Fujitsu fi-6010N User Manual 2

P3PC-2802-02ENZ0
fi-6010N Network Scanner
Operator's Guide

Contents

Copyright .................................................................................. xvii
Introduction ............................................................................. xxiii
Manuals ....................................................................................... xxiii
Trademarks ..................................................................................xxvi
Notice of Liability ..................................................................... xxviii
Safety Precautions ........................................................................xxx
Chapter 1 Scanner Overview ................................................. 1
1.1 Scanner Features ............................................................ 2
Basic uses for scanned documents .................................. 2
Configure and manage with ease ..................................... 3
Advanced security measures ........................................... 3
1.2 Part Names and Functions ............................................. 4
1.2.1 External Parts ........................................................................ 4
1.2.2 Internal Parts ......................................................................... 6
1.3 User Types and Operations ............................................ 7
1.4 System Requirements ................................................... 12
1.4.1 Requirements for Admin Tool.............................................. 12
Software (English Versions) ........................................... 12
Hardware ........................................................................ 12
1.4.2 Requirements for Central Admin Console ........................... 13
Software (English Versions) ........................................... 13
Hardware ........................................................................ 13
fi-6010N Network Scanner Operator's Guide i
1.4.3 Requirements for Central Admin Server.............................. 14
Software (English Versions) ........................................... 14
Hardware ........................................................................ 14
1.4.4 Requirements for Related Servers ...................................... 15
LDAP Server .................................................................. 17
SMTP Server .................................................................. 17
File Server ...................................................................... 17
SharePoint Server .......................................................... 17
FTP Server ..................................................................... 17
Print Server .................................................................... 18
DNS Server .................................................................... 18
WINS Server .................................................................. 18
DHCP Server .................................................................. 18
NTP Server ..................................................................... 18
Fax Server ...................................................................... 18
1.4.5 Network Requirements ........................................................ 19
1.4.6 Scanner Requirements for iScanner Central Admin............ 19
1.4.7 Port Number List.................................................................. 20
Chapter 2 Basic Scanner Operations .................................. 23
2.1 Turning the Power On/Off ............................................. 24
Turning the Power On .................................................... 24
Turning the Power Off .................................................... 25
2.2 Using the Scanner Buttons .......................................... 26
2.2.1 Using the Startup Button ..................................................... 26
2.2.2 Using the Top Cover [SCAN] Button ................................... 27
2.3 Using the LCD Touch Panel ......................................... 28
2.4 Using the Keyboard ....................................................... 29
2.4.1 Using the Keyboard: Administrator...................................... 29
2.4.2 Using the Keyboard: Regular Users .................................... 30
ii
Chapter 3 Administrator Operations (Overview) ............... 31
3.1 Operating and Managing Scanners ............................. 32
3.2 Required Scanner Function Settings .......................... 33
Chapter 4 Administrator Operations (Touch Panel and
Admin Tool) .......................................................... 37
4.1 Administrator Screens via the Touch Panel ............... 38
4.2 Administrator Screens via the Admin Tool ................. 40
4.3 iScanner Administrator Login: via the Touch
Panel .............................................................................. 42
4.4 Setting up for Administrator Access via the Admin
Tool ................................................................................. 44
4.4.1 Checking the Internet Explorer Cache Settings................... 44
4.4.2 Setting the Internet Explorer Trusted Sites.......................... 45
4.4.3 Installing the Admin Tool ..................................................... 47
4.4.4 Uninstalling the Admin Tool................................................. 52
4.5 iScanner Administrator Login: via the Admin Tool .... 53
4.6 Using the System Settings Menus ............................... 56
4.6.1 Calibrating the Touch Panel ............................................... 56
4.6.2 Setting the Scanner Name ................................................. 59
4.6.3 Setting the Language ......................................................... 62
4.6.4 Setting the Region/Timezone ............................................. 63
4.6.5 Setting the Date/Time ......................................................... 64
4.6.6 Setting the Time to Standby Mode ..................................... 66
4.6.7 Setting the Login Method .................................................... 68
4.6.8 Changing the Admin Password .......................................... 71
fi-6010N Network Scanner Operator's Guide iii
4.6.9 Setting a File Name Format for When Saving Scanned
Data .................................................................................... 72
4.6.10 Setting a File Name Format for When Attaching Scanned
Data to e-Mail ..................................................................... 76
4.6.11 Setting the Multifeed Detection Method .............................. 78
4.6.12 Setting Scanning Performance ........................................... 81
Offset Settings ................................................................ 82
Length Magnification Setting .......................................... 82
4.6.13 Setting General Scanner Settings ...................................... 83
4.6.14 Managing Certificates.......................................................... 84
