Sindoh D310 SERIES User Manual
Hide thumbs Also See for D310 SERIES:
Table of Contents

Advertisement

D310 Series
USER MANUAL/Web Management Tool
Before using this Product, please read the
USER MANUAL carefully and keep it for
your reference.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the D310 SERIES and is the answer not in the manual?

Questions and answers

Summary of Contents for Sindoh D310 SERIES

  • Page 1 D310 Series USER MANUAL/Web Management Tool Before using this Product, please read the USER MANUAL carefully and keep it for your reference.
  • Page 2: Table Of Contents

    Table of contents Web Connection Web Connection ..........................1-2 Operating environment ........................1-2 Operations Required to Use Web Connection Configuring network environment settings.................. 2-2 Overview .............................2-2 Assigning an IP address ........................2-2 Confirming the IP address ........................2-3 Confirming Web browser settings....................2-4 Basic Usage How to access..........................
  • Page 3 Assigning an IP address ........................5-2 Registering the DNS server used by this machine ................5-3 Registering the host name ........................5-3 Registering the domain name ......................5-3 Using in the IPv6 environment ....................... 5-4 Using this Machine in a Wireless Network Environment ............5-5 Overview .............................5-5 Setting a network interface configuration ...................5-5 Configuring the basic settings for TCP/IP ..................5-5...
  • Page 4 Using SSL communication .......................7-20 Configuring the Printing Environment Configuring the LPR printing environment................... 8-2 Overview .............................8-2 Enabling LPD ............................8-2 Configuring the Port9100 printing environment................8-3 Overview .............................8-3 Changing the RAW port number......................8-3 Configuring the SMB printing environment.................. 8-4 Overview .............................8-4 Configure basic settings for the SMB printing..................8-4 Using the WINS server........................8-5 Using the direct hosting SMB service....................8-5...
  • Page 5 9.3.4 Using the Memory RX function ......................9-7 9.3.5 Using the Forward TX function ......................9-8 9.3.6 Using the PC-Fax RX Function ......................9-9 9.3.7 Using the TSI Routing function ......................9-9 9.3.8 Restricting PC-FAX transmission......................9-11 Specifying fax report print conditions..................9-12 Restricting Deletions of Received Faxes..................9-14 Configuring the Network Fax Environment 10.1 Configuring the Internet fax environment...................
  • Page 6 function ............................11-15 Deleting all files saved in a User Box using the Scan to URL function...........11-15 Restricting Users from Using this Device 12.1 Overview of User Authentication and Account Track ............... 12-2 User Authentication ..........................12-2 Account Track...........................12-3 Combining user authentication and account track................12-3 12.2 Employing the MFP authentication .....................
  • Page 7 12.16 Configuring common settings when using the authentication function ....... 12-33 12.17 Restricting print jobs without authentication information ............12-34 12.18 Printing without password (Quick authentication) ..............12-35 Overview ............................12-35 Permitting the quick authentication ....................12-35 Registering the quick authentication server..................12-35 Using SSL communication ......................12-36 Setting a secondary authentication server against shutdown of the quick authentication server........................12-37...
  • Page 8 IPv4 address filtering ........................13-11 IPv6 address filtering ........................13-11 13.6 Using IPsec communication ...................... 13-12 13.7 Using the IEEE802.1X authentication..................13-16 13.8 Sending data to the authenticated share folder (Scan to Authorized Folder) ............................13-18 Scan to Authorized Folder ......................13-18 Limiting the direct input of addresses ....................13-18 13.9 Disabling user's operation of registration/change ..............
  • Page 9 Exporting information to your computer ..................14-19 Exporting information to an SMB sharing folder................14-19 14.8.3 Resetting the network settings .......................14-20 14.8.4 Restarting the network interface.....................14-20 14.8.5 Deleting all address information .....................14-20 14.9 Outputting job logs ........................14-21 Operations required to use Closed Network RX................14-21 Downloading job logs ........................14-21 14.10 Backing up Setting Information of this Machine..............
  • Page 10 15.2 Registering a Group........................15-8 15.3 Registering a program........................15-9 15.3.1 Registering an E-mail address program ...................15-9 15.3.2 Registering an FTP program ......................15-9 15.3.3 Registering an SMB program ......................15-10 15.3.4 Registering a WebDAV program .....................15-10 15.3.5 Registering a User Box program ....................15-11 15.3.6 Registering a fax address program....................15-12 15.3.7...
  • Page 11 Enable the Distributed Scan Management ..................16-12 16.8 Associating with the ThinPrint system..................16-13 16.9 Allowing for upload of contents to this machine ..............16-15 16.10 Associating with the remote diagnosis system ............... 16-16 16.10.1 Registering a proxy server used for remote diagnosis ..............16-16 16.10.2 Allowing acquisition of the machine counter ..................16-16 16.10.3...
  • Page 12: Web Connection

    Web Connection...
  • Page 13: Operating Environment

    Web Connection Web Connection Web Connection is a built in utility software product for management use. By using a Web browser on your computer, you can simply confirm the status of this machine and configure various machine settings. Although character input such as address entry and network setting is a difficult process using the touch pan- el, it can be carried out easily if you use the computer.
  • Page 14: Operations Required To Use Web Connection

    Operations Required to Use Web Connection...
  • Page 15: Configuring Network Environment Settings

    Configuring network environment settings Operations Required to Use Web Connection Configuring network environment settings Overview To connect this machine to the network (TCP/IP), follow the procedure below to configure settings. Assigning an IP address to this machine % If this machine has a fixed IP address, enter the IP address, subnet mask, and default gateway. For details, refer to page 2-2.
  • Page 16: Confirming The Ip Address

    Configuring network environment settings Tips When Quick IP Filtering is enabled, you may fail to access Web Connection. If you cannot access Web Connection, set Quick IP Filtering to [No Filtering]. For details on Quick IP Filtering, refer to "User's Guide[Descriptions of Functions/Utility Keys]/[Utility]".
  • Page 17: Confirming Web Browser Settings

    Confirming Web browser settings Confirming Web browser settings The Web Connection page may not be displayed correctly or changed settings may not be applied depend- ing on your Web browser settings. Before using Web Connection, confirm the following settings in the Web browser. JavaScript: Must be enabled.
  • Page 18: Basic Usage

    Basic Usage...
  • Page 19: How To Access

    How to access Basic Usage How to access This section describes how to access Web Connection. Start the Web browser. Enter the IP address of the machine in the URL field, then press [Enter]. % Example: When the IP address of this machine is 192.168.1.20, enter "http://192.168.1.20/". % For details on how to confirm the IP address of this machine, refer to page 2-3.
  • Page 20: Layout Of Web Connection Screen

    This example shows the items in [Information] - [Device Information] to explain sections in each screen. Item Description Sindoh Logo Sindoh site (http://www.Sindoh.com/). KONICA MINOLTA logo Click the logo to jump to the KONICA MINOLTA site (http://www.koni- caminolta.com/). Web Connection logo Click this logo to display the version information of Web Connection.
  • Page 21 Layout of Web Connection screen Item Description Menu category Menu items are divided into some categories depending on each con- tent. The available menu categories vary depending on which optional units are installed on this machine. Menu Click the category of the menu to display the menu items of that cat- egory.
  • Page 22: Login Methods

    Login methods Login methods Login screen When you access Web Connection, this screen appears first. Enter the required information such as a user name, and log in to Web Connection. Tips If you have not configured authentication settings on this machine, the screen in the public user mode appears instead of the Login screen.
  • Page 23: Login Mode

    Login methods Login mode Web Connection has multiple login modes, and available operations differ depending on the mode. Two login modes of Web Connection are provided: the "administrator mode" which is used to configure set- tings of this machine and the "user mode" which enables use of the functions of this machine. Login mode Description Administrator Mode...
  • Page 24: Switching Login Modes

    Login methods Switching login modes When changing to other login mode after logging in to Web Connection, log out of Web Connection once. Log out of Web Connection. % When you are in the public user mode, click [To Login Screen]. % When you are in the mode other than the public user mode, click [Logout].
  • Page 25 Login methods On the Login screen, select [Administrator] and click [Login]. Select [Administrator (Admin Mode)]. % When the administrator of this machine wants to log in to the user mode, select [Administrator (User Mode)]. % When the administrator of this machine logs in as a User Box administrator, select [User Box Ad- ministrator].
  • Page 26: Logging In To Administrator Mode (For A Registered User With Administrator Privileges)

    Login methods Enter the administrator password, then click [OK]. The administrator mode window appears. Tips You can log in to the administrator mode to change settings of this machine even when a job is running or an error or paper jam is occurring on this machine. However, setting change that affects an active job will not be immediately reflected.
  • Page 27: Logging In To The User Mode

    Login methods Select [Administrator (Admin Mode)]. % When the registered user of this machine logs in to the user mode using administrator privileges, select [Administrator (User Mode)]. % When the registered user of this machine logs in as a User Box administrator, select [User Box Ad- ministrator].
  • Page 28 Login methods Enter the user name and password, then click [Login]. Tips Displaying a list of user names enables you to select a login user. To display a list of user names, on the Control Panel, tap [Utility] - [Administrator Settings] - [User Authentication/ Account Track] - [User Authentication Setting] - [Administrative Settings], and set [User Name List] to [ON].
  • Page 29: User Mode Overview

    User Mode Overview User Mode Overview 3.4.1 Main Menu Displaying the Main Menu enables you to display the menus available in Web Connection on a single screen. By doing this, you can quickly access the screen to use to implement required operations. To display the Main Menu, click the icon on the upper right of the screen ( [Web Management Tool] 3-12...
  • Page 30: Each Mode In The User Mode

    User Mode Overview 3.4.2 Each mode in the user mode [Information] Enables you to confirm the information on the system configuration and settings of this machine. Menu Description [Device Information] Enables you to check the components, options, consumables, meter counts, eco information, and authentication function list view of this machine.
  • Page 31: [Job]

    User Mode Overview [Job] Enables you to check the job currently being performed and the job log. Menu Description [Current Jobs] Enables you to check the job currently being performed and the job to be per- formed. Also, it enables you to instruct to preferentially execute a queued print job or delete a send job for which the proof print function is specified through the printer driver.
  • Page 32: [Direct Print]

    User Mode Overview Tips The Hard Disk is optional in some areas. To use this function, the optional Hard Disk is required. [Direct Print] Direct Print is a function that enables you to directly send PDF (Ver.1.6), JPEG, TIFF, XPS, PS, PCL, Text, OOXML (.docx/.xlsx/.pptx), and PPML (.ppml/.vdx/.zip) files on your computer or in an SMB sharing folder to this machine to print them without using the printer driver.
  • Page 33: [Favorite Setting]

    User Mode Overview Menu Description [Address Book] Enables you to register frequently-used destinations on this machine. Also, it enables you to confirm or edit the registered content of the destination regis- tered on this machine. [Group] Enables you to register multiple destinations as a group. Also, it enables you to confirm or edit the registered content of the group destination registered on this machine.
  • Page 34: [Customize]

    User Mode Overview [Customize] Enables you to select a screen to be displayed after logging in to the user mode. [Web Management Tool] 3-17...
  • Page 35: Using The Shortcut Function

    Using the Shortcut Function Using the Shortcut Function Registering a function in Bookmarks of the Web browser Each Web Connection function page can be registered in Bookmarks of the Web browser. Display a page of a function to be registered in Bookmarks, and register it in Bookmarks of the Web browser. Tips For details on how to register a function in Bookmarks, refer to your Web browser's Help function.
  • Page 36: Using The Help Function

    Using the Help function Using the Help function Using the online help Log in to Web Connection and click , and you will be able to display the online help. The online help shows you the detailed descriptions of the function being set. To display the online help, you must connect your computer to the Internet.
  • Page 37: Using The Wizard When Configuring Function Settings

    Using the Help function Using the wizard when configuring function settings Some settings can be simply configured by entering settings as instructed in the screen via a wizard. Setting using the wizard is available for the following functions. [TX Setting for scan documents.] [Transmit the scanned data via E-mail] [Transmit the scanned data via E-mail (attach Digital Signature)] [Transmit the scanned data via E-mail (Public Key Encryption)]...
  • Page 38 Using the Help function Item Description Purpose of the wizard Displays the title of the wizard being set. Check Job Displays the setting item conforming to the flow. Tips If you return to one of the previous setting items in the flow, you must redo settings at that item. The settings subsequent to the item to which you returned are not saved.
  • Page 39: Restricting Use Of Web Connection

    Restricting use of Web Connection Restricting use of Web Connection If you do not want other people to use Web Connection, you can restrict use of Web Connection on the Control Panel. On the Control Panel, tap [Utility] - [Administrator Settings] - [Network Settings] - [HTTP Server Settings], and set [PSWC Settings] to [OFF] (Default: [ON]).
  • Page 40: Configuring Basic Information Settings Of This Machine

    Configuring Basic Information Settings of this Machine...
  • Page 41: Registering Information Of This Machine

    Registering information of this machine Configuring Basic Information Settings of this Ma- chine Registering information of this machine Register device information of this machine such as the name, installed place, and information of the admin- istrator. Registering device information enables you to confirm it by selecting [Information] - [Device Information] - [Configuration Summary] in the user mode of Web Connection.
  • Page 42: Registering Support Information

