to automatically log out a user when the user does not operate the machine for a specified period of time after logging in. The default setting is Off. The time can be set from 60 to 999 seconds, in one second increments, using the number keys. Reference p.3 “Accessing User Tools” 47 System Settings Interface Settings This section describes the user tools in the Interface Settings menu under System Settings. Default settings are shown in bold type. 2 Network This section describes the user tools in the Network menu under Interface Settings. ❖ Machine IPv4 Address Before using this machine in the network environment, you must specify the IPv4 address and subnet mask. The default setting is Auto-Obtain (DHCP). When you select [Specify], enter the IPv4 address and subnet mask as "xxx.xxx.xxx.xxx" ("x" indicates a number). When you select [Specify], make sure that IPv4 address is different from that of other machines on the network. The physical address (MAC address) also appears. ❖ IPv4 Gateway Address A gateway is a connection or interchange point between two networks. Specify the gateway address for the router or host computer used as a gateway. The default setting is 000.000.000.000. ❖ Machine IPv6 Address Specify the machine’s IPv6 network address. • Link-local Address The machine’s specified link-local address appears. • Manual Configuration Address The machine’s manually configured address appears. • Stateless Address: 1-5 The specified stateless address appears. ❖ IPv6 Gateway Address Displays the machine’s IPv6 gateway address. ❖ IPv6 Stateless Address Autoconfiguration Specify IPv6 Stateless Address Autoconfiguration. The default setting is Active. ❖ DNS Configuration Make settings for the DNS server. The default setting is Auto-Obtain (DHCP). When you select [Specify], enter the DNS Server IPv4 address as "xxx.xxx.xxx.xxx"("x" indicates a number). 48 Interface Settings ❖ DDNS Configuration Specify the DDNS settings. The default setting is Active. ❖ Domain Name Specify the domain name. The default setting is Auto-Obtain (DHCP). When you select [Specify], enter the domain name using up to 63 characters. 2 ❖ WINS Configuration Specify the WINS server settings. The default setting is Off. If [On] is selected, enter the WINS Server IPv4 address as "xxx.xxx.xxx.xxx"("x" indicates a number). If DHCP is in use, specify the scope ID. Enter a scope ID using up to 31 characters. ❖ Effective Protocol Select the protocol to use in the network. The default setting for "IPv4" is Active. The default setting for "IPv6" is Inactive. The default setting for "NetWare" is Active. The default setting for "SMB" is Active. The default setting for "AppleTalk" is Active. ❖ NCP Delivery Protocol Select the protocol for NCP delivery. The default setting is TCP / IP Priority. If you select "IPX Only" or "TCP / IP Only", you cannot switch the protocol even if you cannot connect with it. If "NetWare" in [Effective Protocol] is set to "Inactive", you can only use TCP/IP. ❖ NW Frame Type Select the frame type when you use NetWare. The default setting is Auto Select. ❖ SMB Computer Name Specify the SMB computer name. Enter the computer name using up to 15 characters. "*+,/:;<>=?[\]|. and spaces cannot be entered. Do not set a computer name starting with RNP and rnp. Use uppercase letters for alphabets. ❖ SMB Work Group Specify the SMB work group. Enter the computer name using up to 15 characters. "*+,/:;<>=?[\]|. and spaces cannot be entered. Use uppercase letters for alphabet. 49 System Settings ❖ Ethernet Speed Set the access speed for networks. Select a speed that matches your network environment. [Auto Select] should usually be selected. The default setting is Auto Select. Machine 2 10Mbps Half Duplex 10Mbps Full Duplex 100Mbps Half Duplex 100Mbps Full Duplex Auto Select 10Mbps Half Duplex b - - - b 10Mbps Full Duplex - b - - - 100Mbps Half Duplex - - b - b 100Mbps Full Duplex - - - b - Auto Select b - b - b Router/HUB ❖ LAN Type When you have installed the IEEE 802.11b interface unit, select the method of connection. The default setting is Ethernet. [LAN Type] is displayed when wireless LAN board is installed. If Ethernet and IEEE 802.11b (wireless LAN) are both connected, the selected interface has priority. ❖ Ping Command Check the network connection with ping command using given IPv4 address. If you fail to connect to the network, check the following, and then retry the ping command. • Make sure that "IPv4" in [Effective Protocol] is set to "Effective". • Check that the machine with assigned IPv4 address is connected to the network. • There is a possibility that the same IPv4 address is used for the specified equipment. ❖ Permit SNMPv3 Communication Set the encrypted communication of SNMPv3. The default setting is Encryption / Clear Text. If you select to [Encryption Only], you need to set an encryption password for the machine. 50 Interface Settings ❖ Permit SSL / TLS Communication Set the encrypted communication of SSL/TLS. The default setting is Ciphertext / Clear Text. If you set to [Ciphertext Only], you need to install the SSL certificate for the machine. ❖ Host Name Specify the host name. Enter the host name using up to 63 characters. 2 ❖ Machine Name Specify the machine name. Enter the machine name using up to 31 characters. IEEE 802.11b This section describes the user tools in the IEEE 802.11b menu under Interface Settings. [IEEE 802.11b] is displayed when this machine is installed with the wireless LAN interface board. Be sure to make all settings simultaneously. ❖ Communication Mode Specifies the communication mode of the wireless LAN. The default setting is 802.11 Ad-hoc Mode. ❖ SSID Setting Specifies SSID to distinguish the access point in infrastructure mode or 802.11 ad hoc mode. The characters that can be used are ASCII 0x20-0x7e (32 bytes). If blank is specified in 802.11b ad hoc mode or ad hoc mode, "ASSID" appears. ❖ Channel Specifies a channel when you select 802.11b ad hoc mode or ad hoc mode. The default setting is 11. The following channels are available: • Metric version: 1-14 • Inch version: 1-11 51 System Settings ❖ Security Method Specifies the encryption of the IEEE 802.11b (wireless LAN). The default setting is Off. If you select [WEP], always enter WEP key. If you select [WPA], specify the encryption and authentication methods. Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode]. • WEP If you select "WEP", enter WEP key. When using 64 bit WEP, up to 10 characters can be used for hexadecimal and up to five characters for ASCII. When using 128 bit WEP, up to 26 characters can be used for hexadecimal and up to 13 characters for ASCII. The number of characters that can be entered is limited to 10 or 26 for hexadecimal and 5 or 13 for ASCII. • WPA WPA Encryption Method: Select either "TKIP" or "CCMP(AES)". WPA Authent. Method: Select either "WPA-PSK", "WPA", "WPA2-PSK" or "WPA2". If you select "WPA-PSK" or "WPA2–PSK", enter the pre-shared key (PSK) of 8- 63 characters in ASCII code. 2 ❖ Wireless LAN Signal When using in infrastructure mode, you can check the machine's radio wave status using the control panel. Radio wave status is displayed when you press [Wireless LAN Signal]. ❖ Transmission Speed Specifies the communication speed of the IEEE 802.11b (wireless LAN). The default setting is Auto Select. ❖ Restore Factory Defaults You can return the IEEE 802.11b (wireless LAN) settings to their defaults. Reference p.3 “Accessing User Tools” 52 Interface Settings Print List This section describes how to print the configuration page. You can check items related to the network environment. The configuration page shows the current network settings and network information. A Press [System Settings]. 2 B Press [Interface Settings]. C Press [Print List]. D Press the {Start} key. The configuration page is printed. E Press [Exit]. F Press the {User Tools/Counter} key. 53 System Settings File Transfer This section describes the user tools in the File Transfer menu under System Settings. Default settings are shown in bold type. ❖ Delivery Option Enables or disables sending stored or scanned documents to the ScanRouter delivery server. The default setting is Off. Specify this option when selecting whether or not to use the ScanRouter delivery software. If you do, you will have to preregister I/O devices in the ScanRouter delivery software. 2 ❖ Capture Server IPv4 Address Specify the capture server IPv4 address. This setting appears when the media link board is installed, and that the capture function is being used by the ScanRouter delivery software. ❖ SMTP Server Specify the SMTP server name. If DNS is in use, enter the host name. If DNS is not in use, enter the SMTP server IPv4 address. The default setting for Port No. is 25. Enter the server name using up to 127 characters. Spaces cannot be entered. Enter port number between 1 and 65535 using the number keys, and then press the {q} key. 54 ❖ SMTP Authentication Specify SMTP authentication (PLAIN, LOGIN, CRAMMD5, DIGEST-MD5). When sending e-mail to an SMTP server, you can enhance the SMTP server security level using authentication that requires entering the user name and password. If the SMTP server requires authentication, set [SMTP Authentication] to [On], and then specify the user name, e-mail address, password and encryption. The default setting is Off. • Enter the user name using up to 191 characters. Spaces cannot be entered. Depending on the SMTP server type, "realm" must be specified. Add "@" after the user name, as in "user name@realm". • Enter the password using up to 128 characters. Spaces cannot be entered. • Select Encryption as follows: "Encryption"-[Auto] Use If the authentication method is PLAIN, LOGIN, CRAM-MD5, or DIGEST-MD5. "Encryption"-[On] Use If the authentication method is CRAMMD5 or DIGEST-MD5. "Encryption"-[Off] Use If the authentication method is PLAIN, or LOGIN. File Transfer ❖ POP before SMTP Specify POP authentication (POP before SMTP). When sending e-mail to an SMTP server, you can enhance the SMTP server security level by connecting to the POP server for authentication. The default setting is Off. If you set POP before SMTP to [On], specify the waiting time after authentication, user name, e-mail address and password. • Wait Time after Authent.: 300 msec. Specify "Wait Time after Authent." from zero to 10,000 milliseconds, in increments of one millisecond. • User Name Enter the user name using up to 191 characters. Spaces cannot be entered. • E-mail Address Enter the E-mail Address using up to 128 characters. Spaces cannot be entered. • Password Enter the password using up to 128 characters. Spaces cannot be entered. To enable POP server authentication before sending e-mail via the SMTP server, set [POP before SMTP] to [On]. E-mail is sent to the SMTP server after the time specified for "Wait Time after Authent." has elapsed. If you select [On], enter server name in POP3 / IMAP4 Settings. Also, check POP3 port number in E-mail Communication Port. 2 ❖ Reception Protocol Specify Reception Protocol for E-mail Notification function. The default setting is POP3. ❖ POP3 / IMAP4 Settings Specify the POP3/IMAP4 server name for E-mail Notification function. The specified POP3/IMAP4 server name is used for [POP before SMTP]. The default setting is Auto. • Server Name If DNS is in use, enter the host name. If DNS is not in use, enter the POP3/IMAP4 or server IPv4 address. Enter POP3/IMAP4 server name using up to 127 characters. Spaces cannot be entered. • Select Encryption as follows: "Encryption"-[Auto]: Password encryption is automatically set according to the POP/IMAP server settings. "Encryption"-[On]: Encrypt password. "Encryption"-[Off]: Do not encrypt password. 55 System Settings ❖ Administrator's E-mail Address Specify the Administrator's E-mail Address. If a failure occurs in the machine or consumables need to be replaced, e-mail messages are sent to the Administrator's E-mail Address by E-mail Notification function. On e-mailed scanned documents, if the sender is not specified this appears as the sender's address. When sending e-mail, administrator's e-mail address will appear as the sender’s address under the following conditions: • The sender has not been specified and the machine’s e-mail address has not been registered. • The specified sender is not registered in the machine’s address book and the machine’s e-mail address has not been registered. When conducting SMTP authentication for the transmitted files under the e– mail function, the Administrator's E-mail Address will appear in the “From:" box. If you have specified the user name and e-mail address in [SMTP Authentication], make sure to specify this setting. Enter up to 128 characters. On e-mailed scanned documents, if [Auto Specify Sender Name] is [Off], specify the sender. 2 ❖ E-mail Communication Port Specify the port numbers for receiving e-mails. The specified POP3 port number is used for POP before SMTP. The default setting for POP3 is 110. The default setting for IMAP4 is 143. The default setting for SMTP is 25. Enter a port number between 1 and 65535 using the number keys, and then press the {q} key. ❖ E-mail Reception Interval Specify, in minutes, the time interval for E-mail Notification function via POP3 or IMAP4 server. The default setting is On, 15 minute(s). If [On] is selected, the time can be set from 2 to 1440 minutes in increments of one minute. ❖ Max. Reception E-mail Size Specify the maximum reception e-mail size for receiving e-mails. The default setting is 2MB. Enter a size from one to 50 MB in increments of one megabyte. ❖ E-mail Storage in Server Specify whether or not to store received e-mails on the POP3 or IMAP4 server. The default setting is Off. 56 File Transfer ❖ Default User Name / Password (Send) Specify the user name and password required when sending scan files directly to a shared folder on a computer running Windows, to an FTP server, or to a NetWare server. Enter in up to 64 characters. ❖ Program / Change / Delete E-mail Message You can program, change, or delete the e-mail message used when sending a scan file as an attachment. Program / Change: A Press [System Settings]. B Press [File Transfer]. C Press [Program / Change / Delete E-mail Message]. D Check that [Program / Change] is selected. E Press [Not Programmed]. F Press [Change]. G Enter a name, and then press [OK]. Enter the name using up to 20 characters. H Press [Edit]. To start a new line, press [OK] to return to the e-mail message screen, and then press [TNext] in "Select Line to Edit:". I Enter the text, and then press [OK]. Enter up to five lines of text. Each line can consist of up to 80 characters. J Press [OK]. K Press [Exit]. L Press the {User Tools/Counter} key. 2 Delete: A Press [System Settings]. B Press [File Transfer]. C Press [Program / Change / Delete E-mail Message]. D Press [Delete]. E Select the e-mail message to delete. The confirmation message about deleting appears. F Press [Yes]. 57 System Settings ❖ Auto Specify Sender Name Set whether or not to specify the name of the sender when sending e-mail. The default setting is Off. • On If you select [On], the specified e-mail address will appear in the "From:" box. If you do not specify the sender’s address, the administrator’s e-mail address will appear in the "From:" box. If you do not specify the sender when sending a file by e-mail, or if the specified e-mail address is not registered in the machine’s address book, the machine’s e-mail address will appear in the "From:" box. If the machine does not have an e-mail address, the administrator’s e-mail address will appear in the "From:" box. • Off If you select [Off], the specified e-mail address will appear in the "From:" box, but you cannot send e-mail without specifying the sender’s e-mail address. 2 ❖ Scanner Resend Interval Time Specifies the interval the machine waits before resending a scan file, if it cannot be sent to the delivery server or mail server. The default setting is 300 second(s). The interval time can be set from 60 to 900 seconds in one second increments, using the number keys. This setting is for the scanner function. ❖ Number of Scanner Resends Sets a maximum number of times a scan file is resent to the delivery server or mail server. The default setting is On, 3 time(s). If [On] is selected, the number of times can be set from 1 to 99. This setting is for the scanner function. This setting is for the scanner function. Reference p.3 “Accessing User Tools” 58 Administrator Tools Administrator Tools This section describes the user tools in the Administrator Tools menu under System Settings. Default settings are shown in bold type. Administrator Tools are used by the administrator. To change these settings, contact the administrator. We recommend specifying Administrator Authentication before making Administrator Tools settings. 2 ❖ Address Book Management You can add, change or delete information registered in the Address Book. For details, see "Address Book". • Program / Change You can register and change names as well as user codes. • Names You can register a name, key display, registration number, and title selection. • Auth. Info You can register a user code, and specify the functions available to each user code. You can also register user names and passwords to be used when sending e-mail, sending files to folders, or accessing an LDAP server. • Protection You can register a protection code. • E-mail You can register an e-mail address. • Folder You can register the protocol, path, port number, and server name. • Add to Group You can put names registered in the Address Book into a group. • Delete You can delete a name from the Address Book. You can register up to 2,000 names. You can register up to 500 user codes. You can also register and manage names in the Address Book using Web Image Monitor or SmartDeviceMonitor for Admin. 59 System Settings ❖ Address Book: Program / Change / Delete Group Names registered in the Address Book can be added into a group. You can then easily manage the names registered in each group. • Program / Change You can register and change groups. • Names You can register a name, key display, registration number, and title selection. • Programmed User/Group You can check the names or groups registered in each group. • Protection You can register a protection code. • Add to Group You can put groups registered in the Address Book into a group. • Delete You can delete a group from the Address Book. You can register up to 100 groups. You can also register and manage groups in the Address Book using Web Image Monitor or SmartDeviceMonitor for Admin. Use SmartDeviceMonitor for Admin provided with the printer scanner unit. 2 ❖ Address Book: Change Order Changes the order of registered names. You can rearrange the order of items on the same page, but you cannot move items to another page. For example, you cannot move an item from "PLANNING" ([OPQ]) to "DAILY" ([CD]). A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Change Order]. 60 Administrator Tools D Press the name key to be moved. 2 E You can select a name using the number keys. Press the name key in the place you want to move it to. The user key is moved to the selected position, and the user key currently at the selected position is moved forward or backward. If you move the selected user key forward, the user key currently at the selected position is moved backward. If you move the selected user key backward, the user key currently at the selected position is moved forward. You can also select a name using the number keys. 61 System Settings ❖ Print Address Book: Destination List You can print the destination list registered in the Address Book. • Print in Title 1 Order Prints the Address Book in Title 1 order. • Print in Title 2 Order Prints the Address Book in Title 2 order. • Print in Title 3 Order Prints the Address Book in Title 3 order. • Print Group Dial List Prints the group Address Book. A Press [System Settings]. B Press [Administrator Tools]. C Press [Print Address Book: Destination List]. D Select the print format. E Press the {Start} key. The list prints out. 2 62 Administrator Tools ❖ Address Book: Edit Title You can edit the title to easily find a user. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Edit Title]. 2 D Press the title key you want to change. E Enter the new name, and then press [OK]. Press [OK]. F ❖ Address Book: Switch Title Specifies the title to select a name. The default setting is Title 1. ❖ Back Up / Restore Address Book You can back up the machine’s address book to external storage or restore the backup copy from the external storage. You can use the built-in SD card device for backing up data. For details about using SD cards, contact your local service representative. • Back Up You can back up the machine’s address book to external storage. • Restore You can restore the backup copy of the address book from external storage. • Format You can format the external storage. • Obtain Media Info The free space and occupied space of the external storage are displayed. 63 System Settings ❖ Display / Print Counter Allows you to view and print the number of prints. • Display / Print Counter Displays the number of prints for each function (Total, Copier, Send Total, Printer, Scanner Send). • Print Counter List Prints out a list of the number of prints made under each function. 2 ❖ Display / Clear / Print Counter per User Allows you to view and print the numbers of prints accessed with user codes, and to set those values to 0. Press [UPrevious] and [TNext] to show all the numbers of prints. The number of prints may differ from the counter values shown in Display / Print Counter. • Print Counter List for All Users Prints the counter value for all the users. • Clear Counter List for All Users Resets the counter value for all the users. • Print Counter List per User Prints the counter value for each user. • Clear Counter List per User Resets the counter value for each user. • Select All on the Page Select the all users on the page. 64 Administrator Tools ❖ User Authentication Management • User Code Auth. Using User Code Authentication, you can limit the available functions and supervise their use. When using User Code Authentication, register the user code. Using the Printer PC Control function, you can obtain a log of prints corresponding to the codes entered using the printer driver. For details about Basic Authentication, Windows Authentication, LDAP Authentication, and Integration Server Authentication, consult your administrator. • Copier • Printer • GL/2TIFF • Printer: PC Control • Document Server • Scanner • Basic Auth. • Windows Auth. • LDAP Auth. • Integration Svr. Auth. • Off 2 ❖ Enhanced Authentication Management For details about this function, consult your administrator. ❖ Administrator Authentication Management For details about this function, consult your administrator. ❖ Program / Change Administrator For details about this function, consult your administrator. ❖ Key Counter Management Specify that functions you want to manage with the key counter. ❖ Extended Security Specify whether or not to use the extended security functions. For details about the extended security functions, consult your administrator. 65 System Settings ❖ Auto Delete File in Document Server Specify whether documents stored in the Document Server will or will not be deleted after a specified period of time. The default setting is On, 3 day(s). If you select [On], documents stored subsequently are deleted after the specified period. If you select [On], documents are not automatically deleted. If you select [On], enter a number of days from 1 to 180 (in 1 day increments). The default is 3 days, this means documents are deleted 3 days (72 hours) after they are stored. 2 ❖ Delete All Files in Document Server You can delete files stored in the Document Server, including files stored for Sample Print, Locked Print, Hold Print, and Stored Print under the printer function. Even if a password is always set, all documents are deleted. A confirmation message appears. To delete all documents, select [Yes]. ❖ Program / Change / Delete LDAP Server Program the LDAP server to find up e-mail destinations in the LDAP server Address Book directly. This function is possible when sending scan files by email using the scanner function. To start an LDAP search, make sure that the items listed below are set. For other items, check your environment and make any necessary changes. • Server Name • Search Base • Port Number • Search Conditions • Authentication To use the LDAP server in Administrator Tools, select [On] under LDAP server. This function supports LDAP Version 2.0 and 3.0. Ver 2.0 does not support High Security authentication. ❖ LDAP Search Specify whether or not to use the LDAP server for searching. The default setting is Off. If you select [Off], the LDAP server list will not appear on the search display. ❖ AOF (Always On) Specify whether or not to use Auto Off. The default setting is On. ❖ Firmware Version You can check the version of the software installed in this machine. ❖ Network Security Level For details about this function, consult your administrator. 66 Administrator Tools ❖ Auto Erase Memory Setting For details about this function, consult your administrator. ❖ Erase All Memory For details about this function, consult your administrator. ❖ Delete All Logs For details about this function, consult your administrator. 2 ❖ Transfer Log Setting For details about this function, consult your administrator. ❖ Fixed USB Port Specify whether or not to fix the USB port. The default setting is Off. If a PC with the printer driver installed is connected to another device of the same model through the USB interface, selecting [On] for this option eliminates the need for additional installation of the driver to the PC. Reference p.3 “Accessing User Tools” p.113 “Address Book” p.128 “Printing the Counter for Each User” p.180 “Counter” 67 System Settings Programming the LDAP server This section describes how to specify the LDAP server settings. To program / change the LDAP server 2 This section describes how to program / change the LDAP server. A Press [System Settings]. B Press [Administrator Tools]. C Press [TNext] twice. D Press [Program / Change / Delete LDAP Server]. E Check that [Program / Change] is selected. F Select the LDAP server you want to program or change. When programming the server, select [Not Programmed]. G Set each item as necessary. H Press [OK] after setting each item. For details about LDAP server, see "Programming the LDAP server". I Press [Exit]. J Press the {User Tools/Counter} key. Reference p.68 “Programming the LDAP server” To enter an identification name This section describes how to enter a identification name. A Press [Change] under "Name". Register a name for the LDAP server that will appear on the server selection screen of the LDAP search operation. B Enter the server’s identification name. C Press [OK]. 68 Programming the LDAP server To enter a server name This section describes how to enter a server name. A Press [Change] under "Server Name". Register the LDAP server’s host name or IPv4 address. B Enter the LDAP server name. C Press [OK]. 2 To enter the search base This section describes how to enter the search base. A Press [Change] under "Search Base". Select a route folder to start the search from e-mail addresses registered in the selected folder are search targets. B Enter the search base. For example, if the search target is the sales department of ABC company, enter “dc=sales department, o=ABC”. (In this example, the description is for an active directory. “dc” is for the organization unit, and “o” is for the company.) Search base registration may be required depending on your server environment. When registration is required, unspecified searches will result in error. Check your server environment and enter any required specifications. C Press [OK]. To enter a port number This section describes how to enter a port number. A Press [Change] under "Port Number". Specify the port number for communicating with the LDAP server. Specify a port that is compliant with your environment. B Enter the port number using the number keys, and then press the {q} key. When SSL is set to [On], the port number automatically changes to “636”. 69 System Settings To start SSL communication This section describes how to specify SSL communication. A Press [On] under "Use Secure Connection (SSL). Use SSL to communicate with the LDAP server. To use SSL, the LDAP server must support SSL. When SSL is set to [On], the port number automatically changes to “636”. SSL setting must be enabled on this machine. For details, consult your network administrator. 2 To set authentication This section describes how to specify authentication. To make a search request to the LDAP server, use the administrator account for authentication. A Press [TNext]. B Press [On] or [High Security] under "Authentication". Authentication settings must comply with your server’s authentication settings. Check your server settings before setting this machine. [High Security] is available only with LDAP Version 3.0. When [High Security] is selected, the administrator password is encrypted before it is sent to the network. When [On] is selected, the password is sent without encryption. 70 Programming the LDAP server To enter the user name and password This section describes how to enter the user name and password. When [On] or [High Security] is selected for the authentication setting, use the administrator account name and password. Do not enter the administrator account name and password when using authentication for each individual or each search. 2 A Press [TNext]. B Press [Change] under "User Name". C Enter the user name, and then press [OK]. Procedures for the user name setting differ depending on server environment. Check your server environment before making the setting. Example: Domain Name\User Name, User Name@Domain Name, CN=Name, OU=Department Name, DC=Server Name D Press [Change] under "Password”. E Enter the password, and then press [OK]. The user name and password are required for administrator authentication to access the LDAP server. You can set the user name and password in this machine’s Address Book to allow individual authentication access to the LDAP server. Use Administrator Tools to select the user name and password you want to use. To test the connection This section describes how to test the connection. Access the LDAP server to check the proper connection is established. Check authentication works according to the authentication settings. A Press [Connection Test]. A connection test is carried out. B Press [Exit]. If the connection test fails, check your settings and try again. This function does not check search conditions or the search base. 71 System Settings To set search conditions This section describes how to specify search conditions. You can enter an attribute as a typical search keyword. Using the entered attribute, the function searches the LDAP server’s Address Book. A Press [TNext] twice. B Press [Change] for items you want to use as search conditions from the fol- 2 lowing: "Name", "E-mail Address", "Fax Number", "Company Name", and "Department Name". C Enter the attribute you want to use when searching for e-mail addresses, and then press [OK]. The attribute value may change depending on the server environment. Check the attribute value complies with your server environment before setting it. You can leave items blank, but you cannot leave attributes blank when searching for e-mail addresses from the LDAP server Address Book. To set search options This section describes how to specify search options. To search the LDAP server data using a keyword other than prepared keywords such as Name, E-mail Address, FAX Number, Company Name, and Department Name, specify the attribute for the keyword registered in your LDAP server, and the name to be displayed on the control panel during the search. For example, to search e-mail addresses by employee number, enter “employeeNo.” in the Attribute field, and “Employee No.” in the key display field. A Press [TNext] three times. B Press [Change] under "Attribute". C Enter the attribute you want to use when searching for e-mail addresses, and then press [OK]. The attribute value may change depending on the server environment. Check the attribute complies with your server environment before setting it. D Press [Change] under "Key Display". 72 Programming the LDAP server E Enter the key display, and then press [OK]. The registered “key display” appears as a keyword for searching LDAP. • Without key display registration 2 • With key display registration The key does not appear on the search screen unless both “Attribute” and “Key Display” are registered. Make sure you register both to use the optional search. 73 System Settings To delete the programmed LDAP server This section describes how to delete the programmed LDAP server. A Press [System Settings]. B Press [Administrator Tools]. C Press [TNext] twice. D Press [Program / Change / Delete LDAP Server]. E Press [Delete]. F Select the LDAP server you want to delete. G Press [Yes]. H Press [Exit]. I Press the {User Tools/Counter} key. 2 74 3. Copier / Document Server Features This chapter describes user tools in the Copier / Document Server Features menu. For details on how to access Copier / Document Server Features, see "Accessing User Tools". General Features This section describes the user tools in the General Features menu under Copier / Document Server Features. Default settings are shown in bold type. ❖ Auto Image Density Priority You can set whether Auto Image Density is "On" or "Off" when the machine is turned on, reset, or modes are cleared. The default setting for "Text" is On. The default setting for "Drawing" is On. The default setting for "Text / Photo" is On. The default setting for "Photo" is Off. The default setting for "Background Lines" is On. The default setting for "Patched Original" is On. The default setting for "Generation Copy" is On. 75 Copier / Document Server Features ❖ Copy Quality Adjust the finish for each original type (Text, Drawing, Text / Photo, Photo, Background Lines, Patched Original) [Custom Setting] provides a set of adjustment options that service representatives can use to meet customer requests for finish quality. • Text Adjust line and character outline quality in the copy image. The default setting is Normal. Character outline is less defined when [Soft] is selected; more defined when [Sharp] is selected. • Drawing Adjust the line density and lighter sections of image. The default setting is Normal. Originals that have light pencil lines can be reproduced with greater clarity when [Soft] is selected. When [Sharp] is selected, pencil lines can be reproduced clearly with improved clarity. • Text / Photo You can select to prioritize the copy image of "Text" or ”Photo" when copying originals contain photographs and the text. The default setting is Normal. When [Normal] is selected, an original containing a mixture of text and photographs can be reproduced. • Photo You can configure the machine to copy originals. The default setting is Printed Photo. Select [Printed Photo] when copying originals with photographs such as magazines or catalogues. A smooth finish image can be reproduced. Select [Glossy Photo] when copying developed photographs. These options improve the quality of characters within photo images. • Background Lines The default setting is Normal. • Patched Original The default setting is Darkest. 3 ❖ Image Density Specify the copy image density for each original type (Text, Drawing, Text / Photo, Photo, Background Lines, Patched Original, Generation Copy). The default setting is Normal. ❖ Max. Copy Quantity The maximum copy quantity can be set between 1 and 99. The default setting is 99 sheet(s). 76 General Features ❖ Auto Tray Switching If you load paper of the same size in two or more trays, the machine automatically shifts to the other when the first tray runs out of paper (when Auto Paper Select is selected.) This function is called "Auto Tray Switching". This setting specifies whether to use Auto Tray Switching or not. The default setting is With Image Rotation. • With Image Rotation Use to copy when using the Auto Tray Switching function. • Without Image Rotation Only copies with Auto Tray Switching if you load paper of the same size and in the same orientation in two or more trays. If the paper is not the same size or in the same orientation, copying is interrupted and the message "Load paper." is displayed. • Off When a paper tray runs out of paper, copying is interrupted and the message "Load paper." is displayed. 3 ❖ Job End Call You can choose whether or not the beeper sounds when copying is complete. The default setting is On. If Panel Tone of User Tools (System Settings) settings is [On], the machine beeps to notify you that it did not complete a job for reasons such as copying was interrupted, the paper tray ran out of paper, or a paper jam occurred. Reference p.3 “Accessing User Tools” "Selecting the Original Type Setting", Copy/ Document Server Reference "Adjusting Copy Image Density", Copy/ Document Server Reference "Selecting Copy Paper", Copy/ Document Server Reference 77 Copier / Document Server Features Reproduction Ratio This section describes the user tools in the Reproduction Ratio menu under Copier / Document Server Features. Default settings are shown in bold type. For details about the relationships between fixed reduce/enlarge ratios, document sizes, and paper sizes, see "Supplementary Information", Copier / Document Server Reference. ❖ User Reduce/Enlarge Ratio You can register up to three frequently used Reduce / Enlarge ratios other than the fixed Reduce / Enlarge ratio and have them shown on the initial display. You can also change registered Reduce / Enlarge ratios. When you select [User Reduce/Enlarge Ratio], the ratio can be set from 25.0 to 400.0%, using the number keys. • Metric version: The default setting for "F1" is 70.7%. The default setting for "F2" is 141.4%. The default setting for "F3" is 200.0%. • Inch Version (Engineering): The default setting for "F1" is 64.7%. The default setting for "F2" is 129.4%. The default setting for "F3" is 200.0%. • Inch Version (Architecture) The default setting for "F1" is 66.7%. The default setting for "F2" is 133.3%. The default setting for "F3" is 200.0%. 3 78 Reproduction Ratio ❖ Reproduction Ratio Specify the enlargement and reduction ratios that appear if [Reduce / Enlarge] is pressed on the copier screen. When you select [User Reduce/Enlarge Ratio], the ratio can be set from 25.0 to 400.0%, using the number keys. 3 Metric version: • 25.0% (A0 → A4) • 35.4% (A1 → A4, A0 → A3) • 50.0% (A2 → A4, A1 → A3) • 70.7% (A3 → A4, A1 → A2) • 141.4% (A4 → A3, A2 → A1) • 200.0% (A4 → A2, A3 → A1) • 282.8% (A4 → A1, A3 → A0) • 400.0% (A4 → A0) Inch version (Engineering) • 25.0% (E → A) • 32.4% (D → A, E → B) • 50.0% (C → A, D → B, E → C) • 64.7% (B → A, C → B, D → C, E → D) • 129.4% (A → B, B → C, C → D, D → E) • 200.0% (A → C, B → D, C → E) • 258.8% (A → D, B → E) • 400.0% (A → E) 79 Copier / Document Server Features Inch version (Architecture) • 25.0% (E → A) • 33.3% (D → A, E → B) • 50.0% (C → A, D → B, E → C) • 66.7% (B → A, C → B, D → C, E → D) • 133.3% (A → B, B → C, C → D, D → E) • 200.0% (A → C, B → D, C → E) • 266.7% (A → D, B → E) • 400.0% (A → E) 3 ❖ Reduce/Enlarge Ratio Priority You can set the ratio that has priority when [Reduce / Enlarge] is pressed on the copier screen. The default setting is 70.7% (Metric version) / 64.7% (Inch version: Engineering) / 66.7% (Inch version: Architecture). ❖ Magnification Key Display Specify which scale's reproduction ratios shown on the initial display. The default setting is Engineering. ❖ User Auto Reduce/Enlarge: Define a user auto reduce/enlarge ratio for each document size when copying with the User Auto Reduce / Enlarge feature. [Off] determines whether to display a defined user auto reduce/enlarge ratio on a copier screen. Select one of the following paper sizes for a user auto reduce/enlarge ratio defined for each document size: • 34" × 44" • 22" × 34" • 17" × 22" • 11" × 17" • 81/2" × 11" • 36" × 48" • 24" × 36" • 18" × 24" • 12" × 18" • 9" × 12" Reference p.3 “Accessing User Tools” "Supplementary Information", Copier / Document Server Reference 80 Edit Edit This section describes the user tools in the Edit menu under Copier / Document Server Features. Default settings are shown in bold type. ❖ Adjust Position Specify the default setting for Print Position Adjustment. The default setting is Bottom: 20 mm / Right: 20 mm (Metric version) / Bottom: 0.8" / Right: 0.8" (Inch version) • Metric version: 0 to 200 mm (1 mm increments) • Inch version: 0 to 7.8" (0.1" increments) 3 ❖ Erase Border Width Specify the width of the border to be erased. The width is displayed over the other copier screen images. The default setting is 10 mm (Metric version) / 0.4" (Inch version). ❖ Erase Original Shadow in Combine In Combine Copy or Booklet/Magazine Copy mode, you can specify whether to erase a 3 mm, 0.1" bounding margin around all four edges of each original. The default setting is On. 81 Copier / Document Server Features ❖ Image Repeat Separation Line You can select a separation line using the Image Repeat function from: None, Solid, Broken A, Broken B, or Crop Marks. • None • Solid 3 • Broken A • Broken B • Crop Marks The default setting is None. Selecting solid or broken lines might produce a blank area of approximately 1.5 mm (0.06") in width along the separation line. 82 Edit ❖ Double Copies Separation Line You can select a separation line using the Double Copies function from: None, Solid, Broken A, Broken B, or Crop Marks. • None • Solid 3 • Broken A • Broken B • Crop Marks The default setting is None. Selecting solid or broken lines might produce a blank area of approximately 1.5 mm (0.06") in width along the separation line. 83 Copier / Document Server Features ❖ Separation Line in Combine You can select a separation line using the Combine function from: None, Solid, Broken A, Broken B, or Crop Marks. • None • Solid 3 • Broken A • Broken B • Crop Marks The default setting is None. Selecting solid or broken lines might produce a blank area of approximately 1.5 mm (0.06") in width along the separation line. ❖ Copy Order in Combine You can set the copy order in Combine mode to Left to Right or Top to Bottom. GCAH090E The default setting is From Left to Right. 84 Edit ❖ Program / Delete Format Store a format (background) image for use with Format Overlay. You can store up to four formats. See "Program/Delete Overlay Format". ❖ Margin Adjustment Priority Specify the default setting for the margin size. You can set the top and bottom margin size. The default setting is Top: 20 mm, Bottom: 20 mm (Metric version) / Top: 0.8", Bottom: 0.8" (Inch version). The size can be set as follows: • Meric version: 0 to 200 mm (1 mm increments) • Inch version: 0.0" to 7.9" (0.1" increments) 3 ❖ Partial Copy Size Specify the default settings of the start position (Y1) and the copy size (Y2). The default setting is Y1: 0 mm, Y2: 210 mm (Metric version) / Y1: 0.0", Y2: 8.3" (Inch version). The size can be set as follows: • Metric version: Y1: 0 to 14790 mm (1 mm increments), Y2: 210 mm to 15000 mm (1 mm increments) • Inch version: Y1: 0.0" to 582.3" (0.1" increments), Y2: 8.3" to 590.6" (0.1" increments) Reference p.3 “Accessing User Tools” p.93 “Program / Delete Overlay Format” 85 Copier / Document Server Features Stamp This section describes the user tools in the Stamp menu under Copier / Document Server Features. Default settings are shown in bold type. Background Numbering This section describes the user tools in the Background Numbering menu under Stamp. 3 ❖ Size You can set the size of the numbers. The default setting is Normal. ❖ Density You can set the density of the numbers. The default setting is Normal. Preset Stamp This section describes the user tools in the Preset Stamp menu under Stamp. ❖ Stamp Language You can select the language of the message printed in Stamp mode. The default setting is English. ❖ Stamp Priority You can select the stamp type given priority when [Preset Stamp] is pressed. The default setting is COPY. 86 Stamp ❖ Stamp Format Specify how each of stamp is printed. • Stamp Position Specify where to print the stamp. The default setting is Top Right. • Stamp Position You can adjust the position of the stamp within the available ranges shown below. Metric version: "Top Left"…T/B: 4-407mm, L/R: 4-407mm "Top Center"…T/B: 4-407mm, L/R: 203-203mm "Top Right"…T/B: 4-407mm, L/R: 4-407mm "Center Left"…T/B: 203-203mm, L/R: 4-407mm "Center"…T/B: 203-203mm, L/R: 203-203mm "Center Right"…T/B: 203-203mm, L/R: 4-407mm "Bottom Left"…T/B: 4-407mm, L/R: 4-407mm "Bottom Center"…T/B: 4-407mm, L/R: 203-203mm "Bottom Right"…T/B: 4-407mm, L/R: 4-407mm 3 Inch version: "Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Center Left"…T/B: 8.0"-8.0", L/R: 0.1"-16.0" "Center"…T/B: 8.0"-8.0", L/R: 8.0"-8.0" "Center Right"…T/B: 8.0"-8.0", L/R: 0.1"-16.0" "Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" • Size You can set the size of the stamp. The default setting is 1X. • Density You can set the pattern used to print the stamp. Normal: The stamp is printed on the image. You cannot check which parts will overlap. Lighter: The image can be seen through the stamp. Lightest: The image appears even clearer than in the Lighter setting. The default setting is Normal. • Page to Stamp You can have the stamp printed on the first page or all pages. The default setting is All Pages. Reference "Preset Stamp", Copy/ Document Server Reference 87 Copier / Document Server Features User Stamp This section describes the user tools in the User Stamp menu under Stamp. ❖ Program / Delete Stamp You can register, change, or delete user stamps. You can register up to four custom stamps with your favorite designs. ❖ Stamp Format: 1-4 Specify how each of registered User Stamps 1 to 4 is printed. • Stamp Position Specify where to print the User Stamp. The default setting is Top Right. • Stamp Position You can adjust the position of the User Stamp within the available ranges shown below. 3 Metric version: "Top Left"…T/B: 4-407mm, L/R: 4-407mm "Top Center"…T/B: 4-407mm, L/R: 203-203mm "Top Right"…T/B: 4-407mm, L/R: 4-407mm "Center Left"…T/B: 203-203mm, L/R: 4-407mm "Center"…T/B: 203-203mm, L/R: 203-203mm "Center Right"…T/B: 203-203mm, L/R: 4-407mm "Bottom Left"…T/B: 4-407mm, L/R: 4-407mm "Bottom Center"…T/B: 4-407mm, L/R: 203-203mm "Bottom Right"…T/B: 4-407mm, L/R: 4-407mm Inch version: "Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Center Left"…T/B: 8.0"-8.0", L/R: 0.1"-16.0" "Center"…T/B: 8.0"-8.0", L/R: 8.0"-8.0" "Center Right"…T/B: 8.0"-8.0", L/R: 0.1"-16.0" "Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" • Page to Stamp Sets whether to print the stamp on all pages or only the first page. The default setting is All Pages. Reference "User Stamp", Copy/Document Server Reference 88 Stamp Date Stamp This section describes the user tools in the Date Stamp menu under Stamp. ❖ Format You can select the date format for Date Stamp mode. The default setting is DD / MM / YYYY (Metric version) / MM / DD / YYYY (Inch version). ❖ Font You can select the Date Stamp font. The default setting is Font 1. 3 ❖ Size You can set the Date Stamp size. The default setting is Auto. ❖ Superimpose You can have the Date Stamp printed in white when it overlaps black parts of the image. The default setting is Off. ❖ Stamp Setting Specify how Date Stamp is printed. • Stamp Position Specify where to print the Date Stamp. The default setting is Top Left. • Stamp Position You can adjust the position of the Date Stamp within the available ranges shown below. Metric version: "Top Left"…T/B: 4-407mm, L/R: 4-407mm "Top Center"…T/B: 4-407mm, L/R: 203-203mm "Top Right"…T/B: 4-407mm, L/R: 4-407mm "Bottom Left"…T/B: 4-407mm, L/R: 4-407mm "Bottom Center"…T/B: 4-407mm, L/R: 203-203mm "Bottom Right"…T/B: 4-407mm, L/R: 4-407mm Inch version: "Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" • Page to Stamp Sets whether to print the stamp on all pages or only the first page. The default setting is All Pages. 89 Copier / Document Server Features Page Numbering This section describes the user tools in the Page Numbering menu under Stamp. ❖ Stamp Format You can select the page number format given priority when [Page Numbering] is pressed. The default setting is P1,P2.... ❖ Font You can select the page number printed in Page Numbering mode. The default setting is Font 1. 3 ❖ Size You can set the size of the stamp printed in Page Numbering mode. The default setting is Auto. ❖ Page Numbering in Combine You can set page numbering when using the Combine function and the Page Numbering function together. The default setting is Per Original. ❖ Stamp Position Specify how each of stamp is printed. • Stamp Position Specify where to print the stamp. • Stamp Position You can adjust the position of the stamp within the available ranges shown below. Metric version: "Top Left"…T/B: 4-407mm, L/R: 4-407mm "Top Center"…T/B: 4-407mm, L/R: 203-203mm "Top Right"…T/B: 4-407mm, L/R: 4-407mm "Bottom Left"…T/B: 4-407mm, L/R: 4-407mm "Bottom Center"…T/B: 4-407mm, L/R: 203-203mm "Bottom Right"…T/B: 4-407mm, L/R: 4-407mm Inch version: "Top Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Top Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Top Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Bottom Left"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" "Bottom Center"…T/B: 0.1"-16.0", L/R: 8.0"-8.0" "Bottom Right"…T/B: 0.1"-16.0", L/R: 0.1"-16.0" 90 Stamp ❖ Superimpose You can have page numbers printed in white when they overlap black parts of the image. The default setting is Off. ❖ Page Numbering Initial Letter You can select the page numbering initial letter between”P1, P2.../ P.1, P.2...” and ”S1, S2.../ S.1, S.2...” The default setting is P1,P2.../P.1,P.2.... Reference p.3 “Accessing User Tools” 3 91 Copier / Document Server Features Input/Output This section describes the user tools in the Input/Output menu under Copier / Document Server Features. Default settings are shown in bold type. ❖ Rotate Sort: Auto Paper Continue Specify to continue copying when paper of the required orientation has run out during rotate sort. The default setting is Off. • On Copying continues using copy paper of a different orientation. The copy job will finish even if you have left the machine. • Off When paper of the required orientation runs out, the machine stops copying and prompts you to supply copy paper. After you have loaded paper, the machine will continue copying. 3 ❖ Customize Function: Fold Type/Fold Option Specify which "Fold Type/Fold Option" has priority to be shown on the initial display. • • • • • • Off Fan Fold 81/2inch Fan Fold 9inch Fan Fold 11inch Fan Fold 12inch Fan Fold 81/2inch (Margin Fold) Reference p.3 “Accessing User Tools” 92 Program / Delete Overlay Format Program / Delete Overlay Format This section describes how to program / delete Overlay Format. Note ❒ The maximum size of original size to be stored is A0(E). You cannot store long length originals. ❒ For details about Format Overlay, see "Format Overlay", Copier / Document Server Reference. 3 Reference "Format Overlay", Copier / Document Server Reference Programming an Overlay Format This section describes how to program an Overlay Format. A Make sure the machine is ready to copy. B Press [Copier / Document Server Features]. C Press [Edit]. D Press [Program / Delete Format]. E Check that [Program] is selected. F Select a format number (1 to 4). 93 Copier / Document Server Features G Select the original orientation. 3 H Place the original, and then press [Start Scanning]. The original is scanned and stored. I Press [Exit]. J Press the {User Tools / Counter} key. Overwriting a Stored format This section describes how to overwrite a stored Overlay Format. A Make sure the machine is ready to copy. B Press [Copier / Document Server Features]. C Press [Edit]. D Press [Program / Delete Format]. E Check that [Program] is selected. F Select a format number you want to overwrite. G Press [Yes]. You cannot restore a format that has been overwritten. Press [Stop] if you do not want to overwrite the existing format. H Select the original orientation. I Place the original, and then press [Start Scanning]. The original is scanned and stored. J Press [Exit]. K Press the {User Tools / Counter} key. 94 Program / Delete Overlay Format Deleting a Stored format This section describes how to delete a stored Overlay Format. A Make sure the machine is ready to copy. B Press [Copier / Document Server Features]. C Press [Edit]. D Press [Program / Delete Format]. E Press [Delete]. F Select the format number you want to delete. G Press [Yes]. 3 You cannot restore a format that has been deleted. Press [No] if you do not want to delete the existing format. H Press [Exit]. I Press the {User Tools / Counter} key. 95 Copier / Document Server Features Settings for the Document Server This section describes user tool settings for the Document Server. For details, see "System Settings", and "Copier / Document Server Features". ❖ System Settings 3 Heading Item Default General Features Warm-up Beeper On General Features Copy Count Display Up General Features Output: Document Server Internal Tray 1 Tray Paper Settings Paper Tray Priority: Copier Tray 1 Timer Settings Copier / Document Server Auto Reset Timer 60 second(s) Administrator Tools Auto Delete File in Document Server Yes, 3 day(s) Administrator Tools Delete All Files in Document Server - Reference p.35 “System Settings” 96 4. Printer Features This chapter describes user tools in the Printer Features menu. For details on how to access Printer Features, see "Accessing User Tools". List / Test Print This section describes the user tools in the Test Print menu under Printer Features. ❖ Multiple Lists You can print the configuration page and error log. ❖ Configuration Page You can print the machine's current configuration values. ❖ Error Log You can print error logs listing all errors that occurred during printing. The most recent 30 errors are stored in the error log. If a new error is added when there are 30 errors already stored, the oldest error is deleted. However, if the oldest error belongs to one of the following types of print jobs, it is not deleted. Instead, it will be stored in a separate error log, up to a maximum of 30 errors. You can check any of these print jobs for error log information. • Sample Print • Locked Print • Hold Print • Stored Print The records of Auto Job Cancel and jobs canceled manually from the control panel can be printed. ❖ Menu List You can print a Menu List showing the machine's function menus. ❖ PS Configuration / Font Page You can print the current configuration and installed PostScript font list. ❖ PDF Configuration / Font Page You can print the current configuration and installed PDF font list. ❖ Hex Dump You can print in the Hex Dump mode. 97 Printer Features Note ❒ When printing from the [List / Test Print] menu, the machine first tries to print from a tray containing plain or recycled paper. It checks the cut paper tray first, then the paper roll tray. If there is no paper tray containing plain or recycled paper, the machine then tries print on tracing paper and finally printing film. ❒ If the paper roll tray is selected for list printing, the roll paper is cut to A4 size. The paper trays available to be selected for list printing are those that have been selected [Yes] in [Apply Auto Paper Select] of [Paper Type: Tray 1-3] under [System Settings]. (except for printing the system configuration listing). ❒ The machine first tries to use A4 (81/2" x 11") paper for printing the Configuration Page. If the cut paper tray does not contain A4 paper, the machine then tries to use 210 mm-wide paper by checking the paper roll tray and then the preferred paper tray. ❒ The machine first tries to use the preferred paper tray that usually contains plain or recycled paper to print PS Configuration / Font Page. The page will be printed to fit the size of the plain or recycled paper. 