Fujitsu FI-6010N User Manual

P3PC-2962-06ENZ0
fi-6010N Network Scanner
Operator's Guide

Contents

Copyright .................................................................................... xv
Introduction ............................................................................... xxi
Regulatory Information .............................................................. xxii
Trademarks ..................................................................................xxiv
Disclaimer of Liability ............................................................... xxvii
Safety Precautions ........................................................................xxx
Chapter 1 Scanner Overview ................................................. 1
1.1 Scanner Features ............................................................ 2
Basic uses for scanned documents .................................. 2
Configure and manage with ease ..................................... 3
Advanced security measures ........................................... 4
1.2 Part Names and Functions ............................................. 5
1.2.1 External Parts ........................................................................ 5
1.2.2 Internal Parts ......................................................................... 7
1.3 User Types and Operations ............................................ 8
1.4 System Requirements ................................................... 14
1.4.1 Requirements for Admin Tool.............................................. 14
Software (English Versions) ........................................... 14
Hardware ........................................................................ 15
1.4.2 Requirements for Related Servers ...................................... 16
LDAP Server .................................................................. 18
SMTP Server .................................................................. 18
File Server ...................................................................... 18
fi-6010N Network Scanner Operator's Guide i
SharePoint Server .......................................................... 18
FTP Server ..................................................................... 18
Print Server .................................................................... 19
DNS Server .................................................................... 19
WINS Server .................................................................. 19
DHCP Server .................................................................. 19
NTP Server ..................................................................... 19
Fax Server ...................................................................... 19
1.4.3 Port Number List.................................................................. 20
Chapter 2 Basic Scanner Operations .................................. 21
2.1 Turning the Power On/Off ............................................. 22
Turning the Power On .................................................... 22
Turning the Power Off .................................................... 23
2.2 Using the Scanner Buttons .......................................... 24
2.2.1 Using the Startup Button ..................................................... 24
2.2.2 Using the Top Cover [SCAN] Button ................................... 26
2.3 Using the LCD Touch Panel ......................................... 27
2.4 Using the Keyboard ....................................................... 28
2.4.1 Using the Keyboard: Administrator...................................... 28
2.4.2 Using the Keyboard: Regular Users .................................... 29
Chapter 3 Administrator Operations (Overview) .............. 31
3.1 Operating and Managing Scanners ............................. 32
3.2 Required Scanner Function Settings .......................... 33
Chapter 4 Administrator Operations
(LCD Touch Panel and Admin Tool) ................... 37
ii
4.1 Administrator Screens via the LCD Touch Panel ....... 38
4.2 Administrator Screens via the Admin Tool ................. 40
4.3 iScanner Administrator Login: via the LCD Touch
Panel .............................................................................. 42
4.4 Setting up for Administrator Access via the Admin
Tool ................................................................................. 44
4.4.1 Checking the Internet Explorer Cache Settings................... 44
4.4.2 Setting the Internet Explorer Trusted Sites.......................... 45
4.4.3 Installing the Admin Tool ..................................................... 47
4.4.4 Uninstalling the Admin Tool................................................. 52
4.5 iScanner Administrator Login: via the Admin
Tool ................................................................................ 53
4.6 Using the System Settings Menus ............................... 56
4.6.1 Calibrating the LCD Touch Panel ....................................... 56
4.6.2 Setting the Scanner Name ................................................. 59
4.6.3 Setting the Language ......................................................... 62
4.6.4 Setting the Region/Timezone ............................................. 63
4.6.5 Setting the Date/Time ......................................................... 64
4.6.6 Setting the Time to Standby Mode ..................................... 66