    Enables you to confirm the serial number of this machine. Tips The default values of the [Online Help URL] are as follows. If you have changed the default value or de- leted it, enter the following URL. D311 For bizhub C287: http://www.sindoh.com/download/webconnection/onlinehelp/D311/help.html http://www.pagescope.com/download/webconnection/onlinehelp/C287/help.html D310 For bizhub C227: http://www.sindoh.com/download/webconnection/onlinehelp/D310/help.html http://www.pagescope.com/download/webconnection/onlinehelp/C227/help.html...
  • Page 43: Setting The Date And Time For The Machine

    Setting the date and time for the machine Setting the date and time for the machine Manually configuring settings Manually specify the current date and time of this machine. In the administrator mode, select [Maintenance] - [Date/Time Setting] - [Manual Setting], then configure the following settings.
  • Page 44: Configuring Network Settings Of This Machine

    Configuring Network Settings of this Machine...
  • Page 45: Using In The Ipv4 Environment

    Using in the IPv4 environment Configuring Network Settings of this Machine Using in the IPv4 environment Overview To use this machine by connecting it to the IPv4 network, follow the below procedure to configure the set- tings. Setting the method to assign an IP address to this machine % For details on how to assign an IP address, refer to page 5-2.
  • Page 46: Registering The Dns Server Used By This Machine

    Using in the IPv4 environment Registering the DNS server used by this machine If you resolve the name using the host name when accessing a computer or server on the network from this machine, register your DNS server address to this machine. In the administrator mode, select [Network] - [TCP/IP Setting] - [TCP/IP Setting], then configure the following settings.
  • Page 47: Using In The Ipv6 Environment

    Using in the IPv6 environment Using in the IPv6 environment This machine supports the IPv6 network environment. To use this machine in the IPv6 network environment, assign an IPv6 address to this machine. It can be used in the IPv4 and IPv6 environments simultaneously. Tips The following SMB sharing functions are also available in the IPv6 environment by enabling the direct hosting SMB service (enabled by default).
  • Page 48: Using This Machine In A Wireless Network Environment

    Using this Machine in a Wireless Network Environment Using this Machine in a Wireless Network Environment Overview To use this machine by connecting it to a wireless network environment, follow the below procedure to con- figure the settings. The optional Wireless LAN Interface Kit is required to use this function. Selecting a network interface configuration.
  • Page 49: Configuring A Setting To Operate This Machine As A Wireless Lan Adapter

    Using this Machine in a Wireless Network Environment Settings Description [IP Ad- To manually enter the IP address, select [Manual Setting], then enter the IP ad- dress dress and subnet mask of this machine to be used on the wireless network . Setting To automatically obtain the IP address from the DHCP server, select [Auto Set- Method]...
  • Page 50 Using this Machine in a Wireless Network Environment Configure the following settings depending on the setting method you selected in Step 1. % When [Direct Input] is selected: Settings Description [AP Search] Click this to automatically search for an access point around this machine. Se- lect an access point to be connected to this machine from the displayed list.
  • Page 51: Configuring A Setting To Operate This Machine As A Wireless Lan Access Point

    Using this Machine in a Wireless Network Environment Configuring a setting to operate this machine as a wireless LAN access point Configure a setting to operate this machine as a wireless LAN access point. Set this option when [Wired + Wireless (Primary Mode)] is selected in [Network] - [Network I/F Configuration] in the administrator mode.
  • Page 52: Configuring A Setting To Operate This Machine As A Wi-Fi Direct Group Owner

    Using this Machine in a Wireless Network Environment Configuring a setting to operate this machine as a Wi-Fi Direct group owner Wi-Fi Direct is a standard that enables direct connection with a wireless terminal without an access point. In this step, configure a setting to operate this machine as a Wi-Fi Direct group owner Set this option when [Wired + Wireless (Wi-Fi Direct)] is selected in [Network] - [Network I/F Configuration] in the administrator mode.
  • Page 53: Checking The Communication Status Of The Wireless Network Environment

    Using this Machine in a Wireless Network Environment Checking the communication status of the wireless network environment You can select [Network] - [Wireless Network Setting] - [Wireless LAN Adapter]-[Connection status.] in the administrator mode to check the access point connected to this machine, the radio field intensity of the ac- cess point, and the current communication speed.
  • Page 54: Displaying This Machine On The Network Map

    Displaying this machine on the network map Displaying this machine on the network map In Windows Vista or later (Windows Vista/7/8.1/10/Server 2008/Server 2008 R2/Server 2012/Server 2012 R2), you can display this machine on the network map. The network map is very useful for checking the location and information of this machine as well as for net- work troubleshooting.
  • Page 55: Displaying The Network Error Code

    Displaying the network error code Displaying the network error code If an error relating to the network occurs on this machine, the Touch Panel displays an error message with a brief description. To view detailed information for troubleshooting purposes, you can configure settings so that the error code is displayed simultaneously.
  • Page 56: Setting Up The Operating Environment Of Web Connection

    Setting up the Operating Environment of Web Connection...
  • Page 57: Encrypting Communication Using Web Connection

    Encrypting communication using Web Connection Setting up the Operating Environment of Web Con- nection Encrypting communication using Web Connection You can enhance security by encrypting communication between the computer and Web Connection with SSL. The SSL certificate is registered on this machine when it is shipped. Therefore, only enabling SSL/TLS on this machine allows SSL encrypted communication immediately after the setup.
  • Page 58: Changing The Administrator Password

    Changing the administrator password Changing the administrator password You can change the administrator password of this machine from Web Connection. To display this page, select [Security] - [PKI Settings] - [SSL Setting] in the administrator mode to en- crypt communications between your computer and Web Connection using SSL. For details, refer to page 6-2.
  • Page 59: Customizing The Initial Screen

    Customizing the initial screen Customizing the initial screen You can specify the screen to be initially displayed when you log in to the user mode of Web Connection. Setting an appropriate screen as the initial screen according to your operating environment improves work efficiency of the user.
  • Page 60: Changing The Time Period Until Automatic Log Out

    Changing the time period until automatic log out Changing the time period until automatic log out If you do not operate this machine for a given period of time after you log in to Web Connection, you will automatically be logged out. If necessary, you can change the time period before you are automatically logged out.
  • Page 61 Changing the time period until automatic log out [Web Management Tool]...
  • Page 62: Configuring The Scan Environment

    Configuring the Scan Environment...
  • Page 63: Configuring The Scan To E-Mail Environment

    Configuring the Scan to E-mail environment Configuring the Scan Environment Configuring the Scan to E-mail environment Overview The Scan to E-mail is a function that transmits original data scanned on this machine as E-mail attachment. Since this machine supports S/MIME and SSL/TLS encryption, and POP before SMTP authentication, secu- rity can be assured.
  • Page 64: Using An Ssl/Tls Communication

    Configuring the Scan to E-mail environment Settings Description [SMTP Server Address] Enter the address of your E-mail server (SMTP). Use one of the following formats. • Example of host name entry: "host.example.com" • Example of IP address (IPv4) entry: "192.168.1.1" •...
  • Page 65: Using Smtp Authentication

    Configuring the Scan to E-mail environment Settings Description [Port If you select [Start TLS] at [Use SSL/TLS], change the communication port num- Number] ber, if necessary. In normal circumstances, you can use the original port number. [25] is specified by default. [Port If you select [SMTP over SSL] at [Use SSL/TLS], change the SSL communica- No.(SSL)]...
  • Page 66: Using Pop Before Smtp Authentication

    Configuring the Scan to E-mail environment Settings Description [Domain Name] Enter the domain name (realm) for SMTP authentication (using up to 253 char- acters). This item is necessary when the SMTP authentication method is Digest-MD5. • Enter the domain name if two or more domains (realm) exist. •...
  • Page 67: Using S/Mime

    Configuring the Scan to E-mail environment Settings Description [Connection Timeout] Change the timeout period for a communication with the E-mail server (POP) as required. [30] sec. is specified by default. [Port Number] If necessary, change the port number of the E-mail server (POP). In normal circumstances, you can use the original port number.
  • Page 68 Configuring the Scan to E-mail environment In the administrator mode, select [Network] - [E-mail Setting] - [S/MIME], then configure the following settings. Settings Description [S/MIME Comm.Set- Select [ON] to use the S/MIME. ting] To select [ON], the E-mail address of the certificate of this machine must match the E-mail address of the administrator.
  • Page 69: Configuring The Smb Transmission Environment

    Configuring the SMB transmission environment Configuring the SMB transmission environment Overview The SMB Send is a function that transmits original data scanned on this machine to a shared folder in a spec- ified computer. The shared folder is shared using the SMB (Server Message Block) protocol. If the WINS server is installed to resolve the name, register it.
  • Page 70: Configuring Basic Settings For The Smb Transmission

    Configuring the SMB transmission environment To specify a destination computer using the host name, configure the appropriate machine settings and prepare the appropriate environment so that name resolution can be performed with DNS or LLMNR. To perform name resolution with DNS, a destination computer can be specified with "Host Name (ex- ample: host1)"...
  • Page 71: Using The Direct Hosting Smb Service

    Configuring the SMB transmission environment Settings Description [WINS Server Ad- Enter the WINS server address. dress1] to [WINS Server This item is necessary when you do not automatically obtain the WINS server Address2] address using the DHCP. Use the following entry formats. •...
  • Page 72: Configuring The Ftp Transmission Environment

    Configuring the FTP transmission environment Configuring the FTP transmission environment Overview The FTP transmission is a function that transmits original data scanned on this machine to a specified folder in the FTP server. When the proxy server is used, you can configure settings so that the FTP server is accessed via the proxy server.
  • Page 73: Configuring The Webdav Transmission Environment

    Configuring the WebDAV transmission environment Configuring the WebDAV transmission environment Overview The WebDAV transmission is a function that transmits original data scanned on this machine to a specified folder in the WebDAV Server. WebDAV, which is an extension to the HTTP specification, provides the same security technologies as HTTP. Use SSL to encrypt a communication with the WebDAV server;...
  • Page 74: Using Ssl Communication

    Configuring the WebDAV transmission environment Settings Description [Proxy Server Port If necessary, change the proxy server port number. Number] [8080] is specified by default. [User Name] Enter the user name to log in to the proxy server (using up to 63 characters). [Password] Enter the password of the user name you entered into [User Name] (using up to 63 characters).
  • Page 75: Configuring The Ws Scan Environment

    Configuring the WS scan environment Configuring the WS scan environment Overview The WS scan transmission is a function that transmits original data scanned on this machine to the computer on the network on the computer loaded with Windows Vista or later (Windows Vista/7/8.1/10/Server 2008/Server 2008 R2/Server 2012/Server 2012 R2).
  • Page 76: Using The Proxy Server

    Configuring the WS scan environment Settings Description [Scanner Location] Enter a scanner location if necessary (using up to 63 characters). [Scanner Information] Enter scanner information if necessary (using up to 63 characters). [Connection Timeout] Change the time-out time to limit a communication with the computer if nec- essary.
  • Page 77 Configuring the WS scan environment Settings Description [SSL Setting] Select [ON] to make SSL communications. This item is displayed when the device certificate is installed on this machine and SSL communication is enabled by selecting [Security] - [PKI Settings] - [SSL Setting] - [Mode using SSL/TLS] in Administrator mode.
  • Page 78: Configuring The Twain Scan Environment

    Configuring the TWAIN scan environment Configuring the TWAIN scan environment Overview Using the TWAIN driver enables you to use this machine as a scanner by controlling it from a computer con- nected to the network. When using the TWAIN scan, follow the below procedure to configure the settings. Configure settings for connecting to the network such as setting of the IP address of this machine % For details on configuring the setting, refer to page 2-2.
  • Page 79: Searching For A Destination Using The Ldap Server

    Searching for a destination using the LDAP server Searching for a destination using the LDAP server Overview When a directory server such as the LDAP server or Active Directory is used for user management, you can search for a destination (E-mail address or fax number) from the server. Use SSL to encrypt a communication with the server;...
  • Page 80 Searching for a destination using the LDAP server Settings Description [Search Base] Specify the starting point to search for a destination (using up to 255 charac- ters). The range from the entered origin point, including the following tree structure, is searched. Example of entry: "cn=users,dc=example,dc=com"...
  • Page 81: Using Ssl Communication

    Searching for a destination using the LDAP server Tips Clicking [Check Connection] at [LDAP Server List] enables you to confirm whether you can connect to the LDAP server according to the registered contents. Using SSL communication Communication between this machine and the LDAP server is encrypted with SSL. Configure the setting if your environment requires SSL encryption communication with the LDAP server.
  • Page 82: Configuring The Printing Environment

    Configuring the Printing Environment...
  • Page 83: Configuring The Lpr Printing Environment

    Configuring the LPR printing environment Configuring the Printing Environment Configuring the LPR printing environment Overview LPR printing is performed via the network using the LPR protocol. It is mainly used in UNIX-based operating systems. When using the LPR printing function, follow the below procedure to configure the settings. Configure settings for connecting to the network such as setting of the IP address of this machine % For details on configuring the setting, refer to page 2-2.
  • Page 84: Configuring The Port9100 Printing Environment