Importing a Certificate File ............................................. 84
Deleting a Certificate File ............................................... 85
4.7 Using the Network Settings Menus ............................. 86
4.7.1 Giving the Scanner an IP Address ..................................... 86
4.7.2 Setting the Admin Network ................................................. 88
4.7.3 Setting a Central Admin Server .......................................... 90
4.7.4 Setting the DNS Server ...................................................... 93
4.7.5 Setting the WINS Server .................................................... 95
4.7.6 Setting the NTP Server ....................................................... 96
4.7.7 Setting the Proxy Server ..................................................... 98
4.7.8 Setting the Login LDAP Server ......................................... 100
LDAP Search Target .................................................... 104
4.7.9 Setting the e-Mail LDAP Server ........................................ 108
4.7.10 Setting the LDAP Search Parameters .............................. 111
4.7.11 Setting the e-Mail Server (SMTP Server) ......................... 116
4.7.12 Setting the Fax Server ...................................................... 118
4.7.13 Setting the Network Printers ............................................. 119
Checking the Printer Drivers ........................................ 120
Setting the Printer Properties ....................................... 121
Registering a Network Printer (Network Tree) ............. 124
Registering a Network Printer (Network Path) ............. 127
Renaming a Network Printer ........................................ 129
Removing a Network Printer ........................................ 130
Viewing the Printer Details ........................................... 131
iv
4.7.14 Setting the Network Folders ............................................. 132
Registering a Network Folder (Network Tree) .............. 133
Registering a Network Folder (Network Path) .............. 136
Registering a Network Folder (FTP Path) .................... 138
Renaming a Network Folder ......................................... 141
Removing a Network Folder ......................................... 143
Viewing the Network Folder Details ............................. 144
4.7.15 Setting the SharePoint Folders ......................................... 145
Renaming a SharePoint Folder (Display Name) .......... 147
Removing a SharePoint Folder .................................... 148
4.7.16 Setting the Destination for Alert Notifications ................... 149
4.7.17 Checking the Network Connection with a Ping Test ......... 150
4.7.18 Checking the Network Operating Status .......................... 152
Checking the Network Status ....................................... 152
Setting the Link Speed/Duplex Mode ........................... 153
4.8 Using the Device Status Menus ................................. 154
4.8.1 Viewing the System Status ............................................... 154
4.8.2 Viewing the Status of Installed Options ............................ 155
4.8.3 Viewing the Usage Status ................................................ 156
Viewing the Status of Consumable Parts ..................... 156
Resetting the Usage Counter ....................................... 157
4.8.4 Viewing the Add-in Status ................................................ 158
4.9 Using the Operation Logs Menus .............................. 159
4.9.1 Managing the User Log ..................................................... 159
Viewing the User Log Details ...................................... 159
Downloading the User Logs in CSV Format ................ 161
Clearing the User Logs ................................................ 161
4.9.2 Managing the System Log................................................. 162
Viewing the System Log Details .................................. 162
Downloading the System Log in CSV Format ............. 164
Clearing the System Log ............................................. 164
fi-6010N Network Scanner Operator's Guide v
4.10 Using the Maintenance Menus ................................... 165
4.10.1 Maintaining the User Data Store ...................................... 165
Backing up the User Data Store ................................... 167
Restoring the User Data Store ..................................... 169
Clearing the User Data Store ....................................... 170
4.10.2 Maintaining the System Settings ...................................... 171
Downloading the System Settings in CSV Format ....... 171
Backing up System Settings ......................................... 172
Restoring System Settings ........................................... 173
Resetting Factory Defaults ........................................... 174
4.10.3 Updating the Scanner's System Software ........................ 175
4.10.4 Installing/Uninstalling an Add-in Module ........................... 177
Installing an Add-in Module .......................................... 177
Uninstalling an Add-in Module ...................................... 178
4.10.5 Setting the Information Output Level ................................ 179
4.10.6 Obtaining Technical Support ............................................ 180
4.11 Setting Job Features ................................................... 181
4.11.1 Job Setting Quick User Guide ........................................... 183
4.11.2 Setting a Job Sequence ................................................... 185
Adding a job sequence ................................................. 185
Cloning a job sequence ................................................ 197
Editing a job sequence ................................................. 197
Deleting a job sequence ............................................... 198
Filtering job sequences ................................................ 198
Filtering the LDAP List .................................................. 199
4.11.3 Setting a Job Menu ........................................................... 203
Adding a job menu ....................................................... 203
Cloning a job menu ...................................................... 208
Editing a job menu ........................................................ 208
Deleting a job menu ..................................................... 209
Viewing the detailed settings for a job menu ................ 209
4.11.4 Setting a Job Group .......................................................... 210
Adding a job group ....................................................... 210
Editing a job group ....................................................... 215
Deleting a job group ..................................................... 215
vi
Viewing the detailed settings for a job group ................ 216
Assigning job menus to users not included in a job
group ............................................................................ 216