4.6.7 Setting the Login Method .................................................... 68
4.6.8 Setting the LAN Manager Authentication Level................... 73
4.6.9 Changing the Admin Password .......................................... 75
4.6.10 Setting a File Name Format for When Saving
Scanned Data ..................................................................... 76
4.6.11 Setting a File Name Format for When Attaching
Scanned Data to e-Mail ...................................................... 80
4.6.12 Setting the Multifeed Detection Method .............................. 82
4.6.13 Setting Scanning Performance ........................................... 85
Offset Settings ................................................................ 86
Length Magnification Setting .......................................... 86
fi-6010N Network Scanner Operator's Guide iii
4.6.14 Setting General Scanner Settings ...................................... 87
4.6.15 Managing Certificates.......................................................... 88
Importing a Certificate File ............................................. 88
Deleting a Certificate File ............................................... 89
4.7 Using the Network Settings Menus ............................. 90
4.7.1 Giving the Scanner an IP Address ..................................... 90
4.7.2 Setting the Admin Network ................................................. 92
4.7.3 Setting a Central Admin Server .......................................... 94
4.7.4 Setting the DNS Server ...................................................... 98
4.7.5 Setting the WINS Server .................................................. 100
4.7.6 Setting the NTP Server ..................................................... 101
4.7.7 Setting the Proxy Server ................................................... 103
4.7.8 Setting the Login LDAP Server ......................................... 105
LDAP Search Target .................................................... 109
4.7.9 Setting the e-Mail LDAP Server ........................................ 114
4.7.10 Setting the LDAP Search Parameters .............................. 117
4.7.11 Setting the e-Mail Server (SMTP Server) ......................... 122
4.7.12 Setting the Fax Server ...................................................... 124
4.7.13 Setting the Network Printers ............................................. 125
Checking the Printer Drivers ........................................ 126
Setting the Printer Properties ....................................... 127
Registering a Network Printer (Network Tree) ............. 130
Registering a Network Printer (Network Path) ............. 133
Renaming a Network Printer ........................................ 135
Removing a Network Printer ........................................ 136
Viewing the Printer Details ........................................... 137
4.7.14 Setting the Network Folders ............................................. 138
Registering a Network Folder (Network Tree) .............. 139
Registering a Network Folder (Network Path) .............. 142
Registering a Network Folder (FTP Path) .................... 144
Renaming a Network Folder ......................................... 147
Removing a Network Folder ......................................... 149
Viewing the Network Folder Details ............................. 150
4.7.15 Setting the SharePoint Folders ......................................... 151
iv
Renaming a SharePoint Folder (Display Name) .......... 153
Removing a SharePoint Folder .................................... 154
4.7.16 Setting the Destination for Alert Notifications ................... 155
4.7.17 Checking the Network Connection with a Ping Test ......... 156
4.7.18 Checking the Network Operating Status .......................... 158
Checking the Network Status ....................................... 158
Setting the Link Speed/Duplex Mode ........................... 159
4.8 Using the Device Status Menus ................................. 160
4.8.1 Viewing the System Status ............................................... 160
4.8.2 Viewing the Status of Installed Options ............................ 161
4.8.3 Viewing the Usage Status ................................................ 162
Viewing the Status of Consumable Parts ..................... 162
Resetting the Usage Counter ....................................... 163
4.8.4 Viewing the Add-in Status ................................................ 164
4.9 Using the Operation Logs Menus .............................. 165
4.9.1 Managing the User Log ..................................................... 165
Viewing the User Log Details ...................................... 165
Downloading the User Logs in CSV Format ................ 167
Clearing the User Logs ................................................ 167
4.9.2 Managing the System Log................................................. 168
Viewing the System Log Details .................................. 168
Downloading the System Log in CSV Format ............. 170
Clearing the System Log ............................................. 170
4.10 Using the Maintenance Menus ................................... 171
4.10.1 Maintaining the User Data Store ...................................... 171
Backing up the User Data Store ................................... 173