    Configuring the Port9100 printing environment Configuring the Port9100 printing environment Overview The Port9100 printing function directly specifies the RAW port (Port9100) of this machine as a printing des- tination printer and prints data via the network. When using the Port9100 printing function, follow the below procedure to configure the settings. Configure settings for connecting to the network such as setting of the IP address of this machine % For details on configuring the setting, refer to page 2-2.
  • Page 85: Configuring The Smb Printing Environment

    Configuring the SMB printing environment Configuring the SMB printing environment Overview The SMB printing function is a function used to print data by directly specifying this machine on the comput- er. This machine is shared using the SMB (Server Message Block) protocol. If the WINS server is installed to resolve the name, register it.
  • Page 86: Using The Wins Server

    Configuring the SMB printing environment Settings Description [SMB security Signa- Select whether to enable the SMB signature of this machine to suit your envi- ture Setting] ronment. • [Disable]: Disables the SMB signature of this machine. • [When Requested]: Enables the SMB signature of this machine (server) only when the SMB signature is requested from the client side.
  • Page 87: Resolving The Name Using Llmnr

    Configuring the SMB printing environment Resolving the name using LLMNR Using LLMNR (Link-local Multicast Name Resolution) enables you to resolve the name even in an environ- ment with no DNS server. This function is supported by the computer loaded with Windows Vista or later (Windows Vista/7/8.1/10/Server 2008/Server 2008 R2/Server 2012/Server 2012 R2).
  • Page 88: Configuring The Ipp Printing Environment

    Configuring the IPP printing environment Configuring the IPP printing environment Overview IPP printing uses the Internet Printing Protocol (IPP) and prints information via the network. IPP that is extended HTTP is used to forward printing data, enabling you to print data on a printer on a dis- tance location via the Internet.
  • Page 89: Using The Ipp Authentication

    Configuring the IPP printing environment Using the IPP authentication To perform authentication during IPP printing, enable the IPP authentication. In addition, enter information required for authentication. In the administrator mode, select [Network] - [IPP Setting], then configure the following settings. Settings Description [IPP Authentication...
  • Page 90 Configuring the IPP printing environment "https://host name.domain name/ipp" For the host name and domain name, enter [DNS Host Name] and [DNS Default Domain Name] you specified for [TCP/IP Setting] of this machine. Confirm that the name resolution of this machine is possible using the DNS server from the computer. Register this machine in the DNS server in advance.
  • Page 91: Configuring The Ws Printing Environment

    Configuring the WS printing environment Configuring the WS printing environment Overview The computer uses the Web service function of Windows Vista or later (Windows Vista/7/8.1/10/Server 2008/Server 2008 R2/Server 2012/Server 2012 R2) to automatically detect this machine connected to the network and easily install this function as Web service printer. HTTP is used for communication between this machine and the computer.
  • Page 92: Using The Proxy Server

    Configuring the WS printing environment Settings Description [WSD Print V2.0 Set- To use functions of WS printing version 2.0, select [Enable]. ting] When you connect this machine from the computer compatible with version 2.0, you can issue a printing prenotification to this machine, send account in- formation, specify parameters for the advanced device functions, or obtain the device capability and localization information.
  • Page 93 Configuring the WS printing environment In the administrator mode, select [Network] - [DPWS Settings] - [DPWS Common Settings], then configure the following settings. Settings Description [SSL Settings] Select [ON] to make SSL communications. [OFF] is specified by default. [Certificate Verification To verify the certificate, select items to be verified.
  • Page 94: Configuring The Bonjour Printing Environment

    Configuring the Bonjour printing environment Configuring the Bonjour printing environment This machine supports Bonjour used on Mac OS. Bonjour technology runs based on TCP/IP, enabling you to automatically configure the network settings for networked devices and find available services. Enabling the Bonjour function on this machine enables the computer to automatically detect this networked machine and display it as an addable printer in the list.
  • Page 95: Configuring A Setting To Make Prints From An Android Terminal Using Mopria

    Configuring a setting to make prints from an Android terminal using Mopria Configuring a setting to make prints from an Android terminal us- ing Mopria Mopria is a standard that enables printing from an Android terminal by wireless connection without having to install a dedicated application such as a printer driver to suit the manufacturer or model of an Android termi- nal.
  • Page 96: Configuring The E-Mail Rx Print Environment

    Configuring the E-mail RX Print environment Configuring the E-mail RX Print environment Overview E-mail RX Print is a function that prints a file attached to the E-mail received by the machine. If you send an E-mail to the E-mail address of the machine, you can print a PDF, Compact PDF, JPEG, TIFF, XPS, Compact XPS, OOXML (.docx/.xlsx/.pptx), or PPML (.ppml/.vdx/.zip) file on the computer using the ma- chine without using the printer driver.
  • Page 97: Configure Settings To Print A Received E-Mail Attachment

    Configuring the E-mail RX Print environment Configure settings to print a received E-mail attachment Enable the E-mail RX Print function. If necessary, configure settings to restrict E-mail addresses for which printing is to be permitted, or to save E-mail attachments to a User Box. In the administrator mode, select [Network] - [E-mail Setting] - [E-mail RX Print], then configure the following settings.
  • Page 98: Specifying The Default Print Settings For This Machine

    Specifying the default print settings for this machine Specifying the default print settings for this machine 8.9.1 Specifying the default print settings This machine operates according to these settings unless the printer driver specifies the print settings. You can configure default settings for tray, finisher processing, and the number of copies. In the administrator mode, select [Print Setting] - [Basic Setting], then configure the following settings.
  • Page 99 Specifying the default print settings for this machine Settings Description [Banner Sheet Paper Select a paper tray to print a banner page (front cover). Tray] [Auto] is specified by default. [No Matching Paper in Select the operation to be taken when there is no appropriate sized paper in Tray Setting] the specified paper tray.
  • Page 100: Specifying The Default Pcl Print Settings

    Specifying the default print settings for this machine 8.9.2 Specifying the default PCL print settings Configure the PCL settings. Specify the default values for PCL symbol set. In the administrator mode, select [Print Setting] - [PCL Setting], then configure the following settings. Settings Description [Select Color]...
  • Page 101: Specifying The Default Ps Print Settings

    Specifying the default print settings for this machine 8.9.3 Specifying the default PS print settings Configure the PS print settings. Specify default settings for error information printing and the default settings of various profiles. In the administrator mode, select [Print Setting] - [PS Setting], then configure the following settings. Settings Description [Select Color]...
  • Page 102: Specifying The Default Tiff Print Settings

    Specifying the default print settings for this machine 8.9.4 Specifying the default TIFF print settings Specify how to determine the size of print paper when directly printing TIFF, JPEG, or PDF image data. This setting is enabled when data is printed from a USB memory device or directly printed using the Direct Print function of Web Connection.
  • Page 103: Configuring The Default Combination Settings

    Specifying the default print settings for this machine 8.9.7 Configuring the default combination settings Specify the default value for combination settings during direct printing. In the administrator mode, select [Print Setting] - [Page Layout Settings], and configure the following settings. Settings Description [Combination]...
  • Page 104: Specifying The Time-Out Time By Interface

    8.10 Specifying the time-out time by interface 8.10 Specifying the time-out time by interface Change the time-out time to limit a communication between this machine and the computer if necessary. You can change the time-out time to limit communications via a network and USB respectively. In the administrator mode, select [Print Setting] - [Interface Setting], then configure the following settings.
  • Page 105: Restricting Users From Obtaining Device Information Using Password

    8.11 Restricting users from obtaining device information using password 8.11 Restricting users from obtaining device information using pass- word You can use a password to restrict the obtainment of device information from the printer driver. When you attempt to obtain device information from the printer driver, this machine prompts you to enter the password.
  • Page 106: Configuring The Fax Environment

    Configuring the Fax Environment...
  • Page 107: Configuring Basic Fax Settings

    Configuring basic fax settings Configuring the Fax Environment Configuring basic fax settings 9.1.1 Configuring the Line Usage Settings Configure the settings such as the telephone line type (dialing method) and fax receiving mode. In the administrator mode, select [Fax Settings] - [Line Parameter Setting], then configure the following set- tings.
  • Page 108: Registering The Sender Information

    Configuring basic fax settings 9.1.3 Registering the sender information Register the machine name, your company name (sender name), and the fax number that are to be printed as the sender information when faxes are transmitted. The sender information is automatically added to a fax to be sent from this machine. Up to 20 sender names can be registered.
  • Page 109: Specifying Operations When Sending And Receiving A Fax

    Specifying operations when sending and receiving a fax Specifying operations when sending and receiving a fax 9.2.1 Specifying How to Print the Sender Name/Reception Information Specify how to print sender information and reception information of a fax to be sent and received. In the administrator mode, select [Fax Settings] - [Header/Footer Position], then configure the following set- tings.
  • Page 110: Canceling Stamp Setting When Sending A Fax

    Specifying operations when sending and receiving a fax Settings Description [Incorrect User Box No. Select the action taken by the machine if unregistered user box is specified for Entry] receiving a fax using the machine's box. • [Print]: Prints a received fax without saving it in a user box. •...
  • Page 111: Specifying Useful Transmission And Reception Functions

    Specifying useful transmission and reception functions Specifying useful transmission and reception functions 9.3.1 Enabling/Disabling the Fax Functions Enable or disable fax transmission and reception functions, such as Confirm Address that prevents wrong fax transmission, F-Code TX, and Relay RX. In the administrator mode, select [Fax Settings] - [Function Setting] - [Function ON/OFF Setting], then con- figure the following settings.
  • Page 112: Using The Closed Network Rx Function

    Specifying useful transmission and reception functions 9.3.2 Using the Closed Network RX function Closed Network RX is a function that restricts the peers by passwords. You can use this function only when the remote machine is one of our models that have the Password TX function. In the administrator mode, select [Fax Settings] - [Function Setting] - [Closed Network RX], and select the [Password is changed.] check box (Default: [OFF] (not selected)).
  • Page 113: Using The Forward Tx Function

    Specifying useful transmission and reception functions 9.3.5 Using the Forward TX function Forward TX is a function that transfers a received fax, Internet fax, or IP address fax to a pre-specified des- tination. Faxes can be forwarded to personal E-mail addresses or saved in a shared folder in a computer. Received faxes can be converted to files that can be handled by a computer, which saves printing costs.
  • Page 114: Using The Pc-Fax Rx Function

    Specifying useful transmission and reception functions 9.3.6 Using the PC-Fax RX Function PC-Fax RX is a function that automatically saves a received fax to the Memory RX User Box or a user box specified in F-Code (SUB Address). A stored fax job can be read from the user box into a computer. Tips This function cannot be used together with the following functions.
  • Page 115 Specifying useful transmission and reception functions Settings Description [Action when TSI User Select the action to be taken by the machine if a fax number (TSI) is not regis- Box is not set.] tered and no forwarding destination is received. •...
  • Page 116: Restricting Pc-Fax Transmission

    Specifying useful transmission and reception functions 9.3.8 Restricting PC-FAX transmission Select whether to allow PC-Fax TX using the fax driver. To restrict PC-FAX transmission, select, in the administrator mode, [Fax Settings] - [Function Setting] - [PC- FAX TX Setting] - [Restrict] (Default: [Allow]). [Web Management Tool] 9-11...
  • Page 117: Specifying Fax Report Print Conditions

    Specifying fax report print conditions Specifying fax report print conditions Specify the conditions for printing fax-related reports. There are some reports automatically printed and oth- ers to be printed manually. In the administrator mode, select [Fax Settings] - [Report Settings], then configure the following settings. Settings Description [TX Result Report]...
  • Page 118 Specifying fax report print conditions Settings Description [PC-Fax TX Error Re- Select whether to print a report if PC-Fax TX using the fax driver has failed. port] [OFF] is specified by default. [Timer Reservation TX Select whether to print a report when transmission is reserved using the Timer Report] TX function.
  • Page 119: Restricting Deletions Of Received Faxes

    Restricting Deletions of Received Faxes Restricting Deletions of Received Faxes Restrict a deletion of fax documents in the Memory RX User Box or a deletion of fax receive jobs from the job display screen. Two methods are available to restrict deletions. Ask the user to enter the password when deleting to enable deletion when the entered password matches the password that is pre-registered on this machine.
  • Page 120: Configuring The Network Fax Environment

    Configuring the Network Fax Environment...
  • Page 121: Configuring The Internet Fax Environment

    10.1 Configuring the Internet fax environment Configuring the Network Fax Environment 10.1 Configuring the Internet fax environment Overview Internet fax is a function used to send and receive fax via enterprise network and Internet. Internet fax is sent or received via E-mail. The same network as computer network is used for fax transmission. Therefore, you can send and receive faxes without having to worry about high communication costs to distant locations or to send a large number of pages.
  • Page 122 10.1 Configuring the Internet fax environment Settings Description [E-mail Address] Enter the E-mail address of this machine with 320 characters, excluding spac- This E-mail address is used as sender Internet fax address. In the administrator mode, select [Fax Settings] - [Header Information], then configure the following set- tings.
  • Page 123 10.1 Configuring the Internet fax environment Settings Description [Binary division Size] Enter the size to divide an E-mail when [Binary Division] is selected in [Server load reduction transmission method]. [Max Mail Size] Enter the maximum E-mail size allowable for the E-mail server (SMTP) when [Stop Scan TX when maximum limit is exceeded] or [Scan TX by Download URL method only when maximum limit is exceeded] is selected in [Server load reduction transmission method].
  • Page 124: Checking A Fax Reception