4 Printing the Configuration Page This section describes how to print the Configuration Page. A Press [Printer Features]. B Press [Configuration Page] on the [List / Test Print]. The configuration page is printed. C Press the {User Tools/Counter} key. 98 List / Test Print Interpreting the Configuration Page This section describes the Configuration Page. ❖ System Reference • Unit Number Displays the serial number assigned to the board by its manufacturer. • Total Memory Displays the total amount of memory (SDRAM) installed on the printer. • Firmware Version Printer: Displays the version number of the printer firmware. System: Displays the version number of the system firmware. Engine: Displays the version number of the printer engine. LCDC: Displays the version number of the panel display. NIB: Displays the version number of the Network interface. • Device Connection This item(s) appears when the device option(s) is installed. • HDD: Font / Macro Download Displays the capacity of the hard disk drive. • Printer Language Displays the version number of the printer driver language. • Connection Equipment Displays the installed optional equipments. 4 ❖ Paper Input Displays settings made under Tray Paper Settings menu. ❖ System Displays settings made under the System menu. ❖ PS Menu Displays settings made under PS Menu. ❖ PDF Menu Displays settings made under PDF Menu. ❖ Host Interface Displays settings made under the Host Interface menu. When DHCP is active on the network, the actual IPv4 address, subnet mask and gateway address appear in parentheses on the configuration page. ❖ Interface Information Displays the interface information. Reference p.3 “Accessing User Tools” 99 Printer Features Maintenance This section describes the user tools in the Maintenance menu under Printer Features. Default settings are shown in bold type. ❖ List / Test Print Lock You can lock the [List / Test Print] menu. The default setting is Off. ❖ Delete All Temporary Print Jobs You can delete all print jobs temporarily stored in the machine. ❖ Delete All Stored Print Jobs You can delete all print jobs stored in the machine. 4 Reference p.3 “Accessing User Tools” p.35 “System Settings” 100 System System This section describes the user tools in the System menu under Printer Features. Default settings are shown in bold type. ❖ Print Error Report Select this to have an error report printed when a printer or memory error occurs. The default setting is Off. ❖ Auto Continue You can select this to enable Auto Continue. When it is On, printing continues after a system error occurs. The default setting is Off. If this option is set to [Off], a message appears when the specified tray runs out of paper. To cancel a current print job, press [Job Reset]. Printing resumes automatically when you reload the driver-specified tray. 4 ❖ Memory Overflow Select this to have a memory overflow error report printed. The default setting is Do not Print. ❖ Rotate by 180 Degrees Specify whether to rotate the print image 180 degrees relative to the paper orientation. The default setting is Off. ❖ Auto Delete Temporary Print Jobs You can select to automatically delete print jobs temporarily stored in the machine. The default setting is Off. If you select [On], you can set up to 200 hours for auto file deleting. ❖ Auto Delete Stored Print Jobs You can select to automatically delete print jobs stored in the machine. The default setting is On, 3 day(s). If you select [On], you can set up to 180 days for auto file deleting. ❖ Initial Print Job List You can set the desired type of print job list that appears on the screen when you press [Print Jobs]. The default setting is Complete List. • Complete List Displays the list of print jobs stored in the machine. • List Per User ID Displays the list of the User ID who stored a file in the machine. 101 Printer Features ❖ Memory Usage You can select the amount of memory used in Font Priority or Frame Priority, according to paper size or resolution. The default setting is Frame Priority. • Font Priority This setting uses memory for registering fonts. • Frame Priority This setting uses frame memory for high speed printing. ❖ Copies You can specify the number of print sets. This setting is disabled if the number of pages to print has been specified with the printer driver or another command. The default setting is 1. The number of copies can be specified from 1 to 999 by increments of one. 4 ❖ Blank Page Print You can select whether or not to print blank pages. The default setting is On. Pages that match one of the following conditions are identified as blank. • There are no images. • There are images but they are outside the printable area. • There are only blank characters. ❖ Reserved Job Waiting Time You can specify how long the machine waits to receive a print job before allowing other functions such as the copier and scanner functions to interrupt it. The default setting is Short Wait. ❖ Printer Language Specify the printer language. The default setting is Auto. This menu appears only when the PostScript 3 unit is installed. ❖ Sub Paper Size You can enable the Auto Substitute Paper Size (A4, LT) feature. The default setting is Off. ❖ Bypass Tray Setting Priority Specify whether (Printer) Driver / Command or Machine Settings, has priority for determining the paper size for the bypass tray. The default setting is Driver / Command. ❖ Edge to Edge Print You can select whether or not to print on the entire sheet. The default setting is Off. The 5 mm margin along the edges may not be printed properly. 102 System ❖ Default Printer Language You can set the default printer language if the machine cannot find the printer language automatically. The default setting is PS. This menu appears only when the PostScript 3 unit is installed. ❖ Tray Switching You can set to switch the paper tray. The default setting is Off. Reference p.3 “Accessing User Tools” "Loading paper", Troubleshooting 4 103 Printer Features Host Interface This section describes the user tools in the Host Interface menu under Printer Features. Default settings are shown in bold type. ❖ I/O Buffer You can set the size of the I/O Buffer. Normally it is not necessary to change this setting. The default setting is 128KB. ❖ I/O Timeout You can set how many seconds the machine should wait before ending a print job. If data from another port usually arrives in the middle of a print job, you should increase this timeout period. The default setting is 15 seconds. 4 Reference p.3 “Accessing User Tools” 104 PS Menu PS Menu This section describes the user tools in the PS Menu under Printer Features. Default settings are shown in bold type. ❖ Data Format You can select a data format. The default setting is TBCP. This setting is not effective when operating the machine with a parallel or EtherTalk connection. When operating the machine with a parallel connection, and also if the binary data is sent from the printer driver, the print job is canceled. When operating the machine with an Ethernet connection, the print job is canceled under the following conditions: • The printer driver data format is TBCP, and the data format selected on the display panel is Binary Data. • The printer driver data format is binary, and the data format selected on the display panel is TBCP. 4 ❖ Resolution You can set the print resolution in dots per inch. The default setting is 600 dpi. Reference p.3 “Accessing User Tools” 105 Printer Features PDF Menu This section describes the user tools in the PDF Menu under Printer Features. Default settings are shown in bold type. ❖ Change PDF Password Set the password for the PDF file executing PDF Direct Print. • Current Password • New Password • Confirm New Password A password can be set using the Web Image Monitor, but in this case the password information is sent through the network. If security is a priority, set the password using this menu from the Control Panel. 4 ❖ PDF Group Password Set the group password already specified with DeskTopBinder. • Current Password • New Password • Confirm New Password A password can be set using the Web Image Monitor, but in this case the password information is sent through the network. If security is a priority, set the password using this menu from the Control Panel. ❖ Resolution You can set the print resolution in dots per inch. The default setting is 600 dpi. Reference p.3 “Accessing User Tools” 106 5. Scanner Features This chapter describes user tools in the Scanner Features menu. For details on how to access Scanner Features, see "Accessing User Tools". General Settings This section describes the user tools in the General Settings menu under Scanner Features. Default settings are shown in bold type. ❖ Switch Title Select the title to be shown on the destination list. The default setting is Title 1. ❖ Update Delivery Server Destination List Press [Update Delivery Server Destination List] to update the receivers from the delivery server. To use this function, it is necessary to set [Delivery Option] to [On]. For details about "Delivery Option", see "File Transfer". ❖ Search Destination Select a destination list to be used in "Search Destination". To search from LDAP server, it is necessary to register the LDAP server in [System Settings] and set [LDAP Search] to [On]. The default setting is Address Book. For details about "LDAP Search", see ”Administrator Tools". ❖ TWAIN Standby Time When the machine is being used to send e-mail or a file, or functioning as Document Server or a network delivery scanner, a scanning request to the machine as a TWAIN scanner will switch the machine to the network TWAIN scanner function. This setting determines the delay until the machine switches to the network TWAIN scanner function. The default setting is Set Time, 10 sec.. When [Immediate] is selected, the machine will switch to the network TWAIN scanner function at once. When [Set Time] is selected, you can enter the delay time with the number keys (3-30 seconds). The machine will switch to the network TWAIN scanner function when the time set here passes after the last key operation. ❖ Destination List Display Priority 1 Select a destination list to be displayed when the machine is in the initial state. You can select either [E-mail / Folder] or [Delivery Server]. The default setting is Delivery Server. 107 Scanner Features ❖ Destination List Display Priority 2 In the machine’s address book, select which address book appears by default. You can select either [E-mail Address] or [Folder]. The default setting is E-mail Address. ❖ Print & Delete Scanner Journal Up to 250 transmission/delivery results can be checked on this machine. If the stored transmission / delivery results reach 250, select whether to print the delivery journal. • On The transmission/delivery journal is printed automatically. The printed journal is deleted. • Off Transmission/delivery results are deleted one by one as new results are stored. • Do not Print: Disable Send Transmission/delivery cannot be performed when the journal is full. Selecting [Print Scanner Journal] or [Delete Scanner Journal] resets the journal, which allows you to begin transmission/delivery. The default setting is On. When printed, all records are deleted after printing. When not printed, records over the limit are automatically deleted in succession from the oldest record. While the journal is being printed, files with the status waiting cannot be sent. 5 ❖ Print Scanner Journal The scanner journal is printed and deleted. Before printing the scanner journal, be sure to raise the original switching lever. ❖ Delete Scanner Journal The scanner journal is deleted without being printed. Reference p.54 “File Transfer” p.59 “Administrator Tools” 108 Scan Settings Scan Settings This section describes the user tools in the Scan Settings menu under Scanner Features. Default settings are shown in bold type. ❖ Next Original Wait Setting To divide originals and scanning them individually to make a single file, select [Off], [Set Wait Time], or [Continuous Wait] for the waiting status. The default setting is Set Wait Time. The default setting time is 60 sec.. If [Set Wait Time] is selected, enter the wait time in seconds (3-999) for placing additional originals with the number keys. Scanning will start if additional originals are placed and the {Start} key is pressed within this time. You can end scanning and begin transmission by pressing the {q} key within this time. Once the specified time has elapsed, transmission starts automatically. If [Continuous Wait] is selected, the machine will wait for additional originals until the {q} key is pressed. Scanning will start when additional originals are placed and the {Start} key is pressed. You can end scanning and begin sending by pressing the {q} key. If a paper misfeed occurs or any of the following operations are performed while the machine is waiting for additional originals, the countdown stops and does not start again until the {q} key is pressed. • Changing the settings such as the scan settings • Opening the scanner cover • Pressing the {Interrupt} key to activate the copy mode 5 Reference p.3 “Accessing User Tools” "Scan Settings", Scanner Reference "Scan Size", Scanner Reference 109 Scanner Features Send Settings This section describes the user tools in the Send Settings menu under Scanner Features. Default settings are shown in bold type. ❖ Compression (Black & White) Select whether or not to compress scan files. The default setting is On. Compression reduces the time required for transferring the scan file. The actual time required for file transfer will vary depending on the file size and network load. ❖ Max. E-mail Size Select whether or not to limit the size of an e-mail to which an image is attached. The default setting is On, 2048KB. When [On] is selected, enter the size limit (128-102400 KB) with the number keys. When the SMTP limits the size, match that setting. 5 ❖ Divide & Send E-mail This function is effective only when [On] is selected for [Max. E-mail Size]. Select whether or not an image exceeding the size specified in [Max. E-mail Size] should be divided and sent using more than one e-mail. The default setting is Yes (per Max. Size). The default maximum number of divisions is 5. When [Yes (per Max. Size)] is selected, enter the Max. Number of Divisions (2500) with the number keys. When [Multi-page: TIFF] or [Multi-page: PDF] is selected for [File Type], the image will not be divided even if [Yes (per Page)] is selected. When [Yes (per Max. Size)] is selected, some received files may not be able to be restored, depending on the type of e-mail software. If [Off] is selected for this option, and an attempt is made to send an e-mail message that is larger than the specified maximum e-mail size, the machine will read only as much of the message as the maximum size allows. When this happens, you can then select either to cancel sending or send only the portion that has been read. Set the maximum e-mail size within the capacity of the SMTP server. 110 Send Settings ❖ Insert Additional E-mail Info Select the language in which e-mail information such as title, date, and administrator's e-mail address is sent. • On • Off Select one of the following 20 languages: • British English, American English, German, French, Italian, Spanish, Dutch, Portuguese, Polish, Czech, Swedish, Finnish, Hungarian, Norwegian, Danish, Japanese, Simplified Chinese, Traditional Chinese, Russian, and Hangul. Even if [Off] is selected, the massage entered into the scanner screen will be sent by e-mail. The e-mail text which is a template cannot be changed. ❖ No. of Digits for Single Page Files Sets digit number for serial number to attach to Single Page file name. The default setting is 4 Digits. 5 ❖ Stored File E-mail Method Specify the e-mail setting for sending stored files. You can select [Send File] or [Send URL Link]. This setting can be used for the following: The default setting is Send File. • Sending Stored Files by E-mail • Simultaneous Storage and Sending by E-mail If you select [Send File], actual files are attached to e-mails. If you select [Send URL Link], URL Links to file locations are attached to emails. Reference p.3 “Accessing User Tools” 111 Scanner Features 5 112 6. Registering Addresses and Users for Scanner Functions This chapter describes how to register destinations and users in the Address Book. For details on how to access System Settings see "Accessing User Tools". Address Book This section describes Address Book settings. Registering information such as the names of users and their e-mail addresses in the Address Book allows you to manage them easily. Important ❒ Address Book data is stored on the hard disk. It can be lost if there is some kind of hard disk failure. The manufacturer shall not be responsible for any damages resulting data loss. You can register and manage the following items in the Address Book: ❖ Names You can register the name of the user and the key display. This is the basic information required for managing user of the machine. To register an e-mail address in the address book, you must register information such as the user name and destination name in advance. ❖ Auth. Info You can register user codes in order to restrict particular functions to certain users, and to check their use of each function. You can also register login user names and login passwords to be used when sending e-mail, sending to folders, or accessing an LDAP server. 113 Registering Addresses and Users for Scanner Functions ❖ Protection You can set protection codes to stop sender's name from being used or folders from being accessed without authorization. ❖ E-mail Address You can register e-mail destinations in the Address Book. 6 114 Address Book ❖ Folder You can register the protocol, path name and server name. • SMB • FTP 6 • NCP ❖ Add to Group You can put registered e-mail and folder destinations into a group for easier management. 115 Registering Addresses and Users for Scanner Functions Note ❒ You can also use a Web Image Monitor to register names in the Address Book. With the SmartDeviceMonitor for Admin, you can register multiple names at the same time. For details about using Web Image Monitor, see the Web Image Monitor Help. ❒ Using Address Management Tool in SmartDeviceMonitor for Admin, you can backup Address Book data. We recommend backing up data when using the Address Book. For operating instructions, see SmartDeviceMonitor for Admin Help. Managing names in the Address Book By registering a name and key display beforehand, you can specify e-mail and folder destinations simply by selecting the name key. Reference p.118 “Registering Names” Sending e-mail by Quick Dial 6 By registering e-mail addresses in the Address Book, you can specify e-mail destinations simply by selecting them from the scanner initial display when sending a document using the scanner function. A registered e-mail address can be used as the sender's address, and the sender's addresses are automatically entered in the “From" field of an e-mail header. Reference p.132 “E-mail Destination” Sending scanned files to a shared folder directly After registering the path name, user name and password, you can connect to a shared folder simply by selecting the destination shown on the initial scanner display whenever sending files using the scanner function to a shared folder. To share the folder using Windows, select the SMB protocol. To register the folder to the FTP server, select the FTP protocol. To register the folder to the NetWare server, select the NCP protocol. Reference p.137 “Registering Folders” 116 Address Book Preventing unauthorized user access to shared folders from the machine After registering a protection code, you can specify the object of protection to prevent an e-mail destination from being used without permission. You can prevent unauthorized access to registered folders. Reference p.168 “Registering a Protection Code” Managing users and machine usage Register user codes to limit users to the following functions and check their use of each function: • Copier • Document Server • Scanner • Printer 6 Reference p.122 “Authentication Information” 117 Registering Addresses and Users for Scanner Functions Registering Names This section describes names in Address Book. Register user information including their names. The user name is useful for selecting a destination when sending e-mail. You can also use it as a folder destination. You can register up to 2000 names. Registering Names This section describes how to register names. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Press [New Program]. F Press [Change] under ”Name". The name entry display appears. G Enter the name, and then press [OK]. 118 The key display name is set automatically. Registering Names H When you want to change the key display, press [Change] under "Key Display". I Enter the key display, and then press [OK]. J Press the key for the classification you want to use under "Select Title”. The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title. You can select [Frequent] and one more page for each title. 6 K Press [OK]. L Press [Exit]. M Press the {User Tools/Counter} key. Note ❒ The name can be used for documents in the Document Server. For details about the Document Server, see "Using the Document Server", Copy/ Document Server Reference. ❒ You can register up to 2000 programs and allocate them registration numbers between 00001 and 50000. ❒ Registration numbers are initially assigned automatically, but you can change them afterward. To change a registration number, press [Change] to the right of “Registration No.”, and enter a new number using the number keys. Reference "Entering Text", About This Machine "Using the Document Server", Copy/ Document Server Reference 119 Registering Addresses and Users for Scanner Functions Changing a Registered Name This section describes how to change a registered name. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the registered name you want to change. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F To change the name or key display, press [Change] under the name or key display. G Enter the name or key display, and then press [OK]. H To change the title, press the key for the classification you want to use from Select Title. I To change the registration number, press [Change] under ”Registration No.". J Enter a new registration number using the number keys, and then press the {q} key. K Press [OK]. L Press [Exit]. M Press the {User Tools/Counter} key. Reference "Entering Text", About This Machine 120 Registering Names Deleting a Registered Name This section describes how to delete a registered name. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Press [Delete]. E Select the name you want to delete. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Yes]. G Press [Exit]. H Press the {User Tools/Counter} key. 121 Registering Addresses and Users for Scanner Functions Authentication Information This section describes the procedure for authenticating a user code. Important ❒ The functions associated with each user code are the same. If you change or delete user codes, management data and limits associated with that code become invalid. Register user codes to limit users to the following functions and check their use of each function: Copier Document Server Scanner Printer Note ❒ You can register up to 100 user codes. If you add the optional user account enhance unit, you can register up to 500 user codes. ❒ The number of copies scanned using the scanner function is counted for each user code. This allows you to check each user's usage. ❒ To automatically register the printer driver user code, select [Printer: PC Control] for the printer in User Code Authentication. To use the user code set in User Tools, set the user codes registered in User Tools for the printer driver. ❒ For details about setting user codes for the printer driver, see Printer Driver Help. 6 122 Authentication Information Registering a User Code This section describes how to register a user code. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Press the name whose code is to be registered, or enter the registered num- 6 ber using the number key. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Auth. Info]. G Enter the user code using the number keys, and then press the {q} key. If you make a mistake, press [Clear] or the {Clear/Stop} key. H Press [TNext] twice. 123 Registering Addresses and Users for Scanner Functions I Select the functions to be used with the user code from Available Functions. J Press [OK]. To continue registering user codes, repeat the procedure from step E. K Press [Exit]. L Press the {User Tools/Counter} key. Note ❒ You can enter a one-to eight-digit user code. 6 ❒ To register the name, see “Registering Names”. Reference p.118 “Registering Names” Changing a User Code This section describes how to change a registered user code. Important ❒ Even if you change a user code, the counter value will not be cleared. A Press [System Settings]. 124 B Press [Administrator Tools]. C Press [Address Book Management]. Authentication Information D Check that [Program / Change] is selected. E Select the user whose user code you want to change. Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Auth. Info]. G Press [Change], and then enter the new user code using the number keys 6 H Press the {q} key. I To change the available functions, press [Auth. Info] and then press [TNext] twice. J Press the key to select the functions to enable them. Press the key to highlight it, and then the function is enabled. To cancel a selection, press the highlighted key. K Press [OK]. L Press [Exit]. M Press the {User Tools/Counter} key. Note ❒ To change the name, key display and title, see “Changing a Registered Name”. Reference p.120 “Changing a Registered Name” 125 Registering Addresses and Users for Scanner Functions Deleting a User Code This section describes how to delete registered user code. Important ❒ After clearing the user code, the counter is automatically cleared. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose code is to be deleted. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Auth. Info]. G Press [Change] to delete the user code, and then press the {q} key. H Press [OK]. I Press [Exit]. 126 Authentication Information J Press the {User Tools/Counter} key. Note ❒ To delete a name from the Address Book entirely, see “Deleting a Registered Name”. Reference p.121 “Deleting a Registered Name” Displaying the Counter for Each User This section describes how to display the counter for each user. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Display / Clear / Print Counter per User]. D Select the function usage you want to print from [Print Counter] or [Scanner Counter]. Counters for individual function usage under each user code appear. 127 Registering Addresses and Users for Scanner Functions Printing the Counter for Each User This section describes how to print the counter for each user. A Press [System Settings]. B Press [Administrator Tools]. C Press [Display / Clear / Print Counter per User]. D Select a user code from the left side of the display. 6 Press [Select All on the Page] to select all user codes on the page. E Press [Print Counter List] under "Per User". Enter the user code, and then press the {q} key if the User Code Authentication is specified. 128 Authentication Information F Select the function usage you want to print from [Copier Counter], [Printer Counter], [Scanner Counter], and [Total Prints]. G Press [Print]. Printing the Counter for All Users This section describes how to print the counter for all users. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Display / Clear / Print Counter per User]. D Press [Print Counter List] under "All Users". Enter the user code, and then press the {q} key if the User Code Authentication is specified. E Select the function usage you want to print from [Copier Counter], [Printer Counter], [Scanner Counter], and [Total Prints]. F Press [Print]. 129 Registering Addresses and Users for Scanner Functions Clearing the Number of Prints This section describes how to clear the counter. A Press [System Settings]. B Press [Administrator Tools]. C Press [Display / Clear / Print Counter per User]. D Select the user code to clear. E To clear the number of prints made under a user code, select the user code 6 from the left side of the display. Press [Select All on the Page] to select all user codes on the page. F Press [Clear] under "Per User". G Select the function usage you want to clear from [Copier Counter], [Printer Counter],[Scanner Counter], and [All Counters]. H Press [OK]. I To clear the number of prints for all user codes, press [Clear] under "All Users". J Select the function usage you want to clear from [Copier Counter], [Printer Counter],[Scanner Counter], and [All Counters]. 130 Authentication Information K Press [OK]. L Press [Exit]. M Press the {User Tools/Counter} key. 6 131 Registering Addresses and Users for Scanner Functions E-mail Destination This section describes the procedure for registering, changing, and deleting Email Destination. Register e-mail destinations so you do not need to enter an e-mail address every time, and can send scan files from scanner function by e-mail. • It is easy to select the e-mail destination if you register “Name" and “Key Display" as the e-mail destination. • You can register e-mail destinations as a group. • You can use the e-mail address as the sender's address when sending scan files in scanner mode. If you want to do this, set a protection code on the sender address to prevent unauthorized access. Note ❒ You can select an e-mail address from an LDAP server, and then register it in the Address Book. See “Sending Scan File by E-mail", Scanner Reference. Reference p.168 “Registering a Protection Code” 6 Registering an E-mail Destination This section describes how to register an e-mail destination. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose e-mail address you want to register. Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. 132 E-mail Destination F Press [E-mail]. G Press [Change] under "E-mail Address". H Enter the e-mail address, and then press [OK]. 6 I Press [OK]. J Press [Exit]. K Press the {User Tools/Counter} key. Note ❒ You can enter up to 128 characters for the e-mail address. ❒ To register the name, see Registering Names”. Reference p.118 “Registering Names” p.123 “Registering a User Code” p.158 “Registering Names to a Group” Using the e-mail address as the sender This section describes how to use the e-mail address as a sender. A Press [Protection]. B Press [Sender] under "Use Name as". 133 Registering Addresses and Users for Scanner Functions Changing an E-mail Destination This section describes how to change an e-mail destination. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose e-mail address you want to change. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [E-mail]. G Press [Change] under "E-mail Address". H Enter the e-mail address, and then press [OK]. I Press [OK]. J Press [Exit]. 134 E-mail Destination K Press the {User Tools/Counter} key. Note ❒ To change the name, key display and title, see “Changing a Registered Name”. Reference p.120 “Changing a Registered Name” p.133 “Using the e-mail address as the sender” "Entering Text", About This Machine Deleting an E-mail Destination This section describes how to delete an e-mail destination. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose e-mail address you want to delete. Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [E-mail]. G Press [Change] under "E-mail Address". H Press [Delete All], and then press [OK]. I Press [OK]. J Press [Exit]. 135 Registering Addresses and Users for Scanner Functions K Press the {User Tools/Counter} key. Note ❒ To delete the name, key display, and title, see “Deleting a Registered Name”. Reference p.121 “Deleting a Registered Name” 6 136 Registering Folders Registering Folders This section describes the procedure for registering, changing, and deleting folders. By registering a shared folder, you can send scan files to it directly. There are three types of protocol you can use: • SMB For sending files to shared Windows folders. • FTP Use when sending files to an FTP server. • NCP Use when sending files to an NetWare server. Note ❒ For details about protocols, server names, and folder levels, consult your network administrator. ❒ You can prevent unauthorized users from accessing folders from the machine. See "Registering a Protection Code". ❒ You can only select either SMB, FTP, or NCP. If you change protocol after finishing your settings, all previous entries are cleared. 6 137 Registering Addresses and Users for Scanner Functions Using SMB to Connect This section describes the procedure for registering, changing, and deleting SMB folders. Note ❒ To register a folder in an FTP server, see “Using FTP to Connect”. ❒ To register a folder in an NetWare server, see “Using NCP to Connect”. Reference p.145 “Using FTP to Connect” p.150 “Using NCP to Connect” Registering a SMB Folder This section describes how to register a SMB folder. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose folder you want to register. Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. 138 Registering Folders F Press [Auth. Info], and then press [TNext]. G Press [Specify Other Auth. Info] on the right side of Folder Authentication. When [Do not Specify] is selected, the SMB User Name and SMB Password that you have specified in Default User Name / Password (Send) of File Transfer settings applies. H Press [Change] under "Login User Name". I Enter the login user name, and then press [OK]. J Press [Change] under "Login Password". K Enter the password, and then press [OK]. L Enter the password again to confirm, and then press [OK]. M Press [Folder]. N Check that [SMB] is selected. 6 To specify a folder, you can either enter the path manually or locate the folder by browsing the network. O Press [Connection Test] to check the path is set correctly. P Press [Exit]. If the connection test fails, check the settings, and then try again. Q Press [OK]. 139 Registering Addresses and Users for Scanner Functions R Press [Exit]. S Press the {User Tools/Counter} key. Note ❒ To register the name, see Registering Names”. ❒ ❒ ❒ ❒ You can enter up to 64 characters for the user name. You can enter up to 64 characters for the password. You can enter a path using up to 128 characters. If User Authentication is specified, contact your administrator. Reference p.118 “Registering Names” p.140 “Locating the SMB folder manually” p.141 “Locating the SMB folder using Browse Network” Locating the SMB folder manually This section describes how to locate the SMB folder manually. 6 A Press [Change] under "Path". B Enter the path where the folder is located. C Press [OK]. If the format of the entered path is not correct, a message appears. Press [Exit], and then enter the path again. Note ❒ Enter the path using this format: “\\ServerName\Share- Name\PathName”. ❒ You can also enter an IPv4 address. ❒ You can enter a path using up to 128 characters. 140 Registering Folders Locating the SMB folder using Browse Network This section describes how to locate the SMB folder using Browse Network. A Press [Browse Network]. The client computers sharing the same network as the machine appear. If you have already specified your user name and password in steps 7 to 13 on "Registering a SMB Folder", the Network display only lists client computers you are authorized to access. B Select a client computer. Shared folders under it appear. 6 You can press [Up One Level] to switch between levels. C Select the folder you want to register, and then Press [OK]. If a Login Screen Appears This section describes how to log on to the machine if the login screen appears when you try to access a folder by browsing the network. If you have not specified folder authentication, or if an incorrect user name or password has been entered for folder authentication, the login screen appears. A Enter the login user name, and then press [OK]. Enter the login user name specified for folder authentication. B Enter the password, and then press [OK]. The path to the selected folder appears. If a message appears, press [Exit], and then enter the login user name and password again. 141 Registering Addresses and Users for Scanner Functions Changing a SMB Folder This section describes how to change settings of the registered SMB folder. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose folder you want to change. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Folder]. G Select the items you want to change. H Press [Connection Test] to check the path is set correctly. I Press [Exit]. J Press the {User Tools/Counter} key. Note ❒ To change the name, key display and title, see “Changing a Registered Name”. ❒ If the connection test fails, check the settings, and then try again. Reference p.120 “Changing a Registered Name” p.143 “Changing the registered SMB folder” p.143 “To change the protocol” 142 Registering Folders Changing the registered SMB folder This section describes how to change the registered SMB folder. A Press [Change] under "Path". B Enter the New path where the folder is located, and then press [OK]. You can also use Browse Network to specify a new folder. For details, see "Locating the SMB folder using Browse Network". Reference p.141 “Locating the SMB folder using Browse Network” To change the protocol This section describes how to change the protocol. A Press [FTP] or [NCP]. 6 B A confirmation message appears. Press [Yes]. Changing the protocol will clear all settings made under the previous protocol. C Enter each item again. Reference p.145 “Registering a FTP Folder” 143 Registering Addresses and Users for Scanner Functions Deleting a SMB folder This section describes how to delete the registered SMB folder. A [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose folder you want to delete. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Folder]. G Press the protocol which is not currently selected. A confirmation message appears. H Press [Yes]. I Press [OK]. J Press [Exit]. K Press the {User Tools/Counter} key. Note ❒ To delete the name, key display, and title, see “Deleting a Registered Name”. Reference p.121 “Deleting a Registered Name” 144 Registering Folders Using FTP to Connect This section describes the procedure for registering, changing, and deleting FTP folders. Note ❒ To register a shared folder configured in Windows, see “Using SMB to Connect”. ❒ To register a folder in an NetWare server, see “Using NCP to Connect”. Reference p.138 “Using SMB to Connect” p.150 “Using NCP to Connect” Registering a FTP Folder This section describes how to register an FTP folder. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose folder you want to register. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Auth. Info], and then press [TNext]. G Press [Specify Other Auth. Info] on the right side of "Folder Authentication". When [Do not Specify] is selected, the FTP User Name and FTP Password that you have specified in Default User Name / Password (Send) of File Transfer settings applies. For details, see "File Transfer". H Press [Change] under "Login User Name". 145 Registering Addresses and Users for Scanner Functions I Enter the login user name, and then press [OK]. J Press [Change] under "Login Password". K Enter the password, and then press [OK]. L Enter the password again to confirm, and then press [OK]. M Press [Folder]. N Press [FTP]. 6 O Press [Change] under "Server Name". P Enter the server name, and then press [OK]. Q Press [Change] under "Path". R Enter the path, and then press [OK]. You can enter an absolute path, using this format: “/user/ home/username"; or a relative path, using this format: “directory/sub-directory". If you leave the path blank, the login directory is assumed to be the current working directory. You can also enter an IPv4 address. You can enter a path using up to 256 characters. S To change the port number, press [Change] under "Port No". T Enter the port number using the number keys, and then press the {q} key. You can enter 1 to 65535. U Press [Connection Test] to check the path is set correctly. V Press [Exit]. If the connection test fails, check the settings, and then try again. W Press [OK]. X Press [Exit]. 146 Registering Folders Y Press the {User Tools/Counter} key. Note ❒ To register the name, see Registering Names”. ❒ ❒ ❒ ❒ You can enter up to 64 characters for the user name. You can enter up to 64 characters for the password. You can enter a server name using up to 64 characters. If User Authentication is specified, contact your administrator. Reference p.118 “Registering Names” p.140 “Locating the SMB folder manually” p.141 “Locating the SMB folder using Browse Network” Changing a FTP Folder This section describes how to change the registered FTP folder. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose folder you want to change, and then press [Folder]. Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Folder]. G Select the items you want to change. H Press [Connection Test] to check the path is set correctly. I Press [Exit]. 147 Registering Addresses and Users for Scanner Functions J Press the {User Tools/Counter} key. Note ❒ To change the name, key display and title, see “Changing a Registered Name”. Reference p.120 “Changing a Registered Name” p.148 “Changing the protocol” Changing the protocol This section describes how to change the protocol. A Press [SMB], or [NCP]. 6 B A confirmation message appears. Press [Yes]. Changing the protocol will clear all settings made under the previous protocol. C Enter each item again. Reference p.138 “Registering a SMB Folder” Changing the registered FTP folder This section describes how to change the registered FTP folder. 148 A Press [Change] under "Port No". B Enter the new port number, and then press the {q} key. C Press [Change] under "Server Name". D Enter the new server name, and then press [OK]. E Press [Change] under "Path". F Enter the new path, and then press [OK]. Registering Folders Deleting a FTP Folder This section describes how to delete the registered FTP folder. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose folder you want to delete. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Folder]. G Press the protocol which is not currently selected. A confirmation message appears. H Press [Yes]. I Press [OK]. J Press [Exit]. K Press the {User Tools/Counter} key. Note ❒ To delete a name entirely, see “Deleting a Registered Name”. Reference p.121 “Deleting a Registered Name” 149 Registering Addresses and Users for Scanner Functions Using NCP to Connect This section describes the procedure for registering, changing, and deleting NCP folders. Note ❒ To register a shared folder configured in Windows, see “Using SMB to Connect” ❒ To register a folder in an FTP server, see “Using FTP to Connect” Reference p.138 “Using SMB to Connect” p.145 “Using FTP to Connect” Registering a NCP Folder This section describes how to register an NCP folder. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Press the name you want to register or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Auth. Info], and then press [TNext]. G Press [Specify Other Auth. Info] on the right side of Folder Authentication. When [Do not Specify] is selected, the NCP User Name and NCP Password that you have specified in Default User Name / Password (Send) of File Transfer settings applies. For details, see "File Transfer". H Press [Change] under "Login User Name". 150 Registering Folders I Enter the login user name, and then press [OK]. J Press [Change] under "Login Password". K Enter the password, and then press [OK]. L Enter the password again to confirm, and then press [OK]. M Press [Folder]. N Press [NCP]. O Select "Connection Type". If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a NetWare server, press [Bindery]. If you have set "Connection Type" to [NDS], enter the user name followed by the name of the context where the user object is located. If the user name is “user" and the context name is “context", enter “user.context" P Specify the folder, and then Press [OK]. Q Press [Connection Test] to check the path is set correctly. R Press [Exit]. S Press the {User Tools/Counter} key. 6 Note ❒ You can enter up to 64 characters for the user name. ❒ You can enter up to 64 characters for the password. ❒ To specify a folder, you can either enter the path manually or locate the folder by browsing the network. ❒ If User Authentication is specified, contact your administrator. Reference p.118 “Registering Names” p.152 “Locate the NCP folder manually” p.152 “Locating the NCP folder using Browse Network” "Entering Text", About This Machine 151 Registering Addresses and Users for Scanner Functions Locate the NCP folder manually This section describes how to locate the NCP folder manually. A Press [Change] under "Path". B Enter the path where the folder is located. C Press [OK]. Note ❒ If you set "Connection Type" to [NDS], and if the NDS tree name is "tree", the name of the context including the volume is "context", the volume name is "volume" and the folder name is "folder", then the path will be "\\tree\volume. context\folder". ❒ If you set "Connection Type" to [Bindery], and if the NetWare server name is "server", the volume name is "volume" and the folder name is "folder", then the path will be "\\server\volume\folder". ❒ You can enter a path using up to 128 characters. ❒ If the connection test fails, check the settings, and then try again. 6 Locating the NCP folder using Browse Network This section describes how to locate the NCP folder using Browse Network. A Press [Browse Network]. B Search for the destination folder in the NDS tree or NetWare server. You can press [Up One Level] to switch between levels. If you have set "Connection Type" to [NDS], a list of items in the NDS tree appears. If you have set "Connection Type" to [Bindery], a list of items on the NetWare server appears. C Select the folder you want to register, and then press [OK]. Note ❒ Only the folders you are allowed to access appear in [Browse Network]. ❒ If the languages used on the machine and the destination you want to view differ, the items in the list may not appear correctly. ❒ Up to 100 items can be displayed in the list. 152 Registering Folders Changing a NCP folder This section describes how to change the registered NCP folder. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the user of the registered folder you want to change. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Folder]. G Select "Connection Type". If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a NetWare server, press [Bindery]. H Specify the folder. I Press [Connection Test] to check the path is set correctly. J Press [Exit]. K Press the {User Tools/Counter} key. Note ❒ To change the name, key display and title, see “Changing a Registered Name”. Reference p.120 “Changing a Registered Name” p.154 “Changing the registered NCP folder” 153 Registering Addresses and Users for Scanner Functions Changing the registered NCP folder This section describes how to change the register NCP folder. A Press [Change] under "Path". B Enter the path where the folder is located, and then press [OK]. You can also use Browse Network to specify a new folder. For details, see "Locating the NCP folder manually". Reference p.152 “Locate the NCP folder manually” p.152 “Locating the NCP folder using Browse Network” p.154 “Changing the protocol” Changing the protocol This section describes how to change the protocol. A Press [SMB], or [FTP]. B A confirmation message appears. Press [Yes]. 6 Changing the protocol will clear all settings made under the previous protocol. C Enter each item again. Reference p.138 “Registering a SMB Folder” p.145 “Registering a FTP Folder” 154 Registering Folders Deleting an NCP Folder This section describes how to delete the registered NCP folder. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select a user of the folder you want to delete. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Folder]. G Press the protocol which is not currently selected. A confirmation message appears. H Press [Yes]. I Press [OK]. J [Exit]. K Press the {User Tools/Counter} key. Note ❒ To delete a name entirely, see Deleting a Registered Name”. Reference p.121 “Deleting a Registered Name” 155 Registering Addresses and Users for Scanner Functions Registering Names to a Group This section describes how to register names to a group. You can register names to a group to enable easy management of e-mail addresses and folders for each group. To add names to a group, the groups must be registered beforehand. Important ❒ When using Scan to Folder function, you cannot send scan files to a group with over 50 folders registered. ❒ You can register up to 100 groups. Note ❒ You can set a protection code to prevent unauthorized access to the folders registered in a group. For details, see “Registering a Protection Code". Reference p.168 “Registering a Protection Code” 6 Registering a Group This section describes how to register a group. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Program / Change / Delete Group]. D Check that [Program / Change] is selected. E Press [New Program]. 156 Registering Names to a Group F Press [Change] under "Group Name". G Enter the group name, and then press [OK]. The key display name is set automatically. H When you want to change the key display, press [Change] under "Key Display". I Enter the key display, and then press [OK]. J Press the title key under Select Title, if necessary. 6 The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]… Added to the list of items in the selected title. You can select [Frequent] and one more page for each title. K Press [OK]. L Press [Exit]. M Press the {User Tools/Counter} key. Reference "Entering Text", About This Machine 157 Registering Addresses and Users for Scanner Functions Registering Names to a Group This section describes how to register names to a registered group. You can put names that have been registered in the Address Book into a group. When registering new names, you can also register groups at the same time. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name to register in a group. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Add to Group]. 158 Registering Names to a Group G Select a group to which you want to add the name to. The group key that you have selected becomes highlighted, and the name is added to it. 6 H Press [OK]. I Press [Exit]. J Press the {User Tools/Counter} key. 159 Registering Addresses and Users for Scanner Functions Adding a Group to Another Group This section describes how to add a group to another group. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Program / Change / Delete Group]. D Check that [Program / Change] is selected. E Select the group that you want to put into another group. 6 Press the group key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Add to Group]. 160 Registering Names to a Group G Select the group which you want to add to. The group key that you have selected becomes highlighted, and the group is added to it. 6 H Press [OK]. I Press [Exit]. J Press the {User Tools/Counter} key. 161 Registering Addresses and Users for Scanner Functions Displaying Names Registered in a Group This section describes how to display names registered in a group. You can check the names or groups registered in each group. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Program / Change / Delete Group]. D Check that [Program / Change] is selected. E Select the group where the members you want to check is registered. 6 If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Programmed User/Group]. All the names registered will be displayed. G Press [OK]. H Press [Exit]. I Press the {User Tools/Counter} key. 162 Registering Names to a Group Removing a Name from a Group This section describes how to remove a name from a group. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name to remove from a group. 6 Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Add to Group]. G Select the group from which you want to remove the name. The group key that you have selected becomes highlighted, and the name is added to it. 163 Registering Addresses and Users for Scanner Functions H Press [OK]. I Press [Exit]. J Press the {User Tools/Counter} key. Deleting a Group Within Another Group This section describes how to delete a group within another group. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book: Program / Change / Delete Group]. D Check that [Program / Change] is selected. E Select the group that you want to delete from. Press the group key, or enter the registered number during the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Add to Group]. The keys of groups in which the group is registered appear highlighted. 164 Registering Names to a Group G Select the group that you want to delete from. The group key is deselected and the group is deleted from it. H Press [OK]. 6 I Press [Exit]. J Press the {User Tools/Counter} key. 165 Registering Addresses and Users for Scanner Functions Changing a Group Name This section describes how to change a group name. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Program / Change / Delete Group]. D Check that [Program / Change] is selected. E Press the group key you want to change. 6 If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F To change the group name and key display, press [Change] under "Group Name" or "Key Display". G Enter the new group name or key display, and then press [OK]. H To change the title, press the title key under Select Title. I To change the registration number, press [Change] under "Registration No". J Enter the new registration number using the number keys, then Press the {q} key. K Press [OK]. 166 Registering Names to a Group L Press [Exit]. M Press the {User Tools/Counter} key. Deleting a Group This section describes how to delete a group A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Program / Change / Delete Group]. D Press [Delete]. E Press a group key you want to delete. 6 If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Yes]. 167 Registering Addresses and Users for Scanner Functions Registering a Protection Code This section describes how to register a Protection Code. You can stop sender's names or folders being accessed by setting a protection code. You can use this function to protect the following: • Folders You can prevent unauthorized access to folders. • Sender's names You can prevent misuse of sender's names. Reference p.123 “Registering a User Code” Registering a Protection Code to a Single User This section describes how to register a Protection code to a single user. A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Select the name whose protection code you want to register. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. 168 Registering a Protection Code F Press [Protection]. G Press [Destination] or [Sender] under "Use Name as". 6 Both [Destination] and [Sender] can be selected at the same time. H Press [Folder Destination] or [Sender] under "Protection Object". Both [Folder Destination] and [Sender] can be selected at the same time. I Press [Change] under "Protection Code". J Enter a protection code using the number keys, and then press the {q} key. K Press [OK]. L Press [Exit]. M Press the {User Tools/Counter} key. Note ❒ Specify a protection code of up to eight digits. You can also specify “Protection” without specifying a protection code. 169 Registering Addresses and Users for Scanner Functions Registering a Protection Code to a Group User This section describes how to register a Protection Code to a Group User. A Press [System Settings]. B Press [Administrator Tools]. C Press [Address Book: Program / Change / Delete Group]. D Check that [Program / Change] is selected. E Press the group key you want to register or enter the registered number us- 6 ing the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Protection]. G Press [Folder Destination] under "Protection Object". H Press [Change] under "Protection Code". I Enter a protection code using the number keys, and then press the {q} key. J Press [OK]. 