Restoring the User Data Store ..................................... 175
Clearing the User Data Store ....................................... 176
4.10.2 Maintaining the System Settings ...................................... 177
Downloading the System Settings in CSV Format ....... 177
Backing up System Settings ......................................... 178
Restoring System Settings ........................................... 179
Resetting Factory Defaults ........................................... 181
fi-6010N Network Scanner Operator's Guide v
4.10.3 Updating the Scanner's System Software ........................ 182
4.10.4 Checking for New Updates ................................................ 184
Checking for New Updates Manually ........................... 184
Checking for Updates at Scanner Startup .................... 185
Requesting e-Mail Notification When a New
Update is Available ....................................................... 185
4.10.5 Maintaining Add-in Modules .............................................. 186
Installing an Add-in Module ......................................... 186
Uninstalling an Add-in Module ..................................... 187
Uploading an Add-in Settings File ............................... 187
4.10.6 Setting the Information Output Level ................................ 188
4.10.7 Obtaining Technical Support ............................................ 189
4.11 Setting Job Features ................................................... 190
4.11.1 Job Setting Quick User Guide ........................................... 192
4.11.2 Setting a Job Sequence ................................................... 194
Adding a job sequence ................................................. 194
Cloning a job sequence ................................................ 206
Editing a job sequence ................................................. 206
Deleting a job sequence ............................................... 207
Filtering job sequences ................................................ 207
Filtering the LDAP List .................................................. 208
4.11.3 Setting a Job Menu ........................................................... 212
Adding a job menu ....................................................... 212
Cloning a job menu ...................................................... 217
Editing a job menu ........................................................ 217
Deleting a job menu ..................................................... 218
Viewing the detailed settings for a job menu ................ 218
4.11.4 Setting a Job Group .......................................................... 219
Adding a job group ....................................................... 219
Editing a job group ....................................................... 224
Deleting a job group ..................................................... 224
Viewing the detailed settings for a job group ................ 225
Assigning job menus to users not included in a job
group ............................................................................ 225
Filtering the LDAP List .................................................. 227
vi
4.12 Getting a Screenshot on the LCD Touch Panel ........ 231
Chapter 5 Administrator Operations
(Central Admin Console) ................................... 235
5.1 Downloading the Central Admin Server Software .... 236
5.2 Downloading the Central Admin Console ................. 238
5.3 Configuring the Scanner Settings for
Central Admin Management ....................................... 240
Chapter 6 Regular User Operations .................................. 241
6.1 Loading Documents .................................................... 242
6.1.1 How to Load Documents ................................................... 242
6.1.2 Loading Documents Using a Carrier Sheet ....................... 245
6.2 Using LCD Touch Panel Screens: Regular User ...... 248
6.2.1 Common Buttons and Indicators ....................................... 248
6.2.2 Regular User Settings Overview ....................................... 249
6.2.3 Main Menu Screen ............................................................ 250
6.2.4 Job Menu Screen .............................................................. 252
6.3 Logging in: Regular User Mode ................................. 255
6.4 Sending the Scanned Data by e-Mail ......................... 258
6.4.1 Selecting an e-Mail Target from the e-Mail Address
Book .................................................................................. 263
6.4.2 Adding an e-Mail Target to the e-Mail Address
Book .................................................................................. 268
6.4.3 Editing an e-Mail Target in the e-Mail Address
Book .................................................................................. 271
6.4.4 Deleting an e-Mail Target from the e-Mail Address
Book .................................................................................. 273
fi-6010N Network Scanner Operator's Guide vii
6.5 Sending the Scanned Data by Fax ............................. 274
6.5.1 Selecting a Fax Number from the Fax Number List .......... 276
6.5.2 Adding a Contact to the Fax Number List.......................... 279
6.5.3 Editing a Contact in the Fax Number List .......................... 281
6.5.4 Deleting a Contact from the Fax Number List ................... 282