    10.1 Configuring the Internet fax environment Checking a fax reception Configure the settings for requesting or responding the Internet fax transmission result, and the setting re- garding the exchange of capability information between machines. In the administrator mode, select [Fax Settings] - [Network Fax Setting] - [I-Fax Advanced Setting], then con- figure the following settings.
  • Page 125: Configuring Default Compression Type Setting For Transmission In Black And White

    10.1 Configuring the Internet fax environment Configuring default compression type setting for transmission in black and white If necessary, change the default compression type setting when sending a fax in black and white. In the administrator mode, select [Fax Settings] - [Network Fax Setting] - [Black Compression Level], then configure the following settings.
  • Page 126: Using Smtp Authentication

    10.1 Configuring the Internet fax environment Settings Description [Validity Confirm whether the certificate is still valid. Period] [Confirm] is specified by default. [CN] Confirm whether CN (Common Name) of the certificate matches the server ad- dress. [Do Not Confirm] is specified by default. [Key Us- Confirm whether the certificate is used according to the intended purpose ap- age]...
  • Page 127: Using Pop Before Smtp Authentication

    10.1 Configuring the Internet fax environment Settings Description [Authentication Setting] Select whether to synchronize the SMTP authentication with the user authen- tication of this machine. This item is necessary when the user authentication is installed on this machine. • [User Authentication]: Uses the user name and password of the registered user of this machine as [User ID] and [Password] for the SMTP authentica- tion.
  • Page 128 10.1 Configuring the Internet fax environment Settings Description [Validity Confirm whether the certificate is still valid. Period] [Confirm] is specified by default. [CN] Confirm whether CN (Common Name) of the certificate matches the server ad- dress. [Do Not Confirm] is specified by default. [Key Us- Confirm whether the certificate is used according to the intended purpose ap- age]...
  • Page 129: Configuring The Ip Address Fax Environment

    10.2 Configuring the IP address fax environment 10.2 Configuring the IP address fax environment Overview The IP address fax function is a function used to send and receive faxes within a limited network such as enterprise network. In addition to IP address, you can also use a host name and E-mail address to specify the destination.
  • Page 130: Configuring Default Compression Type Setting For Transmission In Black And White

    10.2 Configuring the IP address fax environment Settings Description [Connection Timeout] Change the timeout period for a communication with the E-mail server (SMTP), as required. [300] sec. is specified by default. In the administrator mode, select [Fax Settings] - [Header Information], then configure the following set- tings.
  • Page 131 10.2 Configuring the IP address fax environment In the administrator mode, select [Fax Settings] - [Network Fax Setting] - [Color/Grayscale Multi-Value Com- pression Method], then configure the following settings. Settings Description [Color/Grayscale Multi- Select the default compression type for transmission in full color or gray scale. Value Compression •...
  • Page 132: Configuring The User Box Environment

    Configuring the User Box Environment...
  • Page 133: Creating And Editing A User Box

    11.1 Creating and editing a User Box Configuring the User Box Environment 11.1 Creating and editing a User Box 11.1.1 Creating a User Box Create a Public, Personal, or Group User Box. Personal User Box can be used when user authentication is employed. Group User Box can be used when account track is employed.
  • Page 134: Changing User Box Settings

    11.1 Creating and editing a User Box 11.1.2 Changing User Box settings If you log in to the administrator mode, you can change settings for a registered User Box or delete it without entering the password for the User Box. In the administrator mode, click [Box] - [User Box List].
  • Page 135: Creating And Editing A System User Box

    11.2 Creating and editing a System User Box 11.2 Creating and editing a System User Box 11.2.1 Creating a Bulletin Board User Box Bulletin Board User Box is a box used to save multiple types of fax documents required for polling. If announcement and other fax documents are stored in Bulletin Board User Boxes by purpose and if recip- ients are notified with the relating box numbers, the users can select the required fax documents and they can be polled.
  • Page 136: Creating An Annotation User Box

    11.2 Creating and editing a System User Box Settings Description [Relay TX Pass- To restrict the usage of User Box using password, enter the password (using word]/[Retype Relay TX up to eight digits, including symbols # and *). Password] The entered password is required when sending a relay request to this ma- chine.
  • Page 137: Changing Bulletin Board User Box Settings

    11.2 Creating and editing a System User Box 11.2.4 Changing Bulletin Board User Box settings If you log in to the administrator mode, you can change settings for a registered Bulletin Board User Box or delete it without entering the password for the Bulletin Board User Box. Tips To use this function, the optional Fax Kit is required.
  • Page 138: Changing Annotation User Box Settings

    11.2 Creating and editing a System User Box 11.2.6 Changing Annotation User Box settings If you log in to the administrator mode, you can change settings for a registered Annotation User Box or de- lete it without entering the password for the Annotation User Box. In the administrator mode, click [Box] - [System User Box List].
  • Page 139: Configuring User Box Environment

    11.3 Configuring User Box environment 11.3 Configuring User Box environment 11.3.1 Specifying the maximum number of User Boxes You can set the maximum number of Public User Boxes that can be registered on this machine by the user. In the administrator mode, select [User Auth/Account Track] - [Public User Box Setting], and then select the [Set the maximum number of User Boxes] check box (Default: [OFF] (not selected)).
  • Page 140: Automatically Deleting Files From The Smb Folder

    11.3 Configuring User Box environment 11.3.4 Automatically deleting files from the SMB folder If files in the Public User Box are shared on the network using the Share SMB File function, specify the period from the time when files are saved in the SMB folder via the Public User Box to the time when they are deleted automatically.
  • Page 141: Configuring System User Box Environment

    11.4 Configuring System User Box environment 11.4 Configuring System User Box environment 11.4.1 Deleting all secure documents All files saved in the Secure Print User Box are deleted. In the administrator mode, select [System Settings] - [User Box Setting] - [Delete Secure Print File], then click [OK].
  • Page 142: Configuring The Share Smb File Function

    11.5 Configuring the Share SMB File function 11.5 Configuring the Share SMB File function Overview Share SMB File is a function that shares files in the Public User Box of the machine on the network using the machine as an SMB server. This function allows you to connect to the device through the computer and easily export files in the Public User Box in the same way as when referencing the shared folder on the network.
  • Page 143: Creating A Public User Box To Share Files

    11.5 Configuring the Share SMB File function Creating a Public User Box to share files Create a Public User Box. Also, configure the setting to automatically transfer files from the Public User Box and save them in the SMB folder. In the administrator mode, select [Box] - [User Box List] - [New Registration], then configure the following settings.
  • Page 144: Configuring The Usb Memory Device Settings

    11.6 Configuring the USB Memory Device settings 11.6 Configuring the USB Memory Device settings Specify whether to allow users to print and read files from a USB memory device and to save files to a USB memory device. In the administrator mode, select [System Settings] - [User Box Setting] - [External Memory Function Set- tings], then configure the following settings.
  • Page 145: Disabling User's Operation Of Registration/Change Of A User Box

    11.7 Disabling user's operation of registration/change of a User Box 11.7 Disabling user's operation of registration/change of a User Box You can enable or disable each user's ability to create, edit, and delete a user box. In the administrator mode, select [System Settings] - [User Box Setting] - [User Box Operation], then config- ure the following settings.
  • Page 146: Managing Files Saved In A User Box Using The Scan To Url Function

    11.8 Managing files saved in a User Box using the Scan to URL function 11.8 Managing files saved in a User Box using the Scan to URL func- tion Automatically deleting files saved in a User Box using the Scan to URL func- tion Specify the period from the date and time when files are saved in a User Box on this machine to the time when they are deleted automatically using the Scan to URL function.
  • Page 147 11.8 Managing files saved in a User Box using the Scan to URL function [Web Management Tool] 11-16...
  • Page 148: Restricting Users From Using This Device

    Restricting Users from Using this Device...
  • Page 149: Overview Of User Authentication And Account Track

    12.1 Overview of User Authentication and Account Track Restricting Users from Using this Device 12.1 Overview of User Authentication and Account Track User Authentication Employing User Authentication enables you to manage users who can use this machine. It also enables se- curity- and cost-conscious advanced operations of this machine.
  • Page 150: Account Track

    12.1 Overview of User Authentication and Account Track Authentication Meth- Description MFP authentication + The method using a combination of the authentication function of this machine External server authen- and authentication by an external server. tication Even if some sort of problem occurs on the external authentication server, you can use this machine using its authentication function.
  • Page 151 12.1 Overview of User Authentication and Account Track Tips When switching between synchronization and non-synchronization of user authentication and account au- thentication depending on the business status, configure the following settings to allow each user to select whether to perform synchronization. In the administrator mode, select [User Auth/Account Track] - [General Settings], then set [Synchronize User Authentication &...
  • Page 152: Employing The Mfp Authentication

    12.2 Employing the MFP authentication 12.2 Employing the MFP authentication Overview Users of this machine can be restricted by the authentication function (ON (MFP)) of this machine. Authenti- cation information of users are managed internally by this machine. Employing the user authentication enables security- and cost-conscious advanced operations such as re- stricting users from accessing this machine, restricting users from using the functions by user, and managing the use status of this machine.
  • Page 153 12.2 Employing the MFP authentication Settings Description [When Number of Jobs Sets the maximum number of sheets that each user can print. Here, select an Reach Maximum] operation if the number of sheets exceeds the maximum number of sheets that can be printed.
  • Page 154: Employing The Account Track Function

    12.3 Employing the account track function 12.3 Employing the account track function Overview Installing Account Track enables you to collectively manage multiple users on an account basis. Account au- thentication information is managed internally by this machine. A password can be set by account to restrict users from using this machine. Also, this function allows you to restrict available functions or manage the use status of this machine by account.
  • Page 155 12.3 Employing the account track function In the administrator mode, select [User Auth/Account Track] - [Account Track Settings] - [New Regis- tration], then register an account. Settings Description [No.] Account registration number. Select [Use opening number] to automatically assign the smallest available number. When you want to specify a number, se- lect [Input directly] and then enter a number.
  • Page 156: Overview

    12.4 Employing the Active Directory authentication 12.4 Employing the Active Directory authentication Overview When you use Active Directory of Windows Server for user management, you can restrict users of this ma- chine by authentication using Active Directory. Employing the user authentication enables security- and cost-conscious advanced operations such as re- stricting users from accessing this machine, restricting users from using the functions by user, and managing the use status of this machine.
  • Page 157 12.4 Employing the Active Directory authentication Settings Description [Default Domain Name] Enter the default domain name of your Active Directory (using up to 64 char- acters). [Timeout] Change the time-out time to limit a communication with the Active Directory if necessary.
  • Page 158: Sending To Your Computer (Scan To Home)

    12.4 Employing the Active Directory authentication Sending to Your Computer (Scan to Home) Scan to Home is a function that easily sends the original data scanned in this machine to a shared folder on a server or that on your computer. To use the Scan to Home function, the following settings are required.
  • Page 159 12.4 Employing the Active Directory authentication In the administrator mode, select [User Auth/Account Track] - [Self-Verification Setting in AD Authenti- cation] to configure the following settings. Settings Description [Self-Verification Set- Select [ON] to reinforce authentication processing when using Active Directory. ting in AD Authentica- [OFF] is specified by default.
  • Page 160: Employing The Ntlm Authentication

    12.5 Employing the NTLM authentication 12.5 Employing the NTLM authentication Overview When you use Active Directory of Windows Server (NT-compatible domain environment) for user manage- ment, you can restrict users of this machine by authentication using NTLM. Employing the user authentication enables security- and cost-conscious advanced operations such as re- stricting users from accessing this machine, restricting users from using the functions by user, and managing the use status of this machine.
  • Page 161 12.5 Employing the NTLM authentication In the administrator mode, select [User Auth/Account Track] - [General Settings], then configure the fol- lowing settings. Settings Description [User Authentication] When performing authentication using an external authentication server, select [ON (External Server)] or [ON (MFP + External Server)]. If you want to configure setting so that you can log in to this machine using its authentication function in consideration of an occurrence of some sort of prob- lem on the external authentication server, select [ON (MFP + External Server)].
  • Page 162: Using The Wins Server

    12.5 Employing the NTLM authentication Using the WINS server If the WINS server is installed to resolve the name, set the WINS server address and the name resolution method. In the administrator mode, select [Network] - [SMB Setting] - [WINS/NetBIOS Settings], then configure the following settings.
  • Page 163: Employing The Ldap Authentication