Filtering the LDAP List .................................................. 218
Chapter 5 Administrator Operations (Central Admin
Console) ............................................................. 223
5.1 Function List ................................................................ 224
5.2 Using Central Admin Console Window ..................... 227
5.3 Central Admin Console Quick Guide ......................... 229
5.4 Pre-settings for Using Central Admin Console ........ 231
5.4.1 Installing the Central Admin Server Software.................... 231
Importing the Certificate ............................................... 235
5.4.2 Installing the Central Admin Console ................................ 236
5.4.3 Setting up a Firewall for the Central Admin Server ........... 239
5.4.4 Configuring the Scanner Settings for Central Admin
Management...................................................................... 239
5.4.5 Uninstalling the Central Admin Server
Software/Console .............................................................. 240
Uninstalling the Central Admin Server Software .......... 240
Uninstalling the Central Admin Console ....................... 240
5.5 Central Admin Server Login: via the Central Admin
Console ........................................................................ 241
5.6 Setting the Central Admin Server .............................. 244
[Change Administrator Password] button ..................... 245
[User Roaming Data (Select & Clear)] button .............. 245
Scanner Registration .................................................... 246
Network Connection ..................................................... 246
Screen Settings ............................................................ 247
LDAP Server ................................................................ 247
SharePoint Server Connection Settings ....................... 250
fi-6010N Network Scanner Operator's Guide vii
Software Update Time-Period Restrictions .................. 251
Operation Monitoring .................................................... 252
Error Notification Settings ............................................. 252
Data Import/Export ....................................................... 252
Log Retention ............................................................... 252
Audit Log Settings ........................................................ 253
[OK] button ................................................................... 253
[Cancel] button ............................................................. 253
5.7 Setting Scanner Configuration ................................... 254
[Import Config] button ................................................... 257
[Export Config] button ................................................... 258
Filter Conditions ........................................................... 258
[New] button ................................................................. 259
[Clone] button ............................................................... 260
[Edit] button .................................................................. 260
[Delete] button .............................................................. 260
[Select All] button ......................................................... 260
[Deselect All] button ..................................................... 260
Scanner information list ................................................ 261
5.8 Monitoring and Maintaining the iScanner
Network ......................................................................... 263
iScanner Network ......................................................... 263
iScanner Updates ......................................................... 264
iScanner Events ........................................................... 265
5.9 Updating the System ................................................... 266
Registered System Update .......................................... 266
Upload & Release a New System Update .................... 266
[Back] button ................................................................ 267
viii
5.10 Installing an Add-in ..................................................... 268
Add-in Groups .............................................................. 268
Registered Add-in Module ............................................ 268
Upload & Release a New Add-in .................................. 269
[Back] button ................................................................ 270
5.11 Updating the Scanner System Settings .................... 271
Settings Groups ............................................................ 271
Registered Scanner Settings ........................................ 272
Upload & Release a New Set of Scanner Settings ...... 272
[Back] button ................................................................ 274
5.12 Setting the Job Mode .................................................. 275
Registered Job Mode Settings ..................................... 275
Create & Release a New Set of Job Mode Settings ..... 276
[Back] button ................................................................ 277
5.13 Viewing the Update Status Lists ................................ 278
Filter Conditions ........................................................... 278
[Call Now] button .......................................................... 279
[Clear Update Failures] button ..................................... 279
[Select All] button ......................................................... 279
[Deselect All] button ..................................................... 279
Scanner list ................................................................... 279
[Back] button ................................................................ 280
5.14 Viewing the Scanners Operating Status ................... 281
Scanner Operating Status ............................................ 282
Filter Conditions ........................................................... 283
[Clear All Errors] Button ................................................ 283
5.15 Viewing Event Log ....................................................... 284
[Download] button ........................................................ 284
[Clear Log] button ......................................................... 284
Filter Conditions ........................................................... 284
Event Log ..................................................................... 285
5.16 Collecting and Exporting Audit Logs ........................ 286
5.16.1 Collecting Audit Logs......................................................... 287
5.16.2 Exporting Audit Logs ......................................................... 287
5.16.3 File Format of Audit Logs .................................................. 289
fi-6010N Network Scanner Operator's Guide ix
5.17 Maintaining Central Admin Settings .......................... 291
5.17.1 Backing Up Central Admin Settings .................................. 291
5.17.2 Restoring Central Admin Settings ..................................... 293