6.6 Printing the Scanned Data .......................................... 283
6.6.1 Scaling............................................................................... 288
6.6.2 Positioning ......................................................................... 293
6.6.3 Simplex/Duplex.................................................................. 295
6.7 Saving the Scanned Data to a Network Folder ......... 296
6.8 Saving the Scanned Data in a SharePoint Folder .... 301
6.9 Setting the Scan Options ............................................ 309
6.9.1 Carrier Sheet ..................................................................... 316
6.9.2 Color Mode ........................................................................ 317
6.9.3 Paper Size ......................................................................... 318
Long Page Mode .......................................................... 320
6.9.4 Resolution.......................................................................... 322
6.9.5 Scan Mode ........................................................................ 323
6.9.6 File Format ........................................................................ 324
6.9.7 Searchable PDF ................................................................ 326
6.9.8 PDF Password................................................................... 329
6.9.9 Compression ..................................................................... 331
6.9.10 Brightness.......................................................................... 334
6.9.11 Contrast ............................................................................. 335
6.9.12 Sharpness ......................................................................... 336
viii
6.9.13 Dropout Color .................................................................... 337
6.9.14 Background Removal ........................................................ 338
6.9.15 Blank Page Skip ................................................................ 339
6.9.16 Page Orientation................................................................ 340
6.9.17 Multifeed Detection (Layer and Length) ............................ 343
6.9.18 Edge Cropping................................................................... 344
6.10 Enabling/Disabling the Scan Viewer .......................... 346
6.11 Editing the Scanned Data in the Scan Viewer .......... 349
6.11.1 Viewing a Scanned Page .................................................. 350
6.11.2 Rotating a Scanned Page.................................................. 351
6.11.3 Adding a Scanned Page.................................................... 352
6.11.4 Deleting a Scanned Page.................................................. 353
6.12 Checking the User Log ............................................... 354
6.13 Maintenance ................................................................. 356
6.14 Processing a Job ......................................................... 357
6.14.1 Enabling/Disabling the Message Screen........................... 361
6.14.2 Changing a File Name (for Save/e-Mail Attachment) ........ 363
6.14.3 Checking the Number of Sheets to Be Scanned ............... 364
Chapter 7 Scanner Care .................................................... 367
7.1 Cleaning ....................................................................... 368
7.1.1 Cleaning Materials............................................................. 368
7.1.2 Which Parts and When...................................................... 369
7.2 Cleaning the ADF ......................................................... 370
7.2.1 Cleaning the ADF .............................................................. 371
7.3 Cleaning the LCD Touch Panel .................................. 377
7.4 Cleaning the Keyboard/Keyboard Cover ................... 378
7.5 Cleaning the Carrier Sheet ......................................... 379
7.6 Replacing Parts ........................................................... 380
fi-6010N Network Scanner Operator's Guide ix
7.6.1 Part Numbers and Replacement Cycles ........................... 380
Part numbers and replacement cycle for
consumable parts ......................................................... 380
Part numbers and replacement cycle for
Carrier Sheet ................................................................ 381
7.6.2 Checking the Consumable Alert Status............................. 382
7.6.3 Replacing the Pad Assy .................................................... 383
7.6.4 Replacing the Pick Roller .................................................. 384
7.6.5 Purchasing the Carrier Sheet ............................................ 388
7.7 Changing the Keyboard Cover ................................... 389
7.8 Performing a Scan Test .............................................. 391
Chapter 8 Troubleshooting ............................................... 393
8.1 Removing Jammed Documents ................................. 394
8.2 Dealing with Detached Keycaps ................................ 398
8.3 Network Connection Troubleshooting ...................... 400
8.3.1 Basic Network Operation Tests ......................................... 400
Checking basic network operation with a Ping test ...... 400
Checking the network operating status ........................ 402
Checking the NTP server settings by synchronizing