    12.6 Employing the LDAP authentication 12.6 Employing the LDAP authentication Overview When you use the LDAP server for user management, you can restrict users of this machine by authentication using LDAP. Employing the user authentication enables security- and cost-conscious advanced operations such as re- stricting users from accessing this machine, restricting users from using the functions by user, and managing the use status of this machine.
  • Page 164 12.6 Employing the LDAP authentication Settings Description [Search Base 1] to Specify the starting point and range to search for a user to be authenticated. [Search Base 3] • [Search Base]: Specify the starting point to search for a target (using up to 255 characters).
  • Page 165: Using Ssl Communication

    12.6 Employing the LDAP authentication Settings Description [Reconnection Set- If necessary, change the time to reconnect to the authentication server. tings] • [Reconnect for every login]: Connects to the authentication server at the time authentication is carried out on this machine. If the authentication server is in the shutdown state at the time authentication is carried out on this machine, first confirm that the authentication server is down, and use the temporarily saved authentication information to log in to this machine.
  • Page 166: Sending To Your Address (Scan To Me)

    12.7 Sending to your address (Scan to Me) 12.7 Sending to your address (Scan to Me) The Scan to Me function is a function that transmits original data scanned on this machine to your address easily. To use the Scan to Me function, the following preparation is required. Configuring the environment to use the Scan to E-mail function Installing the MFP authentication or external server authentication Registering an E-mail address as user's registration information...
  • Page 167: Sending The Download Url To Your Address (Scan To Url)

    12.8 Sending the download URL to your address (Scan to URL) 12.8 Sending the download URL to your address (Scan to URL) The Scan to URL function is a function that transmits the URL to download the original data scanned on this machine, to your E-mail address by E-mail.
  • Page 168: Constructing A Single Sign-On Environment For The Smb Transmission

    12.9 Constructing a single sign-on environment for the SMB transmission 12.9 Constructing a single sign-on environment for the SMB transmis- sion By using the user authentication information (login name and password) of this machine as SMB destination authentication information (host name and password), you can avoid the problem of having to specify SMB destination authentication information, allowing construction of a single sign-on environment for SMB trans- mission.
  • Page 169: Configuring A Setting So That A User Can Log In To This Machine Using Administrator Privileges

    12.10 Configuring a setting so that a user can log in to this machine using administrator privileges 12.10 Configuring a setting so that a user can log in to this machine us- ing administrator privileges You can configure a setting so that a registered user can log in to this machine using administrator privileges. In the administrator mode, select [User Auth/Account Track] - [User Authentication Setting] - [Adminis- trative Setting] - [Login Allowed with Administrative Rights], then click [Allow] (default: [Allow]).
  • Page 170: Setting Privileges To Use The Functions Of This Machine By User Or Account

    12.11 Setting privileges to use the functions of this machine by user or account 12.11 Setting privileges to use the functions of this machine by user or account 12.11.1 Restricting available functions by user or account Employing User Authentication or Account Track enables you to restrict available functions by user or ac- count.
  • Page 171: Specifying The Default Function Permission Setting When The External Server Authentication Is Used

    12.11 Setting privileges to use the functions of this machine by user or account Functions Description [Manual Destination In- Select whether to allow direct input of a destination. put] [Allow Fax Only] allows direct input of a fax number only. This option is disabled for an account.
  • Page 172: 12.11.3 Restricting Functions Available To Public Users

    12.11 Setting privileges to use the functions of this machine by user or account 12.11.3 Restricting functions available to public users When public users' (unregistered users') accesses are allowed, you can restrict functions available for public users. Also, you can restrict destinations public users can access. In the administrator mode, select [User Auth/Account Track] - [User Authentication Setting] - [Public User], then configure the following settings.
  • Page 173: Managing The Maximum Number Of Copies By User Or Account

    12.12 Managing the maximum number of copies by user or account 12.12 Managing the maximum number of copies by user or account Employing User Authentication or Account Track enables you to specify the maximum number of copies by user or account. Also, you can set the upper limit of the number of User Boxes that can be registered. Management of the upper limit of copies by user or account depending on the use status of this machine encourages users and accounts to develop awareness of costs and also contributes to cost reduction.
  • Page 174: Limiting The Access To Destinations For Each User

    12.13 Limiting the access to destinations for each user 12.13 Limiting the access to destinations for each user 12.13.1 Methods to limit access to destinations You can limit access to destinations for each user on this machine. The following three methods are available to limit access to destinations.
  • Page 175: 12.13.3 Managing Based On The Reference Allowed Group

    12.13 Limiting the access to destinations for each user 12.13.3 Managing based on the reference allowed group Reference Allowed Group This function sorts multiple destinations registered in this machine into a related group (reference allowed group) such as a group of customers per department. Set a reference allowed group for each user to limit access to destinations.
  • Page 176: Simultaneously Setting A Reference Allowed Level And Reference Allowed Group

    12.13 Limiting the access to destinations for each user Destinations belonging to Reference Allowed Group B: B1 to B5 Tips You can specify the reference allowed level of each reference allowed group. If you assign a reference allowed group for which a reference allowed level is set to the address book, you can manage destina- tions by using both the reference allowed level and reference allowed group.
  • Page 177: Changing The Function Key Display Pattern By User Or Account

    12.14 Changing the function key display pattern by user or account 12.14 Changing the function key display pattern by user or account Overview This machine provides three display patterns to display or hide function keys in each mode. If user authentication or account track is installed on this machine, you can select a display pattern of function keys to be displayed in each mode screen for each user or account track.
  • Page 178: Selecting A Function Key Display Pattern By Account

    12.14 Changing the function key display pattern by user or account Selecting a function key display pattern by account In the administrator mode, select [User Auth/Account Track] - [Account Track Settings] - [Edit], then configure the following settings. Settings Description [Copy/Print Screen] To select a display pattern of function keys to be displayed in the print settings screen in Copy or User Box mode, select [Allow].
  • Page 179: Specifying The Operations Of The Id & Print Function

    12.15 Specifying the operations of the ID & Print function 12.15 Specifying the operations of the ID & Print function The ID & Print function saves print data in the ID & Print User Box of this machine in an environment where user authentication is installed.
  • Page 180: Configuring Common Settings When Using The Authentication Function

    12.16 Configuring common settings when using the authentication function 12.16 Configuring common settings when using the authentication function Set how to manage color printing and the operation when logging out of this machine if user authentication or account track is installed on this machine. In the administrator mode, select [User Auth/Account Track] - [User/Account Common Setting], then config- ure the following settings.
  • Page 181: Restricting Print Jobs Without Authentication Information

    12.17 Restricting print jobs without authentication information 12.17 Restricting print jobs without authentication information Select whether to allow print jobs without authentication information, which are jobs instructed without con- figuring the correct user authentication or account track settings using the printer driver. In the administrator mode, select [User Auth/Account Track] - [Print without Authentication], then configure the following settings.
  • Page 182: Printing Without Password (Quick Authentication)

    12.18 Printing without password (Quick authentication) 12.18 Printing without password (Quick authentication) Overview Configure settings so that authentication (without a password) based only on the user name is allowed when the printer driver is used for printing in an environment where user authentication is employed. This function is called the quick authentication.
  • Page 183: Using Ssl Communication

    12.18 Printing without password (Quick authentication) Settings Description [General Settings] Select the authentication method to log in to the LDAP server. Select one appropriate for the authentication method used for your LDAP serv- • [Simple] • [Digest-MD5] • [GSS-SPNEGO] • [NTLM v1] •...
  • Page 184: Setting A Secondary Authentication Server Against Shutdown Of The Quick Authentication Server

    12.18 Printing without password (Quick authentication) Settings Description [Expira- Confirm whether the certificate is still valid. tion Date] [Confirm] is specified by default. [CN] Confirm whether CN (Common Name) of the certificate matches the server ad- dress. [Do Not Confirm] is specified by default. [Key Us- Confirm whether the certificate is used according to the intended purpose ap- age]...
  • Page 185 12.18 Printing without password (Quick authentication) Settings Description [Search Base 1] to Specify the starting point and range to search for a user to be authenticated. [Search Base 3] • [Search Base]: Specify the starting point to search for a target (using up to 255 characters).
  • Page 186 12.18 Printing without password (Quick authentication) Settings Description [Expira- Confirm whether the certificate is still valid. tion Date] [Confirm] is specified by default. [CN] Confirm whether CN (Common Name) of the certificate matches the server ad- dress. [Do Not Confirm] is specified by default. [Key Us- Confirm whether the certificate is used according to the intended purpose ap- age]...
  • Page 187: Using The Authentication Unit

    12.19 Using the authentication unit 12.19 Using the authentication unit 12.19.1 Setting operations of the authentication unit Authentication Unit (IC card type) If you use the optional Authentication Unit (IC card type), you can log in to this machine or execute a print job by the authentication that uses an IC card or NFC-compatible Android terminal.
  • Page 188: Configuring Basic Settings For The Ldap-Ic Card Authentication

    12.19 Using the authentication unit Configuring basic settings for the LDAP-IC card authentication In the administrator mode, select [User Auth/Account Track] - [LDAP-IC Card Authentication Setting] - [LDAP-IC Card Authentication Setting], set [LDAP-IC Card Authentication Setting] to [ON] (Default: [OFF]). In the administrator mode, select [User Auth/Account Track] - [LDAP-IC Card Authentication Setting] - [Server Registration] - [Edit], then register information of the LDAP server to be used for authenticating the user ID of the IC card.
  • Page 189: Using Ssl Communication

    12.19 Using the authentication unit Settings Description [User Name] Select how to obtain the user name when logging in to this machine. • [Use Card ID]: Select this option when only IC card information is registered on the server. Uses the card ID in the IC card as the user name. •...
  • Page 190 12.19 Using the authentication unit Setting a secondary authentication server automatically changes to the secondary authentication server even if the primary authentication server used for normal operations has shut down, thereby, enabling the LDAP- IC authentication to be continued. In the administrator mode, select [User Auth/Account Track] - [LDAP-IC Card Authentication Setting] - [Secondary Authentication Server Settings], then configure the following settings.
  • Page 191 12.19 Using the authentication unit Settings Description [Domain Name] Enter the domain name to log in to the LDAP server (using up to 64 characters). If [GSS-SPNEGO] is selected for [General Settings], enter the domain name of Active Directory. [Use Referral] Select whether to use the referral function, if necessary.
  • Page 192: Setting To Allow The User To Register The Ic Card In The Ldap Server

    12.19 Using the authentication unit Setting to allow the user to register the IC card in the LDAP server When authentication is performed on the machine using an IC card not registered in the LDAP server, con- figure a setting to allow the user to register the IC card in the LDAP server. The user can register information of a new IC card in the LDAP server, thereby, enabling the reduction of the user or administrator load.
  • Page 193: Using The Mfp Authentication Together Against In The Case Where An Enhanced Server Has Shut Down

    12.20 Using the MFP authentication together against in the case where an enhanced server has shut 12.20 Using the MFP authentication together against in the case where an enhanced server has shut down To manage users who use this machine via the enhanced server such as Authentication Manager, you can use the MFP authentication together against in the case where an enhanced server has shut down Using the enhanced server authentication and MFP authentication together, you can use the authentication information temporarily saved on the machine to log in and use the machine even if the enhanced server has...
  • Page 194 12.20 Using the MFP authentication together against in the case where an enhanced server has shut In the administrator mode, select [User Auth/Account Track] - [Max. Allowance Setting when Enhanced Server down], then configure the following settings. % [Max. Allowance Setting when Enhanced Server down] is displayed when [Temporarily Save Au- thentication Information] is set to [Enable] in Step 1.
  • Page 195: Setting A Secondary Authentication Server Against Shutdown Of An Authentication Server

    12.21 Setting a secondary authentication server against shutdown of an authentication server 12.21 Setting a secondary authentication server against shutdown of an authentication server When an external server is installed, you can set a secondary authentication server to prepare for a case in which the primary authentication server has shut down.
  • Page 196: Using A Mobile Terminal For Authentication Purposes

    12.22 Using a mobile terminal for authentication purposes 12.22 Using a mobile terminal for authentication purposes 12.22.1 Employing the NFC authentication Overview NFC is the standard for near-field communication that is used for connection between handheld terminals or other devices several tens of centimeters away each other. If NFC authentication is employed when user authentication is installed on this machine, you can only place your NFC-compatible Android terminal on the mobile touch area on the Control Panel of this machine to log in to this machine.
  • Page 197: 12.22.2 Employing Bluetooth Le Authentication

    12.22 Using a mobile terminal for authentication purposes Tips For details on how to operate NFC authentication, refer to the help of Mobile for Android. 12.22.2 Employing Bluetooth LE authentication Overview The Bluetooth LE is the standard for power-saving near-field communication that is used for connection be- tween handheld terminals or other devices several meters away each other.
  • Page 198 12.22 Using a mobile terminal for authentication purposes Tap [Printer Panel Login] on the home screen of Mobile for iPhone/iPad. This displays a list of devices compatible with Bluetooth LE communication. Select this machine from the device list. Authentication starts. If authentication succeeds, you can log in to this machine. Tips For details on how to operate Bluetooth LE authentication, refer to the help of Mobile for iPhone/iPad.
  • Page 199 12.22 Using a mobile terminal for authentication purposes [Web Management Tool] 12-52...
  • Page 200: Reinforcing Security

    Reinforcing Security...
  • Page 201: Creating A Certificate For This Machine To Communicate Via Ssl