5.17.3 Obtaining Technical Support on the Central Admin
Server ................................................................................ 294
5.17.4 Migrating Data to an Updated Version of the Central
Admin Server Software...................................................... 295
Chapter 6 Regular User Operations .................................. 297
6.1 Loading Documents .................................................... 298
6.1.1 How to Load Documents ................................................... 298
6.1.2 Loading Documents Using a Carrier Sheet ....................... 301
6.2 Using Touch Panel Screens: Regular User ............... 304
6.2.1 Common Buttons and Indicators ....................................... 304
6.2.2 Regular User Settings Overview ....................................... 305
6.2.3 Main Menu Screen ............................................................ 306
6.2.4 Job Menu Screen .............................................................. 308
6.3 Logging in: Regular User Mode ................................. 311
6.4 Sending the Scanned Data by e-Mail ......................... 314
6.4.1 Selecting an e-Mail Target from the e-Mail Address
Book .................................................................................. 319
6.4.2 Adding an e-Mail Target to the e-Mail Address Book ........ 324
6.4.3 Editing an e-Mail Target in the e-Mail Address Book ........ 327
6.4.4 Deleting an e-Mail Target from the e-Mail Address
Book .................................................................................. 329
6.5 Sending the Scanned Data by Fax ............................. 330
6.5.1 Selecting a Fax Number from the Fax Number List .......... 332
6.5.2 Adding a Contact to the Fax Number List.......................... 335
6.5.3 Editing a Contact in the Fax Number List .......................... 337
6.5.4 Deleting a Contact from the Fax Number List ................... 338
x
6.6 Printing the Scanned Data .......................................... 339
6.6.1 Scaling............................................................................... 344
6.6.2 Positioning ......................................................................... 349
6.6.3 Simplex/Duplex.................................................................. 351
6.7 Saving the Scanned Data to a Network Folder ......... 352
6.8 Saving the Scanned Data in a SharePoint Folder .... 357
6.9 Setting the Scan Options ............................................ 365
6.9.1 Carrier Sheet ..................................................................... 372
6.9.2 Color Mode ........................................................................ 373
6.9.3 Paper Size ......................................................................... 374
Long Page Mode .......................................................... 376
6.9.4 Resolution.......................................................................... 378
6.9.5 Scan Mode ........................................................................ 379
6.9.6 File Format ........................................................................ 380
6.9.7 Searchable PDF ................................................................ 382
6.9.8 PDF Password................................................................... 385
6.9.9 Compression ..................................................................... 387
6.9.10 Brightness.......................................................................... 390
6.9.11 Contrast ............................................................................. 391
6.9.12 Sharpness ......................................................................... 392
6.9.13 Dropout Color .................................................................... 393
6.9.14 Background Removal ........................................................ 394
6.9.15 Blank Page Skip ................................................................ 395
6.9.16 Page Orientation................................................................ 396
6.9.17 Multifeed Detection (Layer and Length) ............................ 399
6.9.18 Edge Cropping................................................................... 400
6.10 Enabling/Disabling the Scan Viewer .......................... 402
fi-6010N Network Scanner Operator's Guide xi
6.11 Editing the Scanned Data in the Scan Viewer .......... 405
6.11.1 Viewing a Scanned Page .................................................. 406
6.11.2 Rotating a Scanned Page.................................................. 407
6.11.3 Adding a Scanned Page.................................................... 408
6.11.4 Deleting a Scanned Page.................................................. 409
6.12 Checking the User Log ............................................... 410
6.13 Maintenance ................................................................. 412
6.14 Processing a Job ......................................................... 413
6.14.1 Enabling/Disabling the Message Screen........................... 417
6.14.2 Changing a File Name (for Save/e-Mail Attachment) ........ 419
6.14.3 Checking the Number of Sheets to Be Scanned ............... 420
Chapter 7 Scanner Care .................................................... 423
7.1 Cleaning ....................................................................... 424
7.1.1 Cleaning Materials............................................................. 424
7.1.2 Which Parts and When...................................................... 425
7.2 Cleaning the ADF ......................................................... 426
7.2.1 Cleaning the ADF .............................................................. 427
7.3 Cleaning the LCD Touch Panel .................................. 433
7.4 Cleaning the Keyboard ............................................... 434
7.5 Cleaning the Carrier Sheet ......................................... 435
xii
7.6 Replacing Parts ........................................................... 436
7.6.1 Part Numbers and Replacement Cycles ........................... 436
Part numbers and replacement cycle for consumable
parts ............................................................................. 436
Part numbers and replacement cycle for Carrier
Sheet ............................................................................ 437
7.6.2 Checking the Consumable Alert Status............................. 438
7.6.3 Replacing the Pad Assy .................................................... 439
7.6.4 Replacing the Pick Roller .................................................. 440
7.6.5 Purchasing the Carrier Sheet ............................................ 444
7.7 Performing a Scan Test .............................................. 445
Chapter 8 Troubleshooting ............................................... 449
8.1 Removing Jammed Documents ................................. 450
8.2 Dealing with Detached Keycaps ................................ 454
8.3 Network Connection Troubleshooting ...................... 456