the system time ............................................................ 403
Checking the mail server by sending a test mail .......... 404
8.3.2 Other Network Connection Troubleshooting ..................... 405
Failure to connect to a server using its IP address ...... 405
Failure to connect to a server using its host name
or FQDN ....................................................................... 407
Failure to add a network printer .................................... 408
Failure to print on a network printer ............................. 408
8.3.3 Failure to Access the Scanner using a Web Browser,
Admin Tool, or Central Admin Server................................ 409
8.4 Other Troubleshooting ................................................ 412
x
8.5 Points to Check before Contacting Your
FUJITSU Scanner Dealer ............................................ 416
8.5.1 General Details.................................................................. 416
8.5.2 Error Status ....................................................................... 417
Problem when connecting to the scanner via
computer ...................................................................... 417
Document feed trouble ................................................. 417
Other problems ............................................................. 418
8.6 Checking the Scanner Labels .................................... 419
8.7 Pre-Maintenance Preparations ................................... 420
Appendix A ADF Paper Specifications .............................. 421
A.1 Paper Size .................................................................... 422
A.2 Paper Requirements .................................................... 423
A.2.1 Paper Type ........................................................................ 423
A.2.2 Paper Weight..................................................................... 423
A.2.3 Precautions........................................................................ 423
A.3 Maximum Document Loading Capacity .................... 426
A.4 Area not to be Perforated ........................................... 427
A.5 Multifeed Detection Conditions .................................. 428
A.5.1 Detection by Layer............................................................. 428
A.5.2 Detection by Length........................................................... 428
A.5.3 Detection by both Layer and Length.................................. 429
Appendix B Management Settings and Limits ................. 431
B.1 e-Mail Address Setting Values ................................... 432
B.2 Limits for Setting Items ............................................... 433
fi-6010N Network Scanner Operator's Guide xi
Appendix C Root Certification Authority ...........................435
C.1 Root Certification Authority List ................................ 436
Appendix D Scanner Specifications .................................. 439
D.1 Device Specifications .................................................. 440
D.2 Scanner Specifications ............................................... 441
D.3 Languages Supported By and Keyboard Covers
Provided With .............................................................. 442
Appendix E Operation Messages .......................................443
E.1 Administrator Messages ............................................. 444
E.1.1 Administrator Screen Messages........................................ 445
E.1.2 System Log Messages ...................................................... 459
Information ................................................................... 459
Error ............................................................................. 462
Warning ........................................................................ 464
E.1.3 Alert Monitor System Log Messages................................. 465
Information ................................................................... 465
Error ............................................................................. 466
Warning ........................................................................ 468
E.2 Regular User Messages .............................................. 469
E.2.1 Regular User Screen Messages........................................ 469
E.2.2 System Log Messages ...................................................... 492
Information ................................................................... 492
Warning ........................................................................ 494
Error ............................................................................. 494
xii
E.2.3 User Log ............................................................................ 514
E.3 Central Admin Messages ............................................ 527
E.3.1 System Log Messages ...................................................... 527
Information ................................................................... 528
Warning ........................................................................ 528
Error ............................................................................. 530
Appendix F Glossary .......................................................... 535
Index .......................................................................................... 541
fi-6010N Network Scanner Operator's Guide xiii
xiv