    13.1 Creating a certificate for this machine to communicate via SSL Reinforcing Security 13.1 Creating a certificate for this machine to communicate via SSL Overview Communication between this machine and the computer can be encrypted with SSL to enhance security. A certificate for this machine is used for the SSL communication between the machine and the computer.
  • Page 202: Requesting The Certificate Authority For Issuing A Certificate

    13.1 Creating a certificate for this machine to communicate via SSL In the administrator mode, select [Security] - [PKI Settings] - [Device Certificate Setting] - [New Regis- tration] - [Create and install a self-signed Certificate.], and enter information required for creating a cer- tificate, then click [OK].
  • Page 203 13.1 Creating a certificate for this machine to communicate via SSL Settings Description [Admin. E-mail Ad- Enter the E-mail address of the administrator of this machine (using up to 128 dress] characters, excluding spaces). If the E-mail address of the administrator was already registered from [System Settings] - [Machine Setting] in the administrator mode, this field displays the registered E-mail address.
  • Page 204: Managing The Certificates For This Machine

    13.2 Managing the certificates for this machine 13.2 Managing the certificates for this machine 13.2.1 Using Different Certificates Depending on the Application This machine can manage multiple certificates and use different certificates depending on the application (protocol). In the administrator mode, click [Security] - [PKI Settings] - [Protocol Setting] - [Create], then select a certifi- cate to be used for the protocol.
  • Page 205: Exporting A Certificate

    13.2 Managing the certificates for this machine 13.2.2 Exporting a certificate Exporting a certificate to your computer The certificate for this machine can be exported to your computer. You can export the certificate if you wish to manage it on the computer or transfer it to other device. In the administrator mode, select [Security] - [PKI Settings] - [Device Certificate Setting] - [Setting] - [Ex- port Certificate], then click [OK].
  • Page 206: Importing A Certificate

    13.2 Managing the certificates for this machine 13.2.3 Importing a certificate Importing a certificate from your computer The exported certificate can be imported on this machine. In the administrator mode, select [Security] - [PKI Settings] - [Device Certificate Setting] - [New Regis- tration] - [Import Certificate], then click [OK].
  • Page 207: Configuring Certificate Verification Settings

    13.3 Configuring certificate verification settings 13.3 Configuring certificate verification settings 13.3.1 Verifying a certificate for peer You can configure the settings for verifying reliability of the certificate (expiration date, CN, key usage, etc.). To check the expiration of certificate, register the URL of the Online Certificate Status Protocol (OCSP) ser- vice.
  • Page 208: How To Import

    13.3 Configuring certificate verification settings Type Description [Trusted CA Intermedi- You must import the certificate of the intermediate certificate authority on this ate Certificate] machine in advance, if the submitted certificate is issued by an intermediate certificate authority. You must also import the root certificate of the CA, which certifies the interme- diate certificate authority, on this machine in advance.
  • Page 209: Registering User's Certificates Automatically On This Machine

    13.4 Registering user's certificates automatically on this machine 13.4 Registering user's certificates automatically on this machine Register a user's certificate used for encrypting E-mail message with S/MIME. The following two methods are available for registering a user's certificate: Registering a user's certificate as destination registration information when the E-mail address is reg- istered on this machine.
  • Page 210: Controlling The Access To This Machine By Ip Address

    13.5 Controlling the access to this machine by IP address 13.5 Controlling the access to this machine by IP address IPv4 address filtering The computers' access to this machine can be controlled via IP address. This is called "IP address filtering." You can specify both IPv4 addresses that are allowed to access this machine and those refused to access the machine.
  • Page 211: Using Ipsec Communication

    13.6 Using IPsec communication 13.6 Using IPsec communication Configure the setting if your environment requires IPsec. The IPsec technology prevents the falsification or leakage of data on the IP packet basis by using encryption technology. As IPsec encrypts data in the network layer, secure communication is ensured even if you use protocols in an upper layer or applications that do not support encryption.
  • Page 212 13.6 Using IPsec communication Settings Description [Authen- Select an authentication method. tication Method] [Local Select the authentication method of this machine when [IKEv2] is selected in Authenti- [Key Exchange Method]. cation Method] [Peer Au- Select the peer authentication method when [IKEv2] is selected in [Key Ex- thentica- change Method].
  • Page 213 13.6 Using IPsec communication From [Peer] in [IPsec Setting], click [Create] and register peers of this machine. % Up to 10 peers can be registered. Settings Description [Name] Enter the peer name (using 1 to 10 characters, excluding "). [Set IP Address] Specify the IP address of the peer.
  • Page 214 13.6 Using IPsec communication Settings Description [Certificate Verification To verify the certificate, select items to be verified. Level Settings] If you select [Confirm] at each item, the certificate is verified for each item. [Validity Confirm whether the certificate is still valid. Period] [Confirm] is specified by default.
  • Page 215: Using The Ieee802.1X Authentication

    13.7 Using the IEEE802.1X authentication 13.7 Using the IEEE802.1X authentication Configure the setting if your environment requires the IEEE802.1X authentication. Using IEEE802.1X authentication enables you to only connect devices authorized by administrators to the LAN environment. Devices that are not authenticated will not be allowed to even join the network, and this ensures rigid security.
  • Page 216 13.7 Using the IEEE802.1X authentication Settings Description [User ID] Enter a user ID (using up to 128 characters). This user ID is used for all EAP-Type options. [Pass- Enter a password with 128 characters. word] The password is used for all EAP-Type options other than [EAP-TLS]. To enter (change) the password, select the [Password is changed.] check box, then enter a new password.
  • Page 217: Sending Data To The Authenticated Share Folder (Scan To Authorized Folder)

    13.8 Sending data to the authenticated share folder (Scan to Authorized Folder) 13.8 Sending data to the authenticated share folder (Scan to Author- ized Folder) Scan to Authorized Folder Authentication information of the users who have logged in to this machine is used for accessing a shared folder on the network, allowing them to send original data scanned on this machine.
  • Page 218: Disabling User's Operation Of Registration/Change

    13.9 Disabling user's operation of registration/change 13.9 Disabling user's operation of registration/change This machine can disable the following user's operations: Registering/changing addresses Registering the biometric/IC card information Changing the sender address ("From" address) for E-mail transmissions Synchronizing user authentication and account track for each user Using the copy program and fax/scan program In the administrator mode, select [Security] - [Restrict User Access], then configure the following settings.
  • Page 219: Restricting User's Web Browser Setting Operations

    13.10 Restricting user's Web browser setting operations 13.10 Restricting user's Web browser setting operations Specify whether to allow the user to perform the following setting operations on the Web browser. Home page Start Up Page Web data (Cookie, Web Storage, or Indexed Database) Authentication information To restrict user's setting operations, select [Security] - [Security Details] - [Browser Setting User Open] in the administrator mode, then select [Restrict] (default: [Restrict]).
  • Page 220: Saving The Operation Log Of The Control Panel

    13.11 Saving the operation log of the control panel 13.11 Saving the operation log of the control panel The operation log on the Control Panel for scanning or sending faxes can be saved as a send operation log. The Control Panel of this machine can be used to save the log information of when and what keys are pressed.
  • Page 221: Enhancing The Security Of This Machine By Simple Operation

    13.12 Enhancing the security of this machine by simple operation 13.12 Enhancing the security of this machine by simple operation [Quick Security Setting] summarizes settings to enhance the security level of this machine. If the quick IP filtering function is employed, the range of the IP addresses accessible to this machine is set automatically, enabling you to quickly specify access restrictions.
  • Page 222 13.12 Enhancing the security of this machine by simple operation Settings Description [Quick IP Filtering] Allows you to restrict the devices that can access this machine using the IP ad- dress (IPv4/IPv6). The range of IP addresses for which access is to be restrict- ed is specified automatically.
  • Page 223: Restricting Functions Using The Usb Port

    13.13 Restricting functions using the USB port 13.13 Restricting functions using the USB port Restrict functions using the USB Port of this machine to enhance security. In the administrator mode, select [Security] - [USB Connection Permission setting], then configure the follow- ing settings.
  • Page 224: Restricting The Firmware Update Using A Usb Memory With A Password

    13.14 Restricting the firmware update using a USB memory with a password 13.14 Restricting the firmware update using a USB memory with a password Configure settings to prompt password entry when the service representative updates firmware of this ma- chine using a USB memory. In the administrator mode, select [Security] - [FW Update (USB) Permission Setting], then configure the fol- lowing settings.
  • Page 225 13.14 Restricting the firmware update using a USB memory with a password [Web Management Tool] 13-26...
  • Page 226: Managing The Machine Status

    Managing the Machine Status...
  • Page 227: Managing The Machine Power For Power Saving

    14.1 Managing the machine power for power saving Managing the Machine Status 14.1 Managing the machine power for power saving 14.1.1 Setting the Power key/Power save function The usage of the Power key on the Control Panel and settings relevant to the power save function of this machine can be changed.
  • Page 228: Switching To Power Save Mode At Specified Time (Weekly Timer)

    14.1 Managing the machine power for power saving Settings Description [Power Saving Select whether to give priority to the power saving when returning from the Fax/Scan] Sleep or sub power off mode to a mode other than the copy mode. When returning to a mode without printing such as the scan/fax mode, do not adjust the temperature of the Fusing Unit in this machine, reducing the power consumption.
  • Page 229: Returning The Machine From The Power Save Mode Via The Wireless Network

    14.1 Managing the machine power for power saving Settings Description [Use Overtime Pass- Select this check box to restrict the use of this machine in the Power Save mode word] using a password. Also enter the password (using up to eight characters, ex- cluding + and ").
  • Page 230: Configuring The Daylight Saving Time Settings

    14.2 Configuring the daylight saving time settings 14.2 Configuring the daylight saving time settings Enable the daylight saving time function on this machine. You can also set the daylight saving time to be au- tomatically enabled on this machine at the specified date. In the administrator mode, select [Maintenance] - [Daylight Saving Time], then configure the following set- tings.
  • Page 231: Customizing The Control Panel Environment

    14.3 Customizing the Control Panel environment 14.3 Customizing the Control Panel environment 14.3.1 Changing a Function to be Assigned to a Register Key You can select functions to be assigned to the hardkeys on the Control Panel and softkeys on the slide menu to suit your requirements.
  • Page 232: Changing The Theme Of The Main Menu

    14.3 Customizing the Control Panel environment Select a function to be assigned to a shortcut key. Settings Description [Function Name] Select a category of function to be assigned to a shortcut key. • [Not Set]: Do not create any shortcut key. •...
  • Page 233: Selecting Function Keys To Be Displayed On The Main Screen (Using A Display Pattern)

    14.3 Customizing the Control Panel environment 14.3.4 Selecting Function Keys to Be Displayed on the Main Screen (Using a Display Pattern) This machine provides three display patterns to display or hide function keys in each mode. The display pattern can be changed to any of the above three types depending on function key usage con- ditions.
  • Page 234: Allowing The Change Of Functions Keys In Each Mode

    14.3 Customizing the Control Panel environment Allowing the change of functions keys in each mode Allow a change of function keys to be displayed on the main screen in each mode. In the administrator mode, select [System Settings] - [Function Display Key Permission Setting], then set [Copy/Print] or [Send/Save] to [Allow].
  • Page 235: Changing The Keypad Display When Entering Number Of Sets

    14.3 Customizing the Control Panel environment 14.3.7 Changing the Keypad display when entering number of sets Select whether to always display the Keypad on the screen where you can enter the number of copies on the Touch Panel or display it when you tap the number of copies. In the administrator mode, select [System Settings] - [Display 10 Keypad when entering Number of Sets], then specify [Always] or [When Number of Sets is pressed] (default: [When Number of Sets is pressed]).
  • Page 236: Notifying Of The Machine Status Via E-Mail

    14.4 Notifying of the machine status via E-mail 14.4 Notifying of the machine status via E-mail Overview If a warning such as paper addition, toner replacement, or paper jam occurs on this machine, it can be sent to a registered E-mail address. To send the machine status via E-mail, follow the below procedure to configure the settings.
  • Page 237: Notifying Of The Machine Counter Via E-Mail

    14.5 Notifying of the machine counter via E-mail 14.5 Notifying of the machine counter via E-mail Overview The counter information managed by this machine can be sent to the registered E-mail address. The infor- mation is useful for seeing the picture of the machine operating status. To send the counter information via E-mail, follow the below procedure to configure the settings.
  • Page 238: Managing The Machine Via Snmp

    14.6 Managing the machine via SNMP 14.6 Managing the machine via SNMP Overview If you manage network devices using Simple Network Management Protocol (SNMP), you can acquire the information of this machine and monitor it via the network. This machine supports the TCP/IP environment. Using the SNMP TRAP function also enables you to notify the specified IP address of a warning that occurred on this machine.
  • Page 239 14.6 Managing the machine via SNMP Settings Description [Context Enter the context name (using up to 63 characters, excluding spaces, \, ', ", and Name] [Discov- Select this check box if you allow a user for detection. Enter a user name for ery User detection (using between 1 to 32 characters, excluding spaces, \, ', ", and #).
  • Page 240 14.6 Managing the machine via SNMP To notify of the machine status using SNMP TRAP function, select in the administrator mode [Mainte- nance] - [Status Notification Setting] - [IP Address] - [Edit], then configure the following settings. Settings Description [Notification Address] Specify the address to be notified of the machine status.
  • Page 241: Checking The Printer Information