170 Registering a Protection Code K Press [Exit]. L Press the {User Tools/Counter} key. Note ❒ Specify a protection code of up to eight digits. You can also specify “Protection” without specifying a protection code. 6 171 Registering Addresses and Users for Scanner Functions Registering SMTP and LDAP Authentication This section describes how to register SMTP and LDAP Authentication. SMTP Authentication This section describes how to register SMTP Authentication. For each user registered in the Address Book, you can register a login user name and login password to be used when accessing an SMTP server. To use an SMTP server, you need to program it beforehand. Important ❒ When [Do not Specify] is selected for SMTP Authentication, the User Name and Password that you have specified in SMTP Authentication of File Transfer settings applies. For details, see "File Transfer". A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Press the name you want to register or enter the registered number using the number keys If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Auth. Info]. G Press [Specify Other Auth. Info] on the right side of SMTP Authentication. 172 Registering SMTP and LDAP Authentication H Press [Change] under "Login User Name". I Enter the login user name, and then press [OK]. J Press [Change] under "Login Password". K Enter the password, and then press [OK]. L Enter the password again to confirm, and then press [OK]. M [OK]. N Press [Exit]. O Press the {User Tools/Counter} key. 6 Note ❒ To register the name, see Registering Names”. ❒ You can enter up to 191 characters for the user name. ❒ You can enter up to 128 characters for the password. ❒ When using POP before SMTP Authentication, you can enter up to 191 characters for the user name, and 128 characters for the password. ❒ To change the SMTP Authentication settings, repeat stepB to O. Reference p.118 “Registering Names” p.12 “Network Settings” "Entering Text", About This Machine 173 Registering Addresses and Users for Scanner Functions LDAP Authentication This section describes how to register LDAP Authentication. For each user registered in the Address Book, you can register a login user name and login password to be used when accessing an LDAP server. To use an LDAP server, you need to program it beforehand. For details, see “LDAP Server Settings", Network Guide. Important ❒ When [Do not Specify] is selected for LDAP Authentication, the User Name and Password that you have specified in Program / Change LDAP Server of Administrator Tools settings applies. For details, see "LDAP Server Settings". A Press [System Settings]. 6 B Press [Administrator Tools]. C Press [Address Book Management]. D Check that [Program / Change] is selected. E Press the name you want to register or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address. F Press [Auth. Info], and then press [TNext]. G Press [Specify Other Auth. Info] on the right side of "LDAP Authentication". 174 Registering SMTP and LDAP Authentication H Press [Change] under "Login User Name". I Enter the login user name, and then press [OK]. J Press [Change] under "Login Password". K Enter the password, and then press [OK]. L Enter the password again to confirm, and then press [OK]. M Press [OK]. N Press [Exit]. O Press the {User Tools/Counter} key. 6 Note ❒ To register the name, see Registering Names”. ❒ You can enter up to 128 characters for the user name. ❒ You can enter up to 128 characters for the password. ❒ To change the LDAP Authentication settings, repeat stepB to O. Reference p.118 “Registering Names” "Entering Text", About This Machine 175 Registering Addresses and Users for Scanner Functions 6 176 7. Other User Tools Initial settings allow you switch the language as well as checking the number of printed papers by displaying the counter. For the details on how to access respective settings, see "Accessing User Tools". Changing the Display Language You can change the language used on the display. English is set as default. A Press [Español]. The language is changed to Spanish. B Press [Salir]. The menu appears in Spanish. Reference p.3 “Accessing User Tools” 177 Other User Tools Inquiry The inquiry function lets you check the telephone numbers to contact for repairs, or ordering consumables such as toner. Be sure to contact your service engineer to verify the following: ❖ Consumables • Telephone No. to order • Toner • Staple • TX Stamp Name ❖ Machine Maintenance/Repair • Telephone No. • Serial No. of Machine ❖ Sales Representative • Telephone No. A Press [Inquiry]. 7 Inquiry information appears. B Press [Print Inquiry List]. 178 Inquiry C Press the {Start} key. Inquiry information prints out. D Press [Exit] twice. Reference p.3 “Accessing User Tools” 7 179 Other User Tools Counter Displaying the Total Counter You can display the total counter value used for all functions. A Press [Counter]. B To print a counter list, press [Print Counter List]. 7 C Press the {Start} key. A counter list prints out. Reference p.3 “Accessing User Tools” 180 8. Appendix Copyrights expat • The software including controller, etc. (hereinafter "software") installed on this product uses the expat under the conditions mentioned below. • The product manufacturer provides warranty and support to the software of the product including the expat, and the product manufacturer makes the initial developer and copyright holder of the expat, free from these obligations. • Information relating to the expat is available at: http://expat.sourceforge.net/ Copyright © 1998, 1999, 2000 Thai Open Source Software Centre, Ltd. and Clark Cooper. Copyright © 2001, 2002 Expat maintainers. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 181 Appendix NetBSD 8 1. Copyright Notice of NetBSD For all users to use this product: This product contains NetBSD operating system: For the most part, the software constituting the NetBSD operating system is not in the public domain; its authors retain their copyright. The following text shows the copyright notice used for many of the NetBSD source code. For exact copyright notice applicable for each of the files/binaries, the source code tree must be consulted. A full source code can be found at http://www.netbsd.org/. Copyright © 1999, 2000 The NetBSD Foundation, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: A Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. B Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. C All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by The NetBSD Foundation, Inc. and its contributors. D Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2.Authors Name List All product names mentioned herein are trademarks of their respective owners. The following notices are required to satisfy the license terms of the software 182 that we have mentioned in this document: Copyrights • This product includes software developed by the University of California, Berkeley and its contributors. • This product includes software developed by Jonathan R. Stone for the NetBSD Project. • This product includes software developed by the NetBSD Foundation, Inc. and its contributors. • This product includes software developed by Manuel Bouyer. • This product includes software developed by Charles Hannum. • This product includes software developed by Charles M. Hannum. • This product includes software developed by Christopher G. Demetriou. • This product includes software developed by TooLs GmbH. • This product includes software developed by Terrence R. Lambert. • This product includes software developed by Adam Glass and Charles Hannum. • This product includes software developed by Theo de Raadt. • This product includes software developed by Jonathan Stone and Jason R. Thorpe for the NetBSD Project. • This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors. • This product includes software developed by Christos Zoulas. • This product includes software developed by Christopher G. Demetriou for the NetBSD Project. • This product includes software developed by Paul Kranenburg. • This product includes software developed by Adam Glass. • This product includes software developed by Jonathan Stone. • This product includes software developed by Jonathan Stone for the NetBSD Project. • This product includes software developed by Winning Strategies, Inc. • This product includes software developed by Frank van der Linden for the NetBSD Project. • This product includes software developed for the NetBSD Project by Frank van der Linden • This product includes software developed for the NetBSD Project by Jason R. Thorpe. • The software was developed by the University of California, Berkeley. • This product includes software developed by Chris Provenzano, the University of California, Berkeley, and contributors. 8 183 Appendix Sablotron Sablotron (Version 0.82) Copyright © 2000 Ginger Alliance Ltd. All Rights Reserved a) The application software installed on this product includes the Sablotron software Version 0.82 (hereinafter, "Sablotron 0.82"), with modifications made by the product manufacturer. The original code of the Sablotron 0.82 is provided by Ginger Alliance Ltd., the initial developer, and the modified code of the Sablotron 0.82 has been derived from such original code provided by Ginger Alliance Ltd. b) The product manufacturer provides warranty and support to the application software of this product including the Sablotron 0.82 as modified, and the product manufacturer makes Ginger Alliance Ltd., the initial developer of the Sablotron 0.82, free from these obligations. c) The Sablotron 0.82 and the modifications thereof are made available under the terms of Mozilla Public License Version 1.1 (hereinafter, "MPL 1.1"), and the application software of this product constitutes the "Larger Work" as defined in MPL 1.1. The application software of this product except for the Sablotron 0.82 as modified is licensed by the product manufacturer under separate agreement(s). d) The source code of the modified code of the Sablotron 0.82 is available at: http://support-download.com/services/device/sablot/notice082.html e) The source code of the Sablotron software is available at: http://www.gingerall.com f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html 8 JPEG LIBRARY • The software installed on this product is based in part on the work of the Independent JPEG Group. 184 Copyrights SASL CMU libsasl Tim Martin Rob Earhart Rob Siemborski Copyright © 2001 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: A Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. B Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. C The name "Carnegie Mellon University" must not be used to endorse or promote products derived from this software without prior written permission. For permission or any other legal details, please contact: Office of Technology Transfer Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3890 (412) 268-4387, fax: (412) 268-7395 [email protected] D Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by Computing Services at Carnegie Mellon University (http://www.cmu.edu/computing/)." CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 8 185 Appendix MD4 Copyright © 1990-2, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD4 MessageDigest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. MD5 Copyright © 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. 8 License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 MessageDigest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. 186 Copyrights Samba(Ver 3.0.4) For SMB transmission, this machine uses Samba ver 3.0.4 (hereinafter referred to as Samba 3.0.4). Copyright © Andrew Tridgell 1994-1998 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. Note ❒ The source code for SMB transmission by this machine can be downloaded from the following website: http://support-download.com/services/scbs RSA BSAFE® 8 • This product includes RSA BSAFE © cryptographic or security protocol software from RSA Security Inc. • RSA and BSAFE are registered trademarks of RSA Security Inc. in the United States and/or other countries. • RSA Security Inc. All rights reserved. 187 Appendix Open SSL Copyright © 1998-2004 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. 8 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 188 THE POSSIBILITY OF SUCH DAMAGE. Copyrights This product includes cryptographic software written by Eric Young ([email protected]). This product includes software written by Tim Hudson ([email protected]). Original SSLeay License Copyright © 1995-1998 Eric Young ([email protected]) All rights reserved. This package is an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]). Note that any information and cryptographic algorithms used in this software are publicly available on the Internet and at any major bookstore, scientific library, and patent office worldwide. More information can be found e.g. at "http://www.cs.hut.fi/crypto". 8 The legal status of this program is some combination of all these permissions and restrictions. Use only at your own responsibility. You will be responsible for any legal consequences yourself; I am not making any claims whether possessing or using this is legal or not in your country, and I am not taking any responsibility on your behalf. NO WARRANTY BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 189 Appendix IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 2) The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under a BSD-style license. Cryptographic attack detector for ssh - source code Copyright © 1998 CORE SDI S.A., Buenos Aires, Argentina. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that this copyright notice is retained. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS SOFTWARE. Ariel Futoransky <[email protected]> <http://www.core-sdi.com> 8 3) One component of the ssh source code is under a 3-clause BSD license, held by the University of California, since we pulled these parts from original Berkeley code. Copyright © 1983, 1990, 1992, 1993, 1995 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 190 Copyrights 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 4) Remaining components of the software are provided under a standard 2-term BSD licence with the following names as copyright holders: Markus Friedl Theo de Raadt Niels Provos Dug Song Kevin Steves Daniel Kouril Wesley Griffin Per Allansson Jason Downs Solar Designer Todd C. Miller Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 8 191 Appendix THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 5) Portable OpenSSH contains the following additional licenses: c) Compatibility code (openbsd-compat) Apart from the previously mentioned licenses, various pieces of code in the openbsd-compat/ subdirectory are licensed as follows: Some code is licensed under a 3-term BSD license, to the following copyright holders: Todd C. Miller Theo de Raadt Damien Miller Eric P. Allman The Regents of the University of California 8 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. 192 Copyrights THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Open LDAP The OpenLDAP Public License Version 2.8, 17 August 2003 Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following conditions are met: 1. Redistributions in source form must retain copyright statements and notices, 2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution, and 8 3. Redistributions must contain a verbatim copy of this document. The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version number. You may use this Software under terms of this license revision or under the terms of any subsequent revision of the license. 193 Appendix THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at all times remain with copyright holders. OpenLDAP is a registered trademark of the OpenLDAP Foundation. Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and distribute verbatim copies of this document is granted. 8 194 Copyrights LibTIFF TIFF emulation software includes freeware TIFF libraries developed by Sam Leffler and Silicon Graphics, Inc.. In accordance with the conditions of distribution, the copyright notice concerning the TIFF library part is shown below. Copyright © 1988, 1989, 1990, 1991 Sam Leffler Copyright © 1991 Silicon Graphics, Inc. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Stanford and Silicon Graphics. THE SOFTWARE IS PROVIDED “AS IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 8 195 INDEX A Accessing User Tools, 3 Address Book: Change Order, 59 Address Book: Edit Title, 59 Address Book: Program / Change / Delete Group, 59 Address Book: Program / Change / Delete Transfer Request, 59 Address Book: Select Title, 59 Address Book: Switch Title, 59 Address Book Management, 59 Adjust Position, 81 Adjust Scan Position, 35 Administrator Authentication Management, 59 Administrator's E-mail Address, 54 Administrator Tools / System Settings, 59 AOF (Always On), 59 Auto Continue, 101 Auto Delete File in Document Server, 59 Auto Delete Stored Print Jobs, 101 Auto Delete Temporary Print Jobs, 101 Auto Image Density Priority, 75 Auto Logout Timer, 46 Auto Off Timer, 46 Auto Specify Sender Name, 54 Auto Tray Switching, 75 B Background Numbering, 86 Back Up / Restore Address Book, 59 Blank Page Print, 101 Bypass Tray Setting Priority, 101 C Capture Server IPv4 Address, 54 Change PDF Password, 106 Changing the Display Language, 177 Channel, 51 Communication Mode, 51 Compression (Black and White), 110 Configuration Page, 97 Copier/Document Server Auto Reset Timer, 46 Copier / Document Server Features / Edit, 81 Copier / Document Server Features / General Features, 75 196 Copier / Document Server Features / Input/Output, 92 Copier / Document Server Features / Reproduction Ratio, 78 Copier / Document Server Features / Stamp, 86 Copies, 101 Copy Count Display, 35 Copy Order in Combine, 81 Copy Quality, 75 Counter, 180 Customize Function/ Fold Type/Fold Option, 92 D Data Format, 105 Date Stamp, 89 DDNS Configuration, 48 Default Printer Language, 101 Default User Name / Password (Send), 54 Delete All Files in Document Server, 59 Delete All Logs, 59 Delete All Stored Print Jobs, 100 Delete All Temporary Print Jobs, 100 Delete Scanner Journal, 107 Delivery Option, 54 Density (Background Numbering), 86 Destination List Display Priority 1, 107 Destination List Display Priority 2, 107 Display / Clear / Print Counter per User, 59 Display Panel, 2 Display / Print Counter, 59 Divide and Send E-mail, 110 DNS Configuration, 48 Document Server, 96 Domain Name, 48 Double Copies Separation Line, 81 E Edge to Edge Print, 101 Edit / Copier / Document Server Features, 81 Effective Protocol, 48 E-mail Communication Port, 54 E-mail Reception Interval, 54 E-mail Storage in Server, 54 Energy Saver Timer, 46 Enhanced Authentication Management, 59 Erase Border Width, 81 Erase Original Shadow in Combine, 81 Error Log, 97 Ethernet Speed, 48 Extended Security, 59 F Feed Start Method, 35 File Transfer / System Settings, 54 Fine Ratio Adjustment Copier, 35 Printer, 35 Firmware Version, 59 Fixed USB Port, 59 Fold Width Fine Adjustment, 35 Font (Date Stamp), 89 Font (Page Numbering), 90 Format (Date Stamp), 89 Function Priority, 35 Function Reset Timer, 35 G General Features / Copier / Document Server Features, 75 General Settings / Scanner Features, 107 General Settings / System Settings, 35 H Hex Dump, 97 Host Interface / Printer Features, 104 Host Name, 48 I IEEE 802.11b, 51 Image Density, 75 Image Repeat Separation Line, 81 Initial Print Job List, 101 Input/Output / Copier / Document Server Features, 92 Inquiry, 178 Insert Additional E-mail Info, 110 Interface Settings / System Settings, 48 Interleave Print, 35 I/O Buffer, 104 I/O Timeout, 104 IPv4 Gateway Address, 48 IPv6 Gateway Address, 48 IPv6 Stateless Address Autoconfiguration, 48 J Job End Call, 75 K Key Counter Management, 59 Key Repeat, 35 L LAN Type, 48 LDAP Search, 59 List / Test Print Lock, 100 List / Test Print / Printer Features, 97 M Machine IPv4 Address, 48 Machine IPv6 Address, 48 Machine Name, 48 Magnification Key Display, 78 Maintenance / Printer Features, 100 Margin Adjustment Priority, 81 Margin Fold Margin Adjustment, 35 Max. Copy Quantity, 75 Max. E-mail Size, 110 Max. Reception E-mail Size, 54 Memory Overflow, 101 Memory Usage, 101 Menu List, 97 Multiple Lists, 97 N NCP Delivery Protocol, 48 Network, 48 Network Security Level, 59 Next Original Wait Setting, 109 No. of Digits for Single Page Files, 110 Number of Scanner Resends, 54 NW Frame Type, 48 O Original Feed Delay 1, 35 Original Feed Delay 2, 35 Output Document Server, 35 Printer, 35 Output tray settings, 40 197 P Page Numbering, 90 Page Numbering in Combine (Page Numbering), 90 Page Numbering Initial Letter, 90 Panel Key Sound, 35 Panel Off Timer, 46 Paper Thickness Paper Bypass, 41 Paper Tray, 41 Paper Tray Priority Copier, 41 Printer, 41 Paper Type Paper Bypass, 41 Tray 1–3, 41 Paper Volume, 41 Partial Copy Size, 81 PDF Configuration / Font Page, 97 PDF Group Password, 106 PDF Menu / Printer Features, 106 Permit SNMPv3 Communication, 48 Permit SSL/TLS Communication, 48 Ping Command, 48 POP3 / IMAP4 Settings, 54 POP before SMTP, 54 Preset Stamp, 86 Print Address Book: Destination List, 59 Print and Delete Scanner Journal, 107 Printer Auto Reset Timer, 46 Printer Bypass Paper Size, 41 Printer Features / Host Interface, 104 Printer Features / List / Test Print, 97 Printer Features / Maintenance, 100 Printer Features / PDF Menu, 106 Printer Features / PS Menu, 105 Printer Features / System, 101 Printer Language, 101 Print Error Report, 101 Print List, 53 Print Priority, 35 Print Scanner Journal, 107 Program / Change Administrator, 59 Program / Change / Delete E-mail Message, 54 Program / Change / Delete LDAP Server, 59 Program / Change / Delete User Text, 35 Program / Delete Format, 81 Program / Delete Stamp (User Stamp), 88 PS Configuration / Font Page, 97 PS Menu / Printer Features, 105 198 R Reception Protocol, 54 Reduce / Enlarge Ratio Priority, 78 Reduce Recovery Time, 59 Reproduction Ratio, 78 Reproduction Ratio / Copier / Document Server Features, 78 Reserved Job Waiting Time, 101 Resolution, 105, 106 Restore Factory Defaults, 51 Rotate by 180 Degrees, 101 Rotate Sort Auto Paper Continue, 92 S Scanner Auto Reset Timer, 46 Scanner Features / General Settings, 107 Scanner Features / Scan Settings, 109 Scanner Features / Send Settings, 110 Scanner Resend Interval Time, 54 Scan Settings / Scanner Features, 109 Search Destination, 107 Security Method, 51 Send Settings / Scanner Features, 110 Separation Line in Combine, 81 Set Date, 46 Set Time, 46 Setup IEEE 802.11b, 9 Setup Wireless LAN, 9 Size (Background Numbering), 86 Size (Date Stamp), 89 Size (Page Numbering), 90 SMB Computer Name, 48 SMB Work Group, 48 SMTP Authentication, 54 SMTP Server, 54 SSID Setting, 51 Stamp / Copier / Document Server Features, 86 Stamp Format 1-4 (User Stamp), 88 Stamp Format (Page Numbering), 90 Stamp Format (Preset Stamp), 86 Stamp Language (Preset Stamp), 86 Stamp Position (Page Numbering), 90 Stamp Priority (Preset Stamp), 86 Stamp Setting (Date Stamp), 89 Stored File E-mail Method, 110 Sub Paper Size, 101 Superimpose (Date Stamp), 89 Superimpose (Page Numbering), 90 Switch Title, 107 System Auto Reset Timer, 46 System / Printer Features, 101 System Settings / Administrator Tools, 59 System Settings / File Transfer, 54 System Settings / General Features, 35 System Settings / Timer Settings, 46 System Settings / Tray Paper Settings, 41 System Status/ Job List Display Time, 35 T Timer Settings / System Settings, 46 Transfer Log Setting, 59 Transmission Speed, 51 Tray Paper Settings / System Settings, 41 Tray Paper Size Tray 1, 41 Tray 2, 41 Tray 3, 41 Tray Switching, 101 TWAIN Standby Time, 107 U Unauthorized Copy Control, 59 Update Delivery Server Destination List, 107 Use LDAP Server, 59 User Authentication Management, 59 User Auto Reduce / Enlarge, 78 User Reduce / Enlarge Ratio, 78 User Stamp, 88 W Warm-up Beeper, 35 WINS Configuration, 48 Wireless LAN Signal, 51 199 200 EN USA B286-7807 In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. c means STAND BY. Trademarks Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. Acrobat® is a registered trademark of Adobe Systems Incorporated. NetWare is a registered trademark of Novell, Inc. Other product names used herein are for identification purposes only and might be trademarks of their respective companies. We disclaim any and all rights to those marks. The proper names of the Windows operating systems are as follows: The product name of Windows 95 is Microsoft® Windows® 95 The product name of Windows 98 is Microsoft® Windows® 98 The product name of Windows Me is Microsoft® Windows® Millennium Edition (Windows Me) The product names of Windows 2000 are as follows: Microsoft® Windows® 2000 Advanced Server Microsoft® Windows® 2000 Server Microsoft® Windows® 2000 Professional The product names of Windows XP are as follows: Microsoft® Windows® XP Professional Microsoft® Windows® XP Home Edition The product names of Windows Server 2003 are as follows: Microsoft® Windows Server® 2003 Standard Edition Microsoft® Windows Server® 2003 Enterprise Edition Microsoft® Windows Server® 2003 Web Edition The product names of Windows NT are as follows: Microsoft® Windows NT® Server 4.0 Microsoft® Windows NT® Workstation 4.0 Copyright © 2007 Operating Instructions General Settings Guide Type for 2404WD/GWD2004/LW324/Aficio MP W2400 Type for 2406WD/GWD2006/LW326/Aficio MP W3600 EN USA B286-7807 Operating Instructions Troubleshooting 1 When the Machine Does Not Operate As Wanted 2 Troubleshooting When Using the Copy Function 3 Troubleshooting When Using the Printer Function 4 Troubleshooting When Using the Scanner Function 5 Adding Paper and Toner 6 Clearing Misfeeds 7 Remarks Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine" before using the machine. Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Important Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. Notes: Some illustrations in this manual might be slightly different from the machine. Certain options might not be available in some countries. For details, please contact your local dealer. Depending on which country you are in, certain units may be optional. For details, please contact your local dealer. Caution: Use of controls or adjustments or performance of procedures other than those specified in this manual might result in hazardous radiation exposure. Two kinds of size notation are employed in this manual. With this machine refer to the inch version. For good copy quality, the supplier recommends that you use genuine toner from the supplier. The supplier shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the supplier with your office products. Power Source 120V, 60Hz, 15A or more Please be sure to connect the power cord to a power source as shown above. For details about power source, see p.78 “Power Connection”. Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important ❒ Media differ according to manual. ❒ The printed and electronic versions of a manual have the same contents. ❒ Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files. ❒ Depending on which country you are in, there may also be html manuals. To view these manuals, a Web browser must be installed. ❒ For details about the functions of RW-3600, refer to the manuals for this option. ❖ About This Machine Be sure to read the Safety Information in this manual before using the machine. This manual provides an introduction to the functions of the machine. It also explains the control panel, preparation procedures for using the machine, how to enter text, and how to install the CD-ROMs provided. ❖ General Settings Guide Explains User Tools settings, and Address Book procedures such as registering e-mail addresses, and user codes. Also refer to this manual for explanations on how to connect the machine. ❖ Troubleshooting Provides a guide to solving common problems, and explains how to replace paper, toner, and other consumables. ❖ Security Reference This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered with, or prevent the machine from unauthorized use. Also refer to this manual for the procedures for registering administrators, as well as setting user and administrator authentication. ❖ Copy/Document Server Reference Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to place originals. ❖ Printer Reference Explains Printer functions and operations. ❖ Scanner Reference Explains Scanner functions and operations. i ❖ Network Guide Explains how to configure and operate the machine in a network environment, and use the software provided. ❖ Other manuals • PostScript3 Supplement • UNIX Supplement • Manuals for DeskTopBinder Lite • DeskTopBinder Lite Setup Guide • DeskTopBinder Introduction Guide • Auto Document Link Guide Note ❒ Manuals provided are specific to machine types. ❒ For “UNIX Supplement”, please visit our Web site or consult an authorized dealer. ❒ “PostScript3 Supplement” and “UNIX Supplement” include descriptions of functions and settings that might not be available on this machine. ii TABLE OF CONTENTS Manuals for This Machine ......................................................................................i How to Read This Manual .....................................................................................1 Symbols .....................................................................................................................1 Names of Major Options ............................................................................................2 1. When the Machine Does Not Operate As Wanted Indicators................................................................................................................3 Panel Tone..............................................................................................................4 Checking Machine Status and Settings...............................................................5 When an Indicator to the Right of a Function Key Is Lit ....................................8 When You Have Problems Operating the Machine.............................................9 When a Job Is Not Performed.............................................................................14 2. Troubleshooting When Using the Copy Function When a Message Appears...................................................................................17 When You Cannot Make Clear Copies ...............................................................20 When You Cannot Make Copies As Wanted .....................................................23 When Memory Is Full ...............................................................................................26 3. Troubleshooting When Using the Printer Function When a Message Appears During Installation of the Printer Driver ...............27 Windows 95/98/Me, Windows 2000, or Windows NT 4.0 ........................................27 Windows XP Professional, Windows Server 2003...................................................28 Windows XP Home Edition ......................................................................................28 If USB Connection Fails ......................................................................................29 When a Message Appears...................................................................................30 Status Messages......................................................................................................30 Alert Messages ........................................................................................................31 Checking the Error Log ............................................................................................33 When You Cannot Print.......................................................................................34 Other Printing Problems .....................................................................................37 4. Troubleshooting When Using the Scanner Function When Scanning Is Not Done As Expected ........................................................43 When You Cannot Send Scanned Files .............................................................44 When Stored Files Cannot Be Accessed .................................................................44 When You Cannot Browse the Network to Send a Scan File ..................................44 When the TWAIN Driver Cannot Be Started ............................................................44 When Stored Files Cannot Be Edited ......................................................................45 When the Network Delivery Function Cannot Be Used ...........................................45 Operations Are Not Possible When Messages Appear ...........................................45 When a Message Appears...................................................................................46 When a Message Appears on the Control Panel .....................................................46 When a Message Appears on the Client Computer.................................................53 iii 5. Adding Paper and Toner Loading Paper ......................................................................................................57 Loading the Paper Roll.............................................................................................59 Loading Cut Paper ...................................................................................................60 Changing the Paper Size.....................................................................................61 Changing the Paper Size in the Paper Roll Tray .....................................................61 Changing the Paper Size in the Cut Paper Tray ......................................................63 Adding Toner........................................................................................................64 Inserting Toner .........................................................................................................65 Sending Scanned Documents When Toner Has Run Out .......................................66 Used Toner ..............................................................................................................66 6. Clearing Misfeeds Removing Jammed Paper ...................................................................................67 Locating Jammed Paper ..........................................................................................68 Removing Jammed Paper........................................................................................69 7. Remarks Where to Put Your Machine ................................................................................75 Machine Environment ..............................................................................................75 Power Connection....................................................................................................78 Maintaining Your Machine ..................................................................................79 Cleaning Inside the Original Cover ..........................................................................79 Cleaning the Main Unit.............................................................................................81 INDEX......................................................................................................... 82 iv How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the “Safety Information” section of About This Machine. Indicates important safety notes. Ignoring these notes could result in moderate or minor injury, or damage to the machine or to property. Be sure to read these notes. They can be found in the “Safety Information” section of About This Machine. Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors. This symbol is located at the end of sections. It indicates where you can find further relevant information. [] Indicates the names of keys that appear on the machine's display panel. {} Indicates the names of keys on the machine's control panel. 1 Names of Major Options Major options of this machine are referred to as follows in this manual: • Roll Feeder Type 240A → Paper roll tray 1 • Roll Feeder Type 240B → Paper roll tray 2 • Paper Cassette Type 240 → Cut paper tray • Folder FD6500A → Folding finisher 2 1. When the Machine Does Not Operate As Wanted This chapter explains basic troubleshooting procedures that are applicable to all functions of this machine. Indicators This section explains the Indicators displayed when the machine requires the user to remove misfed paper, to add paper or to perform other procedures. x: Misfeed indicator Appears when a misfeed occurs. See p.67 “Removing Jammed Paper”. r: Add Paper indicator Appears when paper-out condition occurs. See p.57 “Loading Paper”. D: Add Toner indicator Appears when toner runs out. See p.64 “Adding Toner”. E: Waste Toner Full indicator Appears when the waste toner bottle is full. Contact your sales or service representative. L: Service Call indicator Appears when the machine is malfunctioning or requires maintenance. M: Open Cover indicator Appears when the front cover, etc., is open. 3 When the Machine Does Not Operate As Wanted Panel Tone The following table explains the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. 1 Beep pattern Meaning Cause Two long beeps. Machine has warmed up. After cooling or being switched on, the machine has fully warmed up and is ready for use. Single short beep. Panel/screen input accepted. A control panel or screen key was pressed. Short, then long beep. Panel/screen input rejected. An invalid key was pressed on the control panel or screen, or the entered password was incorrect. Single long beep. Job completed successfully. A Copier/Document Server Features job has finished. Five long beeps. Soft alert. The initial screen returns when the machine goes into energy-saving mode and when simplified display is cancelled. Five long beeps repeated four times. Soft alert. Paper is empty. Five short beeps repeated Strong alert. five time. The machine requires user attention because paper has jammed, the toner needs replenishing, or other problems have occurred. Note ❒ Users cannot mute the machine's beep alerts. When the machine beeps to alert users of a paper jam or toner request, if the machine's covers are opened and closed repeatedly within a short space of time, the beep alert might continue, even after normal status has resumed. ❒ For details about enabling or disabling beep alerts, see “System Settings”, General Settings Guide. Reference “System Settings”, General Settings Guide 4 Checking Machine Status and Settings Checking Machine Status and Settings You can check the machine's system status. 1 ❖ Maintenance Info You can check the following items under [Maintenance Info]: • [Remaining Toner] Displays the amount of remaining toner. • [Paper Tray] Displays the paper type and size loaded in the paper tray. • [Original Misfeed] Displays state of and solutions for original misfeeds. • [Paper Misfeed] Displays state of and solutions for paper jams. • [Cover Open] Indicates whether front cover, duplex unit, etc., is open. ❖ Data Storage You can check the following items under [Data Storage]: • [HDD Remaining Memory] Displays the amount of available hard disk drive memory. • [HDD File(s)] Displays the total number of jobs stored in the hard disk drive. • [Print Job(s)] Displays the number of jobs for Hold print/Stored print/Locked print/Sample print. • [Memory Erase Status] Displays the state of the memory data. ❖ Machine Address Info You can check the following items under [Machine Address Info]: • [Machine IPv4 Address] Displays the machine's IPv4 address. • [Machine IPv6 Address] Displays the machine's IPv6 address. 5 When the Machine Does Not Operate As Wanted ❖ Inquiry You can check the following items under [Inquiry]: • [Machine Repairs] Displays the machine number and contact number that are required for service. • [Sales Representative] Displays the sales representative's telephone number. • [Supply Order] Displays the contact number for placing supply orders. • [Supply Details] Displays the name of toner used on the machine. 1 A On the control panel, press [System Status]. B Press each tab and check the contents. C After checking the information, press [Exit]. The previous screen returns. 6 Checking Machine Status and Settings Note ❒ [Original Misfeed], [Paper Misfeed], and [Cover Open] appear only when these errors occur. ❒ For details about how to locate and remove misfeeds, see “Locating Jammed Paper” or “Removing Jammed Paper”. 1 Reference p.68 “Locating Jammed Paper” p.67 “Removing Jammed Paper” 7 When the Machine Does Not Operate As Wanted When an Indicator to the Right of a Function Key Is Lit 1 When an indicator to the right of a function key lights up, press the corresponding function key. Then, follow the instructions displayed on the control panel. ATK021S If an error occurs in the function you are using, check the message that appears on the control panel, and then refer to “When a Message is Displayed” for the relevant function. Following explain the main reasons the function key is lit. Problem Cause Solution Documents and reports do not print out. There is no copy paper left. Add more paper. See p.57 “Loading Paper”. An error has occurred. The function whose indi- Record the code number shown in the cator is lit is defective. display and contact your service representative. See “When a Message Appears” of each chapter. You can use other functions normally. The machine is unable to connect to the network. A network error has occurred. • Check the displayed message and take an appropriate action. See “When a Message Appears” of each chapter. • Check that the machine is correctly connected to the network, and that the machine is correctly set. See “Network Settings”, General Settings Guide. • Contact the administrator. • When the function key is still lit, even if you take the measures above, contact your service representative. 8 When You Have Problems Operating the Machine When You Have Problems Operating the Machine 1 The following chart gives explanations of common problems and messages. If other messages appear, follow the instructions displayed. Important ❒ Check the contact address and Serial No. of Machine shown in the Service Call message (L), and then contact your service representative. If the contact address is not shown, contact your sales representative. Problem Cause Solution Nothing happens when the operation switch is turned on. The main power switch is turned off. Turn on the main power switch. Although the copier screen appears when the machine is turned on using the main power switch, it cannot be switched to another screen by pressing the {Scanner} key. Functions other than the copier function are not yet ready. Wait a little longer. The machine has just been turned on and the User Tools screen is displayed, but the User Tools menu has items missing. Functions other than the Wait a little longer. copier function are not yet ready. Time required varies by function. Functions appear in the User Tools menu when they become ready for use. The main power indicator continues blinking and does not turn off when pressed. This occurs in the follow- Check if the machine is communicating with a computer. ing cases: • The machine is communicating with external equipment. • The hard disk is active. The display is off. The machine is in Energy Saver mode. Press the {Energy Saver} key to cancel Energy Saver mode. The display is off. The operation switch is turned off. Turn on the operation switch. The display is off. The screen contrast knob is Set the screen contrast knob to the light turned to the dark position. position to see the display panel properly. See “Control Panel”, About This Machine. “Please wait.” appears. This message appears Wait for the machine to get ready. when you turn on the operation switch. 9 When the Machine Does Not Operate As Wanted Problem 1 Cause Solution “Please wait.” appears. This message appears when you change the toner cartridge. Wait for the machine to get ready. “Memory is full. The scanned originals exceed the number of sheets/pages that can be stored in the hard disk. • Press [Store File] to store pages that have been scanned. Delete unnecessary files with [Delete File]. Do you want to store scanned file?” appears. • Press [No] if you are not storing pages that have been scanned. Delete unnecessary files with [Delete File]. This user code is not allowed to use the function selected. Contact the administrator. This user code is not allowed to use the function selected. Press the {Energy Saver} key. Confirm that the display goes off, and then press the {Energy Saver} key again. The display will return to the user code entry display. When printing under the copier or printer function, press the {Energy Saver} key only after printing has finished. “Authentication has failed.” appears. The entered login user name or login password is not correct. Inquire the user administrator for the correct login user name and login password. “Authentication has failed.” appears. The machine cannot per- Contact the administrator. form authentication. “The selected You have tried to delete Files can be deleted by the person who files without the authori- created the file. To delete a file which ty to do so. you are not authorized to delete, contact the person who created the file. “You do not have the privileges to use this function.” continues to be displayed even though you have entered a valid user code. “You do not have the privileges to use this function.” continues to be displayed even though you have entered a valid user code. file(s) contained file(s) without access privileges. Only file(s) with access privileges will be deleted.” appears. 10 Paper is still jammed in An error message remains, even if misfed pa- the tray. per is removed. Clear misfed paper. see p.67 “Removing Jammed Paper”. The user code entry screen is displayed. Users are restricted by user management. Enter the user code (up to eight digits), and then press [OK]. The Authentication screen appears. Basic Authentication, Windows Authentication, LDAP Authentication or Integration Server Authentication is set. Enter your login user name and user password. See “When the Authentication Screen is Displayed”, About This Machine. When You Have Problems Operating the Machine Problem Original images are printed on the reverse side of the paper. Cause You may have loaded the paper incorrectly. Solution Load paper correctly. Load paper into the cut paper tray print side down, and into the bypass tray print side up. See p.57 “Loading Paper”. Misfeeds occur frequently. The cut paper tray's side fences, back fence, or side-end fences, might not be set properly. • Remove the paper. See p.67 “Removing Jammed Paper”. Misfeeds occur frequently. Paper is wrinkled or folded. Cut folded or wrinkled areas off the paper roll. 1 • Check the side fences, back fence, and side-end fences are set properly. See p.61 “Changing the Paper Size”. Remove cut paper that is folded or wrinkled. Misfeeds occur frequently. Jammed or torn paper is inside the machine. Remove the paper, as necessary. See p.67 “Removing Jammed Paper”. Misfeeds occur frequently. You may have loaded pa- • Remove the paper. See p.67 “Removper of a size different from ing Jammed Paper”. the paper size settings. • Use Tray Paper Size Settings to set the paper size. See “Tray Paper Settings”, General Settings Guide and “Copy Paper”, About This Machine. An error C message reYou did not open and When a misfeed C message appears, it mains, even if misfed pa- close the upper section of remains until you open and close the per is removed. the fusing unit. upper section of the fusing unit. Open the fusing unit cover in the back, and then the upper section of the fusing unit to check if any paper remains inside. See p.67 “Removing Jammed Paper”. Originals jam frequently. Originals are curled. Smooth out any curls and try again. 11 When the Machine Does Not Operate As Wanted ❖ Document Server Problem “Exceeded max. number of pages per file. Do you want to store the scanned pages as 1 file?” appears. 1 Cause Solution The number of scanned • To store scanned pages as a file, press pages exceeds the capac[Store File]. Scanned data is stored as ity per file of the Docua file in the Document Server. ment Server. • If you do not want to store scanned pages, press [No]. Scanned data is deleted. • You can store up to 1000 A4 size pages per document. “Original is be- ing scanned by another function. Please wait.” ap- Copier or Scanner function is in use. pears. To cancel a job in progress, first press [Exit], and then press the {Copy} key or {Scanner} key. Next, press the {Clear/Stop} key. When the message “The Stop key has been pressed. Are want to stop “The Clear / pressed. Are want to stop you sure you copying?” or Stop key was you sure you scanning?” ap- pears, press [Stop]. “Cannot display preview of this page.” appears, and The image data may have been corrupted. Pressing [Exit] displays the preview screen without a thumbnail. you can not check the thumbnail image. You forgot your password. You cannot access a pro- Contact the administrator. tected file without enter- To delete the files stored in the docuing the password. ment server, select [Delete All Files in Document Server]. As this will permanently delete every single file, make sure the document server does not contain any files you want to keep. See “Administrator Tools”, General Settings Guide. You cannot find out what is stored in a file. 12 You may not be able to ascertain the contents of a file simply from the file name. You can switch the Select File screen between [List] and [Thumbnails] display to check the contents of the file. In list display, the file name, date of storage, and user name are shown. In thumbnail display, an image of the stored file appears. You can enlarge the image by pressing [Preview]. Use the Select File screen to check information other than the file name. See “Checking the Details of a Stored Document”, Copy/Document Server Reference. When You Have Problems Operating the Machine Problem Memory frequently becomes full. Cause The document server memory is full. Solution Delete unnecessary files. On the file selection display, select unnecessary files, and then press [Delete File]. If this does not increase available memory, do the following. 1 • Switch to the scanner screen, and then delete unnecessary files stored under the scanner function. • Switch to the printer screen, and then delete unnecessary files stored under Sample Print, Locked Print, Hold Print, or Stored Print. You want to check print quality before making a large print run. You can print a single copy without specifying the setting again. Check print quality by printing out only the first set using the {Sample Copy} key. Note ❒ Loading curled paper in the cut paper tray can result in misfeeds and soiled paper edges. To load curled paper in the cut paper tray, first flatten it by hand, and be sure to load it print side down. Also, to prevent paper from curling, lay paper on a flat surface, and do not lean it against the wall. ❒ If you cannot make copies as you want because of paper type, paper size, or paper capacity problems, use recommended paper. See “Copy Paper”, About This Machine. Reference “Copy Paper”, About This Machine 13 When the Machine Does Not Operate As Wanted When a Job Is Not Performed If you cannot execute a function, it may be that the machine is being held up by another function. If you cannot execute a function, terminate any other functions currently active, and then try executing the function again. In certain cases, you can carry out another job (copier, document server, printer, scanner) without canceling the current job being performed. Performing multiple functions simultaneously like this is called “Multi-accessing”. Combination Chart 1 DeskTopBinder Web Document Server Printing Printing ❖ Function Compatibility The chart shows Function Compatibility when print priority is set to “Interleave”. See “General Features”, General Settings Guide. : Simultaneous operations are possible. : Operation is enabled when the relevant function key is pressed and remote switching (of the scanner/external extension) is done. : Operation is enabled when the {Interrupt} key is pressed to interrupt the preceding operation. → : Operation is performed automatically once the preceding operation ends. × : The operation must be started once the preceding operation ends. (Simultaneous operations are not possible.) *1 *2 *2 Printing from Document Server Document Server Operations for Document Server × Scanning a Document to Store in Document Server TWAIN Scanning Scanning Scanner Operations for Scanning Printing Printer → *1 14 Data Reception × Copying × Operations for Copying Copying Mode before you select Copy Operations for Copying Copying Operations for Copying Copy Interrupt Copying Mode after you select DeskTopBinder Web Document Server Printing Printing When a Job Is Not Performed → → Printer Operations for scanning Scanning *2 Web DeskTop Document Server Document Binder Server TWAIN *1 *2 *3 Scanning Operations for Document Server Scanning a Document to Store in Document Server Printing from Document Server TWAIN Document Server Operations for Document Server Scanning a Document to Store in Document Server Printing from Document Server Scanner × × × × × 1 → → Printing Scanner × → → Data Reception Scanning × Scanning × Operations for Scanning × Printing Printer Copying × Data Reception Operations for Copying Copying Interrupt Copying Mode before you select Operations for Copying Copying Operations for Copying Copy Interrupt Copying Mode after you select × × × × × × × × × × × × × *2 × *2 × × × × × × × × *3 *3 *3 Printing Printing Simultaneous operations are only possible after the preceding job documents are all scanned and [New Job] appears. You can scan a document after the preceding job documents are all scanned. Simultaneous operation become possible after you press [New Job]. 15 When the Machine Does Not Operate As Wanted Note ❒ If the machine is capable of executing multiple functions simultaneously, specify which function should have priority in “Print Priority”. This setting is factory-preset to “Display Mode”. For setting of Printing Priority Function, see “General Features”, General Settings Guide. 1 ❒ While printing is in progress, scanning a document using another function may take more time. Reference “General Features”, General Settings Guide. 16 2. Troubleshooting When Using the Copy Function This chapter explains likely causes of and possible solutions for copier function problems. When a Message Appears This section explains the machine's main messages. If other messages appear, follow the instructions they contain. Important ❒ Check the contact address and Serial No. of Machine shown in the Service Call message (L), and then contact your service representative. If the contact address is not shown, contact your sales representative. ❒ For messages that are not listed here, see “When You Have Problems Operating the Machine”. Message Please wait. Cause Solution The main power has just been turned on, paper type (plain paper/ translucent paper/ film) was changed, or the machine is otherwise getting ready. Wait for the machine to fully warm-up. When “Scanning originals can be started.” and “Select copy mode and Place original.” are displayed alternately, you can make the settings for your copies and scan your originals. After the originals have been scanned, the machine will automatically start copying after it has warmed-up. See “Auto Start”, Copy/Document Server Reference. Cannot detect original size. The machine cannot detect Manually select a paper tray without usthe size of the original. ing [Auto Paper Select], and specify a reproduction ratio without using [Auto Reduce / Enlarge]. Memory is full. The machine's memory • When Sort is selected, press [Exit] to is full due to scanning copy scanned originals, and then originals or performing a copy remaining originals. function. The number of • When the Job Preset function is seoriginals that can be lected, check the number of preset stored in memory dejobs, and then try scanning the origipends on the size of orignals again. inals and function settings. Check paper size. An improper paper size is set. Check the settings for Reduce/ Enlarge, etc., and then try again. 