8.3.1 Basic Network Operation Tests ......................................... 456
Checking basic network operation with a Ping test ...... 456
Checking the network operating status ........................ 458
Checking the NTP server settings by synchronizing
the system time ............................................................ 459
Checking the mail server by sending a test mail .......... 460
8.3.2 Other Network Connection Troubleshooting ..................... 461
Failure to connect to a server using its IP address ...... 461
Failure to connect to a server using its host name or
FQDN ........................................................................... 463
Failure to add a network printer .................................... 464
Failure to print on a network printer ............................. 464
8.3.3 Failure to Access the Scanner using a Web Browser,
Admin Tool, or Central Admin Server................................ 465
8.4 Other Troubleshooting ................................................ 468
fi-6010N Network Scanner Operator's Guide xiii
8.5 Points to Check before Contacting Your FUJITSU
Scanner Dealer ............................................................ 472
8.5.1 General Details.................................................................. 472
8.5.2 Error Status ....................................................................... 473
Problem when connecting to the scanner via
computer ...................................................................... 473
Document feed trouble ................................................. 473
Problem with Central Admin ......................................... 474
Other problems ............................................................. 474
8.6 Checking the Scanner Labels .................................... 475
8.7 Pre-Maintenance Preparations ................................... 476
Appendix A ADF Paper Specifications .............................. 477
A.1 Paper Size .................................................................... 478
A.2 Paper Requirements .................................................... 479
A.2.1 Paper Type ........................................................................ 479
A.2.2 Paper Weight..................................................................... 479
A.2.3 Precautions........................................................................ 479
A.3 Maximum Document Loading Capacity .................... 482
A.4 Area not to be Perforated ........................................... 483
A.5 Multifeed Detection Conditions .................................. 484
A.5.1 Detection by Layer............................................................. 484
A.5.2 Detection by Length........................................................... 484
A.5.3 Detection by both Layer and Length.................................. 485
Appendix B Management Settings and Files ................... 487
xiv
B.1 e-Mail Address Setting Values ................................... 488
B.2 Scanner Configuration File Format ........................... 489
B.2.1 Scanner Configuration File Format (for Importing) ............ 489
B.2.2 Scanner Configuration File Format (for Exporting)............ 490
Appendix C Root Certification Authority ........................... 493
C.1 Root Certification Authority List ................................ 494
Appendix D Scanner Specifications .................................. 497
D.1 Device Specifications .................................................. 498
D.2 Scanner Specifications ............................................... 499
D.3 Languages Supported By and Keyboard Covers
Provided With .............................................................. 500
Appendix E Operation Messages .......................................501
E.1 Administrator Messages ............................................. 502
E.1.1 Administrator Screen Messages........................................ 503
E.1.2 System Log Messages ...................................................... 516
Information ................................................................... 516
Error ............................................................................. 519
Warning ........................................................................ 521
E.1.3 Alert Monitor System Log Messages................................. 522
Information ................................................................... 522
Error ............................................................................. 523
Warning ........................................................................ 525
E.2 Regular User Messages .............................................. 526
E.2.1 Regular User Screen Messages........................................ 526
E.2.2 System Log Messages ...................................................... 549
Information ................................................................... 549
Warning ........................................................................ 551
Error ............................................................................. 551
fi-6010N Network Scanner Operator's Guide xv
E.2.3 User Log ............................................................................ 571
E.3 Central Admin Messages ............................................ 584
E.3.1 Central Admin Console Messages .................................... 584
E.3.2 System Log Messages ...................................................... 588
Information ................................................................... 588
Warning ........................................................................ 588
Error ............................................................................. 590
E.3.3 Event Log .......................................................................... 595
System Event Log ........................................................ 595
Central Admin Console Event Log ............................... 597
E.3.4 Backup/Restore Command Messages .............................. 601
Information ................................................................... 601
Error ............................................................................. 601
E.3.5 Audit Log Export Command Messages ............................. 605
Appendix F Compatibility with Different Versions ........... 607
F.1 Backing Up/Restoring User Data and Scanner
Settings ........................................................................ 608
F.2 Updating System Settings from the Central Admin
Server ........................................................................... 609
F.3 Functional Compatibility between the Scanner and
Central Admin Server .................................................. 610
F.4 Backing Up/Restoring Data between Different
Versions of the Central Admin Server Software ....... 611
Appendix G Glossary .......................................................... 613
Index .......................................................................................... 619
xvi