    14.7 Checking the printer information 14.7 Checking the printer information 14.7.1 Checking the counter of this machine You can check the information of various types of counters such as the total counter and counters for re- spective functions. In the administrator mode, select [Maintenance] - [Meter Count] to check the information of various counters of this machine.
  • Page 242: Managing The Setting Information

    14.8 Managing the setting information 14.8 Managing the setting information 14.8.1 Writing the setting information to this machine (Import) Types of information that can be imported Various types of setting information, which are saved (exported) from this machine to your computer or the SMB sharing folder, can be written (imported) to this machine.
  • Page 243: Importing Information From An Smb Sharing Folder

    14.8 Managing the setting information Importing information from an SMB sharing folder In the administrator mode, select [Maintenance] - [Import/Export] to select the information to be import- ed, then click [Import]. Configure the required settings depending on the information to be imported. % To import the [Device Setting], [Authentication Information], or [Address], enter the password that was specified for export.
  • Page 244: Saving The Setting Information Of This Machine (Export)

    14.8 Managing the setting information 14.8.2 Saving the setting information of this machine (Export) Types of information that can be exported Various types of setting information of this machine can be saved (exported) to your computer or the SMB sharing folder. Use this function to back up various types of setting information of this machine or copy set- ting information.
  • Page 245: Resetting The Network Settings

    14.8 Managing the setting information Configure the required settings depending on the information to be exported. % If [Device Setting] is selected, select the export purpose from [Copy Settings] or [Backup Settings]. If you select [Copy Settings], select the type of the setting to be copied. % If you select [Device Setting], [Authentication Information], or [Address], enter the password as re- quired.
  • Page 246: Outputting Job Logs

    14.9 Outputting job logs 14.9 Outputting job logs Operations required to use Closed Network RX You can download logs of the jobs executed on this machine. You can check usage, paper usage, operations and job history for each user or account in the job log. For details on viewing the output job logs, contact your service representative.
  • Page 247: Backing Up Setting Information Of This Machine

    14.10 Backing up Setting Information of this Machine 14.10 Backing up Setting Information of this Machine Backing up data to the server Configure settings to back up setting data of this machine to the server. In the administrator mode, select [Maintenance] - [Backup Settings] - [Server BackUp Settings], then config- ure the following settings.
  • Page 248 14.10 Backing up Setting Information of this Machine To restore backup data, select [Utility] - [Administrator Settings] - [Security Settings] - [Data Backup] on the Control Panel. [Web Management Tool] 14-23...
  • Page 249: Setting The Operating Environment For This Machine

    14.11 Setting the operating environment for this machine 14.11 Setting the operating environment for this machine 14.11.1 Configuring default settings for Normal Display and Enlarge Display collec- tively Select whether to arrange a single setting key for [Default Copy Settings] and [Default Enlarge Display Set- tings], or [Default Scan/Fax Settings] and [Default Enlarge Display Settings].
  • Page 250: 14.11.4 Changing The Default Scan Data File Name

    14.11 Setting the operating environment for this machine 14.11.4 Changing the default scan data file name Change the default file name of scanned original data when saving it. The file name is:"initial of the function" + "text to be added" + "date" + "sequential number" + "page number" + "file extension".
  • Page 251: 14.11.8 Setting The Skip Job Conditions

    14.11 Setting the operating environment for this machine 14.11.8 Setting the skip job conditions When a job being output is stopped by a warning such as shortage of paper, overloaded output tray, or un- matched paper, the subsequent job can be executed. This is called "Skip Job." Whether to skip the current job can be selected for each case where the subsequent job is a fax job or it is other than a fax job.
  • Page 252: 14.11.12 Allowing Acquisition Of Machine Usage Information

    14.11 Setting the operating environment for this machine 14.11.12 Allowing acquisition of machine usage information Select whether to allow us to acquire log data pertaining to the machine usage. If log acquisition is allowed, the logging process starts immediately, which makes it useful if you need to ana- lyze the cause of a problem that may occur later on this machine or to improve the product quality.
  • Page 253: Using An Advanced Function By Registering The License

    14.12 Using an advanced function by registering the license 14.12 Using an advanced function by registering the license 14.12.1 Issuing the request code To use an advanced function by registering the optional license kit with this machine, you must access the License Management Server (LMS) to obtain the function and license codes.
  • Page 254: Updating The Firmware Of This Machine

    14.13 Updating the firmware of this machine 14.13 Updating the firmware of this machine Overview You can externally download firmware and configuration information of this machine to update them. You can keep using the machine even while downloading firmware or configuration information. To externally download firmware and configuration information of this machine and update them, follow the procedure shown below.
  • Page 255: Updating The Firmware Automatically At The Specified Time

    14.13 Updating the firmware of this machine Settings Description [Proxy Authentication] Select whether to use Proxy Authentication. [OFF] is specified by default. • [User Name]: Enter the login name used for proxy authentication (using up to 32 characters). • [Password]: Enter the password of the user name you entered into [User Name] (using up to 32 characters).
  • Page 256: Automatically Updating Firmware Of This Machine Or Other Devices

    14.14 Automatically updating firmware of this machine or other devices 14.14 Automatically updating firmware of this machine or other devices 14.14.1 Configuring settings to update firmware of this machine This machine can automatically update its firmware and configuration information. In this step, configure settings so that this machine monitors the firmware update server on the network at periodic intervals to automatically download and update the latest firmware and configuration information.
  • Page 257 14.14 Automatically updating firmware of this machine or other devices To automatically update configuration information of this machine, in the administrator mode, select [Network] - [Machine Update Settings] - [Machine Auto Update Settings] - [Machine Update Password], then enter the password to decode the encrypted configuration file (using up to 32 characters). % To enter (change) the decryption passphrase, select the [Change Machine Update Password] check box, then enter a new decryption passphrase.
  • Page 258: 14.14.2 Configuring Settings To Update Firmware Of Other Devices

    14.14 Automatically updating firmware of this machine or other devices 14.14.2 Configuring settings to update firmware of other devices Configure settings to operate this machine as a relay server. Operating this machine as a relay server allows you to establish a relay between a different firmware update server on the network and other devices to distribute firmware to them.
  • Page 259 14.14 Automatically updating firmware of this machine or other devices Settings Description [User Enter the user name to connect to the firmware update server (using up to 64 Name] characters). [Pass- Enter the password of the user name you entered into [User Name] (using up to word] 64 characters, excluding ").
  • Page 260 14.14 Automatically updating firmware of this machine or other devices Settings Description [Proxy Authentication] Select whether to use Proxy Authentication. • [User Name]: Enter the login name used for proxy authentication (using up to 32 characters). • [Password]: Enter the password of the user name you entered into [User Name] (using up to 32 characters).
  • Page 261: Returning The Updated Firmware To The Previous Version

    14.15 Returning the updated firmware to the previous version 14.15 Returning the updated firmware to the previous version Return the firmware of this machine to the previous version. In the administrator mode, select [Network] - [Machine Update Settings] - [Firmware Rollback], then click [Rollback].
  • Page 262: Checking Whether Settings Are Updated

    14.16 Checking whether settings are updated 14.16 Checking whether settings are updated If settings are changed via Web Connection when a job is running, it notifies the administrator that a setting change will not be immediately updated. In the administrator mode, select [Maintenance] - [Confirm update settings for Held Jobs.] to check whether settings are updated.
  • Page 263: Enabling Functions That Require The Authentication By An External Institution

    14.17 Enabling functions that require the authentication by an external institution 14.17 Enabling functions that require the authentication by an external institution Some functions that require the authentication by an external institution are disabled at product shipment. After authentication has been obtained, enter the target function code to enable the function. In the administrator mode, select [Maintenance] - [Authorization function Setting] - [Enable Function], and en- ter the function code, then click [OK].
  • Page 264: Registering Various Types Of Information

    Registering Various Types of Information...
  • Page 265: Registering Address Books

    15.1 Registering address books Registering Various Types of Information 15.1 Registering address books 15.1.1 Registering E-mail Address E-mail addresses can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer. When using S/MIME function, you can register a user certificate an the E-mail address.
  • Page 266: Registering An Smb Destination

    15.1 Registering address books Settings Description [Host Address] Enter the host name or IP address of the destination FTP server (using up to 253 characters). • Example of host name entry: "host.example.com" • Example of IP address (IPv4) entry: "192.168.1.1" •...
  • Page 267: Registering A Webdav Destination

    15.1 Registering address books Settings Description [User ID] Enter the name of a user who is authorized to access the folder specified in [File Path] (using up to 64 characters). [Password] Enter the password of the user you entered into [User ID] (using up to 64 char- acters, excluding ").
  • Page 268: Registering A User Box

    15.1 Registering address books 15.1.5 Registering a User Box A User Box can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer. In the administrator mode, select [Store Address] - [Address Book] - [New Registration] - [User Box], then click [OK] to configure the following settings.
  • Page 269: Registering An Internet Fax Address

    15.1 Registering address books Settings Description [Communication Set- As necessary, click [Display] and specify how to send a fax to a destination you ting] wish to register. You may change the settings you made here before sending a fax. • [V34 Off]: V.34 is a communication mode used for super G3 fax communi- cation.
  • Page 270: Registering An Ip Address Fax Destination

    15.1 Registering address books 15.1.8 Registering an IP Address Fax Destination An IP address fax destination can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer. In the administrator mode, select [Store Address] - [Address Book] - [New Registration] - [IP Address Fax], then click [OK] to configure the following settings.
  • Page 271: Registering A Group

    15.2 Registering a Group 15.2 Registering a Group A group can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer. Multiple one-touch destinations can be grouped and managed as a single group.
  • Page 272: Registering A Program

    15.3 Registering a program 15.3 Registering a program 15.3.1 Registering an E-mail address program A program can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer. A combination of address information and the fax/scan transmission option settings can be registered in a program.
  • Page 273: Registering An Smb Program

    15.3 Registering a program Settings Description [Basic Setting]/[Appli- Configure the Scan option settings. cation Setting] For details, refer to page 15-14. [Limiting Access to Limit access to this destination, if necessary. Destinations] For details, refer to page 12-27. 15.3.3 Registering an SMB program A program can be registered or edited using Web Connection.
  • Page 274: Registering A User Box Program

    15.3 Registering a program Settings Description [Destination Informa- Click [Search from List], and select a destination WebDAV from the list. Click tion] [Check Destination] to check registered address books. If you wish to manually enter a destination WebDAV, select [Direct Input] and enter the WebDAV.
  • Page 275: Registering A Fax Address Program

    15.3 Registering a program 15.3.6 Registering a fax address program A program can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer. A combination of address information and the fax/scan transmission option settings can be registered in a program.
  • Page 276: Registering An Ip Address Fax Program

    15.3 Registering a program 15.3.8 Registering an IP address fax program A program can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer. A combination of address information and the fax/scan transmission option settings can be registered in a program.
  • Page 277: 15.3.10 Registering A Program Without Destination

    15.3 Registering a program Settings Description [Limiting Access to Limit access to this destination, if necessary. Destinations] For details, refer to page 12-27. 15.3.10 Registering a program without destination A program can be registered or edited using Web Connection. Although character input is a difficult process using the Touch Panel, it can be carried out easily if you use the computer.
  • Page 278 15.3 Registering a program Settings Description [Searchable PDF] This option is available when [File Type] is set to [PDF] or [Compact PDF] while the searchable PDF function is enabled. Selecting [ON] creates a searchable PDF file using OCR character recognition technology.
  • Page 279 15.3 Registering a program Settings Description [Separate Scan] When there are too many original sheets that cannot be loaded into the ADF at the same time, if you load them in several batches and handle them as one job, select [ON]. You can also scan the original using both ADF and Original Glass alternately.
  • Page 280 15.3 Registering a program Settings Description [Despeckle] Selecting [ON] scans an original using the ADF while removing dusts on the Slit Scan Glass. [OFF] is specified by default. [Book Original] Select this option if you scan two-page spreads such as book and catalog sep- arately into the left and right pages, or scan a page spread as a single page.
  • Page 281: Registering A Temporary One-Touch Destination

    15.4 Registering a temporary one-touch destination 15.4 Registering a temporary one-touch destination The temporary one-touch function registers a combination of address information and the fax/scan transmis- sion option settings temporarily with this machine. A temporary one-touch destination is deleted once data is sent to the registered destination or when the ma- chine is turned OFF.
  • Page 282: Registering The Subject And Body Of An E-Mail

    15.5 Registering the subject and body of an E-mail 15.5 Registering the subject and body of an E-mail Registering the subject Register the subject used for sending E-mail messages or Internet faxes. Up to 10 subjects can be registered, and a subject can be selected from them before transmission. In the administrator mode, select [Store Address] - [Subject] - [Edit], and enter a subject to be registered in [Subject] (using up to 64 characters, excluding a symbol "•").
  • Page 283: Registering A Prefix And Suffix Of Each Destination