17 Troubleshooting When Using the Copy Function 2 Message Cause Solution Rotate Sort is not available with this paper size. Select another paper size or cancel Rotate Sort mode. The rotate sort function does not support the size of the scanned original. You cannot use rotate sort with A0 (E), B4 JIS, A4 (A), and custom size paper. See “Sort”, Copy/Document Server Reference. Set paper of the following dimensions: ❖ Metric version • 420 × 297 mm (A3) • 594 × 420 mm (A2) • 841 × 594 mm (A1) • 515 × 364 mm (B3 JIS) • 728 × 515 mm (B2 JIS) ❖ Inch version (Engineering) • 11" × 17" (B) • 17" × 22" (C) • 22" × 34" (D) ❖ Inch version (Architecture) • 12" × 18" (B) • 18" × 24" (C) • 24" × 35" (D) Maximum number of sets is nn. (A figure is placed at n.) 18 The number of copies ex- You can change the maximum copy ceeds the maximum quantity. See “General Features”, General Settings Guide. copy quantity. File being stored exceeded max. number of pages per file. Copying will be stopped. The scanned originals have too many pages to store as one document. Press [Exit], and then store again with an appropriate number of pages. You do not have the privileges to use this function. This user code is not allowed to use the function selected. Contact the administrator. You do not have the privileges to use this function. This user code is not allowed to use the function selected. If the message continues to be displayed and you cannot switch the screen, press the {Energy Saver} key. Confirm that the display goes off, and then press the {Energy Saver} key again. The display will return to the user code entry display. When printing under the copier or printer function, press the {Energy Saver} key only after printing has finished. Authentication has failed. The entered login user name or login password is not correct. Inquire the user administrator for the correct login user name and login password. When a Message Appears Message Authentication has failed. Cause Solution The machine cannot per- Contact the administrator. form authentication. You have tried to delete The selected file(s) contained files without the authority to do so. file(s) without access privileges. Only file(s) with access privileges will be deleted. Files can be deleted by the person who created the file. To delete a file which you are not authorized to delete, contact the person who created the file. Document Server or Orig. is being scanned by anoth- Scanner function is in use. er function. Please wait. To cancel the job in process, press [Exit], and then press the {Document Server} or {Scanner} key. Next, press the {Clear/Stop} key. When the message “The Clear / Stop key was 2 pressed. Are you sure you want to stop scanning?” appears, press [Stop]. Please wait. The destination list is be- Wait until the message disappears. Do ing updated from the not switch off the power while this mesnetwork using SmartDe- sage is displayed. viceMonitor for Admin. Depending on the number of destinations to be updated, there may be some delay before you can resume operation. Operations are not possible while this message is displayed. Reference p.9 “When You Have Problems Operating the Machine” 19 Troubleshooting When Using the Copy Function When You Cannot Make Clear Copies This section explains likely causes of and possible solutions for unclear copies. Problem 2 Cause Solution Black or white streaks ap- The exposure glass or pear on copies. platen plate is dirty. Clean the exposure glass or platen plate. See p.79 “Maintaining Your Machine”. Black or white streaks ap- The original is dusty. pear on copies. Clean the original and try copying again. Be particularly careful when using the following types of original: • Hand drawn or drawn on with other forms of pencil or pen, such as a plotter. • Film, translucent paper, or other originals that attract static electricity. • Very long originals. 20 The background is dirty. Image density is too dark. Adjust the image density setting. See “Adjusting Copy Image Density”, Copy/Document Server Reference. The background is dirty. Auto Image Density is not selected. Select the auto density. See “Adjusting Copy Image Density”, Copy/Document Server Reference. Copies are too light. Image density is too light. Adjust the image density settings. See “Adjusting Copy Image Density”, Copy/Document Server Reference. Copies are too light. A light copy may result when you use damp or rough grain paper. Use the recommended paper. Also, use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. Copies are too light. Toner cartridge is almost empty. Add toner. See p.64 “Adding Toner”. Parts of images are not printed. The paper is damp. Use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. Toner fusing is poor. The paper thickness is not properly set. Set the paper thickness again. See “Tray Paper Settings”, General Settings Guide. Toner fusing is poor. The copy paper is too thick. Set the paper thickness again. See “Tray Paper Settings”, General Settings Guide. The same copy area is dirty whenever making copies. The exposure glass or platen plate is dirty. Clean the exposure glass or platen plate. See p.79 “Maintaining Your Machine”. The same copy area is dirty whenever making copies. The original that has already been printed is scanned. Select [Generation Copy], and then begin copying. See “Selecting the Original Type Setting”, Copy/Document Server Reference. When You Cannot Make Clear Copies Problem Cause Solution Image density is uneven. The original has areas of solid color, or Positive/Negative is selected when copying multiple sheets. When using Repeat Copy with originals that have areas of solid color, set the number of originals as follows: A0 - A2 (E - C): 1 sheet, A3 (B) or smaller: 3 sheets. For details about sizes of originals, see “Measure Chart”, Copy/Document Server Reference. Image density is uneven. Halftone originals can cause this problem. Try using “Text / Photo” or “Photo”. Images are blurred when using translucent paper. Translucent paper is being used when copying multiple sheets. Select a proper paper thickness for the copy paper. See “Tray Paper Settings”, General Settings Guide. Extreme wrinkling occurs when using translucent paper. An improper paper thickness is selected. Select a proper paper thickness for the copy paper. See “Tray Paper Settings”, General Settings Guide. Strong wrinkles appear when using translucent paper. The paper type has recently been changed from plain paper to translucent paper. Wait about one minute. Streaks, scratches, or wrinkles appear in areas of solid black. Copy paper has been changed from plain to translucent paper, or from translucent to plain paper. After switching from plain to translucent paper, wait one minute. After switching from translucent to plain paper, wait two minutes before making copies. The reverse side of an original image is copied. Image density is too high. Adjust the image density. See “Adjusting Copy Image Density”, Copy/Document Server Reference. The reverse side of an original image is copied. Auto Image Density is not selected. Select the auto density. See “Adjusting Copy Image Density”, Copy/Document Server Reference. Copies are blurred. Continuous copies have been made on small sized paper. Wait about two minutes, and then try copying again. A shadow appears on copies if you use pasted originals. Image density is too high. Adjust the image density. See “Adjusting Copy Image Density”, Copy/Document Server Reference. 2 Change the orientation of the original. Put mending tape on the pasted part. Parts of images are not copied. The original is not set correctly. Set originals correctly. See “Placing Originals”, Copy/Document Server Reference. Parts of images are not copied. The correct paper size is not selected. Select the proper paper size. White lines appear. The exposure glass or platen plate is dirty. Clean the exposure glass or platen plate. See p.79 “Maintaining Your Machine”. 21 Troubleshooting When Using the Copy Function Problem 2 22 Cause Solution White lines appear. When D is blinking, ton- Add toner. See p.64 “Adding Toner”. er is beginning to run out. Copies are blank. The original is not set correctly. When using the exposure glass, face the originals down. See “Placing Originals”, Copy/Document Server Reference. A moiré pattern is produced on copies. Your original has a dot pattern image or many lines. Place the original on the exposure glass at a slight angle. Wrinkles appear on the copy. The paper is damp. • Replace the paper with new paper. • To prevent paper absorbing moisture, turn on the anti-humidity heater switch. See “Guide to Components”, About This Machine. When You Cannot Make Copies As Wanted When You Cannot Make Copies As Wanted This section explains likely causes of and possible solutions for unclear copies. ❖ Basic Problem Cause Misfeeds occur frequently. The number of sheets loaded in the cut paper tray exceeds the capacity of the machine. 2 Solution Load paper only as high as the upper limit markings on the side fences of the cut paper tray. See p.57 “Loading Paper”. Misfeeds occur frequently. The cut paper tray's side Push the cut paper tray's side fences fences are set too tightly. slightly apart, and then reset the tray. Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. Misfeeds occur frequently. The paper is too thick or too thin. Use recommended paper. See “Copy Paper”, About This Machine. Misfeeds occur frequently. The paper is folded or creased. Cut folded or wrinkled areas off the paper roll. Remove cut paper that is folded or wrinkled. Misfeeds occur frequently. Jammed or torn paper is inside the machine. Remove the paper properly. See p.67 “Removing Jammed Paper”. Misfeeds occur frequently. The paper is curled. Smooth out the curl and try again. Misfeeds occur frequently. Printed paper is being used. Use recommended paper. Do not use paper that has been already copied or printed onto. See “Copy Paper”, About This Machine. Copy paper becomes creased. The paper is damp. Replace the paper with new paper. Cut the paper to 1000 mm (40") just before copying. Copy paper becomes creased. The paper is damp. Turn on the anti-humidity heater switch. See “Anti-humidity Heater Switch”, About This Machine. Copy paper becomes creased. The paper is too thin. Use recommended paper. See “Copy Paper”, About This Machine. Copies are slanted. The original was not set straightly. Set the original so that it is squarely aligned with the original guides. Original and copy size does not match. Dampness can cause paper to stretch. Adjust the Fine Magnification setting for Additional Copy. See “Fine Magnification”, Copy/Document Server Reference. 23 Troubleshooting When Using the Copy Function Problem Cause Solution Cannot scan originals on Originals on different se- Scan the originals on each series separately. mixed A series and JIS B ries of paper cannot be series paper continuously. scanned continuously at the same time. You cannot combine sev- Selected functions caneral functions. not be used together. Check the combination of functions and make the settings again. See “Function Compatibility”, Copy/Document Server Reference. Images are skewed. The side fences in the cut paper tray is not locked. Make sure the side fences are locked. See p.61 “Changing the Paper Size”. Images are skewed. The paper is feeding in at a slant. Load the paper correctly. See p.57 “Loading Paper”. The machine does not start copying even though you have inserted paper into the bypass tray. Originals are not scanned. After scanning the originals, load paper in the bypass tray. Copies shift sideways. The paper roll is not set correctly. Set the paper roll correctly, making sure it is straight and not loose. See p.57 “Loading Paper”. Copies shift sideways. The original does not match the size in the original table setting. Adjust the original guides to the specified size, and then insert the original along the guides. See “Placing Originals”, Copy/Document Server Reference. Copies shift sideways. The paper is not set correctly in the bypass tray. Make sure the paper size matches the bypass tray's paper guides. See “Copying from the Bypass Tray”, Copy/Document Server Reference. Copies shift in the direction of the original feed (or opposite) direction. Print Position Adjustment or Margin Adjustment mode is selected. Cancel Print Position Adjustment or Margin Adjustment mode. See “Margin Adjustment” and “Adjust Print Position”, Copy/Document Server Reference. Copies are shorter than the selected size, or cut off before the end. Print Position Adjustment or Margin Adjustment mode is selected. Cancel Print Position Adjustment or Margin Adjustment mode. See “Margin Adjustment” and “Adjust Print Position”, Copy/Document Server Reference. Problem Cause Solution In Double Copies mode, parts of the original image are not copied. Combination of original and copy paper is not correct. Specify the paper size again. For example, select A3L for A4K originals. See “Double Copies”, Copy/Document Server Reference. 2 ❖ Edit 24 In Erase Border, Erase In- You set a wide erased side, or Erase Outside margin. mode, parts of the original image are not copied. Make the margin width narrower. You can adjust it between 2 - 99 mm (0.1" 3.9"). See “Edit”, General Settings Guide. When You Cannot Make Copies As Wanted Problem Cause Solution In Erase Border, Erase In- Originals are not side, or Erase Outside scanned correctly. mode, parts of the original image are not copied. Place the originals correctly. Parts of the image are not copied. Print Position Adjustment or Margin Adjustment mode is selected. Cancel Print Position Adjustment or Margin Adjustment mode. See “Margin Adjustment” and “Adjust Print Position”, Copy/Document Server Reference. Parts of the image are not copied. You placed a custom size original. Enter the size of the original, or set the scanning area wider. See “Placing Custom Size Originals” and “Wide Scan”, Copy/Document Server Reference. In Image Repeat mode, the original image is not copied repeatedly. You selected copy paper Select copy paper larger than the origithe same size as the orig- nals or select the proper reproduction inals, or you did not se- ratio. lect the proper reproduction ratio. 2 ❖ Combine Problem Cause Solution When using Combine, parts of the image are not copied. You specified a reproduction ratio that does not match the sizes of your originals and copy paper. When you specify a reproduction ratio using Manual Paper Select mode, make sure that the ratio matches your originals and the copy paper. Select the correct reproduction ratio before using Combine mode. Copies are not in correct order. You placed the originals in the incorrect order. Start with the first page to be copied. ❖ Folding finisher Problem Cause The folding finisher is not The folding finisher is recognized (is offline). turned off, or the folding finisher and the machine were not turned on in the correct order. Solution If the folding finishers is offline, turn off the main power switches of both the machine and folding finisher, and then turn them back on again in the following order: folding finisher, and then the machine. Then check the folding finisher is online. “Please wait.” ap- The folding finisher is offline. pears on the display panel and printing cannot be done. Turn off the main power switches of both the machine and folding finisher, and then turn them back on again in the following order: folding finisher, and then the machine. Then check the folding finisher is online. Cannot specify folding. Translucent paper or film has been selected. Translucent paper and film are not available for folding. They are delivered to the upper output stacker, but not folded. Select another paper type, and then specify folding. 25 Troubleshooting When Using the Copy Function When Memory Is Full This section explains likely causes of and possible solutions for problems related to full memory. 2 Message Cause Solution Memory is full. nn originals have been scanned. Press [Print] to copy scanned originals. Do not remove remaining originals. The scanned originals exceeds the number of pages that can be stored in memory. Press [Print] to copy scanned originals and cancel the scanning data. Press [Stop] to cancel the scanning data and not copy. The machine checked if the remaining originals should be copied, after the scanned originals was printed. To continue copying, remove all copies, and then press [Continue]. To stop copying, press [Stop]. “n” in the message represents a changeable number. Press [Continue] to scan and copy remaining originals. 26 3. Troubleshooting When Using the Printer Function This chapter explains likely causes of and possible solutions for printer function problems. When a Message Appears During Installation of the Printer Driver This section explains what to do if a message appears when installing the printer driver. Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the printer driver using [Add Printer] or [Install Printer]. Message number 58 appears if there is a newer version of the printer driver already installed. Windows 95/98/Me, Windows 2000, or Windows NT 4.0 This section explains the procedure under Windows 95/98/Me, Windows 2000, or Windows NT 4.0. A On the [Start] menu, point to [Settings], and then click [Printers]. B Double-click the [Add Printer] icon. C Follow the instructions in [Add Printer Wizard]. If the printer driver is on a CD-ROM, the location of the RPCS printer driver is either \DRIVERS\RPCS\WIN9X_ME, or \DRIVERS\RPCS\WIN2K_XP. If the installer starts, click [Cancel] to quit. D Specify a port. For the setting procedure, see a description for the port you are using. Note ❒ Available ports vary according to your Windows operating system or the type of interface. For details, see “Preparing the Machine”, Printer Reference. Reference “Preparing the Machine”, Printer Reference 27 Troubleshooting When Using the Printer Function Windows XP Professional, Windows Server 2003 This section explains the procedure under Windows XP Professional or Windows Server 2003. A On the [Start] menu, click [Printers and Faxes]. B Click [Add a printer]. C Follow the instructions in [Add Printer Wizard]. If the printer driver is on a CD-ROM, the location of the RPCS printer driver is \DRIVERS\RPCS\WIN2K_XP. If the installer starts, click [Cancel] to quit. 3 D Specify a port. See the explanation for the port you are using for the setting procedure. Note ❒ Available ports vary according to your Windows operating system or the type of interface. For details, see “Preparing the Machine”, Printer Reference. Reference “Preparing the Machine”, Printer Reference Windows XP Home Edition This section explains the procedure under Windows XP Home Edition. A On the [Start] menu, click [Control Panel]. B Click [Printer and Other Hardware]. C Click [Printers and Faxes]. D Click [Add a Printer]. E Follow the instructions in [Add Printer Wizard]. If the printer driver is on a CD-ROM, the location of the RPCS printer driver is \DRIVERS\RPCS\WIN2K_XP. If the installer starts, click [Cancel] to quit. F Specify a port. For the setting procedure, see a description for the port you are using. Note ❒ Available ports vary according to your Windows operating system or the type of interface. For details, see “Preparing the Machine”, Printer Reference. 28 Reference “Preparing the Machine”, Printer Reference If USB Connection Fails If USB Connection Fails This section explains how to troubleshoot a problem related to USB connection. Problem The machine is not automatically recognized. Cause Solution The USB cable is not con- Disconnect the USB cable, and then turn nected properly. the machine off and then back on again. After confirming the machine is on, connect the USB cable again. Windows has already con- Check whether the comfigured the USB settings. puter has identified the machine as an unsupported device. Open Windows' Device Manager, and then, under [Universal Serial Bus controllers], remove any conflicting devices. Conflicting devices have a [!] or [?] icon by them. Take care not to accidentally remove required devices. For details, see Windows Help. 3 When using Windows 2000 / XP or Windows Server 2003, an erroneous device is displayed under [USB Controller] in the [Device Manager] dialog box. Windows Me and the ma- You need to download chine cannot be connected. USB Printing Support for Windows Me. Download USB Printing Support from the supplier's website. Search the model name you use on the supplier's website, and download USB Printing Support. 29 Troubleshooting When Using the Printer Function When a Message Appears This section describes the principal messages that appear on the panel display. If a message not described here appears, act according to the message. Note ❒ Before turning the main power off, see “Turning On the Power”, About This Machine. Reference “Turning On the Power”, About This Machine 3 Status Messages This section describes the machine status messages. Message 30 Status Ready This is the default ready message. The machine is ready for use. No action is required. Waiting... The machine is waiting for the next data to print. Wait a while. Offline The machine is offline. To start printing, switch the machine online by pressing [Online]. Please wait. This message might appear for a second or two while the machine is preparing, performing initial adjustments, or adding toner. Wait a while. Job Suspended... All jobs in the machine are suspended. Wait a while. Hex Dump Mode In the Hex Dump mode, the machine receives data in hexadecimal format. Turn off the machine after printing, and then turn back on. Resetting job... The machine is resetting the print job. Wait until “Ready” appears on the display panel. Setting change... The machine is setting changing. You cannot use the control panel while this message is displayed. Wait a while. When a Message Appears Alert Messages This section describes the machine Alert messages. Message Cause Solution Cannot connect with the wireless card. Turn the main power switch off, then check the card. IEEE 802.11b interface unit was not inserted when the machine was turned on. Turn off the machine and check the interface unit is inserted correctly. Then, turn the machine on again. If the message appears again, call your service representative. Cannot connect with the wireless card. Turn the main power switch off, then check the card. IEEE 802.11b interface unit was pulled out after the machine turned on. Turn off the machine and check the interface unit is inserted correctly. Then, turn the machine on again. If the message appears again, call your service representative. Problems with the wireless card. A wireless card that the machine cannot use has been installed. Turn off the machine and check the interface unit is inserted correctly. Then, turn the machine on again. If the message appears again, call your service representative. Problems with the wireless board. Access to the wireless board in which the IEEE 802.11b interface unit is inserted is possible, but an error was detected. Turn off the machine and check the interface unit is inserted correctly. Then, turn the machine on again. If the message appears again, call your service representative. Problem with Hard Disk. An error has occurred in the hard disk drive. Turn off the main power switch, and back on again. If the message appears again, contact your service representative. 3 The entered pass- The password of the en- Enter the correct password. crypted PDF file has word is incorbeen entered incorrectly. rect. Error has occurred. A syntax error, etc., has occurred. Check the PDF file is not corrupted. USB has a problem. An error has occurred in the USB interface. Turn off the main power switch, and back on again. If the message appears again, contact your service representative. Hardware Problem: Ethernet An error has occurred in the Ethernet board. Turn off the main power switch, and back on again. If the message appears again, contact your service representative. Printing privileges have not been set for this document. You tried to print a print- You cannot print this document. protected document. 31 Troubleshooting When Using the Printer Function Message Cause Solution You do not have the privileges to use this function. Use of this function is restricted. Contact the administrator. Authentication has failed. • The login user name or password entered is incorrect. • Check your login user name and password. • Contact the administrator. • The machine currently cannot perform authentication. 3 An error has occurred in Turn off the main power switch, and back Parallel I/F on again. If the message appears again, board has a prob- the parallel interface board. contact your service representative. lem. Printer font error. An error has occurred in the font settings. Contact your service representative. File system is full. There is not enough free space on the file system for printing PDF files. Delete unnecessary files from the hard disk. Maximum capacity of PostScript 3 list display has been exceeded. Reduce the value of [Resolution] in the printer driver. Alternatively, select [Frame Priority] from [Memory Usage] in [System]. See “Printer Features”, General Settings Guide. Memory Overflow Alternatively, reduce the number of files sent to the machine. If this message continues to appear after taking these steps, decrease the number of files sent to the machine. 32 When a Message Appears Checking the Error Log If files could not be stored due to printing errors, identify the cause of the errors by checking the error log on the control panel. A Press the {Printer} key to display the printer screen. 3 ATK022S B Press [Error Log]. An error log list appears. Note ❒ The most recent 30 errors are stored in the error log. If a new error is added when there are 30 errors already stored, the oldest error is deleted. However, if the oldest error is a Sample Print, Locked Print, Hold Print, or Stored Print error, it is not deleted. The error is stored separately until the number of errors reaches 30. ❒ You cannot view [Error Log] on the simplified display. ❒ If the main power switch is turned off, the log is deleted. 33 Troubleshooting When Using the Printer Function When You Cannot Print Use the following procedures if printing does not start when printing from a computer. Problem 3 Cause Solution Printing does not start. The power is off. Check the cable is securely plugged into the power outlet and the machine. Turn on the main power switch. Printing does not start. The machine is set to “Offline”. Press [Online]. Printing does not start. The cause is displayed Check the error message or warning staon the display of the con- tus on the display panel and take the retrol panel. quired action. See p.30 “When a Message Appears”. Printing does not start. The interface cable is not connected correctly. Connect the interface cable securely. See “Connecting to the Interfaces”, General Settings Guide. Printing does not start. The correct interface cable is not being used. The type of interface cable you should use depends on the computer. Be sure to use the correct one. If the cable is damaged or worn, replace it. See “Connecting to the Interfaces”, General Settings Guide. Printing does not start. The interface cable was connected after the machine was switched on. Connect the interface cable before turning on the machine. Printing does not start. If the machine is operating in an extended wireless LAN, failure to print might result from a weak wireless signal. To check signal status, press the {User Tools / Counter} key, and then press [System Settings] on the display panel. On the [Interface Settings] tab, select [IEEE 802.11b], and then press [Wireless LAN Signal]. If signal quality is poor, move the machine to a location where radio waves can pass or remove objects that might cause interference. (You can check signal status only when using wireless LAN in the infrastructure mode.) Printing does not start. 34 If the machine is operating in an extended wireless LAN, SSID settings are incorrect. Check using the machine's display panel that the SSID is correctly set. See “Network Settings”, General Settings Guide. When You Cannot Print Problem Cause Solution Printing does not start. If the machine is operating in an extended wireless LAN, the receiver's MAC address may be preventing communication with the access point. Check access point settings when in the infrastructure mode. Depending on the access point, client access may be limited by MAC address. Also, check there are no problems in transmission between access point and wired clients, and between access point and wireless clients. Printing does not start. The extended wireless LAN has not started. Confirm the orange LED is lit, and the green LED is lit or blinks during transmission. Printing does not start. The login user name, login password, or driver encryption key is invalid. Check the login user name, login password, or driver encryption key. Printing does not start. Advanced encryption Check the settings of the Extended Secuhas been set using the Ex- rity function with the administrator. tended Security function. Data-in lamp does not blink or light up. If the data-in lamp is un- • When the machine is connected to a lit or not flashing even computer via a cable, check the comafter performing [Print], puter print port settings are correct. the machine has not reSee “When the machine is connected ceived the data. to the computer using the interface cable”. 3 • When it is networked with a computer, contact the administrator. The status indicator of the printer is lit. The cause is displayed Check the error message on the display on the display of the con- panel and take required action. See p.30 trol panel. “When a Message Appears”. The destination list is being updated from the tination list... Please wait. Speci- network using SmartDeviceMonitor for Admin. fied destina- “Updating the des- tion(s) or sender's name has been cleared.” appears. Wait until the message disappears. Do not switch off the main power while this message is displayed. Depending on the number of destinations to be updated, there may be some delay before you can resume operation. Operations are not possible while this message is displayed. [List / Test Print] is disabled. A mechanical error might have occurred. Contact your service representative. See “List / Test Print”, General Settings Guide. Printing does not start when using the extended wireless LAN in Ad-hoc mode. The correct Communica- Turn the main power off and back on. tion mode is not set. See “Turning On the Power”, About This Machine. Or, change the settings for [System Settings], [Interface Settings], and [Network]. See “Network Settings”, General Settings Guide. If the printing does not start, consult your service representative. 35 Troubleshooting When Using the Printer Function ❖ When the machine is connected to the computer using the interface cable The following shows how to check the print port when the data-in lamp does not light up or blink. Check if the print port setting is correct. When it is connected using a parallel interface, connect it to LPT1 or LPT2. For Windows 95/98/Me A Click the [Start] button, point to [Settings], and then click [Printers]. B Click the icon of the machine. On the [File] menu, click [Properties]. C Click the [Details] tab. D In the [Print to the following port:] list, confirm the correct port is selected. For Windows 2000 or Windows NT 4.0 A Click the [Start] button, point to [Settings], and then click [Printers]. B Click the icon of the machine. On the [File] menu, click [Properties]. C Click the [Ports] tab. D In the [Print to the following port(s)] list, confirm the correct port is selected. For Windows XP Professional or Windows Server 2003 A Click the [Start] button, and then click [Printers and Faxes]. B Click the icon of the machine. On the [File] menu, click [Properties]. C Click the [Ports] tab. D In the [Print to the following port(s)] list, confirm the correct port is selected. For Windows XP Home Edition A Click the [Start] button, and then click [Control Panel]. B Click [Printers and Other Hardware]. C Click [Printers and Faxes]. D Click the icon of the machine. On the [File] menu, click [Properties]. E Click the [Ports] tab. F In the [Print to the following port(s)] list, confirm the correct port is selected. 3 36 Other Printing Problems Other Printing Problems This section explains likely causes of and possible solutions for problems that can occur when printing from a computer. ❖ If prints are not clear Problem Cause Solution The print on the entire page is faded. When D is blinking, toner is beginning to run out. Add toner. See p.64 “Adding Toner”. The print on the entire page is faded. The paper is damp. Use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. The print on the entire page is faded. The paper is unsuitable. Use the recommended paper. (Printing on coarse or treated paper might result in faint print image.) See “Copy Paper”, About This Machine. Parts of images are not printed. The paper is damp. Use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. White lines appear. When D is blinking, toner is beginning to run out. Add toner. See p.64 “Adding Toner”. 3 ❖ When printer driver settings are required Problem Cause Solution The printed image is different from the image on the computer's display. With certain funcIn the application, change the layout, character tions, such as ensize, and character settings. largement and reduction, image layout might be different to that on the computer display. The printed image is different from the image on the computer's display. You might have selected to replace True Type fonts with machine fonts in the printing process. When printing graphics, the output and the screen are different. If the printer driver is If you want to print accurately, set the printer configured to use the driver to print without using the graphics comgraphics command, mand. See the printer driver Help. the graphics command from the machine is used to print. Garbled characters are printed. The correct printer language might have not been selected. To print an image similar to that of the computer display, make settings to print True Type fonts as an image. See the printer driver Help. Set the correct printer language. 37 Troubleshooting When Using the Printer Function Problem Cause Solution Images are printed in The feed orientation the wrong orientation. you selected and the feed orientation selected in the printer driver's option setup might not be the same. Set the machine's feed orientation and the printer driver's feed orientation accordingly. See the printer driver Help. Images are cut off, or excess is printed. You may be using paper smaller than the size selected in the application. Use the same size paper as that selected in the application. If you cannot load paper of the correct size, use the reduction function to reduce the image, and then print. See the printer driver Help. Page layout is not as expected. Print areas differ depending on machine used. Information that fits on a single page on one machine may not fit on a single page of another machine. Adjust the [Printable area:] setting in the [Printer Configuration...] dialog box on the [Print Settings] tab in the RPCS printer driver. See the printer driver Help. Photo images are coarse. Some applications print Use the application's settings to specify a higher at lower resolution. resolution. Solid lines are printed as broken lines. Dither patterns do not match. 3 Make the following settings with the printer driver: Change the [Dithering:] setting on the [Image Adjustments] tab in the [Change User Settings...] dialog box, on the [Print Quality] tab in the RPCS printer driver. See the printer driver Help. Set up optional devices on the Properties of the Optional components Bidirectional commuconnected to the ma- nication is not working. printer. chine are not recogSee the printer driver Help. nized when using Windows 95 / 98 / Me, Windows 2000 / XP, Windows Server 2003, and Windows NT 4.0. Print results using The correct applicacombined printing or tion or printer driver auto reduce/enlarge settings are not made. are not as expected under Windows 95 / 98 / Me / 2000 / XP, Windows Server 2003, or Windows NT 4.0. When printing on custom size paper under Windows, the image appears in the wrong position. 38 Make sure the application's paper size and orientation settings match those of the printer driver. If a different paper size and orientation are set, select the same size and orientation. The correct custom To print on custom size paper from the paper paper size is not spec- tray, specify the paper size in the printer drivified in the printer er's settings. See the printer driver Help. driver's settings. Other Printing Problems ❖ When paper does not feed in properly Problem Cause Solution Paper is not fed from the selected tray. When you are using a Set the desired input tray using the printer Windows operating driver. See the printer driver Help. system, printer driver settings override those set using the display panel. Print is slanted. The cut paper tray's side fences might not be locked. Check the side fences are locked. See p.61 “Changing the Paper Size”. Print is slanted. The paper is feeding in at a slant. Load the paper correctly. See p.57 “Loading Paper”. Misfeeds occur frequently. The number of sheets Load paper only as high as the upper limit loaded in the cut paper markings on the side fences of the cut paper tray exceeds the capac- tray. See p.57 “Loading Paper”. ity of the machine. Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. Misfeeds occur frequently. The paper is too thick or too thin. Use recommended paper. See “Copy Paper”, About This Machine. Misfeeds occur frequently. The copy paper is wrinkled or has been folded/creased. Use recommended paper. Use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. Misfeeds occur frequently. Printed paper is being used. Use recommended paper. See “Copy Paper”, About This Machine. Copy paper becomes creased. The paper is damp. Use paper that has been stored in the recommended temperature and humidity condition. See “Copy Paper”, About This Machine. Copy paper becomes creased. The paper is too thin. Use recommended paper. See “Copy Paper”, About This Machine. There is considerable delay between the print start instruction and actual printing. Processing time deIf the data-in lamp is blinking, data has been repends on data volceived by the printer. Wait for a moment. ume. High volume data, such as graphics-heavy documents, take longer to process. There is considerable delay between the print start instruction and actual printing. The machine might be in “Sleep mode”. The machine requires time to warm up if it has been in “Sleep mode”. Specify “Sleep mode” in [System Settings], [Auto Off Timer]. There is considerable delay between the print start instruction and actual printing. The paper type setting was changed. If the paper type setting has been changed, there might be a delay before printing begins. Wait for a moment. 3 39 Troubleshooting When Using the Printer Function Problem Cause It takes a long time to complete a print job. Processing time depends on data volume. High volume data, such as graphics-heavy documents, take longer to process. Solution Wait for a moment. Making the following setting on the printer driver may reduce the computer's workload. • Select [Speed] in the [Print priority] on the [Print Quality] tab in the printing preferences dialog box. • Also, select the [User settings] check box, and then click [Change User Settings...]. Select the lower value for the [Resolution:] list on the [Image Adjustments] tab in the [Change User Settings] dialog box. 3 See the printer driver Help. Print jobs take a long time to complete. If a print job is data heavy, it will take longer to complete. If the data-in lamp is blinking, data has been received by the printer. Wait for a moment. ❖ Folding finisher Problem Cause Solution Cannot specify folding. The folding finisher is When the folding finisher is offline, folding offline. cannot be specified. Turn off the main power switches of both the machine and folding finisher, and then turn them back on again in the following order: folding finisher, and then the machine. Then check the folding finisher is online. Cannot specify folding. The optional device is Configure the optional device correctly using not configured cor[Change Accessories...] on the printer driver. See rectly on the printer the printer driver Help. driver. Cannot specify folding. Translucent paper or film was specified. “Please wait.” appears on the display panel and printing cannot be done. Translucent paper and film are not available for folding. They are delivered to the upper output stacker, but not folded. Select another paper type, and then specify folding. The folding finisher is Turn off the main power switch of both the maoffline. chine and folding finisher, and then turn them back on again in the following order: folding finisher, and then the machine. Then check the folding finisher is online. 40 Other Printing Problems ❖ Other printing problems Problem Cause Solution A print instruction was issued from the computer, but printing did not start. User Authentication may have been set. • Ask the administrator for the user code. PDF files do not print out/cannot perform PDF direct print. PDF files are password-protected. To print password-protected PDF files, enter the password in the [PDF Menu] or on Web Image Monitor. • Specify the user code you confirmed when printing from the printer driver. On the printer driver's [Printer Configuration] tab, click [User Code], and then enter the user code. 3 • For details about [PDF Menu], see “PDF Menu”, General Settings Guide. • For details about Web Image Monitor, see the Web Image Monitor Help. PDF files do not print out/cannot perform PDF direct print. PDF files cannot be Change the PDF file security setting. printed if they are print-disabled in PDF file security setting. PDF files do not print out/cannot perform PDF direct print. High compression PDF files created using the machine's scanner function cannot print directly. Open the application used to create the PDF, and then print the file using the application's driver. Re-save the file in normal (non-compressed) PDF format. Some types of High Compression PDF files are not supported. Consult your sales representative about the supported file types. PDF direct print pro- Fonts were not duces strange or mal- embedded. formed characters. Embed fonts in the PDF file you want to print and then print. Printing by wireless LAN is slow. The number of jobs exceeds the capacity of the machine. Reduce the number of jobs. Printing by wireless LAN is slow. • A communication error might have occurred. • Check if there are any other active wirelessdevices near the machine. • Interference from other wireless LAN devices can reduce communication speed. • Remove the machine from close proximity with IEEE 802.11b wireless LAN devices. If the problem cannot be solved, contact your service representative. 41 Troubleshooting When Using the Printer Function 3 42 4. Troubleshooting When Using the Scanner Function This chapter explains likely causes of and possible solutions for scanner function problems. When Scanning Is Not Done As Expected This section explains causes and remedies when scan results are not as expected. Problem Cause Solution The scanned image is dirty. The exposure glass or platen plate is dirty. Clean the exposure glass or platen plate. See p.79 “Maintaining Your Machine”. The image is distorted or out of position. The original has not been loaded square. Insert the original along the original guides, so it is straight. See “Setting Original Orientation”, Scanner Reference. The orientation of the scanned image is not correct. The original was placed in the wrong top/bottom or left/right orientation. Place the original in the correct orientation. See “Setting Original Orientation”, Scanner Reference. No image results from scanning. The original was placed with the front and back reversed. When the original is placed directly on the original table, the side to be scanned must face down. See “Setting Original Orientation”, Scanner Reference. The scanned image contains white spaces. • If you scan originals using Scanning at a higher resolution functions other than the netmay reduce the margins. work TWAIN scanner function, certain paper size and resolution settings may produce scanned images that are larger than the specified size because of margins being added to the sides. • If the File Format Converter (optional ) is installed, the margins may become wider. The scanner journal cannot be printed. The paper tray is open. Close the paper tray. The scanner journal cannot be printed. Paper is loaded in the bypass tray Remove the paper from the bybut another paper tray is specified. pass tray. The scanner journal cannot be printed. The original exit switching lever is in the rear output position. Switch the original exit switching lever to upper output. The file size of the com- For detailed images such as line pressed image is larger drawings, the file size increases than that of the nonafter compression. compressed image. If large-size files become a problem, set Compression to [Off] under Scanner Features. 43 Troubleshooting When Using the Scanner Function When You Cannot Send Scanned Files The following sections explain likely causes of and solutions for Network Delivery and E-mail Sending-related problems. When Stored Files Cannot Be Accessed This section explains likely causes of and possible solutions for job access-related problems. Problem The stored file is locked and is not accessible. 4 Cause Solution The file, which is password pro- Contact the administrator. tected, is locked because the password was incorrectly entered ten times. When You Cannot Browse the Network to Send a Scan File This section explains likely causes of and possible solutions for the Browse Network failing to operate when files are sent. Problem Cause The network cannot be The following machine settings browsed when specifying may not be correct: the destination folder. • IPv4 address Solution Check the settings. See “Network Settings ”, General Settings Guide. • Subnet Mask When the TWAIN Driver Cannot Be Started This section explains likely causes of and possible solutions for the TWAIN driver failing to operate. 44 Problem Cause Solution The Scanner Properties dialog box cannot be displayed. Advanced encryption has been specified in the extended security setting. For details about the extended security setting, contact an administrator. When You Cannot Send Scanned Files When Stored Files Cannot Be Edited This section explains likely causes of and possible solutions for the TWAIN driver failing to operate. Problem Cause Stored files cannot be deleted. File names and passwords cannot be changed. Files cannot be redelivered. Limits have been imposed using the available extended security function. Solution Contact the administrator. When the Network Delivery Function Cannot Be Used 4 This section explains likely causes of and possible solutions for the Network Delivery function failing to operate. Problem Cause Solution The network delivery function cannot be used. The delivery software may be an old version or a security setting may be specified. Contact the administrator. The network delivery function cannot be used. The network delivery function setting is not correct. Specify it correctly. See “Settings Required to Use the Network Delivery Scanner”, General Settings Guide. Operations Are Not Possible When Messages Appear This section explains likely causes of and possible solutions for messages that appear and when the machine fails to operate. Message Cause Solution Destination list / machine settings are updated. Selected destinations or function settings have been cleared. Please re-select the settings. The destination list is being updated from the network using SmartDeviceMonitor for Admin. Depending on the number of destinations to be updated, there may be some delay before you can resume operation. Operations are not possible while this message is displayed. Wait until the message disappears. Do not switch off the power while this message is displayed. 45 Troubleshooting When Using the Scanner Function When a Message Appears This section explains likely causes of and possible solutions for error messages that may appear on the machine's control panel. When a Message Appears on the Control Panel This section explains causes and remedies if an error message appears on the display of the control panel. Important ❒ If a message not described here appears, act according to the message. For information about how to turn off the main power switch, see “Turning On the Power”, About This Machine. 4 Message Cause No HDD is available for this function, or File Format Converter is not connected. Cannot use Scanner Function. No HDD is available for Contact your service representative. this function, or File Format Converter is not connected. Connection with LDAP server has failed. Check the server status. A network error has occurred and connection has failed. LDAP server authentication has failed. Check the settings. The user name and pass- Make settings correctly for the user word differ from those set name and the password for LDAP servfor LDAP Authentication. er authentication. The destination list has been updated. Specified destination(s) or sender's name has been cleared. A specified destination or sender's name was cleared when the destination list in the delivery server was updated. Updating the des- A network error has tination list has occurred. failed. Try again? 46 Solution Try the operation once more. If the message is still shown, the network may be crowded. Check the information of System Settings. See “System Settings”, General Settings Guide. Specify the destination or sender's name again. Check whether the server is connected. When a Message Appears Message Cause Updating the des- The destination list has tination list... been updated. Please wait. Specified destination(s) or sender's name has been cleared. Solution If a destination or sender's name was already selected, re-select it after this message disappears. Exceeded max. number of files which can be sent at the same time. Reduce the number of the selected files. The number of files exceeded the maximum number possible. Exceeded max. No. of results to display. Max.: nnn Search results have exSearch again after changing the search ceeded the max. display- conditions. able number. Reduce the number of files and send them again. 4 (A figure is placed at n.) You do not have the privileges to use this function. The machine has not been set to allow you to use the function. Exceeded max. number of standby files.Try again after the current file is sent. The maximum number of There are 100 files waiting in the sendstandby files was exceeded. ing queue for e-mail, Scan to Folder, or delivery functions. Wait until files have been sent. Exceeded time limit for LDAP server search. Check the server status. A network error has occurred and connection has failed. Try the operation once more. If the message is still shown, the network may be crowded. Check the information of System Settings. See “System Settings”, General Settings Guide. The specified group contains some destination(s) that do not have access privileges. Do you want to select only the privileged destination(s)? The specified group contains some destinations for sending by e-mail and some destinations for sending by Scan to Folder. To select destinations for sending by email, press [Select] for the message displayed on the e-mail screen. To select destination for sending by Scan to Folder, press [Select] for the message displayed on the Scan to Folder screen. Contact the administrator. 47 Troubleshooting When Using the Scanner Function Message Cause Solution Cannot find the specified path. Please check the settings. The destination computer name or folder name is invalid. Check whether the computer name and the folder name for the destination are correct. Exceeded max. number of alphanumeric characters for the path. The maximum number of specifiable alphanumeric characters in a path has been exceeded. The maximum number of characters which can be entered for the path is 128. Check the number of character you entered, and then enter the path again. See “Transmission Function”, Scanner Reference. You have tried to delete The selected file(s) contained files without the authority to do so. file(s) without access privileges. Only file(s) with access privileges will be deleted. 4 Some of selected files are currently in use. They could not be deleted. You cannot delete a file Cancel transmission (“Waiting...”status whose status is “Waitcleared) or the DeskTopBinder setting, ing...” or that is being ed- and then delete the file. ited with DeskTopBinder. You cannot cancel a file Cannot cancel currently being sent. sending all selected file(s). Certain file(s) are currently being sent. 48 The files can be deleted by the file administrator. To delete a file which you are not authorized to delete, contact the administrator. You can only cancel files waiting to be sent. You cannot cancel files already sent or currently being sent, files that were sent but did not reach the destination, or files that have been cancelled. Selected file is currently in use. Cannot change file name. You cannot change the Cancel transmission (“Waiting...” status name of a file whose sta- cleared) or the DeskTopBinder setting, tus is “Waiting...” or that and then change the file name. is being edited with DeskTopBinder. Selected file is currently in use. Cannot change password. You cannot change the password of a file whose status is “Waiting...” or that is being edited with DeskTopBinder. Cancel transmission (“Waiting...” status cleared) or the DeskTopBinder setting, and then delete the password. Selected file is currently in use. Cannot change user name. You cannot change the sender's name whose status is “Waiting...” or that is being edited with DeskTopBinder. Cancel transmission (“Waiting...” status cleared) or the DeskTopBinder setting, and then change the user name. When a Message Appears Message Connection with the destination has failed. Check the status and connection. To check the current status, press [Scanned Files Status]. Cause Solution The correct Network set- • Check the network settings of the clitings are not made. ent computer. • Check that components such as the LAN cable are connected properly. • Check that the server settings are correct and the server is working properly. The entered user name • Check that the user name and passAuthentication word are correct. with the destina- or password was invalid. tion has failed. • Check that the ID and password for the destination folder are correct. Check settings. To check the cur• A password of 128 or more characrent status, ters may not be recognized. press [Scanned Files Status]. Destination(s) or sender name is not specified. Destination(s) or sender name is not specified. Send e-mail after specifying the destination(s) or sender's name. Destination(s) have not been specified. Destination(s) have not been specified. Send e-mail after specifying the destination(s). Sender has not been specified. The sender's name was not specified. A sender's name should be specified before sending e-mail. Send e-mail after specifying the sender's name. Exceeded max. E- The maximum e-mail mail size. Send- size has been exceeded. ing E-mail has been cancelled. Check [Max. Email Size] in Scanner Features. • Increase the size of [Max. E-mail Size]. 4 • Set [Divide & Send E-mail] to [Yes (per Page)] or [Yes (per Max. Size)]. See “Send Settings”, General Settings Guide. Sending the data has failed. The data will be resent later. A network error has occurred and a file was not sent correctly. Wait until sending is retried automatically after the preset interval. If sending fails again, contact the network administrator. Transmission has failed. To check the current status, press [Scanned Files Status]. While a file was being sent, a network error occurred and the file could not be sent correctly. Try the operation once more. If the message is still shown, the network may be crowded. Contact the administrator. Press [Scanned Files Status] to display the transmission results, and then check which job has not been sent. See “Confirmation Displays”, Scanner Reference. 