Copyright

NetAdvantage 2007
Copyright 2000-2007 Infragistics, Inc.
LEADTOOLS for .NET
Copyright© 2005 LEAD Technologies, Inc.
WinPcap3.1
Copyright© 1999 - 2005 NetGroup, Politecnico di Torino (Italy). Copyright© 2005 - 2006 CACE Technologies, Davis (California). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Politecnico di Torino, CACE Technologies nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors. This product includes software developed by the Kungliga Tekniska Hogskolan and its contributors. This product includes software developed by Yen Yen Lim and North Dakota State University.
fi-6010N Network Scanner Operator's Guide xvii
Portions Copyright© 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by the University of California, Berkeley and its contributors."
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions Copyright© 1983 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
xviii
Portions Copyright© 1995, 1996, 1997 Kungliga Tekniska Hogskolan (Royal Institute of Technology, Stockholm, Sweden). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by the Kungliga Tekniska Hogskolan and its contributors."
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions Copyright© 1997 Yen Yen Lim and North Dakota State University. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by Yen Yen Lim and North Dakota State University"
4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
fi-6010N Network Scanner Operator's Guide xix
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions Copyright© 1993 by Digital Equipment Corporation.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Portions Copyright© 1995, 1996, 1997, 1998, and 1999 WIDE Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
xx
Portions Copyright© 1996 Juniper Networks, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1) source code distributions retain the above copyright notice and this paragraph in its entirety, (2) distributions including binary code include the above copyright notice and this paragraph in its entirety in the documentation or other materials provided with the distribution. The name of Juniper Networks may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Portions Copyright© 2001 Daniel Hartmeier All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
z Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
z Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the dis­tribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions Copyright 1989 by Carnegie Mellon. Permission to use, copy, modify, and distribute this program for any purpose and without fee is hereby granted, provided that this copyright and permission notice appear on all copies and supporting documentation, the name of Carnegie Mellon not be used in advertising or publicity pertaining to distribution of the program without specific prior permission, and notice be given in supporting documentation that copying and distribution is by permission of Carnegie Mellon and Stanford University. Carnegie Mellon makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
fi-6010N Network Scanner Operator's Guide xxi
WinDump3.9.5
Copyright© 1999 - 2005 NetGroup, Politecnico di Torino (Italy). Copyright© 2005 - 2006 CACE Technologies, Davis (California). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Politecnico di Torino, CACE Technologies nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors.
Secure iNetSuite 2.0J
Copyright© 2007 Dart Communications
xxii

Introduction

Thank you for purchasing the fi-6010N Network Scanner. This easy-to-use image scanner is designed to be connected to a computer network system and is primarily for office use.