    15.6 Registering a prefix and suffix of each destination 15.6 Registering a prefix and suffix of each destination Register a prefix and suffix of an E-mail address. If a domain contains many E-mail addresses, register a character string (domain name) following an at mark @ as a suffix.
  • Page 284: Registering The Information To Be Added To Header/Footer

    15.7 Registering the information to be added to header/footer 15.7 Registering the information to be added to header/footer When printing an original, you can recall the registered header/footer and print it at the top or bottom of a page. Up to 20 headers/footers can be registered. In the administrator mode, select [System Settings] - [Stamp Settings] - [Header/Footer Registration] - [Edit], then configure the following settings.
  • Page 285: Adding A Font/Macro

    15.8 Adding a font/macro 15.8 Adding a font/macro Add a font or macro to this machine. Also delete the registered font or macro. In the administrator mode, select [Maintenance] - [Edit Font/Macro] - [New Registration], then configure the following settings. Settings Description [Type]...
  • Page 286: Registering A Paper Name And Paper Type

    15.9 Registering a paper name and paper type 15.9 Registering a paper name and paper type Register a paper name and paper type as custom paper. Custom paper can be added to the paper type op- tion. In the administrator mode, select [System Settings] - [Set Paper Name by User], then set [Set Paper Name by User] to [ON].
  • Page 287: Using Data Management Utility

    15.10 Using data management utility 15.10 Using data management utility 15.10.1 Data Management Utility Data Management Utility is a tool capable of managing copy protect data, stamp data, and font/macro data of this machine from a computer on the network. Start up Data Management Utility from the Web Connection login page.
  • Page 288 15.10 Using data management utility To register or edit the copy protect data, click [Edit]. % Clicking [Delete] deletes the registered copy protect data. The copy protect data will not be deleted until you click [Export to the device] and write it to this machine. Register or edit the copy protect data, and click [OK].
  • Page 289: 15.10.3 Managing The Stamp Data

    15.10 Using data management utility 15.10.3 Managing the stamp data You can register or edit stamp data using Data Managing Utility. Up to eight units of stamp data can be man- aged. You cannot edit or delete stamp data that was registered on this machine when it was shipped. This function is available when the Web browser function is disabled.
  • Page 290: 15.10.4 Managing The Font/Macro Data

    15.10 Using data management utility Tips Clicking [System] displays the system menu. The following menu items are available in the system menu. [Auto Protect Setting]: Lock the computer screen if a specified amount of time has elapsed without the machine being operated. You can change the time until the screen is locked. [Export]: Save the data registered on this machine to the computer as a file.
  • Page 291 15.10 Using data management utility Specify the font or macro to be added, and click [OK]. Settings Description [Type] Select a type of font or macro to be added. [Destination] Select where to save font or macro. • [HDD]: Save the font or macro to the hard disk on this machine. •...
  • Page 292: Associating With External Application

    Associating with External Application...
  • Page 293: Using The Web Browser Function

    16.1 Using the Web browser function Associating with External Application 16.1 Using the Web browser function 16.1.1 Configuring Basic Settings for Web browser Enabling the Web browser function If the Web browser function is enabled on this machine, you can display or print contents on websites and upload files via the Web browser using the Touch Panel of this machine.
  • Page 294: Setting Up The Web Browser Operating Environment

    16.1 Using the Web browser function 16.1.2 Setting up the Web browser operating environment Configuring settings to display contents Configure settings to display contents of the Web browser. In the administrator mode, select [System Settings] - [Web Browser Setting] - [General], then configure the following settings.
  • Page 295: Setting Web Browser Operations

    16.1 Using the Web browser function Setting Web browser operations Configure settings for Web browser operations. In the administrator mode, select [System Settings] - [Web Browser Setting] - [Detail Settings], then configure the following settings. Settings Description [Cache] Configure the cache function of the Web browser as necessary. •...
  • Page 296: Associating Via Tcp Socket

    16.2 Associating via TCP Socket 16.2 Associating via TCP Socket Overview To use application software that communicates with this machine via TCP Socket, configure the TCP Socket settings of this machine. If a certificate for this machine is registered, you can encrypt communication between the machine and ap- plication software using SSL.
  • Page 297: Associating Via Openapi

    16.3 Associating via OpenAPI 16.3 Associating via OpenAPI Overview To use application software that communicates with this machine via OpenAPI, configure the OpenAPI set- tings of this machine. If a certificate for this machine is registered, you can use SSL to encrypt communication between this ma- chine and a client when the machine acts as a server.
  • Page 298: Using The Proxy Server

    16.3 Associating via OpenAPI Using the proxy server When the proxy server is used in your network environment, you can configure settings to communicate with applications via the proxy server. To use the proxy server, register the proxy server information on this machine. In addition, configure the set- tings for connection to the proxy server.
  • Page 299: Using The Single Sign-On

    16.3 Associating via OpenAPI Settings Description [Client Select whether to request a certificate from clients that connect to this machine. Certifi- [Do not request] is specified by default. cates] [Validity Confirm whether the certificate is still valid. Period] [Confirm] is specified by default. [CN] Confirm whether CN (Common Name) of the certificate matches the server ad- dress.
  • Page 300: Using The Machine Ftp Server For Association

    16.4 Using the machine FTP server for association 16.4 Using the machine FTP server for association Overview To use application software with which the FTP server of this machine is used to communicate, configure the FTP server. To use the FTP server of this machine for the association, follow the below procedure to configure the set- tings.
  • Page 301: Using The Machine Webdav Server For Association

    16.5 Using the machine WebDAV server for association 16.5 Using the machine WebDAV server for association Overview To use application software with which the WebDAV server of this machine is used to communicate, config- ure the WebDAV server function. If a certificate for this machine is registered, you can encrypt communication between the machine and ap- plication software using SSL.
  • Page 302: Releasing The Association With Application

    16.6 Releasing the association with application 16.6 Releasing the association with application You can set this to prevent this machine from being connected to the server when an error occurs on the server while My Panel Manager or My Print Manager is running. In the administrator mode, select [System Settings] - [System Connection Setting] - [System Connection Set- ting], then configure the following settings.
  • Page 303: Associating With The Distributed Scan Server

    16.7 Associating with the distributed scan server 16.7 Associating with the distributed scan server Overview This machine can be integrated into the system using the Distributed Scan Management. The Distributed Scan Management is a function of Windows Server 2008 R2/Server 2012/Server 2012 R2, integrating scan- ner devices supporting the function into the document workflow of an organization.
  • Page 304: Associating With The Thinprint System

    16.8 Associating with the ThinPrint system 16.8 Associating with the ThinPrint system Configure settings to enable the ThinPrint function in this machine. ThinPrint is a function that realizes speedy printing by performing data compression or broadband control when sending a print job from ThinPrint Engine (.print Engine) to ThinPrint Client (.print Client). This machine operates as ThinPrint Client (.print Client).
  • Page 305 16.8 Associating with the ThinPrint system Settings Description [Server Connection Displays the status of the connection with Connection Service. Status] Clicking [Refresh] updates the status. [Web Management Tool] 16-14...
  • Page 306: Allowing For Upload Of Contents To This Machine

    16.9 Allowing for upload of contents to this machine 16.9 Allowing for upload of contents to this machine If the Internal Web Server (IWS) function is enabled, you can transfer Web page contents to this machine and use the machine as a Web server. Transfer the Web page contents to this machine using WebDAV.
  • Page 307: Associating With The Remote Diagnosis System

    16.10 Associating with the remote diagnosis system 16.10 Associating with the remote diagnosis system 16.10.1 Registering a proxy server used for remote diagnosis To use a proxy server for using a service that diagnoses the machine status remotely, register the proxy serv- er information with this machine.
  • Page 308: 16.10.4 Allowing Read And Write Of The Machine Setting Information

    16.10 Associating with the remote diagnosis system 16.10.4 Allowing read and write of the machine setting information When using a service that diagnoses the machine status remotely, addresses (address book, group, and pro- gram) registered with this machine and authentication information (user authentication and account track) can be imported or exported from/to the remote diagnosis system.
  • Page 309: Associating With The Fax Server

    16.11 Associating with the fax server 16.11 Associating with the fax server Overview When using a fax server, you can configure the server for registering and using applications. When using the fax server communicates in the E-mail format, you can configure settings to automatically add a prefix and suffix to a destination number.
  • Page 310: Application Setting Templates

    16.11 Associating with the fax server In the [Function Setting] page of the selected custom item, configure the following settings. Settings Description [Button Name] Enter the button name (using up to 16 characters). [Function Name] Select a function name. [Message on Panel] Enter the name to be displayed on the Touch Panel (using up to 32 charac- ters).
  • Page 311 16.11 Associating with the fax server [No.] [Button Name] [Function Name] [Keyboard [Default [Options] Type] Value] [Cover Sheet [CoverSheet] Not specified. Not speci- Not specified. Type] fied. [Hold For Pre- [Hold For Preview] Not specified. Not speci- [No] view] fied. [Secure Docs] [No.] [Button Name]...
  • Page 312: Associating With The Fax Server Communicating In E-Mail Format

    16.11 Associating with the fax server Associating with the fax server communicating in E-Mail format When using a fax server that communicates in the E-mail format, a prefix and a suffix can be automatically added to the destination number. In the administrator mode, select [System Settings] - [System Connection Setting] - [System Connection Set- ting], then configure the following settings.
  • Page 313: Operating The Machine Control Panel Remotely

    16.12 Operating the machine Control Panel remotely 16.12 Operating the machine Control Panel remotely Overview The Control Panel of this machine can be operated remotely from a computer on the network. The following three methods are available for operating the Control Panel. Operation procedure Description Using the dedicated...
  • Page 314: Accessing The Machine Directly

    16.12 Operating the machine Control Panel remotely Settings Description [Validity Confirm whether the certificate is still valid. Period] [Do Not Confirm] is specified by default. [CN] Confirm whether CN (Common Name) of the certificate matches the server ad- dress. [Do Not Confirm] is specified by default. [Key Us- Confirm whether the certificate is used according to the intended purpose ap- age]...
  • Page 315: Using An Android/Ios Terminal For Operations

    16.12 Operating the machine Control Panel remotely Settings Description [Password Authentica- Select whether to request password entry for connecting with this machine. To tion] request for a password entry, select [ON], and enter the password (using up to 64 characters). To enter (change) the password, select the [Password is changed.] check box, and enter the current password and new password.
  • Page 316 16.12 Operating the machine Control Panel remotely Settings Description [Keyboard Link] Select whether to allow text to be entered from the text entry application on the Android/iOS terminal. You can enter characters using the keyboard, handwriting, or voice input func- tion.
  • Page 317: Customizing The Openapi Application Key Arrangement On The Main Menu

    16.13 Customizing the OpenAPI application key arrangement on the main menu 16.13 Customizing the OpenAPI application key arrangement on the main menu Overview If the OpenAPI application is registered on this machine, the application shortcut keys registered on this ma- chine are displayed within Registered Application List Key (default: [APP]) on the main menu.
  • Page 318 16.13 Customizing the OpenAPI application key arrangement on the main menu In the administrator mode, select [System Settings] - [Registered Application List Setting] - [Registered Application Join Group Setting], then select the application to be registered in the group and click [Edit]. Select the group that the selected application belongs to, and click [OK].
  • Page 319: Associating This Machine With An Android/Ios Terminal Using The Qr Code

    16.14 Associating this machine with an Android/iOS terminal using the QR code 16.14 Associating this machine with an Android/iOS terminal using the QR code Displaying network information of this machine using the QR code Configure settings to display network information of this machine as the QR code on the screen of this ma- chine.
  • Page 320: Associating This Machine With An Android/Ios Terminal Using Nfc

    16.15 Associating this machine with an Android/iOS terminal using NFC 16.15 Associating this machine with an Android/iOS terminal using NFC Setting network information of this machine via NFC NFC is the standard for near-field communication that is used for connection between handheld terminals or other devices several tens of centimeters away each other.
  • Page 321: Connecting An Android Terminal To This Machine Via Nfc Using Remote Access

    16.15 Associating this machine with an Android/iOS terminal using NFC Place the Android terminal on the mobile touch area on the Control Panel of this machine. % If the Android terminal is in the sleep mode (the screen is off) or the screen is locked, cancel the sleep mode of the Android terminal, unlock the screen, then place the Android terminal on the mo- bile touch area.
  • Page 322: Associating This Machine With An Ios Terminal Using Bluetooth Le

    16.16 Associating this machine with an iOS terminal using Bluetooth LE 16.16 Associating this machine with an iOS terminal using Bluetooth LE Enabling the Bluetooth LE function on this machine The Bluetooth LE is the standard for power-saving near-field communication that is used for connection be- tween handheld terminals or other devices several meters away each other.
  • Page 323: Connecting An Ios Terminal To This Machine Via Remote Access Using Bluetooth Le

    16.16 Associating this machine with an iOS terminal using Bluetooth LE This machine and the iOS terminal must be connected to the same wireless LAN environment. The steps below must be executed near this machine. Start Mobile for iPhone/iPad on the iOS terminal to display the screen that allows you to register a device.

Table of Contents

Save PDF