Copyright

NetAdvantage
Copyright© 2000-2010 Infragistics, Inc.
LEADTOOLS for .NET
Copyright© 2005 LEAD Technologies, Inc.
WinPcap
Copyright© 1999 - 2005 NetGroup, Politecnico di Torino (Italy). Copyright© 2005 - 2010 CACE Technologies, Davis (California). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Politecnico di Torino, CACE Technologies nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors. This product includes software developed by the Kungliga Tekniska Hogskolan and its contributors. This product includes software developed by Yen Yen Lim and North Dakota State University.
fi-6010N Network Scanner Operator's Guide xv
Portions Copyright© 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by the University of California, Berkeley and its contributors."
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions Copyright© 1983 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
xvi
Portions Copyright© 1995, 1996, 1997 Kungliga Tekniska Hogskolan (Royal Institute of Technology, Stockholm, Sweden). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by the Kungliga Tekniska Hogskolan and its contributors."
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions Copyright© 1997 Yen Yen Lim and North Dakota State University. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by Yen Yen Lim and North Dakota State University"
4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
fi-6010N Network Scanner Operator's Guide xvii
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions Copyright© 1993 by Digital Equipment Corporation.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Portions Copyright© 1995, 1996, 1997, 1998, and 1999 WIDE Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
xviii
Portions Copyright© 1996 Juniper Networks, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1) source code distributions retain the above copyright notice and this paragraph in its entirety, (2) distributions including binary code include the above copyright notice and this paragraph in its entirety in the documentation or other materials provided with the distribution. The name of Juniper Networks may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Portions Copyright© 2001 Daniel Hartmeier All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
z Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
z Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the dis­tribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions Copyright 1989 by Carnegie Mellon. Permission to use, copy, modify, and distribute this program for any purpose and without fee is hereby granted, provided that this copyright and permission notice appear on all copies and supporting documentation, the name of Carnegie Mellon not be used in advertising or publicity pertaining to distribution of the program without specific prior permission, and notice be given in supporting documentation that copying and distribution is by permission of Carnegie Mellon and Stanford University. Carnegie Mellon makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
fi-6010N Network Scanner Operator's Guide xix
WinDump
Copyright© 1999 - 2005 NetGroup, Politecnico di Torino (Italy). Copyright© 2005 - 2006 CACE Technologies, Davis (California). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Politecnico di Torino, CACE Technologies nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors.
Secure iNetSuite
Copyright© 2008 Dart Communications
xx