Manuals

The following manuals are prepared for the scanner. Read them as needed.
Manual Description
fi-6010N Network Scanner Getting Started (paper)
fi-6010N Network Scanner Operator's Guide (This Manual) (PDF)
Provides useful and detailed information on setting up, connecting, and caring for your scanner. Read this manual first. In this guide, it is indicated as "Getting Started".
Contains further information about scanner settings, scanner administration, and scanner operations, and may be used as a general reference. To read the manual, download it from the scanner. For more details about how to download the manual, refer to the "Getting Started".
fi-6010N Network Scanner Operator's Guide xxiii

Regulatory Information

FCC Declaration
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
zReorient or relocate the receiving antenna. zIncrease the separation between the equipment and receiver. zConnect the equipment into an outlet on a circuit different from that to which the receiver is located. zConsult your dealer or an experienced radio/TV technician.
FCC warning: Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
NOTICE
The use of a shielded interface cable is required to comply with the Class B limits of Part 15 of FCC rules. The length of the AC cable must be 2 meters (6.6 feet) or less.
Canadian DOC Regulations
This digital apparatus does not exceed the Class B limit for radio noise emissions from digital apparatus set out in the Radio interference Regulations of the Canadian Department of Communications. This Class B digital apparatus complies with Canadian ICES-003. Le présent appareil numérique n'émet pas de parasites radioélectriques dépassant les limites applicables aux appareils numériques de la classe B et prescrites dans le Règlement sur le brouillage radioélectrique dictées par le Ministère des Communications du Canada. Cet appareil numérique de la classe B est conforme la norme NMB-003 du Canada.
Bescheimigung des Herstellers / Importeurs
Für den fi-6010N wird folgendes bescheinigt:
zIn Übereinsstimmung mit den Bestimmungen der EN45014(CE) funkentstört zMaschinenlärminformationsverordnung 3.GPSGV: Der höchste Schalldruckpegel beträgt 70 dB (A)
oder weniger, gemäß EN ISO 7779.
xxiv
Use in High-safety Applications
WARNING
H
g
This product has been designed and manufactured on the assumption that it will be used in office, personal, domestic, regular industrial, and general-purpose applications. It has not been designed and manufactured for use in applications (simply called "high-safety applications" from here on) that directly involve danger to life and health when a high degree of safety is required, for example, in the control of nuclear reactions at nuclear power facilities, automatic flight control of aircraft, air traffic control, operation control in mass-transport systems, medical equipment for sustaining life, and missile firing control in weapons systems, and when provisionally the safety in question is not ensured. The user should use this product with adopting measures for ensuring safety in such high­safety applications. PFU LIMITED assumes no liability whatsoever for damages arising from use of this product by the user in high-safety applications, and for any claims or compensation for damages by the user or a third party.
About the Use of Mercury
Lamp(s) inside this product contain mercury and must be recycled or disposed of according to local, state, or federal laws.
To avoid unexpected injury, read the following carefully. Doing the following actions may result in serious personal injuries:
zDo not lick or consume the substance contained in the lamp. zDo not incinerate, crush, or shred the lamps or scanner parts. zDo not breathe the chemical liquid contained in the scanner lamps.
LCD Peculiarities
zThe LCD backlight is a fluorescent tube that contains some mercury. zBe aware that neither of the following is considered a fault.
z Despite the fact that the latest advanced technology has been used to produce the scanner’s
TFT color LCD's, the large number of pixels involved means that an occasional (always-on) bright dot or (always-off) dark dot may be visible.
z The characteristics of the LCD mean that there may be some variation in hue and intensity of
colors across the screen.
Replacing Batteries
In order to retain data such as BIOS information, this product has a battery (CMOS RAM battery) on board.
z Do not replace the battery yourself, as there is a risk of explosion if the
wrong type is used. Please contact your maintenance engineer in charge when the battery runs low.
z Do not touch the battery. Never install or remove the battery by yourself.
Doing so may cause electric shock or static electricity which can damage the device.
fi-6010N Network Scanner Operator's Guide xxv
About Maintenance
The user must not perform repairs on this scanner. Contact your FUJITSU scanner dealer or an authorized FUJITSU scanner service provider for repairs to this product.