49 Troubleshooting When Using the Scanner Function Message 4 50 Cause Solution Transmission has failed. Insufficient memory in the destination hard disk. To check the current status, press [Scanned Files Status]. Transmission has failed. Allocate sufficient space. There was not enough free space on the hard disk of the SMTP server, FTP server, or client computer at the destination. Output buffer is full. Sending the data has been cancelled. Please try again later. Too many jobs are in standby state, and sending was cancelled. Retry sending after sending jobs in standby state completes. Exceeded max. number of pages per file. Do you want to store the scanned pages as 1 file? The file being stored has exceeded the max. number of pages for one file. Specify whether to use the data or not. Scan the pages that were not scanned and store them as a new file. See “Storing Files Using the Scanner Function”, Scanner Reference. Exceeded maximum number of file to store. Delete all unnecessary files. Too many files are waiting to be delivered. Select fewer files for transmission, or delete some unneeded files. For details about the number of files that you can store, see “Storage Function”, Scanner Reference. Too many files are waitExceeded max. number of stored ing to be delivered. files. Cannot send the scanned data as capturing files is unavailable. Select fewer files for transmission, or delete some unneeded files. For details about the number of files that you can store, see “Storage Function”, Scanner Reference. Exceeded max. number of files which can be used in Document Server at the same time. The maximum number of files that can be stored in the document server has been exceeded. Check the files stored, and then delete unneeded files. See “Document Server”, Copy/Document Server Reference or “Storing Files Using the Scanner Function”, Scanner Reference. Entered protection code for destination is incorrect. Please re-enter. The correct protect destina- Make sure the protection code is correct, tion code was not entered. and then enter it again. See “Registering a Protection Code”, General Settings Guide. Password entered is not correct. Please re-enter. You have entered an incorrect password. Check the authentication settings, and then enter a correct password. When a Message Appears Message Cause Solution Exceeded max. number of alphanumeric characters. The maximum enterable Make sure the maximum number of number of alphanumeric characters which can be entered, and characters has been exceeded. then enter it again. See “Values of Various Set Items for Transmission/Storage/Delivery Function”, Scanner Reference. Authentication has failed. The entered login user name or login password is incorrect. Check the login user name and login password. The machine is unable to authenticate. Contact an administrator. The entered path is not correct. Please re-enter. The entered path format is incorrect. Confirm the destination computer and the path, and then enter it again. Reduce the number of pages in the transCaptured file ex- The maximum number of pages per file has been mitted file, and then resend the file. See ceeded max. exceeded. “Storage Function”, Scanner Reference. number of pages per file. Cannot send the scanned data. 4 Original is being The machine is using an- Retry scanning after the operation with the other function is completed. scanned by anoth- other function such as copying. er function. Please wait. [Copier][Document Server]... Original is being The machine is using anscanned by anoth- other function such as copying. er function. Switch to the following function, then press the Stop key to cancel scanning or press the Start key to continue. Switch to another function such as Copier, Document Server, etc., and then press either the {Clear/Stop} key to cancel scanning or the {Start} key to continue. [Copier][Document Server]... Specify destination(s) and set original(s). Destination(s) is not specified. Specify destination(s), and then set original(s). Specify the next destination, then set original. The next destination is not specified. Specify the next destination, and then set original. 51 Troubleshooting When Using the Scanner Function Message 4 Cause Solution E-mail address entered is not correct. Please re-enter. The entered e-mail address is incorrect. Make sure the e-mail address is correct, and then enter it again. Memory is full. Press [Send] to send the current scanned data, or press [Cancel] to delete. Because there is not enough free hard disk space in the machine for delivering or sending by e-mail while storing in the Document Server, only some of the pages could be scanned. Specify whether to use the data or not. Memory is full. Cannot scan. The scanned data will be deleted. Because of insufficient hard disk space, the first page could not be scanned. Try one of the following measures: • Wait for a while, and then retry the scan operation. • Reduce the scan area or scanning resolution. See “Scan Settings”, Scanner Reference. • Delete unneeded stored files. See “Deleting a Stored File”, Scanner Reference. Memory is full. Do you want to store scanned file? Because there is not enough free hard disk space in the machine for storing in the Document Server, only some of the pages could be scanned. Specify whether to use the data or not. No paper is set in the No paper. Load specified paper tray. paper of one of the following sizes, then press [Start Printing]. A3K, B4K, A4K... Load paper of the sizes listed in the message. The scanned original Exceeded max. was too large, or its oridata capacity. entation was not correct. Set Original Orientation to “R” then press the Start key again. Specify the scan size and resolution again. Note that it may not be possible to scan very large originals at a high resolution. Re-loading the original in a different orientation may enable the machine to scan large originals. See “Relationship between Resolution and Scan Size”, Scanner Reference. 52 When a Message Appears Message Cause Solution Exceeded max. data capacity.Check scanning resolution, then press Start key again. The scanned data exceeded maximum data capacity. Specify the scan size and resolution again. Note that it may not be possible to scan very large originals at a high resolution. See “Relationship between Resolution and Scan Size”, Scanner Reference. Exceeded max. page capacity per file. Press [Send] to send the scanned data, or press [Cancel] to delete. The number of scanned pages exceeded maximum page capacity. Select whether to send the data so far. Cannot display preview of this page. The size of the image you want to preview is larger than A2 (C). Images larger than A2 (C) cannot be previewed. 4 Specify A2 (C) or a smaller image, or scan again at A2 (C) or smaller. Reference “Turning On the Power”, About This Machine When a Message Appears on the Client Computer This section explains likely causes of and possible solutions for the main error messages displayed on the client computer when using the TWAIN driver. Important ❒ If a message not described here appears, act according to the message. For information about how to turn off the main power switch, see “Turning On the Power”, About This Machine. Message Paper misfeed has occurred. Cause A paper misfeed has occurred. Solution Remove jammed originals, and place them again. Check whether the originals are suitable to be scanned by the machine. The scanning area does not match the original. The specified area to be scanned differs from the actual scanned area of the original. Check the location of the original. The start position of the scanning area does not match the original. The specified area to be scanned differs from the actual scanned area of the original. Check the location of the original. 53 Troubleshooting When Using the Scanner Function Message Standby time reached. Cause An original was not loaded within the specified time limit. Solution Load an original within the time limit specified in [Standby Time]. Please call your An unrecoverable error has Contact your service representative. service represen- occurred in the machine. tative. The TWAIN scanner Scanner is not available on the function cannot be used specified device. on this machine. Scanner is not available. Check the scanner connection status. 4 • The machine's main power switch is off. • The machine is not connected to the network correctly. Contact your service representative. • Set the main power switch to “On”. • Check whether the machine is connected to the network correctly. • Deselect the personal firewall function of the client computer. • Use an application such as telnet to make sure SNMPv1 or SNMPv2 is set as the machine's protocol. See “Network Settings”, General Settings Guide and “Using telnet”, Network Guide. 54 Cannot find the scanner. Check the scanner main power switch. The machine's main power switch is off. Check that the cable is securely plugged into the power outlet and the machine. Set the main power switch to “On”. Error has occurred on the scanner. Scanning will be cancelled. The application-speciCheck whether the scanning settings fied scan conditions have made with the application exceed the exceeded the setting setting range of the machine. range of the machine. Fatal error has occurred in the scanner. An unrecoverable error has An unrecoverable error has occurred in the occurred on the machine. machine. Call your service representative. Scanner is not ready. Check the scanner and the options. The original cover is open. Check whether the original cover is closed. When a Message Appears Message Cause Insufficient mem- Scanner memory is insufficient. ory.Reduce the scanning area. Solution • Reset the scan size. • Lower the resolution. • Set with no compression. See TWAIN Driver help. The problem may be due to the following cause: • “The Relationship between the Resolution and the Scanning Area” chart in Help for halftone scanning might not always apply. Scanning cannot be performed if large values are set for brightness when using halftone or high resolution. Error has occurred within the scanner driver. An error has occurred in the driver. 4 • Check whether the network cable is connected correctly to the client computer. • Check whether the Ethernet board of the client computer is recognized correctly by Windows. • Check whether the client computer can use the TCP/IP protocol. Scanner is in use by another function. A function of the machine other than the scanner function is being used such as the copier function. Insufficient mem- The computer does not ory. Reduce reso- have enough memory. lution, original size, or scanning area. Wait for a while and reconnect. Reduce the resolution or size of scanning. Alternately, try scanning again after closing any other applications in use. No User Code is registered. Consult your system administrator. Access is restricted with user codes. Contact the administrator of the machine. Any of Login User Name, Login Password or Driver Encryption Key is incorrect. The entered login user • Check the login user name, login name, password, or drivpassword, and driver encryption er encryption key was key. invalid. • Permission to use this function has not been granted. Contact the administrator. Reference “Turning On the Power”, About This Machine 55 Troubleshooting When Using the Scanner Function 4 56 5. Adding Paper and Toner This chapter explains troubleshooting procedures that are applicable to all the machine's functions. Loading Paper This section explains what to do when paper runs out and needs reloading. R CAUTION: • Be careful when replacing the roll paper or removing misfed paper by following the operating instructions properly. Otherwise, an injury may result from the paper cutter inside. R CAUTION: • The fusing section of this machine might be very hot. Caution should be taken when removing misfed paper. R CAUTION: • When replacing or loading the paper roll, do not put the paper roll on the upper of the paper roll tray. Otherwise the tray may fall and an injury may result. • Hold the paper rolls horizontally with both hands. When you grab the paper holder and hold the paper roll vertically, the paper roll may fall off and an injury may result. R CAUTION: • When replacing or loading the paper, or clearing paper jams, pull out the cut paper tray slowly with both hands. Do not pull out the cut paper tray with a single hand. Otherwise the rear of the cut paper tray may fall and an injury may result. Important ❒ When removing paper rolls, lift the paper holders on either side of the paper roll before removing. Do not lift one side only. This could damage the machine. ATJ012S 57 Adding Paper and Toner Note ❒ If the original hanger (optional) is installed, remove it before pulling out the paper roll tray or cut paper tray. ❒ For paper types and sizes that can be loaded in the paper roll tray and cut paper tray, see “Recommended Paper Sizes and Types”, About This Machine. ❒ For details about changing the paper size in the paper roll tray or cut paper tray, see “Changing the Paper Size”. ❒ To load paper in the bypass tray, see “Copying from the Bypass Tray”, Copy/Document Server Reference. Reference p.61 “Changing the Paper Size” “Recommended Paper Sizes and Types”, About This Machine “Copying from the Bypass Tray”, Copy/Document Server Reference 5 58 Loading Paper Loading the Paper Roll The following procedure explains loading the paper roll. 5 ATK003S Note ❒ When you use the printer function, set the paper volume again after loading the paper roll. See “Tray Paper Settings”, General Settings Guide. ❒ When you change the paper size or paper type, make the paper size or type settings under System Settings. See “Tray Paper Settings”, General Settings Guide. 59 Adding Paper and Toner Reference “Tray Paper Settings”, General Settings Guide Loading Cut Paper The following procedure explains loading cut paper. 5 ATK004S Note ❒ Fan the paper before loading. ❒ Straighten curled or warped paper before loading. ❒ Extend the side-end fences when changing to a larger paper size such as A3. See “Changing the Paper Size in the Cut Paper Tray”. Reference p.63 “Changing the Paper Size in the Cut Paper Tray” 60 Changing the Paper Size Changing the Paper Size This section explains how to change a paper size. Procedures for changing the paper size differ depending on the tray. Make sure you are following the appropriate procedure before you begin. Note ❒ Be sure to select the paper size with System Settings. If you do not, misfeeds might occur. See, “Tray Paper Settings”, General Settings Guide. ❒ For details about paper sizes and types, see “Copy Paper”, About This Machine. Reference “Copy Paper”, About This Machine “Tray Paper Settings”, General Settings Guide Changing the Paper Size in the Paper Roll Tray 5 The following procedure explains how to change a paper size in the paper roll tray. Removing the roll holder The following procedure explains removing the roll holder. Important ❒ Always follow the instructions below when adjusting the roll holder. Do not force the roll holder by pulling or sliding it strongly. This could damage it. ATK005S 61 Adding Paper and Toner Setting the roll holder The following procedure explains setting the roll holder. 5 ATK006S Note ❒ For procedures about loading the paper, see “Loading Paper”. ❒ Confirm paper width using the paper roll tray's scale. Reference p.57 “Loading Paper” 62 Changing the Paper Size Changing the Paper Size in the Cut Paper Tray The following procedure explains how to change a paper size in the cut paper tray. 5 ATK007S Note ❒ This procedure is required for loading A3K, B4 JISK, 11" × 17"K, or 12" × 18"K size paper. ❒ If you want to load A4K, 81/2" × 11"K paper sizes, see “Loading Cut Paper”. ❒ When you change the paper size or paper type, make the paper size or type settings under System Settings. See “Tray Paper Settings”, General Settings Guide. ❒ Fan the paper before loading. ❒ Straighten curled or warped paper before loading. Reference p.60 “Loading Cut Paper” “Tray Paper Settings”, General Settings Guide 63 Adding Paper and Toner Adding Toner This section explains adding and storing toner. R WARNING: • Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open flame. Dispose of used toner containers in accordance with local regulations. R CAUTION: • Keep toner (used or unused) and toner containers out of reach of children. R CAUTION: • If toner or used toner is inhaled, gargle with plenty of water and move into a fresh air environment. Consult a doctor if necessary. R CAUTION: • If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult a doctor if necessary. 5 R CAUTION: • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary. R CAUTION: • Avoid getting toner on your clothes or skin when removing a paper jam or replacing toner. If your skin comes into contact with toner, wash the affected area thoroughly with soap and water. • If toner gets on your clothing, wash with cold water. Hot water will set the toner into the fabric and may make removing the stain impossible. R CAUTION: • Do not open toner containers forcefully. Toner can spill, dirtying your clothes or hands, and possibly resulting in accidental ingestion. Important ❒ Fault may occur if you use toner other than the recommended type. ❒ When adding toner, do not turn off the operation switch. If you do, settings will be lost. ❒ Always add toner when the machine instructs you. ❒ When a message “DAdd Toner” is shown on the display, replace the applicable toner. ❒ Store toner containers in a cool, dry place free from direct sunlight. ❒ Store on a flat surface. 64 Adding Toner Note ❒ You can check name of the required toner name and the replacement procedure using the “DAdd Toner” screen. ❒ Press [System Status] to check contact number where you can order supplies. See “Checking Machine Status and Settings”. Reference p.5 “Checking Machine Status and Settings” Inserting Toner The following describes how to replace toner. Important ❒ Do not shake the removed toner cartridge. The remaining toner might scatter. 5 ATK008S Note ❒ The waste toner bottle makes a noise when toner is added. This noise does not indicate a malfunction. 65 Adding Paper and Toner Sending Scanned Documents When Toner Has Run Out When the machine has run out of toner, the indicator on the display lights. Note that even if there is no toner left, you can still send scanned documents. A Make sure that the machine is in scanner mode. B Press [Exit], and then perform transmission operation. The error message disappears. Note ❒ If the scanner screen does not appear in step A, press the {Scanner} key. Used Toner Toner cannot be re-used. Bring the stored used container to your sales or service representative for recycling through our recycling system. If you discard it on your own, treat it as general plastic waste material. 5 66 6. Clearing Misfeeds This chapter explains what to do when paper or originals misfeed (become jammed inside the machine). Removing Jammed Paper R CAUTION: • The fusing section of this machine might be very hot. Caution should be taken when removing misfed paper. R CAUTION: • Be careful when replacing the roll paper or removing misfed paper by following the operating instructions properly. Otherwise, an injury may result from the paper cutter inside. R CAUTION: • When replacing or loading the paper, or clearing paper jams, pull out the cut paper tray slowly with both hands. Do not pull out the cut paper tray with a single hand. Otherwise the rear of the cut paper tray may fall and an injury may result. R CAUTION: • Keep your hands clear of the paper exit area and the inside of the folding finisher. You can trap your fingers if you do not. Important ❒ When clearing misfeeds, do not turn off the operation switch. If you do, your settings will be lost. ❒ To prevent misfeeds, do not leave any torn scraps of paper inside the machine. ❒ Contact your service representative if misfeeds occur frequently. Note ❒ For details about how to locate and remove misfeeds, see “Locating Jammed Paper” or “Removing Jammed Paper”. ❒ On the original cover, paper output exit cover, or paper roll tray, there is a sticker explaining how to remove misfed paper. Reference p.68 “Locating Jammed Paper” p.69 “Removing Jammed Paper” 67 Clearing Misfeeds Locating Jammed Paper If a misfeed happens, remove the misfed paper or original by following the procedures shown on the diagrams on the original cover, paper output exit cover, or paper roll tray. A misfeed has occurred in the place corresponding to the letter displayed on the control panel. ATK009S 6 A Press the key of the section from where you want to remove the jammed paper. B After each step is complete, press [Next]. To go back to the previous step, press [Previous]. C When all jammed paper are removed, restore the machine to the original state. Note ❒ More than one misfeed may be indicated. When this happens, check all the areas indicated. 68 Removing Jammed Paper Removing Jammed Paper The following procedure explains how to remove jammed paper. Important ❒ The internal parts of the machine may be hot. Wait for the fusing unit to cool down before clearing a paper jam in the unit. ❒ When removing jammed paper from the fusing section, touch only the areas explicitly specified in this manual. ❒ Do not remove the fusing unit. Doing so can result in reduced print quality. Note ❒ On the original cover, paper output exit cover, or paper roll tray, there is a sticker explaining how to remove misfed paper. ❒ If a detailed removal instruction appears on the right of the screen, follow it. ❒ You can also use the procedure indicated in [System Status] to remove jammed paper. When A1 is lit 6 ATK010S 69 Clearing Misfeeds When A2 is lit 6 ATK011S 70 Removing Jammed Paper When B is lit ATK012S When C is lit 6 ATK013S When P is lit ATK014S 71 Clearing Misfeeds When N1 - N7 is lit ❖ When N1 is lit ATK015S ❖ When N3 is lit 6 ATK016S ❖ When N5 is lit ATK017S 72 Removing Jammed Paper ❖ When N7 is lit ATK018S 6 73 Clearing Misfeeds 6 74 7. Remarks This chapter describes how to maintain and operate the machine. Where to Put Your Machine This section provides precautions for installation, movement and disposal. Machine Environment Choose your machine's location carefully. Environmental conditions greatly affect its performance. Moving The following describes precautions when moving the machine. R CAUTION: • Contact your service representative if you need to lift the machine (such as when relocating it to another floor). Do not attempt to lift the machine without the assistance of your service representative. The machine will be damaged if it topples or is dropped, resulting in malfunction and risk of injury to users. The machine's various handling areas are for service engineer use only. Do not touch these areas. R CAUTION: • Before moving the machine, be sure to disconnect all external connections, especially the power cord from the wall outlet. Damaged power cords are a fire and electric shock hazard. R CAUTION: • Unplug the power cord from the wall outlet before you move the machine. While moving the machine, you should take care that the power cord will not be damaged under the machine. Important ❒ Be careful when moving the machine. Take the following precautions: • Turn off the main power. • Unplug the power cord from the wall outlet. When you pull out the plug from the socket, grip the plug to avoid damaging the cord, thereby reducing the risk of fire or electric shock. • Close all covers and trays, including the front cover and bypass tray. ❒ Keep the machine level and carry it carefully, taking care not to jolt or tip it. Rough handling may cause a malfunction or damage the hard disk or memory, resulting in loss of stored files. 75 Remarks ❒ Do not take off the holding stand. ❒ Protect the machine from strong shocks. Impact can damage the hard disk and cause stored files to be lost. As a precautionary measure, files should be copied to another computer. Note ❒ For details about how to turn the main power off, see “Turning On the Power”, About This Machine. Reference “Turning On the Power”, About This Machine Optimum environmental conditions The following describes precautions when locating the machine. R CAUTION: • Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur. • Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur. R CAUTION: • After you move the machine, use the caster fixture to fix it in place. Otherwise the machine might move or come down to cause an injury. 7 R CAUTION: • Make sure the room where you are using the machine is well ventilated and spacious. Good ventilation is especially important when the machine is used heavily. Temperature: 10 - 30 °C (50 - 86 °F) Humidity: 15 - 90% A strong and level base. The machine must be level within 5 mm, 0.2 inches: both front to rear and left to right. • To avoid possible buildup of ozone, make sure to locate this machine in a large well ventilated room that has an air turnover of more than 30 m3/hr/person. • • • • 76 Where to Put Your Machine Environments to avoid • Locations exposed to direct sunlight or other sources of strong light (more than 1,500 lux). • Locations directly exposed to cool air from an air conditioner or heated air from a heater. (Sudden temperature changes can cause condensation to form inside the machine.) • Locations close to machines generating ammonia, such as a diazo copy machine. • Places where the machine will be subject to frequent strong vibration. • Dusty areas. • Areas with corrosive gases. Access to the machine Place the machine near the power source, providing the clearance areas shown. ❖ Clearance required for the machine only 7 ATK019S 1. Rear: 60 cm (23.6") or more 2. Right: 60 cm (23.6") or more 3. Front: 100 cm (39.4") or more 4. Left: 60 cm (23.6") or more ❖ Clearance required for the machine and the optional folding finisher ATK020S 1. Rear: 100 cm (39.4") or more 2. Right: 80 cm (31.5") or more 3. Front: 100 cm (39.4") or more 4. Left: 80 cm (31.5") or more 77 Remarks Power Connection The following explains power supply. R WARNING: • Connect the machine only to the power source described on the inside front cover of this manual. Connect the power cord directly into a wall outlet and do not use an extension cord. • Do not damage, break or make any modifications to the power cord. Do not place heavy objects on it. Do not pull it hard nor bend it more than necessary. These actions could cause an electric shock or fire. R WARNING: • If the power cord is damaged (exposure of the core, disconnection, etc.), contact your service representative to change a new one. Operating the machine with a damaged power cord may cause an electric shock or fire. R CAUTION: • When you disconnect the power plug from the wall outlet, always pull the plug (not the cable). R CAUTION: • To disconnect the power code, pull it out by plug. Do not drag the code itself. Doing so may result in damage to the code, leading to fire or electric shock. 7 • • • • 78 When you unplug the power cord, the anti-condensation heaters go off. Make sure the plug is inserted firmly in the wall outlet. Voltage must not fluctuate by more than 10%. The wall outlet shall be installed near the machine and shall be easily accessible. Maintaining Your Machine Maintaining Your Machine If the exposure glass, or platen plate is dirty, copy clarity may be reduced. Clean these parts if they are dirty. Important ❒ Do not use chemical cleaners or organic solvents, such as thinner or benzene. If such substances get inside the machine or melt plastic parts, a failure might occur. ❒ Do not clean parts other than those explicitly specified in this manual. Other parts should only be cleaned by your service representative. ❖ How to maintain Cleaning the machine: Wipe the machine with a soft, dry cloth. If this does not remove the dirt, wipe the machine with a damp and tightly wrung cloth. If a damp cloth still does not remove the dirt, try using a mild detergent. Wipe the machine with a dry cloth to remove the moisture, after using a damp cloth. Cleaning Inside the Original Cover If you open the original cover, you can access the exposure glass and original feed mechanism. A Open the original cover while holding it on both sides. 7 ATJ038S B Wipe the exposure glass with soft, dry cloth. ATJ039S 79 Remarks C Wipe the platen plate with a soft, dry cloth. ATJ040S D Wipe the original feed guides with a soft, dry cloth. 7 ATJ041S E Close the original cover gently. ATJ042S Note ❒ If there is paper dust or fluff inside, remove it. 80 Maintaining Your Machine Cleaning the Main Unit Clean off toner that may have collected on the imaging area. Important ❒ Do not leave the main unit more than 10 minutes, otherwise copy quality may deteriorate. A Lift the main unit opening levers on either side and open the main unit. ATJ043S B Wipe it with a soft, dry cloth. 7 ATJ044S C Close the main unit cover gently. 81 INDEX A Access to the machine, 77 Adding Paper, 57 Adding Paper and Toner, 57 Adding Toner, 64 Alert Messages, 31 C Cannot Browse the Network to Send a Scan File, 44 Cannot Make Clear Copies, 20 Cannot Make Copies As Wanted, 23 Cannot Print, 34 Cannot Send Scanned Files, 44 Changing the Paper Size, 61 Changing the Paper Size in the Cut Paper Tray, 63 Changing the Paper Size in the Paper Roll Tray, 61 Checking Machine Status and Settings, 5 Checking the Error Log, 33 Cleaning Inside the Original Cover, 79 Cleaning the Main Unit, 81 Clearing Misfeeds, 67 Combine, 23 Copy Function, 17 D Data Storage, 5 Document Server, 9 E Edit, 23 Environment, 75 Environments to avoid, 77 Error Log, 33 F Folding finisher, 23, 37 Function Compatibility, 14 H How to Read This Manual, 1 82 I If prints are not clear, 37 If USB Connection Fails, 29 Indicators, 3 Indicator to the Right of a Function Key Is Lit, 8 Inquiry, 5 Inserting Toner, 65 J Job Is Not Performed, 14 L Loading Cut Paper, 60 Loading Paper, 57 Loading the Paper Roll, 59 Locating Jammed Paper, 68 M Machine Address Info, 5 Machine Does Not Operate As Wanted, 3 Machine Environment, 75 Maintaining Your Machine, 79 Maintenance Info, 5 Manuals for This Machine, i Memory Is Full, 26 Message Appears, 17, 30, 46 Message Appears During Installation of the Printer Driver, 27 Message Appears on the Client Computer, 53 Message Appears on the Control Panel, 46 Moving, 75 Multi-accessing, 14 N Names of Major Options, 2 Network Delivery Function Cannot Be Used, 45 O Operations Are Not Possible When Messages Appear, 45 Optimum environmental conditions, 76 Other Printing Problems, 37 P Panel Tone, 4 Power Connection, 78 Printer Function, 27 Problems Operating the Machine, 9 Put Your Machine, 75 R Remarks, 75 Removing Jammed Paper, 67, 69 Removing the roll holder, 61 S Scanner Function, 43 Scanning Is Not Done As Expected, 43 Sending Scanned Documents When Toner Has Run Out, 66 Setting the roll holder, 62 Status Messages, 30 Stored Files Cannot Be Accessed, 44 Stored Files Cannot Be Edited, 45 Symbols, 1 T Toner, 64 TWAIN, 44, 53 TWAIN Driver Cannot Be Started, 44 U Used Toner, 66 W When A1 is lit, 69 When A2 is lit, 70 When B is lit, 71 When C is lit, 71 When N1 is lit, 72 When N3 is lit, 72 When N5 is lit, 72 When N7 is lit, 72 When paper does not feed in properly, 37 When P is lit, 71 When printer driver settings are required, 37 Windows 2000, 27 Windows 95/98/Me, 27 Windows NT 4.0, 27 Windows Server 2003, 28 Windows XP Home Edition, 28 Windows XP Professional, 28 83 84 EN USA B286-7757 In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. c means STAND BY. In accordance with IEC 60417, this machine uses the following symbols for the anti-humidity heater switch: a means POWER ON. b means POWER OFF. Trademarks Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. TrueType is registered trademarks of Apple Computer, Inc. Adobe®, PostScript®, Acrobat®, are registered trademarks of Adobe Systems Incorporated. Other product names used herein are for identification purposes only and might be trademarks of their respective companies. We disclaim any and all rights to those marks. The proper names of the Windows operating systems are as follows: • The product name of Windows® 95 is Microsoft® Windows® 95 • The product name of Windows® 98 is Microsoft® Windows® 98 • The product name of Windows® Me is Microsoft® Windows® Millennium Edition (Windows Me) • The product names of Windows® 2000 are as follows: Microsoft® Windows® 2000 Advanced Server Microsoft® Windows® 2000 Server Microsoft® Windows® 2000 Professional • The product names of Windows® XP are as follows: Microsoft® Windows® XP Professional Microsoft® Windows® XP Home Edition • The product names of Windows Server® 2003 are as follows: Microsoft® Windows Server® 2003 Standard Edition Microsoft® Windows Server® 2003 Enterprise Edition Microsoft® Windows Server® 2003 Web Edition • The product names of Windows NT® are as follows: Microsoft® Windows NT® Server 4.0 Microsoft® Windows NT® Workstation 4.0 Copyright © 2007 Operating Instructions Troubleshooting Type for 2404WD/GWD2004/LW324/Aficio MP W2400 Type for 2406WD/GWD2006/LW326/Aficio MP W3600 EN USA B286-7757 Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81% Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm Operating Instructions Security Reference Operating Instructions Security Reference Printed in the Netherlands GB GB B286-7900 Operating Instructions Security Reference 1 Getting Started 2 Authentication and its Application 3 Preventing Information Leaks 4 Managing Access to the Machine 5 Enhanced Network Security 6 Specifying the Extended Security Functions 7 Troubleshooting 8 Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine" before using the machine. * &$%' Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81% Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its completeness or accuracy. If you have any questions concerning the legality of copying or printing certain items, consult with your legal advisor. Important Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. Trademarks Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. AppleTalk, EtherTalk, are registered trademarks of Apple Computer, Inc. Bonjour is a trademark of Apple Computer Inc. PostScript® and Acrobat® are registered trademarks of Adobe Systems, Incorporated. NetWare is a registered trademarks of Novell, Inc. Other product names used herein are for identification purposes only and might be trademarks of their respective companies. We disclaim any and all rights to those marks. The proper names of the Windows operating systems are as follows: • The product name of Windows® 95 is Microsoft® Windows 95. • The product name of Windows® 98 is Microsoft® Windows 98. • The product name of Windows® Me is Microsoft® Windows Millennium Edition (Windows Me). • The product names of Windows® 2000 are as follows: Microsoft® Windows® 2000 Advanced Server Microsoft® Windows® 2000 Server Microsoft® Windows® 2000 Professional • The product names of Windows® XP are as follows: Microsoft® Windows® XP Professional Microsoft® Windows® XP Home Edition • The product names of Windows Server® 2003 are as follows: Microsoft® Windows Server® 2003 Standard Edition Microsoft® Windows Server® 2003 Enterprise Edition Microsoft® Windows Server® 2003 Web Edition • The product names of Windows NT® 4.0 are as follows: Microsoft® Windows NT® Server 4.0 Microsoft® Windows NT® Workstation 4.0 Notes Some illustrations in this manual might be slightly different from the machine. Certain options might not be available in some countries. For details, please contact your local dealer. Two kinds of size notation are employed in this manual. With this machine refer to the metric version. Copyright © 2006 Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. • Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files. • Depending on which country you are in, there may also be html manuals. To view these manuals, a Web browser must be installed. • For details about the functions of RW-3600, refer to the manuals for this option. ❖ About This Machine Be sure to read the Safety Information in this manual before using the machine. This manual provides an introduction to the functions of the machine. It also explains the control panel, preparation procedures for using the machine, how to enter text, and how to install the CD-ROMs provided. ❖ General Settings Guide Explains User Tools settings, and Address Book procedures such as registering e-mail addresses, and user codes. Also refer to this manual for explanations on how to connect the machine. ❖ Troubleshooting Provides a guide to solving common problems, and explains how to replace paper, toner, and other consumables. ❖ Security Reference (This manual) This manual is for administrators of the machine. It explains security functions that the administrators can use to protect data from being tampered with, or prevent the machine from unauthorized use. Also refer to this manual for the procedures for registering administrators, as well as setting user and administrator authentication. ❖ Copy/ Document Server Reference Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to place originals. ❖ Printer Reference Explains Printer functions and operations. ❖ Scanner Reference Explains Printer functions and operations. i ❖ Network Guide Explains how to configure and operate the machine in a network environment, and use the software provided. ❖ Other manuals • Manuals for This Machine • Safety Information • Quick Reference Copy Guide • Quick Reference Printer Guide • Quick Reference Scanner Guide • PostScript3 Supplement • UNIX Supplement • Manuals for DeskTopBinder Lite • DeskTopBinder Lite Setup Guide • DeskTopBinder Introduction Guide • Auto Document Link Guide Note ❒ Manuals provided are specific to machine types. ❒ For "UNIX Supplement", please visit our Web site or consult an authorized dealer. ❒ "PostScript3 Supplement" and "UNIX Supplement" include descriptions of functions and settings that might not be available on this machine. Product name DeskTopBinder Lite Professional *1 and DeskTopBinder ScanRouter EX Professional er EX Enterprise *1 *1 ii Optional General name *1 DeskTopBinder and ScanRout- The ScanRouter delivery software TABLE OF CONTENTS Manuals for This Machine ...................................................................................... i How to Read This Manual ..................................................................................... 1 Symbols .....................................................................................................................1 1. Getting Started Enhanced Security................................................................................................. 3 Glossary .....................................................................................................................4 Setting Up the Machine..............................................................................................5 Security Measures Provided by this Machine..................................................... 7 Using Authentication and Managing Users ................................................................7 Preventing Information Leaks ....................................................................................8 Limiting and Controlling Access .................................................................................9 Enhanced Network Security.....................................................................................10 2. Authentication and its Application Administrators and Users ................................................................................... 11 Administrators ..........................................................................................................12 User..........................................................................................................................13 The Management Function .................................................................................14 About Administrator Authentication..........................................................................15 About User Authentication .......................................................................................16 Enabling Authentication......................................................................................17 Authentication Setting Procedure.............................................................................17 Administrator Authentication .............................................................................18 Specifying Administrator Privileges..........................................................................19 Registering the Administrator...................................................................................22 Logging on Using Administrator Authentication .......................................................25 Logging off Using Administrator Authentication .......................................................28 Changing the Administrator......................................................................................29 Using Web Image Monitor........................................................................................31 Using Web Printing Tool ..........................................................................................32 User Authentication.............................................................................................33 User Code Authentication ........................................................................................34 Basic Authentication.................................................................................................38 Windows Authentication...........................................................................................47 LDAP Authentication ................................................................................................55 Integration Server Authentication.............................................................................63 If User Authentication is Specified..................................................................... 74 User Code Authentication (Using the Control Panel)...............................................74 User Code Authentication (Using a Printer Driver) ..................................................75 Login (Using the Control Panel) ...............................................................................75 Log Off (Using the Control Panel) ............................................................................77 Login (Using a Printer Driver)...................................................................................78 Login (Using Web Image Monitor) ...........................................................................78 Log Off (Using Web Image Monitor) ........................................................................78 Auto Logout..............................................................................................................79 Authentication using an external device...................................................................80 iii 3. Preventing Information Leaks Printing a Confidential Document ...................................................................... 81 Choosing a Locked Print file ....................................................................................81 Printing a Locked Print File ......................................................................................82 Deleting Locked Print Files ......................................................................................84 Changing Passwords of Locked Print Files..............................................................85 Unlocking Locked Print Files....................................................................................87 Specifying Access Permission for Stored Files ...............................................88 Assigning Users and Access Permission for Stored Files .......................................89 Specifying Access Privileges for Files Stored using the Scanner Function .............92 Assigning the User and the Access Permission for the User’s Stored Files ............95 Specifying Passwords for the Stored Files...............................................................98 Unlocking Files.......................................................................................................100 Preventing Data Leaks Due to Unauthorized Transmission.......................... 102 Restrictions on Destinations...................................................................................102 Protecting the Address Book ...........................................................................105 Address Book Access Permission .........................................................................105 Encrypting the Data in the Address Book .............................................................. 108 Deleting Data on the Hard Disk ........................................................................ 111 Overwriting the Data on the Hard Disk................................................................... 111 4. Managing Access to the Machine Preventing Modification of Machine Settings .................................................121 Menu Protect ...................................................................................................... 122 Menu Protect..........................................................................................................122 Limiting Available Functions ............................................................................ 125 Specifying Which Functions are Available .............................................................125 Managing Log Files ...........................................................................................127 Specifying Delete All Logs .....................................................................................128 Transfer Log Setting...............................................................................................129 5. Enhanced Network Security Preventing Unauthorized Access.....................................................................131 Enabling/Disabling Protocols .................................................................................131 Access Control .......................................................................................................133 Specifying Network Security Level.........................................................................134 Encrypting Transmitted Passwords.................................................................137 Driver Encryption Key ............................................................................................ 138 Group Password for PDF files................................................................................140 IPP Authentication Password.................................................................................141 Protection Using Encryption ............................................................................ 142 SSL (Secure Sockets Layer) Encryption................................................................ 143 User Settings for SSL (Secure Sockets Layer) ...................................................... 148 Setting the SSL / TLS Encryption Mode.................................................................149 SNMPv3 Encryption ...............................................................................................151 iv 6. Specifying the Extended Security Functions Changing the Extended Security Functions ................................................... 153 Changing the Extended Security Functions ........................................................... 153 Settings .................................................................................................................. 155 Other Security Functions ..................................................................................160 Scanner Function ................................................................................................... 160 Limiting Machine Operation to Customers Only ............................................161 Settings .................................................................................................................. 161 7. Troubleshooting Authentication Does Not Work Properly .........................................................165 A Message Appears...............................................................................................165 Machine Cannot Be Operated................................................................................167 8. Appendix Supervisor Operations ......................................................................................171 Logging on as the Supervisor ................................................................................172 Logging off as the Supervisor ................................................................................173 Changing the Supervisor........................................................................................173 Resetting an Administrator’s Password .................................................................175 Machine Administrator Settings.......................................................................176 System Settings .....................................................................................................176 Copier / Document Server Features ......................................................................178 Printer Features .....................................................................................................179 Scanner Features................................................................................................... 180 Extended Feature Setting Menu ............................................................................180 Settings via Web Image Monitor ............................................................................181 Settings via SmartDeviceMonitor for Admin........................................................... 183 Network Administrator Settings .......................................................................184 System Settings .....................................................................................................184 Scanner Features................................................................................................... 185 Extended Feature Setting Menu ............................................................................185 Settings via Web Image Monitor ............................................................................186 Settings via SmartDeviceMonitor for Admin........................................................... 188 File Administrator Settings ...............................................................................189 System Settings .....................................................................................................189 Printer Features .....................................................................................................189 Extended Feature Setting Menu ............................................................................190 Settings via Web Image Monitor ............................................................................191 User Administrator Settings ............................................................................. 192 System Settings .....................................................................................................192 Extended Feature Setting Menu ............................................................................193 Settings via Web Image Monitor ............................................................................194 Settings via SmartDeviceMonitor for Admin........................................................... 194 Document Server File Permissions..................................................................195 The Privilege for User Account Settings in the Address Book ..................... 196 v User Settings...................................................................................................... 199 Copier / Document Server Features ......................................................................200 Printer Functions ....................................................................................................202 Scanner Features................................................................................................... 204 System Settings .....................................................................................................205 Web Image Monitor Setting.................................................................................... 210 Functions That Require Options ......................................................................221 INDEX....................................................................................................... 222 vi How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the "Safety Information" section of About This Machine. Indicates important safety notes. Ignoring these notes could result in moderate or minor injury, or damage to the machine or to property. Be sure to read these notes. They can be found in the "Safety Information" section of About This Machine. Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors. This symbol is located at the end of sections. It indicates where you can find further relevant information. [] Indicates the names of keys that appear on the machine’s display panel. {} Indicates the names of keys on the machine’s control panel. 1 2 1. Getting Started Enhanced Security This machine's security function can be enhanced through the management of the machine and its users using the improved authentication functions. By specifying access limits on the machine’s functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access. Data encryption can prevent unauthorized data access and tampering via the network. Note ❒ In this manual, explanations of printer/scanner security functions are applicable to Printer Option Type W3600. ❖ Authentication and Access Limits Using authentication, administrators manage the machine and its users. To enable authentication, information about both administrators and users must be registered in order to authenticate users via their login user names and passwords. Four types of administrator manage specific areas of machine usage, such as settings and user registration. Access limits for each user are specified by the administrator responsible for user access to machine functions and documents and data stored in the machine. Reference For details, see p.12 “Administrators”. ❖ Encryption Technology This machine can establish secure communication paths by encrypting transmitted data and passwords. 3 Getting Started Glossary ❖ Administrator There are four types of administrator: machine administrator, network administrator, file administrator, and user administrator. We recommend only one person take each administrator role. A single administrator can perform the tasks of multiple administrators. Basically, administrators make machine settings and manage the machine; they cannot perform normal operations, such as copying and printing. 1 ❖ User A user performs normal operations on the machine, such as copying and printing. ❖ File Creator (Owner) This is a user who can store files in the machine and authorize other users to view, edit, or delete those files. ❖ Registered User This is a user whose personal information is registered in the address book. The registered user is the user who knows the login user name and password. ❖ Administrator Authentication Administrators are authenticated by means of the login user name and login password supplied by the administrator when specifying the machine’s settings or accessing the machine over the network. ❖ User Authentication Users are authenticated by means of the login user name and login password supplied by the user when specifying the machine’s settings or accessing the machine over the network. The user’s login user name and password, as well as personal information items as e-mail address, are stored in the machine’s address book. The personal information can be obtained from the Windows domain controller (Windows authentication), LDAP Server (LDAP authentication), or Integration Server (Integration Server Authentication) connected to the machine via the network. ❖ Login This action is required for administrator authentication and user authentication. Enter your login user name and login password on the machine’s control panel. A login user name and login password may also be supplied when accessing the machine over the network or using such utilities as Web Image Monitor and SmartDeviceMonitor for Admin. 