Introduction

Thank you for purchasing the fi-6010N Network Scanner. This easy-to-use image scanner is designed to be connected to a computer network system and is primarily for office use.

Manuals

The following manuals are prepared for the scanner. Read them as needed.
Manual Description
fi-6010N Network Scanner Getting Started (paper)
fi-6010N Network Scanner Operator's Guide (This Manual) (PDF)
Scanner Central Admin User’s Guide (PDF)
Provides useful and detailed information on setting up, con­necting, and caring for your scanner. Read this manual first. In this guide, it is indicated as "Getting Started".
Contains further information about scanner settings, scanner administration, and scanner operations, and may be used as a general reference. To read the manual, download it from the scanner. For more details about how to download the manual, refer to the "Get­ting Started".
Provides information about methods for operating and config­uring scanner central administration.
fi-6010N Network Scanner Operator's Guide xxi

Regulatory Information

FCC Declaration
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
zReorient or relocate the receiving antenna. zIncrease the separation between the equipment and receiver. zConnect the equipment into an outlet on a circuit different from that to which the receiver is located. zConsult your dealer or an experienced radio/TV technician.
FCC warning: Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
NOTICE
The use of a shielded interface cable is required to comply with the Class B limits of Part 15 of FCC rules. The length of the AC cable must be 2 meters (6.6 feet) or less.
Canadian DOC Regulations
This digital apparatus does not exceed the Class B limit for radio noise emissions from digital apparatus set out in the Radio interference Regulations of the Canadian Department of Communications. This Class B digital apparatus complies with Canadian ICES-003. Le présent appareil numérique n'émet pas de parasites radioélectriques dépassant les limites applicables aux appareils numériques de la classe B et prescrites dans le Règlement sur le brouillage radioélectrique dictées par le Ministère des Communications du Canada. Cet appareil numérique de la classe B est conforme la norme NMB-003 du Canada.
Bescheimigung des Herstellers / Importeurs
Für den fi-6010N wird folgendes bescheinigt:
zIn Übereinsstimmung mit den Bestimmungen der EN45014(CE) funkentstört zMaschinenlärminformationsverordnung 3.GPSGV: Der höchste Schalldruckpegel beträgt 70 dB (A)
oder weniger, gemäß EN ISO 7779.
xxii
Use in High-safety Applications
WARNING
H
g
This product has been designed and manufactured on the assumption that it will be used in office, personal, domestic, regular industrial, and general-purpose applications. It has not been designed and manufactured for use in applications (simply called "high-safety applications" from here on) that directly involve danger to life and health when a high degree of safety is required, for example, in the control of nuclear reactions at nuclear power facilities, automatic flight control of aircraft, air traffic control, operation control in mass-transport systems, medical equipment for sustaining life, and missile firing control in weapons systems, and when provisionally the safety in question is not ensured. The user should use this product with adopting measures for ensuring safety in such high­safety applications. PFU LIMITED assumes no liability whatsoever for damages arising from use of this product by the user in high-safety applications, and for any claims or compensation for damages by the user or a third party.
Use of Mercury
Lamp(s) inside the scanner contain mercury and must be recycled or disposed of according to local, state, or federal laws.
To avoid unexpected injuries:
zDo not put the substance contained in the lamp in your mouth as it has mercury. zDo not breathe the chemical liquid contained in the scanner lamps. zDo not incinerate, crush, or shred the lamps or scanner parts.
LCD Peculiarities
zThe LCD backlight is a fluorescent tube that contains some mercury. zBe aware that neither of the following is considered a fault.
z Despite the fact that the latest advanced technology has been used to produce the scanner’s
TFT color LCD's, the large number of pixels involved means that an occasional (always-on) bright dot or (always-off) dark dot may be visible.
z The characteristics of the LCD mean that there may be some variation in hue and intensity of
colors across the screen.
Replacing Batteries
In order to retain data such as BIOS information, this product has a battery (CMOS RAM battery) on board.
z Do not replace the battery yourself, as there is a risk of explosion if the
wrong type is used. Please contact your maintenance engineer in charge when the battery runs low.
z Do not touch the battery. Never install or remove the battery by yourself.
Doing so may cause electric shock or static electricity which can damage the device.
fi-6010N Network Scanner Operator's Guide xxiii
About Maintenance
The user must not perform repairs on this scanner. Contact your FUJITSU scanner dealer or an authorized FUJITSU scanner service provider for repairs to this product. For more details, refer to the following web page:
http://imagescanner.fujitsu.com/warranty.html