Trademarks

Microsoft, Windows, Windows Vista, Windows Server, and SharePoint are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Adobe, the Adobe logo, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Intel, Pentium, and Intel Core are trademarks or registered trademarks of Intel Corporation in the United States and other countries. ABBYY, FineReader are trademarks of ABBYY. Other company names and product names are the trademarks or registered trademarks of the respective companies.
How Trademarks are Indicated in This Manual
References to operating systems (OS) and applications are indicated as follows:
Windows
Windows XP
Windows Vista
Windows 7
Windows 2000 Server
Microsoft® Windows® operating system
Microsoft® Windows® XP Professional operating system
®
Microsoft
Windows® XP Home Edition operating system
Microsoft® Windows Vista® Home Basic operating system
®
Microsoft Microsoft Microsoft Microsoft
Windows Vista® Home Premium operating system
®
Windows Vista® Business operating system
®
Windows Vista® Enterprise operating system
®
Windows Vista® Ultimate operating system
Microsoft® Windows® 7 Home Premium operating system
®
Microsoft Microsoft Microsoft
Windows® 7 Professional operating system
®
Windows® 7 Enterprise operating system
®
Windows® 7 Ultimate operating system
Microsoft® Windows® 2000 Server
®
Microsoft Microsoft
Small Business Server 2000
®
Windows® 2000 Advanced Server
xxvi
Windows Server 2003
Microsoft® Windows Server® 2003, Standard Edition
®
Microsoft Microsoft
Windows Server® 2003, Enterprise Edition
®
Windows Server® 2003, Datacenter Edition
Windows Server 2008
Microsoft® Windows Server® 2008 Standard
®
Microsoft Microsoft
Windows Server® 2008 Enterprise
®
Windows Server® 2008 Datacenter
Exchange
.NET Framework
SharePoint
Internet Explorer
Internet Information
SQL Server 2005 Express Edition
Adobe Acrobat
Adobe Reader
RightFax
Intel Pentium III Processor
Microsoft® Exchange 2000 Server
®
Microsoft Microsoft
Exchange Server 2003
®
Exchange Server 2007 (supported by 64-bit operating systems
only)
Microsoft® .NET Framework
Microsoft® Office SharePoint® Server 2007
Microsoft® Internet Explorer
®
Microsoft® Internet Information Services
Microsoft® SQL Server® 2005 Express Edition
Adobe® Acrobat®
Adobe® Reader
®
RightFax Business Server (Version 9.3)
Intel® Pentium® III Processor
Manufacturer
PFU LIMITED International Sales Dept., Imaging Business Division, Products Group
Solid Square East Tower 580 Horikawa-cho, Saiwai-ku, Kawasaki-shi Kanagawa 212-8563, Japan Phone: (81-44) 540-4538
All Rights Reserved, Copyright© PFU LIMITED 2009-2010
fi-6010N Network Scanner Operator's Guide xxvii

Notice of Liability

WARNING
CAUTION
BEFORE USING THIS PRODUCT, PLEASE READ THIS MANUAL CAREFULLY. IF THIS PRODUCT IS NOT USED CORRECTLY, UNEXPECTED INJURY CAN OCCUR TO USERS OR BYSTANDERS.
Keep this manual in a safe place so that it can be easily referred to during use of this product.
While all efforts have been made to ensure the accuracy of all information in this manual, PFU assumes no liability to any party for any damage caused by errors or omissions or by statements of any kind in this manual, its updates or supplements, whether such errors are omissions or statements resulting from negligence, accidents, or any other cause. PFU further assumes no liability arising from the application or use of any product or system described herein; nor any liability for incidental or consequential damages arising from the use of this manual. PFU disclaims all warranties regarding the information contained herein, whether expressed, implied, or statutory.
Warning Indications Used in This Manual
This indication alerts operators to an operation that, if not strictly observed, may result in severe injury or death.
This indication alerts operators to an operation that, if not strictly observed, may result in safety hazards to personnel or damage to equipment.
xxviii
Loading...
+ 633 hidden pages