4 ❖ Logout This action is required with administrator and user authentication. This action is required when you have finished using the machine or changing the settings. Enhanced Security Setting Up the Machine If you want higher security, make the following setting before using the machine: 1 A Turn the machine on. B Press the {User Tools/Counter} key. C Press [System Settings]. D Press [Interface Settings]. E Specify IP Address. For details, see the General Settings Guide. F Connect the machine to the network. G Start the Web Image Monitor, and then log on to the machine as the administrator. For details, see p.78 “Login (Using Web Image Monitor)”. H Install the server certificate. For details, see p.142 “Protection Using Encryption”. I Enable secure sockets layer (SSL). 5 Getting Started J Enter the administrator’s user name and password. During steps F to I, the administrator’s default account (user name: admin, password: blank) in unencrypted form will be vulnerable to network interception, and this account may be used for breaking into the machine over the network. If you consider this risky, we recommend that you specify a temporary administrator password between steps A and F. 1 Reference p.31 “Using Web Image Monitor” 6 Security Measures Provided by this Machine Security Measures Provided by this Machine Using Authentication and Managing Users 1 ❖ Enabling Authentication To control administrators’ and users’ access to the machine, perform administrator authentication and user authentication using login user names and login passwords. To perform authentication, the authentication function must be enabled. Reference For details, see p.17 “Enabling Authentication”. ❖ Specifying Authentication Information to Log on Users are managed using the personal information managed in the machine’s address book. By enabling user authentication, you can allow only people registered in the address book to use the machine. Users can be managed in the address book by the user administrator. Reference For details, see p.44 “Specifying Authentication Information to Log on”. ❖ Specifying Which Functions are Available This can be specified by the user administrator. Specify the functions available to registered users. By making this setting, you can limit the functions available to users. Reference For details, see p.125 “Specifying Which Functions are Available”. 7 Getting Started Preventing Information Leaks ❖ Printing confidential files Using the printer’s Locked Print, you can store files in the machine as confidential files and then print them. You can print a file using the machine’s control panel and collect it on the spot to prevent others from seeing it. 1 Reference For details, see p.81 “Printing a Confidential Document”. ❖ Protecting Stored Files from Unauthorized Access You can specify who is allowed to use and access scanned files and the files in Document Server. You can prevent activities such as the printing of stored files by unauthorized users. Reference For details, see p.88 “Specifying Access Permission for Stored Files”. ❖ Protecting Stored Files from Theft You can specify who is allowed to use and access scanned files and the files in Document Server. You can prevent such activities as the sending and downloading of stored files by unauthorized users. Reference For details, see p.88 “Specifying Access Permission for Stored Files”. ❖ Preventing Data Leaks Due to Unauthorized Transmission You can specify in the address book which users are allowed to send files using the scanner. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book. Reference For details, see p.102 “Preventing Data Leaks Due to Unauthorized Transmission”. ❖ Protecting Registered Information in the Address Book You can specify who is allowed to access the data in the address book. You can prevent the data in the address book being used by unregistered users. To protect the data from unauthorized reading, you can also encrypt the data in the address book. To protect the data from unauthorized reading, you can also encrypt the data in the address book. Reference For details, see p.105 “Protecting the Address Book”. 8 Security Measures Provided by this Machine ❖ Managing Log Files You can improve data security by deleting log files stored in the machine. By transferring the log files, you can check the history data and identify unauthorized access. To transfer the log data, the log collection server is required. 1 Reference For details, see p.127 “Managing Log Files”. ❖ Overwriting the Data on the Hard Disk Before disposing of the machine, make sure all data on the hard disk is deleted. Prevent data leakage by automatically deleting transmitted printer jobs from memory. To overwrite the hard disk data, the optional DataOverwriteSecurity unit is required. Reference For details, see p.111 “Overwriting the Data on the Hard Disk”. Limiting and Controlling Access ❖ Preventing Modification or Deletion of Stored Data You can specify who is allowed to access stored scan files and files stored in Document Server. You can permit selected users who are allowed to access stored files to modify or delete the files. Reference For details, see p.88 “Specifying Access Permission for Stored Files”. ❖ Preventing Modification of Machine Settings The machine settings that can be modified according to the type of administrator account. Register the administrators so that users cannot change the administrator settings. Reference For details, see p.121 “Preventing Modification of Machine Settings”. ❖ Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. Reference For details, see p.125 “Limiting Available Functions”. 9 Getting Started Enhanced Network Security ❖ Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default settings. 1 Reference For details, see p.131 “Preventing Unauthorized Access”. ❖ Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user authentication. Reference For details, see p.137 “Encrypting Transmitted Passwords”. ❖ Safer Communication Using SSL When you access the machine using a Web Image Monitor or IPP, you can establish encrypted communication using SSL. When you access the machine using an application such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL. To protect data from interception, analysis, and tampering, you can install a server certificate in the machine, negotiate a secure connection, and encrypt transmitted data. Note ❒ To establish encrypted communication using SSL, the machine must have the printer and scanner functions. Reference For details, see p.142 “Protection Using Encryption”. 10 2. Authentication and its Application Administrators and Users When controlling access using the authentication specified by an administrator, select the machine’s administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access. To enable the authentication function, the login user name and login password are required in order to use the machine. Specify administrator authentication, and then specifying user authentication. Important ❒ If user authentication is not possible because of a problem with the hard disk or network, you can use the machine by accessing it using administrator authentication and disabling user authentication. Do this if, for instance, you need to use the machine urgently. Reference For details, see p.42 “Specifying Login User Name and Login Password”. 11 Authentication and its Application Administrators There are four types of administrator: machine administrator, network administrator, file administrator, and user administrator. By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single administrator. You can also specify a supervisor who can change each administrator’s password. Administrators are limited to managing the machine’s settings and controlling user access. so they cannot use functions such as copying and printing. To use such functions, you need to register a user in the address book and then be authenticated as the user. 2 Reference For details, see p.22 “Registering the Administrator”. For details, See p.171 “Supervisor Operations”. ❖ User Administrator This is the administrator who manages personal information in the address book. A user administrator can register/delete users in the address book or change users’ personal information. Users registered in the address book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again. ❖ Machine Administrator This is the administrator who mainly manages the machine’s default settings. You can set the machine so that the default for each function can only be specified by the machine administrator. By making this setting, you can prevent unauthorized people from changing the settings. ❖ Network Administrator This is the administrator who manages the network settings. You can set the machine so that network settings such as the IP address and settings for sending and receiving e-mail can only be specified by the network administrator. By making this setting, you can prevent unauthorized users from changing the settings and disabling the machine, and thus ensure correct network operation. ❖ File Administrator This is the administrator who manages permission to access stored files. You can specify passwords to allow only registered and permitted users to view and edit files stored in Document Server. By making this setting, you can prevent data leaks and tampering due to unauthorized users viewing and using the registered data. 12 ❖ Supervisor The supervisor can delete an administrator’s password and specify a new one. The supervisor cannot specify defaults or use normal functions. However, if any of the administrators forget their password and cannot access the machine, the supervisor can provide support. Administrators and Users User Users are managed using the personal information in the machine’s address book. By enabling user authentication, you can allow only people registered in the address book to use the machine. Users can be managed in the address book by the user administrator. 2 Reference For details about registering users in the address book, see General Settings Guide, the SmartDeviceMonitor for Admin Help, or the Web Image Monitor Help. 13 Authentication and its Application The Management Function The machine has an authentication function requiring a login user name and login password. By using the authentication function, you can specify access limits for individual users and groups of users. Using access limits, you cannot only limit the machine’s available functions but also protect the machine settings and files and data stored in the machine. 2 Important ❒ If you have enabled [Administrator Authentication Management], make sure not to forget the administrator login user name and login password. If an administrator login user name or login password is forgotten, a new password must be specified using the supervisor’s authority. ❒ Be sure not to forget the supervisor login user name and login password. If you do forget them, a service representative will to have to return the machine to its default state. This will result in all data in the machine being lost and the service call may not be free of charge. Reference For details, see p.171 “Supervisor Operations”. 14 The Management Function About Administrator Authentication There are four types of administrator: user administrator, machine administrator, network administrator, and file administrator. 2 AYJ002S 1. User Administrator 4. File Administrator This administrator manages personal information in the address book. You can register/delete users in the address book or change users’ personal information. This administrator manages permission to access stored files. You can specify passwords for the files stored in the Document Server so only authorized users can view and change them. 2. Machine Administrator This administrator manages the machine’s default settings. It is possible to enable only the machine administrator to set data security for copying, log deletion and other default. 3. Network Administrator This administrator manages the network settings. You can set the machine so that network settings such as the IP address and settings for sending and receiving email can be specified by the network administrator only. 5. Authentication Administrators must enter their login user name and password to be authenticated. 6. This machine 7. Administrators manage the machine’s settings and access limits. For details about each administrator, see p.12 “Administrators”. 15 Authentication and its Application About User Authentication This machine has an authentication function to prevent unauthorized access. By using login user name and login password, you can specify access limits for individual users and groups of users. 2 AYJ001S 1. User 6. Access Limit A user performs normal operations on the machine, such as copying and printing. Using authentication, unauthorized users are prevented from accessing the machine. 2. Group 7. Authorized users and groups can use only those functions permitted by the administrator. A group performs normal operations on the machine, such as copying and printing. 3. Unauthorized User 4. Authentication Using a login user name and password, user authentication is performed. 5. This Machine 16 Enabling Authentication Enabling Authentication To control administrators’ and users’ access to the machine, perform administrator or user authentication using login user names and passwords. To perform authentication, the authentication function must be enabled. To specify authentication, you need to register administrators. 2 Reference For details, see p.22 “Registering the Administrator”. Authentication Setting Procedure Specify administrator authentication and user authentication according to the following chart: Note ❒ To specify Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication, you must first specify administrator authentication. ❒ You can specify User Code Authentication without specifying administrator authentication. Administrator Authentication Specifying Administrator Privileges See p.19 “Specifying Administra- See p.19 “Specifying Administrator Privileges”. tor Privileges”. Registering the Administrator See p.22 “Registering the Administrator”. User Authentication Specifying User Authentication See p.17 “Enabling Authentication”. A Authentication that requires only the machine: • User Code Authentication See p.34 “User Code Authentication”. • Basic Authentication See p.38 “Basic Authentication”. B Authentication that requires external devices: • Windows Authentication See p.47 “Windows Authentication”. • LDAP Authentication See p.55 “LDAP Authentication”. • Integration Server Authentication See p.63 “Integration Server Authentication”. 17 Authentication and its Application Administrator Authentication Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name already registered in the address book. Windows Authentication, LDAP Authentication and Integration Server Authentication are not performed for an administrator, so an administrator can log on even if the server is unreachable because of a network problem. Each administrator is identified by a login user name. One person can act as more than one type of administrator if multiple administrator authority is granted to a single login user name. You can specify the login user name, login password, and encryption password for each administrator. The encryption password is a password for performing encryption when specifying settings using Web Image Monitor or SmartDeviceMonitor for Admin. The password registered in the machine must be entered when using applications such as SmartDeviceMonitor for Admin. Administrators are limited to managing the machine’s settings and controlling user access. so they cannot use functions such as copying and printing. To use such functions, you need to register a user in the address book and then be authenticated as the user. 2 Note ❒ Administrator authentication can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. 18 Administrator Authentication Specifying Administrator Privileges To specify administrator authentication, set Administrator Authentication Management to [On]. You can also specify whether or not to manage the items in System Settings as an administrator. To log on as an administrator, use the default login user name and login password. The defaults are "admin" for the login name and blank for the password. 2 Important ❒ If you have enabled [Administrator Authentication Management], make sure not to forget the administrator login user name and login password. If an administrator login user name or login password is forgotten, a new password must be specified using the supervisor’s authority. Reference For details, see p.171 “Supervisor Operations”. Note ❒ For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 19 Authentication and its Application D Press [Administrator Authentication Management]. 2 E Press the [User Management], [Machine Management], [Network Management], or [File Management] key to select which settings to manage. F Set "Admin. Authentication" to [On]. [Available Settings] appears. 20 Administrator Authentication G Select the settings to manage from "Available Settings". 2 The selected settings will be unavailable to users. [Available Settings] varies depending on the administrator. For details about Available Settings, see p.121 “Managing Access to the Machine” Note ❒ To specify administrator authentication for more than one category, repeat steps E to G. H Press [OK]. I Press [Exit] twice. 21 Authentication and its Application Registering the Administrator If administrator authentication has been specified, it is recommended to assign each administrator role to a different person. By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single administrator. You can register up to four login user names (Administrators 1 to 4) to which you can grant administrator privileges. Administrator authentication can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. 2 Preparation Log on using a registered administrator name and password. The administrator defaults are "admin" for the login name and blank for the password. For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. Note ❒ You can use up to 32 alphanumeric characters and symbols when registering login user names and login passwords. Keep in mind that passwords are case-sensitive. ❒ User names cannot contain numbers only, spaces, semicolons (;), or quotes ("), nor can they be left blank. ❒ Do not use Japanese, Traditional Chinese, Simplified Chinese, or Hangul double-byte characters when entering the login user name or password. If you use multi-byte characters when entering the login user name or password, you cannot authenticate using Web Image Monitor. A Press the {User Tools/Counter} key. B Press [System Settings]. 22 Administrator Authentication C Press [Administrator Tools]. 2 D Press [Program / Change Administrator]. E In the line for the administrator whose authority you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. If you allocate each administrator’s authority to a different person, the screen appears as follows: 23 Authentication and its Application F Press [Change] for "Login user name". 2 G Enter the login user name, and then press [OK]. H Press [Change] for "Login password". I Enter the login password, and then press [OK]. Follow the password policy to make the login password more secure. For details about the password policy, see p.158 “Password Policy”. J If a password reentry screen appears, enter the login password, and then press [OK]. K Press [Change] for "Encryption password". 24 Administrator Authentication L Enter the encryption password, and then press [OK]. 2 M If a password reentry screen appears, enter the encryption password, and then press [OK]. N Press [OK] twice. You will be automatically logged off. O Press the {User Tools/Counter} key. Logging on Using Administrator Authentication If administrator authentication has been specified, log on using an administrator’s user name and password. This section describes how to log on. Note ❒ To log on as an administrator, enter the administrator’s login user name and login password. ❒ When logging on using administrative authentication, the name of the administrator will appear. If logging on under a user name with multiple administrator authentications, one of the names of those administrators will appear. ❒ If you try to log on from an operating screen, "Selected function cannot be used." appears. Press the {User Tools/Counter} key to change the default. A Press the {User Tools/Counter} key. B Press the {Login/Logout} key. AQI007S 25 Authentication and its Application C Press [Enter] for "Login User Name". 2 D Enter the login user name, and then press [OK]. Note ❒ When you log on to the machine for the first time as the administrator, enter "admin". E Press [Enter] for "Login Password". Note ❒ If assigning the administrator for the first time, proceed to step G without pressing [Enter]. 26 Administrator Authentication F Enter the login password, and then press [OK]. 2 G Enter [Login]. "Authenticating... Please wait." appears, followed by the screen for specifying the default. 27 Authentication and its Application Logging off Using Administrator Authentication If administrator authentication has been specified, be sure to log off after completing settings. This section explains how to log off after completing settings. A Press the {Login/Logout}key. 2 AQI007S B Press [Yes]. 28 Administrator Authentication Changing the Administrator Change the administrator’s login user name and login password. You can also assign each administrator’s authority to the login user names "Administrator 1" to "Administrator 4" To combine the authorities of multiple administrators, assign multiple administrators to a single administrator. For example, to assign machine administrator authority and user administrator authority to [Administrator 1], press [Administrator 1] in the lines for the machine administrator and the user administrator. 2 Preparation For details about logging on with administrator authentication, see p.25 “Logging on Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. 29 Authentication and its Application C Press [Administrator Tools]. 2 D Press [Program / Change Administrator]. E In the line for the administrator you want to change, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. F Press [Change] for the setting you want to change, and re-enter the setting. G Press [OK]. H Press [OK] twice. You are logged off automatically. I Press the {User Tools/Counter} key. 30 Administrator Authentication Using Web Image Monitor Using Web Image Monitor, you can log on to the machine and change the administrator settings. This section describes how to access the Web Image Monitor. A Start your Web browser. B Enter "http://(machine's address)/" in the address bar of a Web browser. 2 Top page of Web Image Monitor appears. C Click [Login]. D Enter the login name and password of an administrator, and then click [Login] E Make setting as desired. Note ❒ When logging on as an administrator use the login name and password of an administrator set in the machine. The default login name is “admin” and the password is blank. ❒ For details about Web Image Monitor, see the Web Image Monitor Help. 31 Authentication and its Application Using Web Printing Tool Administrative settings for GL/2 & TIFF Filter can be changed, system logs can be collected, etc. using Web Printing Tool. A Start your Web browser. B Enter “http://(machine's address)/webprint/” in the Web browser’s address 2 bar. Top page of Web Printing Tool appears. C Click the link to the administrator’s page in the header area on the upperright hand of the screen. To change administrative settings (GL/2 & TIFF Initial Configuration) click To collect system logs click . . D Enter the administrator password, and then click [OK]. E Make setting as desired. Note ❒ When logging in to Web Printing Tool the default password is set as “admin”. To differentiate from the administrator password set in the machine, use a password unique to Web Printing Tool for login. ❒ If the password authentication fails three times in a row, you will be returned to the Web Printing Tool top page. To return to the login page again, click the link in the header area on the upper-right hand of the screen. ❒ The password can be changed in "Change the administrator password" under the "Administrator Password" tab on the administrator settings (GL/2 & TIFF Initial Configuration) screen. Click [On] to activate the password entry fields. The password must be 4 to 8 characters long. ❒ For details about Web Printing Tool, see the Web Printing Tool Help. 32 User Authentication User Authentication There are five types of user authentication method: user code authentication, basic authentication, Windows authentication, Integration Server Authentication, and LDAP authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication. The settings depend on the authentication method. 2 Note ❒ User code authentication is used for authenticating on the basis of the user code, and basic authentication, Windows authentication, LDAP authentication, and Integration Server Authentication are used for authenticating individual users. ❒ The user code account, that has no more than eight digits and is used for User Code authentication, can be carried over and used as a login user name even after the authentication method has switched from User Code authentication to BASIC authentication, Windows authentication, LDAP authentication, or Integration Server authentication. In this case, since the User Code authentication does not have a password, the login password is set as a blank account. When the authentication method switches to an external authentication (Windows authentication, LDAP authentication, or Integration Server authentication), authentication will not occur, unless the external authentication device has previously registered the carried over user code account. However, the user code account will remain in the Address Book of the machine in spite of the authentication failure. From a security perspective, when switching from User Code authentication to another authentication method, we recommend that you delete accounts you are not going to use, or set up a login password. For details about deleting accounts, see General Settings Guide. For details about changing passwords, see p.42 “Specifying Login User Name and Login Password”. ❒ You cannot use more than one authentication method at the same time. ❒ User authentication can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. ❒ When enabling “user authentication,” all users in the address book can access and change all the settings on the GL/2 & TIFF screen. 33 Authentication and its Application User Code Authentication This is an authentication method for limiting access to functions according to the user code. The same user code can be used by more than one user. For details about specifying user codes, see General Settings Guide. Limitation ❒ To control the use of DeskTopBinder for the delivery of files stored in the machine, select Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication. 2 Reference For details about specifying the user code for the printer driver, see Printer Reference or Printer driver Help. For details about specifying the TWAIN driver user code, see TWAIN driver Help. Specifying User Code Authentication This can be specified by the machine administrator. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 34 User Authentication D Press [User Authentication Management]. 2 E Select [User Code Auth.]. Note ❒ If you do not want to use user authentication management, select [Off]. F Select which of the machine’s functions you want to limit. User Code Authentication will be applied to the selected functions. Unselected functions will not be affected. For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”. 35 Authentication and its Application G Select the "Printer Job Authentication" level. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job Authentication". Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)]or[Simple (Limitation)]. ❒ If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is required for printing with non-specified devices. ❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note that, because the machine does not require authentication in this case, it may be used by unauthorized users. If you select [Entire], proceed to step L. If you select [Simple (All)] or [Simple (Limitation)], proceed to step H. 2 Reference For details, see p.71 “Printer Job Authentication Levels and Printer Job Types”. H Press [Simple (Limitation)] 36 User Authentication I Press [Change]. 2 J Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. K Press [Exit]. L Press [OK]. M Press [Exit]. N Press [Yes]. You are logged off. O Press the {User Tools/Counter} key. 37 Authentication and its Application Basic Authentication Specify this authentication when using the machine’s address book to authenticate for each user. Using basic authentication, you cannot only manage the machine’s available functions but also limit access to stored files and to the personal data in the address book. Under basic authentication, the administrator must specify the functions available to each user registered in the address book. 2 Specifying Basic Authentication This can be specified by the machine administrator. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 38 User Authentication D Press [User Authentication Management]. 2 E Select [Basic Auth.]. Note ❒ If you do not want to use user authentication management, select [Off]. F Select which of the machine’s functions you want to permit. Basic Authentication will be applied to the selected functions. Users can use the selected functions only. For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”. 39 Authentication and its Application G Select the "Printer Job Authentication" level. Limitation ❒ If Printer Controller RW-3600 is installed, [Simple (Limitation)] will not be accepted. Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)]or [Simple (Limitation)]. ❒ If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is required for printing with non-specified devices. ❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note that, because the machine does not require authentication in this case, it may be used by unauthorized users. If you select [Entire], proceed to step L. If you select [Simple (All)] or [Simple (Limitation)], proceed to step H. 2 Reference For details, see p.71 “Printer Job Authentication Levels and Printer Job Types”. H Press [Simple (Limitation)] 40 User Authentication I Press [Change]. 2 J Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. K Press [Exit]. L Press [OK]. M Press the {User Tools/Counter} key. Authentication Information Stored in the Address Book This can be specified by the user administrator. If you have specified [User Authentication], you can specify access limits for individual users and groups of users. Specify the setting in the address book for each user. User authentication can also be specified via SmartDeviceMonitor for Admin or Web Image Monitor. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. You need to register a user in the address book. For details about the address book, see General Settings Guide. See p.125 “Limiting Available Functions”. 41 Authentication and its Application Specifying Login User Name and Login Password In [User Authentication Management], specify the login user name and password. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. D Press [Address Book Management]. 2 E Select the user or group. F Press [Auth. Info]. 42 User Authentication G Press [Change] for “Login User Name”. 2 H Enter a login user name, and then press [OK]. I Press [Change] for “Login Password”. J Enter a login password, and then press [OK]. K If a password reentry screen appears, enter the login password, and then press [OK]. L Press [OK]. M Press [Exit] twice. N Press the {User Tools/Counter} key. 43 Authentication and its Application Specifying Authentication Information to Log on The login user name and password specified in [User Authentication Management] can be used as the login information for "SMTP Authentication", "Folder Authentication", and "LDAP Authentication". For details about specifying login user name and login password, see p.42 “Specifying Login User Name and Login Password”. If you use a login user name and password other than the one specified in [User Authentication Management] for "SMTP Authentication", "Folder Authentication", or "LDAP Authentication", see General Settings Guide. 2 A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 44 User Authentication D Press [Address Book Management]. 2 If the setting to be specified does not appear, press [TNext] to scroll down to other settings. E Select the user or group. F Press [Auth. Info]. G Specify the login user name and password. 45 Authentication and its Application H Select [Use Auth. Info at Login] in "SMTP Authentication". 2 If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Limitation ❒ When using [Use Auth. Info at Login] for "SMTP Authentication", "Folder Authentication", or "LDAP Authentication", a user name other than "other" , "admin" , "supervisor" or "HIDE***" must be specified. The symbol "***" represents any character. ❒ To use [Use Auth. Info at Login] for SMTP authentication, a login password up to 128 characters in length must be specified. Note ❒ For folder authentication, select [Use Auth. Info at Login] in "Folder Authentication". ❒ For LDAP authentication, select [Use Auth. Info at Login] in "LDAP Authentication". I Press [OK]. J Press the {User Tools/Counter} key. 46 User Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server. The address book stored in the directory server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the address book. If you can obtain user information, the sender’s address (From:) is fixed to prevent unauthorized access when sending e-mails under the scanner function. 2 Important ❒ During Windows Authentication, data registered in the directory server, such as the user’s e-mail address, is automatically registered in the machine. If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed. ❖ Operational Requirements for Windows Authentication • To specify Windows authentication, the following requirements must be met: • The Printer/Scanner unit must be installed. • A domain controller has been set up in a designated domain. • This function is supported by the operating systems listed below. NTLM authentication is used for Windows authentication. To obtain user information when running Active Directory, use LDAP. If SSL is being used, this requires a version of Windows that supports TLS v1, SSL v2, or SSL v3. • Windows NT 4.0 Server • Windows 2000 Server • Windows Server 2003 Limitation ❒ Users managed in other domains are subject to user authentication, but they cannot obtain items such as e-mail addresses. ❒ If you have created a new user in the domain controller and selected [User must change password at next logon], log on to the machine from the computer to change the password before logging on from the machine’s control panel. ❒ If the machine has Printer Controller RW-3600 installed, it will not accept the Windows Authentication under the printer function. However, you can complete Windows Authentication when using the scanner function through the Printer Controller RW-3600 and Printer Option Type W3600. ❒ For details about Windows Authentication methods using Printer Controller RW-3600, refer to the Printer Controller RW-3600 user manual. 47 Authentication and its Application Note ❒ The first time you access the machine, you can use the functions available to your group. If you are not registered in a group, you can use the functions available under [*Default Group]. To limit which functions are available to which users, first make settings in advance in the address book. ❒ When accessing the machine subsequently, you can use all the functions available to your group and to you as an individual user. ❒ Enter the login password correctly, keeping in mind that it is case-sensitive. ❒ Users who are registered in multiple groups can use all the functions available to those groups. ❒ A user registered in two or more global groups can use all the functions available to members of those groups. ❒ If the "Guest" account on the Windows server is enabled, even users not registered in the domain controller can be authenticated. When this account is enabled, users are registered in the address book and can use the functions available under [*Default Group]. 2 Specifying Windows Authentication This can be specified by the machine administrator. Note ❒ Under Windows Authentication, you can select whether or not to use secure sockets layer (SSL) authentication. ❒ To automatically register user information such as e-mail addresses under Windows authentication, it is recommended that communication between the machine and domain controller be encrypted using SSL. ❒ Under Windows Authentication, you do not have to create a server certificate unless you want to automatically register user information such as e-mail addresses using SSL. A Press the {User Tools/Counter} key. B Press [System Settings]. 48 User Authentication C Press [Administrator Tools]. 2 D Press [User Authentication Management]. E Select [Windows Auth.]. Note ❒ If you do not want to use user authentication management, select [Off]. 49 Authentication and its Application F Press [Change] for "Domain Name". 2 G Enter the name of the domain controller to be authenticated, and then press [OK]. H Select the "Printer Job Authentication" level. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job Authentication". Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)] or [Simple (Limitation)]. ❒ If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is required for printing with non-specified devices. ❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note that, because the machine does not require authentication in this case, it may be used by unauthorized users. 50 User Authentication If you select [Entire], proceed to step M. If you select [Simple (All)] or [Simple (Limitation)], proceed to step I. Reference For details, see p.71 “Printer Job Authentication Levels and Printer Job Types”. I Press [Simple (Limitation)] 2 J Press [Change]. K Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. L Press [Exit]. 51 Authentication and its Application M Press [On] for "Use Secure Connection(SSL)". 2 If you are not using secure sockets layer (SSL) for authentication, press [Off]. If global groups have been registered under Windows server, you can limit the use of functions for each global group. You need to create global groups in the Windows server in advance and register in each group the users to be authenticated. You also need to register in the machine the functions available to the global group members. Create global groups in the machine by entering the names of the global groups registered in the Windows Server. (Keep in mind that group names are case sensitive.) Then specify the machine functions available to each group. If global groups are not specified, users can use the available functions specified in [*Default Group]. If global groups are specified, users not registered in global groups can use the available functions specified in [*Default Group]. By default, all functions are available to [*Default Group] members. Specify the limitation on available functions according to user needs. N Under "Group", press [Program / Change], and then press [* Not Programmed]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. 52 User Authentication O Under "Group Name", press [Change], and then enter the group name. 2 P Press [OK]. Q Select which of the machine’s functions you want to permit. Windows Authentication will be applied to the selected functions. Users can use the selected functions only. For details about "Limiting Available Functions", see p.125 “Limiting Available Functions”. Limitation ❒ If Printer Controller RW-3600 is installed, [Printer] will not be accepted. R Press [OK] twice. S Press the {User Tools/Counter} key. 53 Authentication and its Application -Installing Internet Information Services (IIS) and Certificate services Specify this setting if you want the machine to automatically obtain e-mail addresses registered in Active Directory. We recommended you install Internet Information Services (IIS) and Certificate services as the Windows components. Install the components, and then create the server certificate. If they are not installed, install them as follows: A Select [Add/Remove Programs] on the [Control Panel]. B Select [Add/Remove Windows Components]. C Select the [Internet Information Services (IIS)] check box. D Select the [Certificate Services] check box, and then click [Next]. E Installation of the selected Windows components starts, and a warning message appears. F Click [Yes]. G Click [Next]. H Select the Certificate Authority, and then click [Next]. On the displayed screen, [Enterprise root CA] is selected. I Enter the Certificate Authority name (optional) in [CA Identifying Information], and then click [Next]. J Leave [Data Storage Location] at its default, and then click [Next]. Internet Information Services and Certificate services are installed. 2 -Creating the Server Certificate After installing Internet Information Services (IIS) and Certificate services Windows components, create the Server Certificate as follows: A Start [Internet Services Manager]. B Right-click [Default Web Site], and then click [Properties]. C On the [Directory Security] tab, click [Server Certificate]. Web Server Certificate Wizard starts. D Click [Next]. E Select [Create a new certificate], and then click [Next]. F Select [Prepare the request now, but send it later], and then click [Next]. G Enter the required information according to the instructions given by Web Server Certificate Wizard. H Check the specified data, which appears as Request File Summary, and then click [Next]. The server certificate is created. 54 User Authentication LDAP Authentication Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the address book. When using LDAP Authentication, to prevent the password information being sent over the network unencrypted, it is recommended that communication between the machine and LDAP server be encrypted using SSL. You can specify on the LDAP server whether or not to enable SSL. To enable this, you must create a server certificate for the LDAP server. Using Web Image Monitor, you can specify whether or not to check the reliability of the SSL server being connected to. For details see the Web Image Monitor Help. 2 Important ❒ During LDAP Authentication, the data registered in the LDAP server, such as the user’s e-mail address, is automatically registered in the machine. If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed. ❖ Operational Requirements for LDAP Authentication To specify LDAP authentication, the following requirements must be met: • The network configuration must allow the machine to detect the presence of the LDAP server. • When SSL is being used, TLSv1, SSLv2, or SSLv3 can function on the LDAP server. • The LDAP server must be registered in the machine. For details about registration, see Network Guide. • When registering the LDAP server, the following setting must be specified. • Server Name • Serch Base • Port No. • SSL Communication • Authentication • Serch Conditions(Name, E-mail Address) When specifying "SSL Communication", [On] must be specified. When specifying "Authentication", [On] or [High Security] must be specified. For details about registration, see General Settings Guide. 55 Authentication and its Application Limitation ❒ Under LDAP authentication, you cannot specify access limits for groups registered in the LDAP Server. ❒ When using LDAP Authentication, you cannot use reference functions in LDAP Search for servers using SSL. ❒ Enter the user’s login user name using up to 32 characters and login password using up to 128 characters. ❒ Do not use double-byte Japanese, Traditional Chinese, Simplified Chinese, or Hangul characters when entering the login user name or password. If you use double-byte characters , you cannot authenticate using Web Image Monitor. ❒ If the machine has Printer Controller RW-3600 installed, it will not accept the LDAP Authentication under the printer function. However, you can complete LDAP Authentication when using the scanner function through the Printer Controller RW-3600 and Printer Option Type W3600. ❒ For details about LDAP Authentication methods using Printer Controller RW-3600, refer to the Printer Controller RW-3600 user manual. 2 Note ❒ Under LDAP Authentication, if “Anonymous Authentication” in the LDAP server’s settings is not set to "Prohibit", users who do not have an LDAP server account might still be able to gain access. ❒ If the LDAP server is configured using Windows Active Directory, Anonymous Authentication might be available. If Windows Authentication is available, we recommend you use it. ❒ The first time an unregistered user accesses the machine after LDAP authentication has been specified, the user is registered in the machine and can use the functions available under [Available Functions] during LDAP Authentication. ❒ To limit the available functions for each user, register each user and corresponding [Available Functions] setting in the address book, or specify [Available Functions] for each registered user. The [Available Functions] setting becomes effective when the user accesses the machine subsequently. 56 User Authentication Specifying LDAP Authentication This can be specified by the machine administrator. A Press the {User Tools/Counter} key. B Press [System Settings]. 2 C Press [Administrator Tools]. D Press [User Authentication Management]. 57 Authentication and its Application E Select [LDAP Auth.]. 2 Note ❒ If you do not want to use user authentication management, select [Off]. F Select the LDAP server to be used for LDAP authentication. 58 User Authentication G Select the "Printer Job Authentication" level. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job Authentication". 2 Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)] or [Simple (Limitation)]. ❒ If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is required for printing with non-specified devices. ❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note that, because the machine does not require authentication in this case, it may be used by unauthorized users. If you select [Entire], proceed to step L. If you select [Simple (All)] or [Simple (Limitation)], proceed to step H. Reference For details, see p.71 “Printer Job Authentication Levels and Printer Job Types”. H Press [Simple (Limitation)] 59 Authentication and its Application I Press [Change]. 2 J Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. K Press [Exit]. L Select which of the machine’s functions you want to permit. LDAP Authentication will be applied to the selected functions. Authentication will be applied to the selected functions. For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”. Limitation ❒ If Printer Controller RW-3600 is installed, [Printer] will not be accepted. 60 User Authentication M Press [Change] for "Login Name Attribute". 2 N Enter the login name attribute , and then press [OK]. Note ❒ You can use the Login Name Attribute as a search criterion to obtain information about an authenticated user. You can create a search filter based on the Login Name Attribute, select a user, and then retrieve the user information from the LDAP server so it is transferred to the machine’s address book. The method for selecting the user name depends on the server environment. Check the server environment and enter the user name accordingly. O Press [Change] for "Unique attribute". 61 Authentication and its Application P Enter the unique attribute and then press [OK]. 2 Note ❒ Specify Unique Attribute on the machine to match the user information in the LDAP server with that in the machine. By doing this, if the Unique Attribute of a user registered in the LDAP server matches that of a user registered in the machine, the two instances are treated as referring to the same user. You can enter an attribute such as "serialNumber" or "uid". Additionally, you can enter "cn" or "employeeNumber", provided it is unique. If you do not specify the Unique Attribute, an account with the same user information but with a different login user name will be created in the machine. Q Press [OK]. R Press the {User Tools/Counter} key. 62 User Authentication Integration Server Authentication To use Integration Server Authentication, you need a server on which ScanRouter software that supports authentication is installed. For external authentication, the Integration Server Authentication collectively authenticates users accessing the server over the network, providing a server-independent centralized user authentication system that is safe and convenient. For example, if the delivery server and the machine share the same Integration Server Authentication, single sign-on is possible using DeskTopBinder. To use [Integration Svr. Auth.], the machine must have access to a server on which ScanRouter System or Web SmartDeviceMonitor software is installed. For details about the software, contact your local dealer. Using Web Image Monitor, you can specify whether or not to check the reliability of the SSL server being connected to. For details see the Web Image Monitor Help. 2 Important ❒ During Integration Server Authentication, the data registered in the server, such as the user’s e-mail address, is automatically registered in the machine. If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed. Limitation ❒ If the machine has Printer Controller RW-3600 installed, it will not accept the Integration Server Authentication under the printer function. However, you can complete Integration Server Authentication when using the scanner function through the Printer Controller RW-3600 and Printer Option Type W3600. ❒ For details about Integration Sever Authentication methods using Printer Controller RW-3600, refer to the Printer Controller RW-3600 user manual. Note ❒ The built-in default administrator name is "Admin" on the Server and "admin" on the machine. 63 Authentication and its Application Specifying Integration Server Authentication This can be specified by the machine administrator. This section explains how to specify the machine settings. For details, see the Authentication Manager manual. A Press the {User Tools/Counter} key. B Press [System Settings]. 2 C Press [Administrator Tools]. D Press [User Authentication Management]. 64 User Authentication E Select [Integration Svr. Auth.]. 2 Note ❒ If you do not wish to use User Authentication Management, select [Off]. F Press [Change] for "Server Name". Specify the name of the server for external authentication. G Enter the server name, and then press [OK]. Enter the IPv4 address or host name. 65 Authentication and its Application H In "Authentication Type", select the authentication system for external authentication. 2 Select an available authentication system. Note ❒ For general usage, select [Default]. I Press [Change] for "Domain Name". J Enter the domain name, and then press [OK]. Note ❒ You cannot specify a domain name under an authentication system that does not support domain login. 66 User Authentication K Press [Obtain URL]. 2 The machine obtains the URL of the server specified in [Server Name]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. If [Server Name] or the setting for enabling SSL is changed after obtaining the URL, the "URL" is "Not Obtained". L Press [OK] If you set "Authentication Type" to "Windows", you can use the global group. If you set "Authentication Type" to "Notes", you can use the Notes group. If you set "Authentication Type" to "Basic (Integration Server)", you can use the groups created using the Authentication Manager. M Under "Group", press [Program / Change], and then press [* Not Programmed]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. 67 Authentication and its Application N Under "Group Name", press [Change], and then enter the group name. 2 O Press [OK]. P Select which of the machine’s functions you want to permit. Authentication will be applied to the selected functions. Users can use the selected functions only. For details about “Limiting Available Functions”, see p.125 “Limiting Available Functions”. Limitation ❒ If Printer Controller RW-3600 is installed, [Printer] will not be accepted. Q Press [OK] twice. R Select the "Printer Job Authentication" level. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job Authentication". 68 User Authentication Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)] or [Simple (Limitation)]. ❒ If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients’ IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver. Authentication is required for printing with non-specified devices. ❒ If you select [Simple (All)] or [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing. However, note that, because the machine does not require authentication in this case, it may be used by unauthorized users. If you select [Entire], proceed to step W. If you select [Simple (All)] or [Simple (Limitation)], proceed to step S. 2 Reference For details, see p.71 “Printer Job Authentication Levels and Printer Job Types”. S Press [Simple (Limitation)] T Press [Change]. 69 Authentication and its Application U Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication. 2 You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. V Press [Exit]. W Press [On] for “Use Secure Connection(SSL)”. To not use secure sockets layer (SSL) for authentication, press [Off]. X Press [OK]. Y Press the {User Tools/Counter} key. 70 User Authentication ❖ Printer Job Authentication Levels and Printer Job Types This section explains the relationship between printer job authentication levels and printer job types. Depending on the combination of printer job authentication level and printer job type, the machine may not print properly. Set an appropriate combination according to the operating environment. User authentication is supported by the RPCS printer driver. Machine Settings (displayed on the control panel) Printer Job Types [User Authentication Management] [Printer Job Authentication] [Restrict Use of Simple Encryption] A B C D E F G [Off] — — ✩ ✩ ✩ ✩ ✩ ✩ ✩ [User Code Auth.], [Basic Auth.], [Windows Auth.], [LDAP Auth.], [Integration Svr. Auth.] [Simple (All)] [Off] $ ❍ × ✩ ✩ ✩ ❍ × ❍ × × ❍ [On] [Entire] [Off] [On] 2 × $ ❍ × ✩: Printing is possible regardless of user authentication. ❍: Printing is possible if user authentication is successful. If user authentication fails, the print job is reset. $: Printing is possible if user authentication is successful and [Driver Encryption Key] for the printer driver and machine match. ×: Printing is not possible regardless of user authentication, and the print job is reset. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify Printer Job Authentication and Printer Job Types. Reference For details about [Restrict Use of Simple Encryption], see p.153 “Changing the Extended Security Functions”. 