Trademarks

Microsoft, Windows, Windows Vista, Windows Server, and SharePoint are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Adobe, the Adobe logo, Acrobat, and Reader are either registered trademarks or trade names of Adobe Systems Incorporated in the United States and/or other countries. Intel is a registered trademark or trademark of Intel Corporation in the United States and other countries. Red Hat is the registered trademark or trademark of Red Hat, Inc. in the United States and other countries.
ABBYY OCR by ABBYY. All rights reserved. ABBYY and FineReader are trademarks of ABBYY. Other company names and product names are the registered trademarks or trademarks of the respective companies.
FineReader™ 7.X/8.X/9.X Engine, © ABBYY 2009.
How Trademarks are Indicated in This Manual
The following abbreviations are used in this manual:
Windows
Windows XP
Windows Vista
Windows 7
Windows® operating system
Windows® XP Home Edition operating system
®
Windows Windows
XP Professional operating system
®
XP Professional x64 Edition operating system
Windows Vista® Home Basic operating system (32/64-bit)
®
Windows Vista Windows Vista Windows Vista Windows Vista
Home Premium operating system (32/64-bit)
®
Business operating system (32/64-bit)
®
Enterprise operating system (32/64-bit)
®
Ultimate operating system (32/64-bit)
Windows® 7 Starter operating system (32-bit)
®
Windows Windows Windows Windows
7 Home Premium operating system (32/64-bit)
®
7 Professional operating system (32/64-bit)
®
7 Enterprise operating system (32/64-bit)
®
7 Ultimate operating system (32/64-bit)
xxiv
Windows 8
Windows® 8 operating system (32/64-bit)
®
Windows Windows
8 Pro operating system (32/64-bit)
®
8 Enterprise operating system (32/64-bit)
Windows 2000 Server
Windows Server 2003
Windows Server 2008
Windows® 2000 Server Small Business Server 2000
Windows® 2000 Advanced Server
Windows Server® 2003, Standard Edition
®
Windows Server Windows Server Windows Server Windows Server Windows Server Windows Server Windows Server Windows Server
2003, Enterprise Edition
®
2003, Datacenter Edition
®
2003 R2, Standard Edition
®
2003 R2, Standard x64 Edition
®
2003 R2, Enterprise Edition
®
2003 R2, Enterprise x64 Edition
®
2003 R2, Datacenter Edition
®
2003 R2, Datacenter x64 Edition
Windows Server® 2008 Standard (32/64-bit)
®
Windows Server Windows Server Windows Server Windows Server
2008 Enterprise (32/64-bit)
®
2008 Datacenter (32/64-bit)
®
2008 R2 Standard (64-bit)
®
2008 R2 Enterprise (64-bit)
Windows Server 2012
Exchange
.NET Framework
SharePoint
Solaris 10
Red Hat Enterprise Linux
Windows Server® 2012 Standard (64-bit)
Microsoft® Exchange 2000 Server
®
Microsoft Microsoft
Exchange Server 2003
®
Exchange Server 2007 (supported by 64-bit operating systems
only) Microsoft® Exchange Server 2010 (supported by 64-bit operating systems
only)
Microsoft® .NET Framework
Microsoft® Office SharePoint® Server 2007
®
Microsoft
SharePoint® Server 2010 (supported by 64-bit operating sys-
tems only)
Solaris 10 Operating System
Red Hat® Enterprise Linux® 4 Red Hat
®
Enterprise Linux® 5
fi-6010N Network Scanner Operator's Guide xxv
SUSE Linux Enterprise Server
SUSE™ Linux Enterprise Server 10
Internet Explorer
Internet Information
SQL Server 2005 Express Edition
Adobe Acrobat
Adobe Reader
RightFax
Admin Tool
Central Admin Server
Central Admin Console
Network Folder
SharePoint Folder
Microsoft® Internet Explorer Windows® Internet Explorer
®
®
Microsoft® Internet Information Services
Microsoft® SQL Server® 2005 Express Edition
Adobe® Acrobat®
Adobe® Reader
®
RightFax Business Server (Version 9.3)
fi Network Scanner Admin Tool
Scanner Central Admin Server iScanner Central Admin Server
Scanner Central Admin Console iScanner Central Admin Console
A folder that is set to save scanned data in the file server or FTP server
A folder that is set to save scanned data in SharePoint
Manufacturer
PFU LIMITED International Sales Dept., Imaging Business Division, Products Group
Solid Square East Tower 580 Horikawa-cho, Saiwai-ku, Kawasaki-shi Kanagawa 212-8563, Japan Phone: (81-44) 540-4538
© PFU LIMITED 2010-2013
xxvi

Disclaimer of Liability

WARNING
CAUTION
Reproducibility of the Scanned Image Data
Confirm that the image data scanned with this product meets your requirements (for example, image reproducibility in size accuracy, fidelity, content, colors). Make sure that there are no missing parts in the scanned image data before disposing of the original document used for scanning.
Warning Indications Used in This Manual
This indication alerts operators to an operation that, if not strictly observed, may result in severe injury or death.
This indication alerts operators to an operation that, if not strictly observed, may result in safety hazards to personnel or damage to equipment.
fi-6010N Network Scanner Operator's Guide xxvii
Symbols Used in This Manual
ATTENTION
HINT
R
This manual uses the following symbols in the explanations in addition to the warning indications.
This symbol alerts operators to particularly important information. Be sure to read this information.
This symbol alerts operators to helpful advice regarding operation.
A TRIANGLE symbol indicates that special care and attention is required. The drawing inside the triangle shows the specific caution.
A CIRCLE with a diagonal line inside shows action which users may not perform. The drawing inside or under the circle shows the specific action that is not allowed.
Outline characters on a colored background show instructions users should follow.
It may also include the drawing that shows the specific instruction.
This symbol is used to indicate information about administrator operations. In Chapter 4, operations that can be performed by either or both of the
administrator login modes one indicated by the following symbols:
: Administrator operating via the LCD touch panel.
: Administrator operating via the network interface using the
Admin Tool.
: Administrator operating via the network interface using the
Central Admin Console.
This symbol is used to indicate information about regular user operations.
xxviii
Loading...
+ 555 hidden pages