71 Authentication and its Application ❖ [Printer Job Authentication] • [Entire] The machine authenticates all printer jobs and remote settings, and cancels jobs and settings that fail authentication. Printer Jobs: Job Reset Settings: Disabled • [Simple (All)] The machine authenticates printer jobs and remote settings that have authentication information, and cancels the jobs and settings that fail authentication. Printer jobs and settings without authentication information are performed without being authenticated. • [Simple (Limitation)]. You can specify the range to apply [Simple (Limitation)] to by specifying [Parallel Interface: Simple], [USB: Simple], and the client’s IPv4 address. 2 ❖ Printer Job Types A In the RPCS printer driver dialog box, the [Confirm authentication information when printing] and [Encrypt] check boxes are selected. Personal authentication information is added to the printer job. The printer driver applies advanced encryption to the login passwords. The printer driver encryption key, enables the driver encryption to prevent the login password being stolen. B In the RPCS printer driver dialog box, the [Confirm authentication information when printing] check box is selected. Personal authentication information is added to the printer job. The printer driver applies simple encryption to login passwords. C In the RPCS printer driver dialog box, the [Confirm authentication information when printing] check box is not selected. Personal authentication information is added to the printer job and is disabled. D When using the PostScript 3 printer driver, the printer job contains user code information. Personal authentication information is not added to the printer job but the user code information is. E Note ❒ This type also applies to recovery/parallel printing using an RPCS printer driver that does not support authentication. When using the PostScript 3 printer driver, the printer job does not contain user code information. Neither personal authentication information nor user code information is added to the printer job. Note ❒ Type 5 also applies to recovery/parallel printing using an RPCS printer driver that does not support authentication. 72 User Authentication F G A printer job or PDF file is sent from a host computer without a printer driver and is printed via LPR. Personal authentication information is not added to the printer job. A PDF file is printed via ftp. Personal authentication is performed using the user ID and password used for logging on via ftp. However, the user ID and password are not encrypted. 2 73 Authentication and its Application If User Authentication is Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, operations are not possible with the machine. Log on to operate the machine, and log off when you are finished operations. Be sure to log off to prevent unauthorized users from using the machine. When auto logout timer is specified, the machine automatically logs you off if you do not use the control panel within a given time. Additionally, you can authenticate using an external device. For details, see p.80 “Authentication using an external device”. 2 Note ❒ Consult the User Administrator about your login user name, password, and user code. ❒ For user code authentication, enter a number registered in the address book as [User Code]. User Code Authentication (Using the Control Panel) When user authentication is set, the following screen appears. Enter a user code, and then press the [OK] key. Note ❒ To log off, do one of the following: • Press the Operation switch. • Press the {Energy Saver} key after jobs are completed. • Press the {Clear/Stop} key and the {Reset} key at the same time. 74 If User Authentication is Specified User Code Authentication (Using a Printer Driver) When user authentication is set, specify the user code in the printer properties of a printer driver. For details, see the printer driver Help. Login (Using the Control Panel) 2 Follow the procedure below to log on when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set. A Press [Enter] for “Login User Name”. B Enter a login user name, and then press [OK]. C Press [Enter] for “Login Password”. 75 Authentication and its Application D Enter a login password, and then press [OK]. 2 E Press [Login]. When the user is authenticated, the screen for the function you are using appears. 76 If User Authentication is Specified Log Off (Using the Control Panel) Follow the procedure below to log off when Basic Authentication, Windows Authentication, or LDAP Authentication is set. A Press the {Login/Logout} key. 2 AQI007S B Press [Yes]. Note ❒ You can log off using following procedures also. • Press the {Power} key. • Press the {Energy Saver} key. 77 Authentication and its Application Login (Using a Printer Driver) When Basic Authentication, Windows Authentication, or LDAP Authentication is set, make encryption settings in the printer properties of a printer driver, and then specify a login user name and password. For details, see the printer driver Help. 2 Note ❒ When logged on using a printer driver, logging off is not required. Login (Using Web Image Monitor) This section explains how to log onto the machine via Web Image Monitor. A Click [Login] at the toppage on the Web Image Monitor. B Enter a login user name and password, and then click [Login]. Note ❒ For user code authentication, enter a user code in [User Name], and then click [OK]. ❒ The procedure may differ depending on the Web Image Monitor used. Log Off (Using Web Image Monitor) A Click [Logout] to log off. Note ❒ Delete the cache memory in the Web Image Monitor after logging off. 78 If User Authentication is Specified Auto Logout This can be specified by the machine administrator. When using user authentication management, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto Logout. 2 A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Timer Settings]. D Press [Auto Logout Timer]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. 79 Authentication and its Application E Select [On]. 2 Note ❒ If you do not want to specify [Auto Logout Timer], select [Off]. F Enter "60" to "999" (seconds) using the number keys, and then press [q]. G Press the {User Tools/Counter} key. Authentication using an external device If you authenticate using an external device, see the Kit manual. For details, contact your local dealer. 80 3. Preventing Information Leaks Printing a Confidential Document Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine’s output trays. When printing confidential documents, use the Locked Print function. ❖ Locked Print • Using the printer’s Locked Print function, store files in the machine as Locked Print files and then print them from the control panel and retrieve them immediately, preventing others from viewing them. • Confidential documents can be printed regardless of the User Authentication settings. Note ❒ To store files temporarily, select [Stored Print] under the printer driver. If you select [Share stored print files], also, you can share these files. Choosing a Locked Print file Using the printer driver, specify a Locked Print file. If user authentication has been enabled, you must enter the login user name and login password using the printer driver. For details see the printer driver Help. A Open the printer driver dialog box. B Set [Job type] to [Locked Print]. C Click [Details...]. D Enter the user ID and password. Note ❒ The password entered here let you use the Locked Print function. ❒ To print a Locked Print file, enter the same password on the control panel. Limitation ❒ Enter the user ID using up to 8 alphanumeric characters. ❒ Enter the password using 4 to 8 numbers. E Click [OK]. A confirmation message appears. F Confirm the password by re-entering it. G Click [OK]. 81 Preventing Information Leaks H Perform Locked Print. Reference For details, see the printer driver Help. Printing a Locked Print File Print Locked Print files using the control panel. The Document Administrator can change the password if a user has forgotten it. This can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. 3 Preparation For details about logging on and logging off with user authentication, see p.75 “Login (Using the Control Panel)”, p.77 “Log Off (Using the Control Panel)”. A Press the {Printer} key. B Press [Print Jobs]. C Press [Locked Print Job List]. Only Locked Print files belonging to the user who has logged on appear. D Select the Locked Print file to print. 82 Printing a Confidential Document E Press [Print]. 3 F Enter the password for the Locked print file, and then press [OK]. Note ❒ Enter the password specified in step D on p.81 “Choosing a Locked Print file”. G Press [Yes]. 83 Preventing Information Leaks Deleting Locked Print Files This can be specified by the file creator (owner). To delete Locked Print files, you must enter the password for the files. If the password has been forgotten, ask the file administrator to change the password. This can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. Note ❒ Locked Print files can also be deleted by the file administrator. 3 A Press the {Printer} key. B Press [Print Jobs]. C Press [Locked Print Job List]. D Select the file. 84 Printing a Confidential Document E Press [Delete]. 3 F Enter the password for the Locked Print file, and then press [OK]. G Press [Yes]. Changing Passwords of Locked Print Files This can be specified by the file creator (owner) or file administrator. If the password has been forgotten, the file administrator change the password. This can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. A Press the {Printer}key. B Press [Print Jobs]. C Press [Locked Print Job List]. D Select the file. 85 Preventing Information Leaks E Press [Change Password]. 3 F Enter the password for the stored file, and then press [OK]. The machine administrator does not need to enter the password. G Enter the new password for the stored file, and then press [OK]. H If a password reentry screen appears, enter the login password, and then press [OK]. 86 Printing a Confidential Document Unlocking Locked Print Files If you specify [On] for "Enhance File Protection", the file will be locked and become inaccessible if an invalid password is entered ten times. This section explains how to unlock files. Only the file administrator can unlock files. This can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. For details about "Enhance File Protection", see p.153 “Changing the Extended Security Functions”. 3 Note ❒ You can use the same procedure to unlock stored print files also. A Press the {Printer} key. B Press [Print Jobs]. C Press [Locked Print Job List]. D Select the file. E Press [Unlock File]. F Press [Yes]. 87 Preventing Information Leaks Specifying Access Permission for Stored Files You can specify who is allowed to access stored scan files and files stored in the Document Server. This can prevent activities such as printing or sending of stored files by unauthorized users. You can also specify which users can change or delete stored files. ❖ Access Permission To limit the use of stored files, you can specify four types of access permission. 3 Read-only In addition to checking the content of and information about stored files, you can also print and send the files. Edit You can change the print settings for stored files. This includes permission to view files. Edit / Delete You can delete stored files. This includes permission to view and edit files. Full Control You can specify the user and access permission. This includes permission to view, edit, and edit / delete files. Note ❒ Files can be stored by any user who is allowed to use the Document Server, copy function, or scanner function. ❒ Using Web Image Monitor, you can check the content of stored files. For details, see the Web Image Monitor Help. ❒ Access permission to documents sent from the printer driver and stored on the machine can only be set on Web Image Moniter. ❒ The default access permission for the file creator (owner) is "Read-only". You can also specify the access permission. ❖ Password for Stored Files • Passwords for stored files can be specified by the file creator (owner) or file administrator. • You can obtain greater protection against the unauthorized use of files. For details, see p.98 “Specifying Passwords for the Stored Files” • Even if User Authentication is not set, passwords for stored files can be set. For details, see the relevant manuals. 88 Specifying Access Permission for Stored Files Assigning Users and Access Permission for Stored Files This can be specified by the file creator (owner) or file administrator. Specify the users and their access permissions for each stored file. By making this setting, only users granted access permission can access stored files. This can also be specified via Web Image Monitor. Important ❒ If files become inaccessible, reset their access permission as the file creator (owner). This can also be done by the file administrator. If you want to access a file but do not have access permission, ask the file creator (owner). 3 A Press the {Document Server} key. B Select the file. C Press [File Management]. 89 Preventing Information Leaks D Press [Change Access Priv.]. 3 E Press [Program/Change/Delete]. F Press [New Program]. 90 Specifying Access Permission for Stored Files G Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. 3 H Press [Exit]. I Select the user who you want to assign an access permission to, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. J Press [Exit]. K Press [OK]. 91 Preventing Information Leaks Specifying Access Privileges for Files Stored using the Scanner Function If user authentication is set for the scanner function, you can specify access privileges for stored files when storing them in the Document Server. You can also change the access privileges for the file. Specifying Access Privileges When Storing Files This section explains how to specify the access privileges and then store a file in the Document Server under the scanner function. 3 A Press [Store File]. B Press [Access Privileges]. C Press [New Program]. 92 Specifying Access Permission for Stored Files D Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. E Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. F Press [Exit]. G Press [OK]. H Store files in the Document Server. 3 Changing Access Privileges for Previously Stored Files This section explains the authentication process for accessing a file stored in the Document Server under the scanner function. A Press [Select Stored File]. B Select the file. C Press[Manage / Delete File]. 93 Preventing Information Leaks D Press [Change Access Priv.]. 3 E Press [Program/Change/Delete]. F Press [New Program]. G Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. H Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. I Press [Exit]. J Press [OK]. 94 Specifying Access Permission for Stored Files Assigning the User and the Access Permission for the User’s Stored Files This can be specified by the file creator (owner) or user administrator. Specify the users and their access permission to files stored by a particular user. Only those users granted access permission can access stored files. This makes the management of access permission easier than it is when permission is specified for each stored file. 3 Important ❒ If files become inaccessible, be sure to enable the user administrator, and then reset the access permission for the files in question. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 95 Preventing Information Leaks D Press [Address Book Management]. 3 E Select the user or group. F Press [Protection]. 96 Specifying Access Permission for Stored Files G Under "Protect File(s)", press [Program/Change/Delete] for "Permissions for Users/Groups". 3 If the setting to be specified does not appear, press [TNext] to scroll down to other settings. H Press [New Program]. I Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. J Press [Exit]. 97 Preventing Information Leaks K Select the user who you want to assign an access permission to, and then select the permission. 3 Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. L Press [Exit]. M Press [OK]. N Press [Exit]. O Press the {User Tools/Counter} key. Specifying Passwords for the Stored Files This can be specified by the file creator (owner) or file administrator. Specify passwords for the stored files. Provides increased protection against unauthorized use of files. A Press the {Document Server} key. B Select the file. 98 Specifying Access Permission for Stored Files C Press [File Management]. 3 D Press [Change Password]. E Enter the password using the number keys. You can use 4 to 8 numbers as the password for the stored file. F Press [OK]. G Confirm the password by re-entering it using the number keys. H Press [OK]. I Press [OK]. 99 Preventing Information Leaks Unlocking Files If you specify [On] for "Enhance File Protection", the file will locked and become inaccessible if an invalid password is entered 10 times. This section explains how to unlock files. Only the file administrator can unlock files. For details about "Enhance File Protection", see p.153 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. 3 A Press the {Document Server} key. B Select the file. C Press [File Management]. 100 Specifying Access Permission for Stored Files D Press [Unlock File]. 3 E Press [Yes]. F Press [OK]. 101 Preventing Information Leaks Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person masquerading as the user. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book. 3 Restrictions on Destinations This can be specified by the user administrator. Make the setting to disable the direct entry of e-mail addresses under the scanner function. By making this setting, the destinations can be restricted to addresses registered in the address book. If you set [Restrict Use of Destinations] to [On], you can prohibit users from directly entering telephone numbers, e-mail addresses, or Folder Path in order to send files. If you set [Restrict Use of Destinations] to [Off], [Restrict Adding of User Destinations] appears. In [Restrict Adding of User Destinations], you can restrict users from registering data in the address book. If you set [Restrict Adding of User Destinations] to [Off], users can directly enter destination e-mail addresses and Folder Path in [Program Dest.] on the scanner screen. If you set [Restrict Adding of User Destinations] to [On], users can specify destinations directly, but cannot use [Program Dest.] to register data in the address book. When this setting is made, only the user administrator can change the address book. For details, see p.153 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. 102 Preventing Data Leaks Due to Unauthorized Transmission A Press the {User Tools/Counter} key. B Press [System Settings]. 3 C Press [Administrator Tools]. D Press [Extended Security]. E Press [On] for "Restrict Use of Destinations". 103 Preventing Information Leaks F Press [OK]. G Press the {User Tools/Counter} key. Reference This can also be specified using Web Image Monitor or SmartDeviceMonitor for Admin. For details, see the Help for each application. 3 104 Protecting the Address Book Protecting the Address Book If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person masquerading as the user. To protect the data from unauthorized reading, you can also encrypt the data in the address book. Address Book Access Permission 3 This can be specified by the registered user. The access permission can also be specified by a user granted full control or the user administrator. You can specify who is allowed to access the data in the address book. By making this setting, you can prevent the data in the address book being used by unregistered users. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 105 Preventing Information Leaks D Press [Address Book Management]. 3 E Select the user or group. F Press [Protection]. G Under "Protect Destination", press [Program/Change/Delete] for "Permissions for Users/Groups". 106 Protecting the Address Book H Press [New Program]. 3 I Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. J Press [Exit]. K Select the user who you want to assign an access permission to, and then select the permission. Select the permission, from [Read-only], [Edit], [Edit / Delete], or [Full Control]. L Press [Exit]. M Press [OK]. N Press [Exit]. O Press the {User Tools/Counter} key. 107 Preventing Information Leaks Encrypting the Data in the Address Book This can be specified by the user administrator. Encrypt the data in the address book. Reference See p.153 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. 3 Note ❒ If you register additional users after encrypting the data in the address book, those users are also encrypted. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 108 Protecting the Address Book D Press [Extended Security]. 3 E Press [On] for "Encrypt Address Book". F Press [Change] for “Encryption Key”. G Enter the encryption key, and then press [OK]. Enter the encryption key using up to 32 alphanumeric characters. H Press [Encrypt / Decrypt]. 109 Preventing Information Leaks I Press [Yes]. Do not switch the main power off during encryption, as doing so may corrupt the data. Encrypting the data in the address book may take a long time. The time it takes to encrypt the data in the address book depends on the number of registered users. The machine cannot be used during encryption. Normally, once encryption is complete, [Exit] appears. If you press [Stop] during encryption, the data is not encrypted. If you press [Stop] during decryption, the data stays encrypted. 3 J Press [Exit]. K Press [OK]. L Press the {User Tools/Counter} key. 110 Deleting Data on the Hard Disk Deleting Data on the Hard Disk A B Hard Disk The machine’s hard disk lets you store data under the copy, printer, scanner, and document server functions, as well as the address book and counters stored under each user code. Data Not Overwritten in the Hard Disk The machine’s memory lets you store data transmitted using network TWAIN scanner. Even if you delete the data on the hard disk, this data remains intact. 3 Overwriting the Data on the Hard Disk To use this function, the optional DataOverwriteSecurity unit must be installed. To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data stored on the hard disk. You can also automatically overwrite temporarily-stored data. Note ❒ Depending on the hard disk capacity and the method of erasing the data, this action may take a few hours. Once you start the Erase All Memory function, no other machine operation is possible until the function completes or you quit the function. ❖ Auto Erase Memory Setting To erase selected data on the hard disk, specify [Auto Erase Memory Setting]. ❖ Erase All Memory To erase all the data on the hard disk, using [Erase All Memory]. ❖ Methods of Erasing the Data You can select the method of erasing the data from the following: The default is "NSA". NSA *1 Overwrites the data on the hard disk twice with random numbers and once with zeros. DoD *2 Overwrites the data with a number, its complement, and random numbers, and then checks the result. Random Numbers Overwrites the data with random numbers the specified number of times. You can specify between 1 and 9 as the number of times the data is overwritten with random numbers. The default is 3 times. *1 *2 National Security Agency Department of Defense Reference For details, see the manual supplied with the DataOverwriteSecurity unit. 111 Preventing Information Leaks "Auto Erase Memory Setting" This can be specified by the machine administrator. A document scanned in Copier or Scanner mode, or print data sent from a printer driver is temporarily stored on the machine's hard disk. Even after the job is completed, it remains in the hard disk as temporary data. Auto Erase Memory erases the temporary data on the hard disk by writing over it. Overwriting starts automatically once the job is completed. The Copier and Printer functions take priority over the Auto Erase Memory function. If a copy or print job is in progress, overwriting will only be done after the job is completed. 3 Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. 112 Deleting Data on the Hard Disk D Press [Auto Erase Memory Setting]. 3 If the setting to be specified does not appear, press [TNext] to scroll down to other settings. E Press [On], and then select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. If you select [Random Numbers], proceed to step F. If you select [NSA] or [DoD], proceed to step H. F Press [Change]. 113 Preventing Information Leaks G Enter the number of times that you want to overwrite using the number keys, and then press [q]. 3 H Press [OK]. Auto Erase Memory is set. Important ❒ When Auto Erase Memory is set to "On", temporary data that remained on the hard disk when Auto Erase Memory was "Off" might not be overwritten. Note ❒ Should the main power switch of the machine be turned off before overwriting is completed, the temporary data will remain on the hard disk until the main power switch is next turned on and overwriting is resumed. ❒ If the overwriting method is changed while overwriting is in progress, the remainder of the temporary data will be overwritten using the method set originally. Canceling Auto Erase Memory A Follow steps A to D in "Auto Erase Memory Setting". B Press [Off]. C Press [OK]. Auto Erase Memory is disabled. Note ❒ To set Auto Erase Memory to "On" again, repeat the procedure in "Auto Erase Memory Setting". 114 Deleting Data on the Hard Disk Types of Data that Can or Cannot Be Overwritten The following table shows the types of data that can or cannot be overwritten by Auto Erase Memory. Data overwritten by Auto Erase Memory Copier • Copy jobs Printer • Print Jobs • Sample Print/Locked Print/Stored Print Jobs *1 • Spool Printing jobs 3 • PDF Direct Print data Scanner *2 • Scanned files sent by email • Files sent by Scan to Folder • Documents sent using DeskTopBinder, the ScanRouter delivery software or a Web Image Monitor Data not overwritten by Auto Erase Memory Documents stored by the user in the Document Server using the Copier, Printer or Scanner functions *3 Information registered in the Address Book *4 Counters stored under each user code *1 *2 *3 *4 A Sample Print, Locked Print, or Stored Print job can only be overwritten after it has been executed. Stored print jobs can be overwritten by Auto Erase Memory only if they have been deleted in advance. Data scanned with network TWAIN scanner will not be overwritten by Auto Erase Memory. A stored document can only be overwritten after it has been printed or deleted from the Document Server. Data stored in the Address Book can be encrypted for security. For details, see p.108 “Encrypting the Data in the Address Book”. 115 Preventing Information Leaks "Erase All Memory" This can be specified by the machine administrator. You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. 3 Important ❒ If you select Erase All Memory, the following are also deleted: user codes, counters under each user code, user stamps, data stored in the Address Book, printer fonts downloaded by users, applications using Embedded Software Architecture, SSL server certificates, and the machine’s network settings. Note ❒ Before erasing the hard disk, you can back up user codes, counters for each user code, and Address Book data using SmartDeviceMonitor for Admin. For details, see SmartDeviceMonitor for Admin Help. A Disconnect communication cables connected to the machine. B Press the {User Tools/Counter} key. C Press [System Settings]. D Press [Administrator Tools]. 116 Deleting Data on the Hard Disk E Press [Erase All Memory]. 3 If the setting to be specified does not appear, press [TNext] to scroll down to other settings. F Select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. If you select [Random Numbers], proceed to step G. If you select [NSA] or [DoD], proceed to step I. G Press [Change]. 117 Preventing Information Leaks H Enter the number of times that you want to overwrite using the number keys, and then press [q]. 3 I Press [OK]. J Press [Yes]. K When overwriting is completed, press [Exit], and then turn off the power. Reference Before turning the power off, see "Turning On the Power", About This Machine. Important ❒ Should the main power switch of the machine be turned off before Erase All Memory is completed, overwriting is canceled. ❒ Make sure the main power switch is not turned off during overwriting. Note ❒ If the main power is turned off when Erase All Memory is in progress, overwriting will start again when you next turn on the main power. ❒ If an error occurs before overwriting is completed, turn off the main power. Turn it on again, and then repeat from stepB. 118 Deleting Data on the Hard Disk Canceling Erase All Memory A Press [Cancel] while Erase All Memory is in progress. B Press [Yes]. Erase All Memory is canceled. Note ❒ If you stop this before completion, the data is not fully erased. Execute [Erase All Memory] again to erase the data. 3 C Turn off the main power. Note ❒ To resume overwriting after power off, turn on the main power of the machine, and then repeat the procedure in "Erase All Memory". 119 Preventing Information Leaks 3 120 4. Managing Access to the Machine Preventing Modification of Machine Settings Administrator type determines which machine settings can be modified. Users cannot change the administrator settings. In [Admin. Authentication], [Available Settings], the administrator can select which settings users cannot specify. Register the administrators before using the machine. ❖ Type of Administrator Register the administrator on the machine, and then authenticate the administrator using the administrator’s login user name and password. The administrator can also specify [Available Settings] in [Admin. Authentication] to prevent users from specifying certain settings. Administrator type determines which machine settings can be modified. The following types of administrator are available: • User Administrator • Network Administrator • Machine Administrator • File Administrator Reference For details, see p.12 “Administrators”. For details, see p.18 “Administrator Authentication”. For details, see p.176 “Machine Administrator Settings”. For details, see p.184 “Network Administrator Settings”. For details, see p.189 “File Administrator Settings”. For details, see p.12 “User Administrator”. ❖ Menu Protect Use this function to specify the permission level for users to change those settings accessible by non-administrators. You can specify Menu Protect for the following settings: • Copier / Document Server Features • Printer Features • Scanner Features Reference For details, see p.199 “User Settings”. 121 Managing Access to the Machine Menu Protect The administrator can also limit users’ access permission to the machine’s settings. The machine’s System Settings menu and the printer’s regular menus can be locked so they cannot be changed. This function is also effective when management is not based on user authentication. To change the menu protect setting, you must first enable administrator authentication. Reference For details about the menu protect level for each function, see p.199 “User Settings”. 4 Menu Protect You can set menu protect to [Off], [Level 1], or [Level 2]. If you set it to [Off], no menu protect limitation is applied. To limit access to the fullest extent, select [Level 2]. For details about the menu protect level for each function, see p.199 “User Settings”. Copying Functions To specify [Menu Protect] in [Copier / Document Server Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings]. A Press the {User Tools/Counter} key. B Press [Copier / Document Server Features]. C Press [Administrator Tools]. D Press [Menu Protect]. 122 Menu Protect E Select the menu protect level, and then press [OK]. F Press the {User Tools/Counter} key. 4 Printer Functions To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings]. A Press the {User Tools/Counter} key. B Press [Printer Features]. C Press [Maintenance]. D Press [Menu Protect]. E Select the menu protect level, and then press [OK]. 123 Managing Access to the Machine F Press the {User Tools/Counter} key. Scanner Functions To specify [Menu Protect] in [Scanner Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings]. A Press the {User Tools/Counter} key. B Press [Scanner Features]. 4 C Press [Initial Settings]. D Press [Menu Protect]. E Select the menu protect level, and then press [OK]. F Press the {User Tools/Counter} key. 124 Limiting Available Functions Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. ❖ Available Functions Specify the available functions from the copier, Document Server, scanner and printer function. Specifying Which Functions are Available This can be specified by the user administrator. Specify the functions available to registered users. By making this setting, you can limit the functions available to users. 4 Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Administrator Tools]. D Press [Address Book Management]. 125 Managing Access to the Machine E Select the user. F Press [Auth. Info]. G In [Available Functions], select the functions you want to specify. 4 If the setting to be specified does not appear, press [TNext] to scroll down to other settings. H Press [OK]. I Press [Exit]. J Press the {User Tools/Counter} key. 126 Managing Log Files Managing Log Files A Log information To view the log, the log collection server is required. The following log information is stored in the machine’s memory and on its hard disk: • Job log Stores information about workflow related to user files, such as copying, printing, and scan file delivery • Access log Stores information about access, such as logging on and off, creating and deleting files, scanning data security for copying documents, administrator procedures *1 , and customer engineer procedures. *2 *1 *2 B C 4 Deleting all log information Formatting the hard disk Deleting log information To delete the log, the log collection server is required. By deleting the log stored in the machine, you can free up space on the hard disk. Transferring log information To transfer the log, the log collection server is required. You can transfer the log information, which indicates who tried to gain access and at what time. By transferring the log files, you can check the history data and identify unauthorized access. 127 Managing Access to the Machine Specifying Delete All Logs This can be specified by the machine administrator. By deleting the log stored in the machine, you can free up space on the hard disk. A Press the {User Tools/Counter} key. B Press [System Settings]. 4 C Press [Administrator Tools]. D Press [Delete All Logs]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. A confirmation message appears. E Press [Yes]. F Press [Exit]. G Press the {User Tools/Counter}key. 128 Managing Log Files Transfer Log Setting The machine administrator can select [On] from the log server only. When using the machine’s control panel, you can change the setting to [Off] only if it is set to [On]. You can check and change the transfer log setting. This setting lets you transfer log files to the log server to check the history data and identify unauthorized access. For details about log collection server, contact your local dealer. For details about the transfer log setting, see log collection server help. A Press the {User Tools/Counter}key. B Press [System Settings]. 4 C Press [Administrator Tools]. 129 Managing Access to the Machine D Press [Transfer Log Setting]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. 4 E Press [Off]. F Press [OK]. G Press the {User Tools/Counter}key. 130 5. Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses, disable ports and protocols, or use Web Image Monitor to specify the network security level to prevent unauthorized access over the network and protect the address book, stored files, and default settings. Enabling/Disabling Protocols This can be specified by the network administrator. Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. C Press [Interface Settings]. 131 Enhanced Network Security D Press [Effective Protocol]. E Press [Inactive] for the protocol you want to disable. 5 F Press [OK]. G Press the {User Tools/Counter} key. Reference Advanced network settings can be specified using Web Image Monitor. For details, see the Web Image Monitor Help. 132 Preventing Unauthorized Access Access Control This can be specified by the network administrator. The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16][192.168.15.20], the client PC addresses from which access is possible will be from 192.168.15.16 to 192.168.15.20. Limitation ❒ Using access control, you can limit access involving LPR, RCP/RSH, FTP, IPP, DIPRINT, Web Image Monitor, SmartDeviceMonitor for Client or DeskTopBinder. You cannot limit the Monitoring of SmartDeviceMonitor for Client. ❒ You cannot limit access involving telnet, or monitoring SmartDeviceMonitor for Admin. 5 A Open a Web browser. B Enter "http://(machine's-address)/" in the address bar to access the machine. C Click [Login]. The network administrator can log on using the appropriate login user name and login password. D Click [Configuration], under [Security], click [Access Control]. The [Access Control] page appears. E To specify the IPv4 Address, in [Access Control Range], enter an IP address that has access to the machine. To specify the IPv6 Address, in [Access Control Range] - [Range], enter an IP address that has access to the machine, or in [Mask], enter an IP address from which access to the machine and specify the [Mask Length]. F Click [OK]. Access control is set. G Click [Logout]. Reference For details, see the Web Image Monitor Help. 133 Enhanced Network Security Specifying Network Security Level This can be specified by the network administrator. This setting lets you change the security level to limit unauthorized access. Set the security level to [Level 0], [Level 1], or [Level 2]. Select [Level 2] for maximum security to protect confidential information. Select [Level 1] for moderate security. Use this setting if the machine is connected to the office local area network (LAN). Select [Level 0] to use this setting if no information needs to be protected. You can specify the entire network security level setting the machine’s control panel. Reference For details about logging on and logging off with user authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. 5 A Press the {User Tools/Counter}key. B Press [System Settings]. C Press [Administrator Tools]. 134 Preventing Unauthorized Access D Press [Network Security Level]. If the setting you want to specify does not appear, press [TNext] to scroll down to other settings. E Select the network security level. 5 Select [Level 0], [Level 1], or [Level 2]. F Press [OK]. G Press [Exit]. H Press the {User Tools/Counter}key. -Status of Functions under each Network Security Level ❍= Available — = Unavailable U = Port is open. | = Port is closed. ✩ = Automatic ★ = Ciphertext Only × = Ciphertext Priority 135 Enhanced Network Security Function Network Security Level Level 0 TCP/IP ❍ ❍ ❍ U U U Port 443 U U U Port 631 U U | Port 7443/7444 U U U Port 80 U U U Port 631 U U | Port 443 U U U DIPRINT ❍ ❍ - LPR ❍ ❍ - IPP 5 FTP Port 21 U U U ssh Port 22 U U U U U U U U U RSH/RCP ❍ ❍ - SNMP ❍ ❍ ❍ sftp RFU SNMP v1v2 Port 10021 Setting ❍ - - Browse ❍ ❍ - ❍ ❍ ❍ ✩ ✩ ★ ❍ - - U U | SNMP v3 SNMP Encryption TELNET SSDP Port 1900 NBT Port 137/138 U U | ❍ ❍ ❍ × × ★ DNS ❍ ❍ - SMB ❍ ❍ - NetWare NetWare ❍ ❍ - AppleTalk AppleTalk ❍ ❍ - SSL SSL / TLS Encryption Mode 136 Level 2 Port 80 TCP/IP HTTP Level 1 Encrypting Transmitted Passwords Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user authentication. ❖ Driver Encryption Key Encrypt the password transmitted when specifying user authentication. To encrypt the login password, specify the driver encryption key on the machine and on the printer driver installed in the user’s computer. Reference See p.153 “Changing the Extended Security Functions”. ❖ Group Passwords for PDF Files DeskTopBinder Lite’s PDF Direct Print function allows a PDF group password to be specified to enhance security. 5 ❖ Password for IPP Authentication To encrypt the IPP Authentication password on the Web Image Monitor, set [Authentication] to [DIGEST], and then specify the IPPAuthentication password set on the machine. Note ❒ You can use Telnet or FTP to manage passwords for IPP authentication, although it is not recommended. 137 Enhanced Network Security Driver Encryption Key This can be specified by the network administrator. Specify the driver encryption key on the machine. By making this setting, you can encrypt login passwords for transmission to prevent them from being analyzed. Reference See p.153 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. 5 C Press [Administrator Tools]. 138 Encrypting Transmitted Passwords D Press [Extended Security]. E For [Driver Encryption Key], press [Change]. 5 F Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. Note ❒ The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers. Make sure to enter the same driver encryption key as that specified on the machine. G Press [OK]. H Press the {User Tools/Counter} key. Reference See the printer driver Help. See the TWAIN driver Help. 139 Enhanced Network Security Group Password for PDF files This can be specified by the network administrator. On the machine, specify the group password for PDF files. By using a PDF group password, you can enhance security and so protect passwords for PDF files from being analyzed. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. Note ❒ The network administrator must give users the group password for PDF files that are already registered on the machine. The users can then register it in DeskTopBinder on their computers. For details, see the DeskTopBinder Help. ❒ Be sure to enter the same character string as that specified on the machine for the group password for PDF files. ❒ The group password for PDF files can also be specified using Web Image Monitor. For details, see the Web Image Monitor Help. 5 A Press the {User Tools/Counter} key. B Press [Printer Features]. C Press [PDF Menu], and then press [PDF Group Password]. If the setting to be specified does not appear, press [TNext]. D For [Current Password], press [Enter]. E Enter the password, and then press [OK]. Enter the group password for PDF files using up to 32 alphanumeric characters. F Press [OK]. G For [New Password], press [Enter]. 140 Encrypting Transmitted Passwords H Enter the password, and then press [OK]. I For [Confirm New Password], press [Enter]. J Enter the password and press [OK]. K Press [OK]. L Press the {User Tools/Counter} key. IPP Authentication Password This can be specified by the network administrator. Specify the IPP authentication passwords for the machine using Web Image Monitor. By making this setting, you can encrypt IPP authentication passwords for transmission to prevent them from being analyzed. 5 Note ❒ When using the IPP port under Windows XP or Windows Server 2003, you can use the operating system’s standard IPP port. A Open a Web Image Monitor. B Enter "http://(machine's-address)/" in the address bar to access the machine. C Log onto the machine. The network administrator can log on. Enter the login user name and login password. D Click [Configuration], click [Security], and then click [IPP Authentication]. The [IPP Authentication] page appears. E Select [DIGEST] from the [Authentication] list. F Enter the user name in the [User Name] box. G Enter the password in the [Password] box. H Click [Apply]. IPP authentication is specified. I Log off from the machine. 141 Enhanced Network Security Protection Using Encryption When you access the machine using a Web Image Monitor or IPP, you can establish encrypted communication using SSL. When you access the machine using an application such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL. To protect data from interception, analysis, and tampering, you can install a server certificate in the machine, negotiate a secure connection, and encrypt transmitted data. ❖ SSL (Secure Sockets Layer) 5 AUS001 S A B C D 142 To access the printer from a user’s computer, request for the SSL server certificate and public key. The server certificate and public key are sent from the printer to the user’s computer. Create shared key from the user’s computer, and then encrypt it using public key. The encrypted shared key is sent to the printer. Protection Using Encryption E F The encrypted shared key is decrypted in the machine using private key. Transmit the encrypted data using the shared key, and then decrypt the data at the machine to attain secure transmission. SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator. To protect the communication path and establish encrypted communication, create and install the server certificate. There are two ways of installing a server certificate: create and install a self-certificate using the machine, or request a certificate from a certificate authority and install it. ❖ Configuration flow (self-signed certificate) A Creating and installing the server certificate Install the server certificate using Web Image Monitor. B Enabling SSL Enable the [SSL/TLS] setting using Web Image Monitor. 5 ❖ Configuration flow (certificate issued by a certificate authority) A Creating the server certificate Create the server certificate using Web Image Monitor. The application procedure after creating the certificate depends on the certificate authority. Follow the procedure specified by the certificate authority. B Installing the server certificate Install the server certificate using Web Image Monitor. C Enabling SSL Enable the [SSL/TLS] setting using Web Image Monitor. Creating and Installing the Server Certificate (Self-Signed Certificate) Create and install the server certificate using Web Image Monitor. Note ❒ To confirm whether SSL configuration is enabled, enter https://(machine’saddress) in your Web Image Monitor’s address bar to access this machine. If the "The page cannot be displayed" message appears, check the configuration as the SSL configuration is invalid. 143 Enhanced Network Security Creating and Installing the Self-Signed Certificate Create and install the server certificate using Web Image Monitor. This section explains the use of a self-certificate as the server certificate. A Open a Web Image Monitor. B Enter "http://(machine's-address)/" in the address bar to access the printer. C Log onto the machine. The network administrator can log on. Enter the login user name and login password. D Click [Configuration], under [Security], click [Device Certificate]. E Click [Create]. F Make the necessary settings. 5 Reference For details about the displayed items and selectable items, see Web Image Monitor Help. G Click [OK]. The setting is changed. H Click [OK]. A security warning dialog box appears. I Check the details, and then click [OK]. [Installed] appears under [Certificate Status] to show that a server certificate for the printer has been installed. J Log off from the machine. Note ❒ Click [Delete] to delete the server certificate from the machine. 144 Protection Using Encryption Creating the Server Certificate (Certificate Issued by a Certificate Authority) Create the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. A Open a Web Image Monitor. B Enter "http://(machine's-address)/" in the address bar to access the printer. C Log onto the machine. The network administrator can log on. Enter the login user name and login password. D Click [Configuration], under [Security], click [Device Certificate]. The [Device Certificate] page appears. E Select the Server Certificate Number that you want to create. F Click [Request]. G Make the necessary settings. 5 Reference For details about the displayed items and selectable items, see Web Image Monitor Help. H Click [OK]. [Requesting] appears for [Certificate Status] in the Certificates area. I Log off from the machine. J Apply to the certificate authority for the server certificate. The application procedure depends on the certificate authority. For details, contact the certificate authority. For the application, click the Web Image Monitor Details icon and use the information that appears in Certificate Details. Note ❒ Using Web Image Monitor, you can create the contents of the server certificate but you cannot send the application. ❒ Click [Cancel Request] to cancel the request for the server certificate. 145 Enhanced Network Security Installing the Server Certificate (Certificate Issued by a Certificate Authority) Install the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. Enter the server certificate contents issued by the certificate authority. A Open a Web Image Monitor. B Enter "http://(machine's-address)/" in the address bar to access the printer. C Log onto the machine. The network administrator can log on. Enter the login user name and login password. D Click [Configuration], under [Security], click [Device Certificate]. The [Device Certificate] page appears. 5 E Select Server Certificate Number that you are going to install. F Click [Install]. G Enter the contents of the server certificate. In the [Certificate Request] box, enter the contents of the server certificate received from the certificate authority. Reference For details about the displayed items and selectable items, see Web Image Monitor Help. H Click [OK]. [Installed] appears under [Certificate Status] to show that a server certificate for the machine has been installed. I Log off from the machine. 146 Protection Using Encryption Enabling SSL After installing the server certificate in the machine, enable the SSL setting. This procedure is used for a self-signed certificate or a certificate issued by a certificate authority. A Open a Web Image Monitor. B Enter "http://(machine's-address)/" in the address bar to access the printer. C Log onto the machine. The network administrator can log on. Enter the login user name and login password. D Click [Configuration], under [Security], click [SSL/TLS]. The [SSL/TLS] page appears. E Click [Enable] for the protocol version used in [SSL/TLS]. F Select the encryption communication mode for [Permit SSL/TLS Communica- 5 tion]. G Click [OK]. The SSL setting is enabled. H Click [OK]. I Log off from the machine. Note ❒ If you set [Permit SSL/TLS Communication] to [Ciphertext Only], enter "https://(machine's address)/" to access the machine. 147 Enhanced Network Security User Settings for SSL (Secure Sockets Layer) If you have installed a server certificate and enabled SSL (Secure Sockets Layer), you need to install the certificate on the user’s computer. The network administrator must explain the procedure for installing the certificate to users. If a warning dialog box appears while accessing the machine using the Web Image Monitor or IPP, start the Certificate Import Wizard and install a certificate. A When the [Security Alert] dialog box appears, click [View Certificate]. The [Certificate] dialog box appears. To be able to respond to inquiries from users about such problems as expiry of the certificate, check the contents of the certificate. B On the [General] tab, click [Install Certificate...]. Certificate Import Wizard starts. 5 C Install the certificate by following the Certificate Import Wizard instructions. Note ❒ For details about how to install the certificate, see the Web Image Monitor Help. ❒ If a certificate issued by a certificate authority is installed in the printer, confirm the certificate store location with the certificate authority. Reference For details about where to store the certificate when accessing the machine using IPP, see the SmartDeviceMonitor for Client Help. 148 Protection Using Encryption Setting the SSL / TLS Encryption Mode By specifying the SSL/TLS encrypted communication mode, you can change the security level. ❖ Encrypted Communication Mode Using the encrypted communication mode, you can specify encrypted communication. Ciphertext Only Allows encrypted communication only. If encryption is not possible, the machine does not communicate. Ciphertext Priority Performs encrypted communication if encryption is possible. If encryption is not possible, the machine communicates without it. Ciphertext / Clear Text Communicates with or without encryption, according to the setting. 5 Setting the SSL / TLS Encryption Mode This can be specified by the network administrator. After installing the server certificate, specify the SSL/TLS encrypted communication mode. By making this setting, you can change the security level. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. 149 Enhanced Network Security C Press [Interface Settings]. D Press [Permit SSL/TLS Communication] 5 If the setting to be specified does not appear, press [TNext] to scroll down to other settings. E Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext/Clear Text] as the encrypted communication mode. F Press [OK]. G Press the {User Tools/Counter} key. Note ❒ The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see the Web Image Monitor Help. 150 Protection Using Encryption SNMPv3 Encryption This can be specified by the network administrator. When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. 5 C Press [Interface Settings]. 151 Enhanced Network Security D Press [Permit SNMPv3 Communication]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. E Press [Encryption Only]. 5 F Press [OK]. G Press the {User Tools/Counter} key. Note ❒ To use SmartDeviceMonitor for Admin for encrypting the data for specifying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMPv3 Communication] on the machine. ❒ If network administrator’s [Encryption Password] setting is not specified, the data for transmission may not be encrypted or sent. Reference For details about specifying the network administrator’s [Encryption Password] setting, see p.22 “Registering the Administrator”. 152 6. Specifying the Extended Security Functions Changing the Extended Security Functions As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for instance, encrypting transmitted data and data in the address book. If you need extended security, specify the machine’s extended security functions before using the machine. This section outlines the extended security functions and how to specify them. For details about when to use each function, see the corresponding chapters. Changing the Extended Security Functions To change the extended security functions, display the extended security screen as follows: Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. Procedure for Changing the Extended Security Functions A Press the {User Tools/Counter} key. B Press [System Settings]. 153 Specifying the Extended Security Functions C Press [Administrator Tools]. D Press [Extended Security]. 6 E Press the setting you want to change, and change the setting. F Press [OK]. G Press the {User Tools/Counter} key. 154 Changing the Extended Security Functions Settings ❖ Driver Encryption Key This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication. The Driver Encryption Key must match the encryption key set on the machine. Reference See the printer driver Help. See the TWAIN driver Help. ❖ Encrypt Address Book This can be specified by the user administrator. Encrypt the data in the machine’s address book. Reference See p.108 “Encrypting the Data in the Address Book”. • On • Off 6 Note ❒ Default: Off ❖ Restrict Use of Destinations This can be specified by the user administrator. The available scanner destinations are limited to the destinations registered in the address book. Reference See p.33 “You cannot use more than one authentication method at the same time.”. A user cannot directly enter the destinations for transmission. Limitation ❒ If you specify the setting to receive e-mails via SMTP, you cannot use [Restrict Use of Destinations]. Note ❒ The destinations searched by "Search LDAP" can be used. • On • Off Note ❒ Default: Off 155 Specifying the Extended Security Functions ❖ Restrict Adding of User Destinations This can be specified by the user administrator. When "Restrict Use of Destinations" is set to [Off]. After entering a scanner destination directly, you can register it in the address book by pressing [Program Dest.]. If [On] is selected for this setting, [Program Dest.] does not appear. If you set [Restrict Adding of User Destinations] to [On], users can specify destinations directly, but cannot use [Program Dest.] to register data in the address book. When this setting is made, only the user administrator can change the address book. • On • Off Note ❒ Default: Off ❖ Restrict Display of User Information This can be specified if user authentication is specified. When the job history is checked using a network connection for which authentication is not available, all personal information can be displayed as "********". For example, when someone not authenticated as an administrator checks the job history using SNMP in SmartDeviceMonitor for Admin, personal information can be displayed as "********" so users cannot be identified. Because no information identifying registered users can be viewed, unauthorized users can be prevented from obtaining information about the registered files. • On • Off 6 Note ❒ Default: Off ❖ Enhance File Protection This can be specified by the file administrator. By specifying a password, you can limit operations such as printing, deleting, and sending files, and can prevent unauthorized people from accessing the files. However, it is still possible for the password to be cracked. By specifying "Enhance File Protection", files are locked and so become inaccessible if an invalid password is entered ten times. This can protect the files from unauthorized access attempts in which a password is repeatedly guessed. The locked files can only be unlocked by the file administrator. When "Enhance File Protection" is specified, ( ) appears at the screen. Note ❒ If files are locked, you cannot select them even if the correct password is entered. • On • Off Note ❒ Default: Off 156 Changing the Extended Security Functions ❖ Settings by SNMPv1 and v2 This can be specified by the network administrator. When the machine is accessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed. If you select [Prohibit], the setting can be viewed but not specified with SNMPv1, v2. • Prohibit • Do not Prohibit Note ❒ Default: Do not Prohibit ❖ Restrict Use of Simple Encryption This can be specified by the network administrator. For example, this setting is set to [On] and you want to edit the address book in User Management Tool or Address Management Tool in SmartDeviceMonitor for Admin, or you want to access the machine using DeskTopBinder or the ScanRouter delivery software, enable SSL/TLS for encrypted communication. For details about specifying SSL/TLS, see p.149 “Setting the SSL / TLS Encryption Mode”. If you select [On], specify the encryption setting using the printer driver. • On • Off 6 Note ❒ Default: Off Reference For details, see the Printer driver Help. For details, see the TWAIN driver Help. 157 Specifying the Extended Security Functions ❖ Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for operations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine. When this is selected, authentication is not required for users who logged on to the machine before [Login Privilege] was selected. If you select [Access Privilege], users who canceled a copy or print job in progress and the machine administrator can operate the machine. Limitation ❒ Even if you select [Login Privilege] and log onto the machine, you cannot cancel a copy or print job in progress if you are not authorized to use the copy and printer functions. ❒ You can specify [Authenticate Current Job] only if [User Authentication Management] was specified. • Login Privilege • Access Privilege • Off 6 Note ❒ Default: Off ❖ Password Policy This can be specified by the user administrator. The password policy setting is effective only if [Basic Auth.] is specified. This setting lets you specify [Complexity Setting] and [Minimum Character No.] for the password. By making this setting, you can limit the available passwords to only those that meet the conditions specified in [Complexity Setting] and [Minimum Character No.]. If you select [Level 1], specify the password using a combination of two types of characters selected from upper-case letters, lower-case letters, decimal numbers, and symbols such as #. If you select [Level 2], specify the password using a combination of three types of characters selected from upper-case letters, lower-case letters, decimal numbers, and symbols such as #. • Level 1 • Level 2 • Off • Minimum Character No. Note ❒ Default: Off (0) 158 Changing the Extended Security Functions ❖ @Remote Service This can be specified by the machine administrator. Communication via HTTPS for @Remote Service cannot be received when [Prohibit] is selected. If you select [Prohibit], you must inform your service representative. • Prohibit • Do not Prohibit Note ❒ Default: Do not Prohibit 6 159 Specifying the Extended Security Functions Other Security Functions This section explains settings for preventing information leaks, and functions that you can restrict to further increase security. Scanner Function ❖ Print & Delete Scanner Journal To prevent personal information in the transmission/delivery history being printed automatically, set user authentication and the journal will specify [Do not Print: Disable Send] automatically. If you do this, the scanner is autmatically disabled when the journal history exceeds 250 transmissions/deliveries. When this happens, click [Print Scanner Journal] or [Delete Scanner Journal]. To print the scanner journal automatically, set [On] for "Print & Delete Scanner Journal". 6 160 Limiting Machine Operation to Customers Only Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator authentication. The machine can be set to prohibit operation without administrator authentication and also prohibit remote registration in the address book by a service representative. We maintain strict security when handling customers data. Administrator authentication prevents us operating the machine without administrator permission. Use the following settings. • Service Mode Lock Settings ❖ Service Mode Lock This can be specified by the machine administrator. Service mode is used by a customer engineer for inspection or repair. If you set the service mode lock to [On], service mode cannot be used unless the machine administrator logs onto the machine and cancels the service mode lock to allow the customer engineer to operate the machine for inspection and repair. This ensures that the inspection and repair are done under the supervision of the machine administrator. 6 Specifying Service Mode Lock Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. 161 Specifying the Extended Security Functions C Press [Administrator Tools]. D Press [Service Mode Lock]. 6 E Press [On] and then [OK]. A confirmation message appears. F Press [Yes]. G Press the {User Tools/Counter} key. 162 Limiting Machine Operation to Customers Only Canceling Service Mode Lock For a customer engineer to carry out inspection or repair in service mode, the machine administrator must log onto the machine and cancel the service mode lock. Preparation For details about logging on and logging off with administrator authentication, see p.25 “Logging on Using Administrator Authentication”, p.28 “Logging off Using Administrator Authentication”. A Press the {User Tools/Counter} key. B Press [System Settings]. 6 C Press [Administrator Tools]. D Press [Service Mode Lock]. 163 Specifying the Extended Security Functions E Press [Off] and then press [OK]. F Press the {User Tools/Counter} key. The customer engineer can switch to service mode. 6 164 7. Troubleshooting Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. A Message Appears This section explains how to deal with problems if a message appears on the screen during user authentication. The most common messages are explained. If some other message appears, deal with the problem according to the information contained in the message. Messages Causes Solutions You do not have the privileges to use this function. The authority to use the function is not specified. • If this appears when trying to use a function: The function is not specified in the address book management setting as being available. The user administrator must decide whether to authorize use of the function and then assign the authority. • If this appears when trying to specify a default setting: The administrator differs depending on the default settings you wish to specify. Using the list of settings, the administrator responsible must decide whether to authorize use of the function. 165 Troubleshooting Messages Causes Solutions Failed to obtain URL. The machine cannot connect to the server or cannot establish communication. Make sure the server's settings, such as the IP Address and host name, are specified correctly on the machine. Make sure the host name of the UA Server (Integration Server) is specified correctly. Authentication has failed. The machine is connected to the server, but the UA service is not responding properly. Make sure the user authentication service is specified correctly. SSL is not specified correctly on the server. Specify SSL using Authentication Manager. Server authentication failed. Make sure server authentication is specified correctly on the machine. The entered login user name or login password is not correct Inquire the user administrator for the correct login user name and login password. Delete unnecessary user adThe number of users registered in the address book has dresses. reached the maximum limit allowed by Windows Authentication or , LDAP Authentication, or Integration Server Authentication, so you cannot register additional users. 7 166 Cannot access the authentication server when using Windows authentication , LDAP Authentication, or Integration Server Authentication. A network or server error may have occurred. Confirm with the LAN administrator of the network in use. The selected file(s) You have tried to delete files without the authority to do so. contained file(s) without access privileges. Only file(s) with access privileges will be deleted. Files can be deleted by the file creator (owner) or file administrator. To delete a file which you are not authorized to delete, contact the file creator (owner). Authentication Does Not Work Properly Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide instructions on how to deal with them. Condition Cause Solution Cannot print using the printer driver or connect using the TWAIN driver. User authentication has been rejected. Enter the login user name and login password in the printer driver. Confirm the user name and login name with the administrator of the network in use if using Windows Authentication, LDAP Authentication, or Integration Server Authentication. Confirm with the user administrator if using basic authentication. Cannot authenticate using the TWAIN driver. The encryption key specified in the driver does not match the machine’s driver encryption key. Specify the driver encryption key registered in the machine. The values for SNMPv3 account, password and encryption algorithm on the printer driver do not match the values set on the machine. Make sure settings for SNMPv3 account, password and encryption algorithm under the Network Connections Tool are matched to those on the machine. Another user is logging on to the machine. Wait for the user to log off. Authentication is taking time because of operating conditions. Make sure the LDAP server setting is correct. Authentication is not possible while the machine is editing the address book data. Wait until editing of the address book data is complete. See p.138 “Driver Encryption Key”. 7 Make sure the network settings are correct. 167 Troubleshooting Condition Cause Solution After starting [User Management Tool] or [Address Management Tool] in SmartDeviceMonitor for Admin and entering the correct login user name and password, a message appears to notify that an incorrect password has been entered. "Restrict Simple Encryption" is not set correctly. Alternatively, [SSL/TLS] has been enabled although the required certificate is not installed in the computer. Set "Restrict Simple Encryption" to [On]. Alternatively, enable [SSL/TLS], install the server certificate in the machine, and then install the certificate in the computer. Reference See p.157 “Restrict Use of Simple Encryption”. Cannot log on to the machine using [Document Server: Authentication/Encryption] in DeskTopBinder. See p.149 “Setting the SSL / TLS Encryption Mode”. Cannot access the machine using ScanRouter EX Professional V3 / ScanRouter EX Enterprise V2. Cannot connect to the ScanRouter delivery software. The ScanRouter delivery software may not be supported by the machine. Update to the latest version of the ScanRouter delivery software. Cannot access the machine us- ScanRouter EX Professional V2 does not support user authentication. ing ScanRouter EX Professional V2. 7 Cannot log off when using the copying or scanner functions. The original has not been scanned completely. When the original has been scanned completely, press [q], remove the original, and then log off. [Program Dest.] does not appear on the scanner screen for specifying destinations. [Restrict Adding of User Destinations] is set to [Off] in [Restrict Use of Destinations] in [Extended Security], so only the user administrator can register destinations in the address book. Registration must be done by the user administrator. Stored files do not appear. User authentication may have been disabled while [All Users] is not specified. Re-enable user authentication, and then enable [All Users] for the files that did not appear. For details about enabling [All Users], see p.88 “Specifying Access Permission for Stored Files”. Destinations specified using the machine do not appear. User authentication may have been disabled while [All Users] is not specified. Re-enable user authentication, and then enable [All Users] for the destinations that did not appear. For details about enabling [All Users], see p.105 “Protecting the Address Book”. 168 Authentication Does Not Work Properly Condition Cause Solution Cannot print when user authentication has been specified. User authentication may not be specified in the printer driver. Specify user authentication in the printer driver. If you try to interrupt a job while copying or scanning, an authentication screen appears. With this machine, you can log off while copying or scanning. If you try to interrupt copying or scanning after logging off, an authentication screen appears. Only the user who executed a copying or scanning job can interrupt it. Wait until the job has completed or consult an administrator or the user who executed the job. After you execute [Encrypt Address Book] the [Exit] message does not appear. The hard disk may be faulty. Contact your service representative. The file may be corrupt. For details, see the printer driver Help. 7 169 Troubleshooting 7 170 8. Appendix Supervisor Operations The supervisor can delete an administrator’s password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the supervisor’s user name and password, you cannot use normal functions or specify defaults. Log on as the supervisor only to change an administrator’s password. Important ❒ The default login user name is "supervisor" and the login password is blank. We recommend changing the login user name and login password. ❒ When registering login user names and login passwords, you can specify up to 32 alphanumeric characters and symbols. Keep in mind that user names and passwords are case-sensitive. ❒ Be sure not to forget the supervisor login user name and login password. If you do forget them, a service representative will to have to return the machine to its default state. This will result in all data in the machine being lost and the service call may not be free of charge. Note ❒ You cannot specify the same login user name for the supervisor and the administrators. ❒ Using Web Image Monitor, you can log on as the supervisor and delete an administrator’s password or specify a new one. 171 Appendix Logging on as the Supervisor If administrator authentication has been specified, log on using the supervisor login user name and login password. This section describes how to log on. A Press the {Login/Logout} key. AQI007S B Press [Enter] for [Login User Name]. C Enter a login user name, and then press [OK]. Note ❒ When you assign the administrator for the first time, enter "supervisor". D Press [Enter] for [Login Password]. E Enter a login password, and then press [OK]. 8 Note ❒ When you assign the administrator for the first time, proceed to step F without pressing [Enter]. F Press [Login]. 172 Supervisor Operations Logging off as the Supervisor If administrator authentication has been specified, be sure to log off after completing settings. This section explains how to log off after completing settings. A Press the {Login/Logout} key. AQI007S B Press [Yes]. Changing the Supervisor A Press the {User Tools/Counter} key. B Press [System Settings]. 8 C Press [Administrator Tools]. D Press [Program / Change Administrator]. 173 Appendix E Under "Supervisor", click [Change]. F Press [Change] for the login user name. G Enter the login user name, and then press [OK]. H Press [Change] for the login password. I Enter the login password, and then press [OK]. J If a password reentry screen appears, enter the login password, and then 8 press [OK]. K Press [OK] twice. L Press the {User Tools/Counter} key. 174 Supervisor Operations Resetting an Administrator’s Password Preparation For details about logging on and logging off as the supervisor, see p.172 “Logging on as the Supervisor”, p.173 “Logging off as the Supervisor”. A Press the {Login/Logout} key. AQI007S B Log on as the supervisor. You can log on in the same way as an administrator. C Press [System Settings]. D Press [Administrator Tools]. E Press [Program / Change Administrator]. F Press [Change] for the administrator you wish to reset. G Press [Change] for the login password. H Enter the login password, and then press [OK]. I If a password reentry screen appears, enter the login password, and then press [OK]. J Press [OK]. K Press [OK]. L Press the {User Tools/Counter} key. 8 175 Appendix Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ General Features All the settings can be specified. ❖ Tray Paper Settings All the settings can be specified. ❖ Timer Settings All the settings can be specified. ❖ File Transfer The following settings can be specified. • Delivery Option • SMTP Authentication SMTP Authentication User Name E-mail Address Password Encryption • POP before SMTP Wait Time after Authent. User Name E-mail Address Password • Reception Protocol • POP3 / IMAP4 Settings Server Name Encryption • Administrator's E-mail Address • Default User Name / Password (Send) SMB User Name / SMB Password FTP User Name / FTP Password NCP User Name / NCP Password • Program / Change / Delete E-mail Message 8 176 Machine Administrator Settings ❖ Administrator Tools • Display / Print Counter • Display / Clear / Print / Counter per User Display Counter per User Print Counter per User • User Authentication Management You can specify which authentication to use. You can also edit the settings for each function. • Administrator Authentication Management Machine Management • Program / Change Administrator Machine Administrator You can change the user name and the full-control user’s authority. • Key Counter Management • Extended Security Restrict Display of User Information Authentication Current Job @Remote Service • Capture Priority *1 Capture: Ownership Capture: Public Priority Capture: Owner Defaults • Extended Features • Program / Change / Delete LDAP Server Name Server Name Search Base Port Number Use Secure Connection (SSL) Authentication Search Conditions Search Options • LDAP Search • Service Mode Lock • Auto Erase Memory Setting *2 • Erase All Memory *2 • Transfer Log Setting • Fixed USB Port *1 *2 8 File Format Converter option must be installed. The DataOverwriteSecurity unit option must be installed. 177 Appendix Copier / Document Server Features The following settings can be specified. ❖ General Features All the settings can be specified. ❖ Reproduction Ratio All the settings can be specified. ❖ Edit All the settings can be specified. ❖ Stamp All the settings can be specified. ❖ Input / Output All the settings can be specified. ❖ Administrator Tools All the settings can be specified. 8 178 Machine Administrator Settings Printer Features The following settings can be specified. ❖ List / Test Print All the settings can be specified. ❖ Maintenance • Menu Protect • List / Test Print Lock ❖ System • Print Error Report • Auto Continue • Memory Overflow • Rotate by 180 Degrees • Initial Print Job List • Memory Usage • Copies • Blank Page Print • Reserved Job Waiting Time • Printer Language • Sub Paper Size • Bypass Tray Setting Priority • Edge to Edge Print • Default Printer Language • Tray Switching 8 ❖ Host Interface All the settings can be specified. ❖ PS Menu All the settings can be specified. ❖ PDF Menu All the settings can be specified. 179 Appendix Scanner Features The following settings can be specified. ❖ General Settings All the settings can be specified. ❖ Scan Settings All the settings can be specified. ❖ Send Settings All the settings can be specified. ❖ Initial Settings All the settings can be specified. Extended Feature Setting Menu The following settings can be specified. ❖ Extended Feature Settings • Startup Setting • Install • Uninstall • Change Allocation • Extended Feature Info 8 ❖ GL/2 & TIFF • General Settings All the settings can be specified. • GL/2 Print Settings All the settings can be specified. ❖ TIFF / CALS Settings • All the settings can be specified. 180 Machine Administrator Settings Settings via Web Image Monitor The following settings can be specified. ❖ Top Page • Reset Printer Job • Reset Device ❖ Device Settings • System Spool Printing Protect Printer Display Panel Print Priority Function Priority Permit Firmware Update Display IP Address on Device Display Panel Paper Tray Priority (Copier) Paper Tray Priority (Printer) • Paper All the settings can be specified. • Timer All the settings can be specified. • Date/Time All the settings can be specified. • E-mail All the settings can be specified. • Auto E-mail Notification All the settings can be specified. • On demand E-mail Notification All the settings can be specified. • File Transfer All the settings can be specified. • User Authentication Management All the settings can be specified. • Administrator Authentication Management Machine Administrator Authentication Available Settings for Machine Administrator • Program/Change Administrator You can specify the following administrator settings as the machine administrator. Login User Name Login Password Change Encryption Password 8 181 Appendix • LDAP Server All the settings can be specified. • Firmware Update Update ❖ Printer • System Print Error Report Auto Continue Memory Overflow Initial Print Job List Rotate by 180 Degrees Copies Black Page print Reserved Job Waiting Time Printer Language Sub paper Size Bypass Tray Setting Priority Edge to Edge Print Default Printer Language Tray Switching List / Test Print lock I/O Buffer I/O Timeout Data Format Resolution (PS Settings) Resolution (PDF Settings) Tray Parameters (PCS) Tray Parameters (PS) PDF Group Password PDF Fixed Password • Host Interface All the settings can be specified. 8 ❖ Interface Settings • Parallel Interface • USB ❖ Network • SNMPv3 182 Machine Administrator Settings ❖ RC Gate • Setup RC Gate Confirm • Remote Communication Gate proxy Server Remote Communication Gate proxy Server proxy Address Port Number User Name Password ❖ Webpage • Download Help File OS language Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ Device Properties • Reset Device • Reset Current Job • Reset All Jobs ❖ User Management Tool The following settings can be specified. • User Page Count • Access Control List • Reset User Counters 8 183 Appendix Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Interface Settings • Network All the settings can be specified. • IEEE 802.11b *1 All the settings can be specified. Note ❒ If DHCP is set to [On], the settings that are automatically obtained via DHCP cannot be specified. *1 The IEEE802.11b interface unit option must be installed. ❖ File Transfer • SMTP Server Server Name Port No. • E-mail Communication Port POP3 IMAP4 • E-mail Reception Interval • Scanner Resend Interval Time • Number of Scanner Recsends • Auto Specify Sender Name • Max. Reception E-mail size • E-mail Storage in Server 8 184 ❖ Administrator Tools • Administrator Authentication Management Network Management • Program / Change Administrator Network Administrator You can specify the user name and change the full-control user’s authority. • Extended Security Driver Encryption Key Settings by SNMP V1 and V2 Restrict Use of Simple Encryption • Network Security Level Network Administrator Settings Scanner Features The following settings can be specified. ❖ Send Settings • Max. E-mail Size • Divide & Send E-mail Extended Feature Setting Menu The following settings can be specified. ❖ Extended Feature Settings • Startup Setting • Install • Uninstall • Change Allocation • Extended Feature Info ❖ GL/2 & TIFF • General Settings All the settings can be specified. • GL/2 Print Settings All the settings can be specified. 8 ❖ TIFF / CALS Settings • All the settings can be specified. 185 Appendix Settings via Web Image Monitor The following settings can be specified. ❖ Device Settings • System Device Name Comment Location • E-mail All the settings can be specified. • Auto E-mail Notification Groups to Notify • Program/Change Administrator You can specify the following administrator settings for the machine administrator. Login User Name Login Password Change Encryption Password • Administrator Authentication Management Network Administrator Authentication Available Settings for Network Administrator ❖ Interface • Change Interface • Wireless LAN *1 Communication Mode SSID Channel Security Type 8 *1 186 The IEEE802.11b interface unit option must be installed. Network Administrator Settings ❖ Network • IPv4 All the settings can be specified. • IPv6 All the settings can be specified. • NetWare All the settings can be specified. • AppleTalk All the settings can be specified. • SMB All the settings can be specified. • SNMP All the settings can be specified. • SNMPv3 All the settings can be specified. • SSDP All the settings can be specified. • Bonjour Bonjour Computer Name Location Print Order Priority (DIPRINT) Print Order Priority (LPR) Print Order Priority (IPP) 8 ❖ Webpage All the settings can be specified. ❖ Security • Network Security All the settings can be specified. • Access Control All the settings can be specified. • IPP Authentication All the settings can be specified. • SSL/TLS All the settings can be specified. • ssh All the settings can be specified. • Site Certificates All the settings can be specified. • Device Certificates All the settings can be specified. 187 Appendix Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ NIB Setup Tool All the settings can be specified. 8 188 File Administrator Settings File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management File Management • Program / Change Administrator File Administrator • Extended Security Enhance File Protection • Auto Delete File in Document Server • Delete All Files in Document Server Printer Features The following settings can be specified. ❖ Maintenance • Delete All Temporary Print Jobs • Delete All Stored Print Jobs 8 ❖ System • Auto Delete Temporary Print Jobs • Auto Delete Stored Print Jobs 189 Appendix Extended Feature Setting Menu The following settings can be specified. ❖ Extended Feature Settings • Startup Setting • Install • Uninstall • Change Allocation • Extended Feature Info ❖ GL/2 & TIFF • General Settings All the settings can be specified. • GL/2 Print Settings All the settings can be specified. ❖ TIFF / CALS Settings • All the settings can be specified. 8 190 File Administrator Settings Settings via Web Image Monitor The following settings can be specified. ❖ Top Page Reset Printer Job ❖ Document Server All the settings can be specified. ❖ Printer: Print Jobs • Printer Print Jobs *1 *1 The file administrator can select [Delete], [Delete Password], and [Unlock Job]. The file administrator cannot print files. ❖ Device Settings • Auto E-mail Notification Groups to Notify • Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator • Program/Change Administrator You can specify the following administrator settings for the file administrator. Login User Name Login Password Change Encryption Password • Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator 8 ❖ Printer • Auto Delete Temporary Print Jobs • Auto Delete Stored Print Jobs ❖ Webpage • Download Help File 191 Appendix User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management User Management • Program / Change Administrator User Administrator • Extended Security Restrict Use of Destinations Restrict Adding of User Destinations Encrypt Address Book Password Policy • Print Address Book: Destination List • Address Book Management • Address Book: Program / Change / Delete Group • Address Book: Program / Change / Delete Transfer Request • Address Book: Change Order • Address Book: Edit Title • Address Book: Switch Title 8 192 User Administrator Settings Extended Feature Setting Menu The following settings can be specified. ❖ Extended Feature Settings • Startup Setting • Install • Uninstall • Change Allocation • Extended Feature Info ❖ GL/2 & TIFF • General Settings All the settings can be specified. • GL/2 Print Settings All the settings can be specified. ❖ TIFF / CALS Settings • All the settings can be specified. 8 193 Appendix Settings via Web Image Monitor The following settings can be specified. ❖ Address Book All the settings can be specified. ❖ Device Settings • Auto E-mail Notification Groups to Notify • Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator • Program/Change Administrator The user administrator settings that can be specified are as follows: Login User Name Login Password Change Encryption Password ❖ Webpage • Download Help File ❖ Extended Feature Settings • Startup Settings • Extended Feature Info • Install • Uninstall • Change Allocation • Administrator Tools • Copy Extended Features 8 Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ Address Management Tool All the settings can be specified. ❖ User Management Tool • Restrict Access To Device • Add New User • Delete User • User Properties 194 Document Server File Permissions Document Server File Permissions The authorities for using the files stored in Document Server are as follows: The authority designations in the list indicate users with the following authorities. • Read-only This is a user assigned "Read-only" authority. • Edit This is a user assigned "Edit" authority. • Edit / Delete This is a user assigned "Edit / Delete" authority. • Full Control This is a user granted full control. • Owner This is a user who can store files in the machine and authorize other users to view, edit, or delete those files. • File Administrator This is the file administrator. ❍ =Granted authority to operate. - =Not granted authority to operate. User Viewing Details about Stored Files Print/ ViewTransing Thumb- mission nails Changing Information about Stored Files Deleting Files Specifying File Password Specify- Unlocking ing Permis- Files sions for Users/ Groups Readonly ❍ ❍ ❍ - - - - - Edit ❍ ❍ ❍ ❍ - - - - Edit / Delete ❍ ❍ ❍ ❍ ❍ - - - Full Control ❍ ❍ ❍ ❍ ❍ - ❍ - Owner ❍ *1 ❍ *1 ❍ *1 ❍ *1 ❍ *1 ❍ ❍ - File Administrator ❍ ❍ - - ❍ ❍ ❍ ❍ *1 8 This setting can be specified by the owner. 195 Appendix The Privilege for User Account Settings in the Address Book The authorities for using the address book are as follows: The authority designations in the list indicate users with the following authorities. • Read-only This is a user assigned "Read-only" authority. • Edit This is a user assigned "Edit" authority. • Edit / Delete This is a user assigned "Edit / Delete" authority. • Full Control This is a user granted full control. • Registered User There are users with personal information registered in the address book have a ligin password and user name. • User Administrator This is the user administrator. 8 196 The Privilege for User Account Settings in the Address Book ❍ =You can view and change the setting. U =You can view the setting. - =You cannot view or specify the setting. Settings User Readonly Edit Edit / Delete RegisUser Adminis- tered User trator Full Control Registration No. U ❍ ❍ ❍ ❍ ❍ Key Display U ❍ ❍ ❍ ❍ ❍ Name U ❍ ❍ ❍ ❍ ❍ Select Title U ❍ ❍ ❍ ❍ ❍ User Code - - - ❍ - - Login User Name - - - ❍ ❍ - Login Password - - - ❍ *1 ❍ *1 - SMTP Authentication - - - ❍ *1 ❍ *1 - Folder Authentication U ❍ ❍ ❍ ❍ - LDAP Authentication - - - ❍ *1 ❍ *1 - Available Functions - - - ❍ U - Use Name as U U U ❍ ❍ U Protection Code - - - ❍ *1 ❍ *1 - Protection Object U U U ❍ ❍ U Protect Dest.: Permissions for Users/ Groups - - - ❍ ❍ ❍ Protect File(s): Permissions for Users/ Groups - - - ❍ ❍ ❍ Auth. Info Protection 8 197 Appendix Settings User Readonly 198 Edit / Delete RegisUser Adminis- tered User trator Full Control E-mail Address E-mail Address U ❍ ❍ ❍ ❍ ❍ Folder Destination SMB/ FTP/NCP U ❍ ❍ ❍ ❍ ❍ SMB: Path U ❍ ❍ ❍ ❍ ❍ FTP: Port No. U ❍ ❍ ❍ ❍ ❍ FTP: Server Name U ❍ ❍ ❍ ❍ ❍ FTP: Path U ❍ ❍ ❍ ❍ ❍ NCP: Path U ❍ ❍ ❍ ❍ ❍ NCP: Connection type U ❍ ❍ ❍ ❍ ❍ *1 8 Edit You can only enter the password. User Settings User Settings If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. ❍ =You can view and change the setting. U =You can view the setting. - =You cannot view or specify the setting. Note ❒ Settings that are not in the list can only be viewed, regardless of the menu protect level setting. 8 199 Appendix Copier / Document Server Features The default for [Menu Protect] is [Level 2]. Tab Names Settings Menu Protect Off General Features Auto Image Density Priority Reproduction Ratio Edit 8 200 Level 1 Level 2 ❍ U U Copy Quality ❍ ❍ U Image Density ❍ ❍ U Max. Copy Quantity ❍ U U Auto Tray Switching ❍ U U Job End Call ❍ U U User Reduce / Enlarge Ratio ❍ U U Reproduction Ratio ❍ U U Reduce / Enlarge Ratio Priority ❍ U U User Auto Reduce / Enlarge A0–A4 ❍ U U User Auto Reduce / Enlarge B1–B4 ❍ U U Adjust Position ❍ U U Erase Border Width ❍ U U Erase Original Shadow in Combine ❍ ❍ U Image Repeat Separation Line ❍ ❍ U Double Copies Separation Line ❍ ❍ U Separation Line in Combine ❍ ❍ U Copy Order in Combine ❍ ❍ U Program / Delete Format ❍ ❍ U Margin Adjustment Priority ❍ U U Partial Copy Size ❍ U U User Settings Tab Names Settings Menu Protect Off Stamp Level 1 Level 2 BackSize ground Density Numbering ❍ ❍ U ❍ ❍ U Preset Stamp ❍ ❍ U ❍ U U ❍ ❍ U ❍ ❍ U ❍ ❍ U ❍ ❍ U ❍ ❍ U ❍ ❍ U Stamp Language Stamp Priority Stamp Format: COPY *1 Stamp Format: URGENT *1 Stamp Format: PRIORITY *1 Stamp Format: For Your Info. *1 Stamp Format: PRELIMINARY *1 Stamp Format: For Internal Use Only ❍ ❍ U *1 ❍ ❍ U Program / Delete Stamp ❍ ❍ U Stamp Format: 1 ❍ ❍ U Stamp Format: 2 ❍ ❍ U Stamp Format: 3 ❍ ❍ U Stamp Format: 4 ❍ ❍ U Format ❍ U U Font ❍ ❍ U Size ❍ ❍ U Superimpose ❍ ❍ U Stamp Setting *1 ❍ ❍ U Stamp Format: CONFIDENTIAL Stamp Format: DRAFT User Stamp Date Stamp *1 *1 8 201 Appendix Tab Names Settings Menu Protect Off Stamp Page Numbering Stamp Format ❍ U U Font ❍ ❍ U Size ❍ ❍ U Page Numbering in Combine ❍ ❍ U Stamp Position: P1, P2… *1 ❍ ❍ U Stamp Position: 1/5, 2/5… *1 ❍ ❍ U Stamp Position: -1-, -2-… *1 ❍ ❍ U Stamp Position: P.1,P.2... *1 ❍ ❍ U ❍ ❍ U ❍ ❍ U Superimpose ❍ ❍ U Page Numbering Initial Letter ❍ ❍ U Rotate Sort: Auto Paper Continue ❍ U U Stamp Position: 1, 2… *1 Stamp Position: 1-1, 1-2… Input / Output *1 Level 1 Level 2 *1 You can adjust the print position but not specify it. Printer Functions The default for [Menu Protect] is [Level 2]. 8 ❖ Normal Printer Screen Functions Menu Protect Off 202 Level 1 Level 2 Print Jobs ❍ ❍ ❍ Displaying a list of Spool Jobs ❍ ❍ ❍ User Settings ❖ Printer Features Tab Names Settings Menu Protect Off Maintenance List/Test Print System Host Interface PS Menu PDF Menu Level 1 Level 2 Delete All Temporary Print Jobs - - - Delete All Stored Print Jobs - - - Multiple Lists ❍ ❍ ❍ Configuration Page ❍ ❍ ❍ Error log ❍ ❍ ❍ Menu List ❍ ❍ ❍ PS Configuration / Front Page ❍ ❍ ❍ PDF Configuration / Front Page ❍ ❍ ❍ Hex Dump ❍ ❍ ❍ Print Error Report ❍ U U Auto Continue ❍ U U Memory Overflow ❍ U U Rotate by 180 Degrees ❍ U U Auto Delete Temporary Print Jobs ❍ U U Auto Delete Stored Print Jobs ❍ U U Initial Print Job List ❍ U U Memory Usage ❍ U U Copies ❍ U U Blank Page Print ❍ U U Reserved Job Waiting Time ❍ U U Printer Language ❍ U U Sub Paper Size ❍ U U Bypass Tray Setting Priority ❍ U U Edge to Edge Print ❍ U U Default Printer Language ❍ U U Tray Switching ❍ U U I/O Buffer ❍ U U I/O Timeout ❍ U U Data Format ❍ U U Resolution ❍ U U Change PDF Password ❍ U U PDF Group Password ❍ U U Resolution ❍ U U 8 203 Appendix Scanner Features The default for [Menu Protect] is [Level 2]. Tab Names Settings Menu Protect Off General Settings 8 204 Level 1 Level 2 Switch Title ❍ U Update Delivery Server Destination List ❍ ❍ - Search Destination ❍ U U TWAIN Standby Time ❍ U U Destination List Display Priority 1 ❍ U U Destination List Display Priority 2 ❍ U U Print & Delete Scanner Journal ❍ U U Print Scanner Journal ❍ - - Delete Scanner Journal ❍ - - U Scan Settings Next Original Wait Setting ❍ U U Send Settings Compression (Black & White) ❍ ❍ U Insert Additional E-mail Info. ❍ ❍ U No. of Digits for Single Page File ❍ ❍ U Stored File E-mail Method ❍ ❍ U User Settings System Settings The settings available to the user depend on whether or not administrator authentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Tab Names Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Availa"Available Setble Settings" has tings" has been not been specified. specified. ❍ ❍ U Panel Key Sound ❍ ❍ U Warm-up Beeper ❍ ❍ U Copy Count Display ❍ ❍ U Function Priority ❍ ❍ U Print Priority ❍ ❍ U Function Reset Timer ❍ ❍ U Interleave Print ❍ ❍ U Output: Printer ❍ ❍ U Original Feed Delay 1 ❍ ❍ U Original Feed Delay 2 ❍ ❍ U Feed Start Method ❍ ❍ U Fine Ratio Adjustment : Copier ❍ ❍ U Fine Ratio Adjustment : Printer ❍ ❍ U Adjust Scan Position ❍ ❍ U System Status / Job List Display Time ❍ ❍ U Key Repeat ❍ ❍ U General Features Program / Change / Delete User Text 8 205 Appendix Tab Names Tray Paper Settings Timer Settings 8 Interface Settings Network Administrator authentication has not been specified. Settings "Availa"Available Setble Settings" has tings" has been not been specified. specified. Paper Tray Priority: Copier ❍ ❍ U Paper Tray Priority: Printer ❍ ❍ U Tray Paper Size: Tray 1-3 ❍ ❍ U Printer Bypass Paper Size ❍ ❍ U Paper Type: Paper Bypass ❍ ❍ U Paper Type: Tray 1-3 ❍ ❍ U Paper Thickness : Paper Tray ❍ ❍ U Paper Thickness : Paper Bypass ❍ ❍ U Paper Volume ❍ ❍ U Auto Off Timer ❍ ❍ U Energy Saver Timer ❍ ❍ U Panel Off Timer ❍ ❍ U System Auto Reset Timer ❍ ❍ U Copier/ Document Server Auto Reset Timer ❍ ❍ U Printer Auto Reset Timer ❍ ❍ U Scanner Auto Reset Timer ❍ ❍ U Set Date ❍ ❍ U Set Time ❍ ❍ U Auto Logout Timer ❍ ❍ U Machine IPv4 Address *1 ❍ ❍ U IPv4 Gateway Address ❍ ❍ U ❍ ❍ U IPv6 Gateway Address ❍ ❍ U IPv6 Stateless Address Autoconfiguration ❍ ❍ U *1 ❍ ❍ U DDNS Configuration ❍ ❍ U ❍ ❍ U ❍ ❍ U Effective Protocol ❍ ❍ U NCP Delivery Protocol ❍ ❍ U Machine IPv6 Address DNS Configuration Domain Name *1 WINS Configuration 206 Administrator authentication has been specified. *1 *1 User Settings Tab Names Interface Settings Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Availa"Available Setble Settings" has tings" has been not been specified. specified. NW Frame Type ❍ ❍ U SMB Computer Name ❍ ❍ - SMB Work Group ❍ ❍ - Ethernet Speed ❍ ❍ U LAN Type ❍ ❍ U Ping Command ❍ ❍ U Permit SNMP v3 Communication ❍ ❍ U Permit SSL / TLS Communication ❍ ❍ U Host Name ❍ ❍ - Machine Name ❍ ❍ - Parallel Timing ❍ ❍ U Parallel Communication Speed ❍ ❍ U Selection Signal Status ❍ ❍ U Input Prime ❍ ❍ U Bidirectional Communication ❍ ❍ U Signal Control ❍ ❍ U Communication Mode IEEE 802.11b Transmission Speed *5 ❍ ❍ U ❍ ❍ U SSID Setting ❍ ❍ U Restore Factory Defaults ❍ ❍ - Channel ❍ ❍ U Security Method ❍ ❍ U ❍ ❍ U Network Parallel Interface *7 Print List 8 207 Appendix Tab Names File Transfer Administrator authentication has not been specified. Settings ❍ U ❍ ❍ U ❍ ❍ U POP before SMTP ❍ ❍ U Reception Protocol ❍ ❍ U POP3 / IMAP4 Settings ❍ ❍ U Administrator's E-mail Address ❍ ❍ - E-mail Communication Port ❍ ❍ U E-mail Reception Interval ❍ ❍ U Max. Reception E-mail Size ❍ ❍ U ❍ ❍ U SMTP Authentication *4 E-mail Storage in Server ❍ ❍ U Program / Change / Delete E-mail Message ❍ ❍ U Auto Specify Sender Name ❍ ❍ U Scanner Resend Interval Time ❍ ❍ U Number of Scanner Resends ❍ ❍ U Address Book Management ❍ ❍ U Address Book: Program / Change / Delete Group ❍ ❍ U Address Book: Change Order ❍ ❍ U Print Address Book: Destination List ❍ ❍ U Address Book: Edit Title ❍ ❍ U Address Book: Switch Title ❍ ❍ U Back Up / Restore Address Book ❍ ❍ U Display / Print Counter ❍ ❍ U Display / Clear / Print Counter per User ❍ ❍ U User Authentication Management ❍ ❍ U Administrator Authentication Management ❍ ❍ U Key Counter Management ❍ ❍ U External Charge Unit Management ❍ ❍ U Enhanced External Charge Unit Management ❍ ❍ U Default User Name / Password (Send) Administrator Tools 208 "Availa"Available Setble Settings" has tings" has been not been specified. specified. ❍ Delivery Option *3 SMTP Server 8 Administrator authentication has been specified. *4 User Settings Tab Names Administrator Tools Administrator authentication has not been specified. Settings ❍ ❍ U Auto Delete File in Document Server ❍ ❍ U Delete All Files in Document Server ❍ ❍ - *6 ❍ ❍ U ❍ ❍ U Program / Change / Delete LDAP Server *4 ❍ ❍ U LDAP Search ❍ ❍ U Firmware Version ❍ ❍ U Auto Erase Memory Setting *8 ❍ ❍ U Erase All Memory *8 ❍ ❍ U Transfer Log Setting ❍ ❍ U Fixed USB Port ❍ ❍ U Capture: Delete All Unsent Files *2 *3 *4 *5 *6 *7 *8 "Availa"Available Setble Settings" has tings" has been not been specified. specified. Extended Security Capture Priority *1 Administrator authentication has been specified. *6 If you select [Auto-Obtain (DHCP)], you can only view the setting. You can only view the encryption setting. You can only view Main Delivery Server IP Address and Sub Delivery Server IP Address. You can only specify the password. The IEEE802.11b interface unit option must be installed. File Format Converter option must be installed. The IEEE 1284 interface board option must be installed. The data overwrite security unit option must be installed. 8 209 Appendix Web Image Monitor Setting ❖ Device Settings The settings available to the user depend on whether or not administrator authentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category System 8 Paper 210 Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. Device Name ❍ ❍ U Comment ❍ ❍ U Location ❍ ❍ U Spool Printing ❍ ❍ U Protect Printer Display Panel ❍ - - Print Priority ❍ - - Function Reset Timer ❍ - - Permit Firmware Update ❍ - - Display IP Adress on Display Panel ❍ - - Paper Tray Priority : Copier ❍ ❍ U Paper Tray Priority : Printer ❍ ❍ U Tray1 - Paper Size ❍ ❍ U Tray1 - Paper Type ❍ ❍ U Tray1 - Apply Auto Paper Select ❍ ❍ U Tray2 - Paper Size ❍ ❍ U Tray2 - Paper Type ❍ ❍ U Tray2 - Apply Auto Paper Select ❍ ❍ U Tray3 - Paper Size ❍ ❍ U Tray3 - Paper Type ❍ ❍ U Tray3 - Apply Auto Paper Select ❍ ❍ U Bypass Tray - Paper Size ❍ ❍ U Bypass Tray - Custom Paper Size ❍ ❍ U Bypass Tray - Paper Type ❍ ❍ U User Settings Category Date/Time Timer Logs Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. Set Date ❍ ❍ U Set Time ❍ ❍ U SNTP Server Address ❍ ❍ U SNTP Polling Interval ❍ ❍ U Time Zone ❍ ❍ U Auto Off Timer ❍ ❍ U Energy Saver Timer ❍ ❍ U Panel Off Timer ❍ ❍ U System Auto Reset Timer ❍ ❍ U Copier/ Document Server Auto Reset Timer ❍ ❍ U Scanner Auto Reset Timer ❍ ❍ U Printer Auto Reset Timer ❍ ❍ U Auto Logout Timer ❍ ❍ U Collect Job Logs ❍ ❍ U Collect Access Logs ❍ ❍ U 8 211 Appendix Category E-mail 8 212 Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. Administrator E-mail Address ❍ ❍ U Reception Protocol ❍ ❍ U E-mail Reception Interval ❍ ❍ U Max. Reception E-mail Size ❍ ❍ U E-mail Storage in Server ❍ ❍ U SMTP Server Name ❍ ❍ U SMTP Port No. ❍ ❍ U SMTP Authentication ❍ ❍ U SMTP Auth. E-mail Address ❍ ❍ U SMTP Auth. User Name ❍ ❍ - SMTP Auth. Password *1 ❍ ❍ - SMTP Auth. Encryption ❍ ❍ U POP before SMTP ❍ ❍ U POP E-mail Address ❍ ❍ U POP User Name ❍ ❍ - POP Password *1 ❍ ❍ - Timeout setting after POP Auth. ❍ ❍ U POP3/IMAP4 Server Name ❍ ❍ U POP3/IMAP4 Encryption ❍ ❍ U POP3 Reception Port No. ❍ ❍ U IMAP4 Reception Port No. ❍ ❍ U SMTP Reception Port No. ❍ ❍ U E-mail Notification E-mail Address ❍ ❍ U Receive E-mail Notification ❍ ❍ - E-mail Notification User Name ❍ ❍ - E-mail Notification Password ❍ ❍ - User Settings Category Auto E-mail Notification On-demand E-mail Notification File Transfer Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. Notification Message ❍ ❍ U Group 1–4 Address List ❍ ❍ U Call Service ❍ ❍ U Out of Toner ❍ ❍ U Toner Almost Empty ❍ ❍ U Waste Toner Bottle is Full ❍ ❍ U Waste Toner Bottle is Almost Full ❍ ❍ U Paper Misfeed ❍ ❍ U Cover Open ❍ ❍ U Out of Paper ❍ ❍ U Paper Tray Error ❍ ❍ U Output Tray Full ❍ ❍ U Detailed Settings of Each Item ❍ ❍ U Notification Subject ❍ ❍ U Notification Message ❍ ❍ U Restriction to System Config. Info. ❍ ❍ U Restriction to Network Config. Info. ❍ ❍ U Restriction to Printer Config. Info. ❍ ❍ U Restriction to Supply Info. ❍ ❍ U Restriction to Device Status Info. ❍ ❍ U Receivable E-mail Address/Domain Name ❍ ❍ U E-mail Language ❍ ❍ U SMB User Name ❍ ❍ - SMB Password *1 ❍ ❍ - FTP User Name ❍ ❍ - *1 ❍ ❍ - NCP User Name ❍ ❍ - NCP Password *1 ❍ ❍ - FTP Password 8 213 Appendix Category User Authentication Management 8 *1 214 Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. User Authentication Management ❍ ❍ U User Code Authentication - Printer Job Authentication ❍ ❍ U User Code - Available Functions ❍ ❍ U Basic Authentication - Printer Job Authentication ❍ ❍ U Basic Authentication - Available Functions ❍ ❍ U Windows Authentication - Printer Job Authentication ❍ ❍ U Windows Authentication - Domain Name ❍ ❍ U Windows Authentication - Group Settings for Windows Authentication ❍ ❍ U Windows Authentication - SSL ❍ ❍ U LDAP Authentication - Printer Job Authentication ❍ ❍ U LDAP Authentication - LDAP Authentication ❍ ❍ U LDAP Authentication - Login Name Attribute ❍ ❍ U LDAP Authentication - Unique Attribute ❍ ❍ U LDAP Authentication - Available Functions ❍ ❍ U Integration Server Authentication - Printer Job Authentication ❍ ❍ U Integration Server Authentication - SSL ❍ ❍ U Integration Server Authentication - Integration Server Name ❍ ❍ U Integration Server Authentication - Authentication Type ❍ ❍ U Integration Server Authentication - Obtain URL ❍ ❍ U Integration Server Authentication - Domain Name ❍ ❍ U Integration Server Authentication - Group Settings for Integration Server Authentication ❍ ❍ U You can only specify the password. User Settings ❖ Printer The default for [Menu Protect] is [Level 2]. Category Settings Menu Protect System Print Error Report ❍ U U Auto Continue ❍ U U Memory Overflow ❍ U U Memory Usage ❍ U U Auto Delete Temporary Print Job ❍ U U Auto Delete Stored Print Job ❍ U U Initial Print Job List ❍ U U Rotate By 180 Degrees ❍ U U Copies ❍ U U Blank Page Print ❍ U U Reserved Job Waiting Time ❍ U U Printer Language ❍ U U Sub Paper Size ❍ U U Default Printer Language ❍ U U Bypass Tray Setting Priority ❍ U U Edge to Edge Print ❍ U U Off Level 1 Level 2 Tray Switching ❍ U U Host Interface I/O Buffer ❍ U U I/O Timeout ❍ U U PS Settings Data Format ❍ U U Resolution ❍ U U PDF Settings Resolution ❍ - - PDF Temporary Password ❍ ❍ ❍ PDF Temporary Password ❍ ❍ ❍ PDF Group Password Current PDF Group Password ❍ - - PDF Fixed Password New PDF Group Password ❍ - - Confirm PDF Group Password ❍ - - Current PDF Fixed Password ❍ - - New PDF Fixed Password ❍ - - Confirm PDF Fixed Password ❍ - - 8 215 Appendix ❖ Interface The settings available to the user depend on whether or not administrator authentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. Network Change Interface U U - Wireless LAN Setting *1 Change Interface ❍ ❍ - 8 Parallel Interface *2 USB *1 *2 216 Settings Communication Mode ❍ ❍ U SSID ❍ ❍ U Channel ❍ ❍ U Security Type - - U WEP Authentication ❍ ❍ U WEP Key ❍ ❍ U WPA - PSK / WPA2 - PSK ❍ ❍ U WPA / WPA2 User Name ❍ ❍ U WPA / WPA2 Domain Name ❍ ❍ U WPA Cliant Certification U U - Password - - - Phase 2 User Name - - - Server ID ❍ ❍ U Parallel Timing ❍ ❍ U Parallel Communication Speed ❍ ❍ U Selection Signal Status ❍ ❍ U Input Prime ❍ ❍ U Bidirectional Communication ❍ ❍ U USB ❍ ❍ U The IEEE802.11b interface unit option must be installed. The IEEE 1284 interface board option must be installed. User Settings ❖ Network The settings available to the user depend on whether or not administrator authentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category IPv4 Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. IPv4 ❍ ❍ U Host Name ❍ ❍ U DHCP ❍ ❍ U Domain Name ❍ ❍ U IPv4 Address ❍ ❍ U Subnet Mask ❍ ❍ U DDNS ❍ ❍ U WINS ❍ ❍ U Primary WINS Server ❍ ❍ U Secondary WINS Server ❍ ❍ U Scope ID ❍ ❍ U Default Gateway Address ❍ ❍ U DNS Server ❍ ❍ U LPR ❍ ❍ U RSH/RCP ❍ ❍ U DIPRINT ❍ ❍ U FTP ❍ ❍ U sftp ❍ ❍ U IPP ❍ ❍ U IPP Timeout ❍ ❍ U 8 217 Appendix Category IPv6 8 NetWare AppleTalk 218 Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. IPv6 ❍ ❍ U Host Name ❍ ❍ U Domain Name ❍ ❍ U Stateless Address Autoconfiguration ❍ ❍ U Manual Configuration Address ❍ ❍ U Default Gateway Address ❍ ❍ U DDNS ❍ ❍ U DNS Server ❍ ❍ U LPR ❍ ❍ U RSH/RCP ❍ ❍ U DIPRINT ❍ ❍ U FTP ❍ ❍ U sftp ❍ ❍ U IPP ❍ ❍ U IPP Timeout ❍ ❍ U NetWare ❍ ❍ U Print Server Name ❍ ❍ U Logon Mode ❍ ❍ U File Server Name ❍ ❍ U NDS Tree ❍ ❍ U NDS Context Name ❍ ❍ U Operation Mode ❍ ❍ U Remote Printer No. ❍ ❍ U Job Timeout ❍ ❍ U Frame Type ❍ ❍ U Print Server Protocol ❍ ❍ U NCP Delivery Protocol ❍ ❍ U AppleTalk ❍ ❍ U Printer Name ❍ ❍ U Zone Name ❍ ❍ U User Settings Category SMB SNMP SNMPv3 Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. SMB ❍ ❍ U Workgroup Name ❍ ❍ U Computer Name ❍ ❍ U Comment ❍ ❍ U Notify Print Completion ❍ ❍ U SNMP ❍ - - IPv4 ❍ - - IPv6 ❍ - - IPX ❍ - - SNMPv1 / v2 Function ❍ - - SNMPv1 Trap Communication ❍ - - SNMPv2 Trap Communication ❍ - - Permit Settings by SNMPv1 and v2 ❍ - - Community ❍ - - SNMP ❍ - - IPv4 ❍ - - IPv6 ❍ - - IPX ❍ - - SNMPv3 Function ❍ - - SNMPv3 Trap Communication ❍ - - Context Name U - - Authentication Algorithm ❍ - - Permit SNMPv3 Communication ❍ - - SNMPv3 Trap Communication Setting ❍ - - Account Name (User) ❍ - - Authentication Password (User) ❍ - - Encryption Password (User) ❍ - - Access Type (User) ❍ - - Access Type (Network Administrator) ❍ - - Access Type (Machine Administrator) ❍ - - 8 219 Appendix Category Bonjour 8 220 Settings Administrator authentication has not been specified. Administrator authentication has been specified. "Available Settings" has not been specified. "Available Settings" has been specified. Bonjour ❍ ❍ U Computer Name ❍ ❍ U Location ❍ ❍ U DIPRINT ❍ ❍ U LPR ❍ ❍ U IPP ❍ ❍ U Functions That Require Options Functions That Require Options The following functions require certain options and additional functions. • Hard Disk overwrite erases function DataOverwriteSecurity unit 8 221 INDEX A Access Control, 133 Access Permission, 88 Address Book, 194 Address Management Tool, 194 Administrator, 4 Administrator Authentication, 4 Administrator Tools, 177, 178, 184, 189, 192 AppleTalk, 187 Authenticate Current Job, 158 Authentication and Access Limits, 3 Auto Erase Memory Setting, 111 Available Functions, 125 B Bonjour, 187 C Configuration flow (certificate issued by a certificate authority), 143 Configuration flow (self-signed certificate), 143 D Device Properties, 183 Device Settings, 181, 186, 191, 194, 210 Document Server, 191 Driver Encryption Key, 137, 138, 155 E Edit, 178, 195, 196 Edit / Delete, 195, 196 Encrypt Address Book, 155 Encrypted Communication Mode, 149 Encryption Technology, 3 Enhance File Protection, 156 Erase All Memory, 111 Extended Feature Setting Menu, 180, 185, 190, 193 F File Administrator, 12, 121, 195 File Creator (Owner), 4 File Transfer, 176, 184 Full Control, 195, 196 222 G General Features, 176, 178 General Settings, 180 Group Passwords for PDF Files, 137 H Host Interface, 179 I Initial Settings, 180 Input / Output, 178 Interface, 216 Interface Settings, 182, 184, 186 IPv4, 187 IPv6, 187 J Job, 191 L List / Test Print, 179 Locked Print, 81 Login, 4 Logout, 4 M Machine Administrator, 12, 121 Maintenance, 179, 189 Menu Protect, 121, 122 Methods of Erasing the Data, 111 N NetWare, 187 Network, 182, 187, 217 Network Administrator, 12, 121 NIB Setup Tool, 188 O Operational Requirements for Windows Authentication, 47 Owner, 195 P Password for IPP Authentication, 137 Password for Stored Files, 88 Password Policy, 158 PDF Menu, 179 Print & Delete Scanner Journal, 160 Printer, 182, 191, 215 Printer Job Authentication, 71 PS Menu, 179 R RC Gate, 183 Read-only, 195, 196 Registered User, 4, 196 @Remote Service, 159 Reproduction Ratio, 178 Reset Device, 181 Reset Printer Job, 181 Restrict Adding of User Destinations, 156 Restrict Display of User Information, 156 Restrict Use of Destinations, 155 Restrict Use of Simple Encryption, 157 T Timer Settings, 176 Top Page, 181, 191 Tray Paper Settings, 176 Type of Administrator, 121 U User, 4 User Administrator, 12, 121, 196 User Authentication, 4 User Management Tool, 183 W Webpage, 183, 187, 191, 194 S Scan Settings, 180 Security, 187 Send Settings, 180, 185 Service Mode Lock, 161 Settings by SNMPv1 and v2, 157 SMB, 187 SNMP, 187 SNMPv3, 187 SSDP, 187 SSL (Secure Sockets Layer), 142 Stamp, 178 Supervisor, 12 System, 179, 189 System Settings, 184 223 MEMO 224 MEMO 225 MEMO 226 GB GB B286-7900 Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81% Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its completeness or accuracy. If you have any questions concerning the legality of copying or printing certain items, consult with your legal advisor. Important Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. Trademarks Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. AppleTalk, EtherTalk, are registered trademarks of Apple Computer, Inc. Bonjour is a trademark of Apple Computer Inc. PostScript® and Acrobat® are registered trademarks of Adobe Systems, Incorporated. NetWare is a registered trademarks of Novell, Inc. Other product names used herein are for identification purposes only and might be trademarks of their respective companies. We disclaim any and all rights to those marks. The proper names of the Windows operating systems are as follows: • The product name of Windows® 95 is Microsoft® Windows 95. • The product name of Windows® 98 is Microsoft® Windows 98. • The product name of Windows® Me is Microsoft® Windows Millennium Edition (Windows Me). • The product names of Windows® 2000 are as follows: Microsoft® Windows® 2000 Advanced Server Microsoft® Windows® 2000 Server Microsoft® Windows® 2000 Professional • The product names of Windows® XP are as follows: Microsoft® Windows® XP Professional Microsoft® Windows® XP Home Edition • The product names of Windows Server® 2003 are as follows: Microsoft® Windows Server® 2003 Standard Edition Microsoft® Windows Server® 2003 Enterprise Edition Microsoft® Windows Server® 2003 Web Edition • The product names of Windows NT® 4.0 are as follows: Microsoft® Windows NT® Server 4.0 Microsoft® Windows NT® Workstation 4.0 Notes Some illustrations in this manual might be slightly different from the machine. Certain options might not be available in some countries. For details, please contact your local dealer. Two kinds of size notation are employed in this manual. With this machine refer to the metric version. Copyright © 2006 Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81% Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm Operating Instructions Security Reference Operating Instructions Security Reference Printed in the Netherlands GB GB B286-7900 Operating Instructions Security Reference 1 Getting Started 2 Authentication and its Application 3 Preventing Information Leaks 4 Managing Access to the Machine 5 Enhanced Network Security 6 Specifying the Extended Security Functions 7 Troubleshooting 8 Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine" before using the machine. * &$%'
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project