1. The reproduction of the content of this manual, either partially or in full,
is prohibited without prior permission.
2. The content of this manual is subject to change without notice.
3. Unauthorized duplication or modification is strictly prohibited.
4. This manual was created with careful attention to content; however, if
inaccuracies, errors or omissions are noticed, please contact your
sales or service representative.
5. Some network application functions may not be supported, depending
on the operating environment or other software.
The actual performance of network application functions is determined
by various factors, such as the system configuration, customer data
and operator controls.
Since the operating environment of network application functions
differs depending on the customer, the configuration of specific
products and the suitability of the application software should be
determined specifically for the customer.
6. We assume no responsibility for consequences arising from use,
regardless of items 4 and 5 mentioned above.
7. The software provided with the device, the software included on the
CD-ROM and information such as the design of and materials related
to this manual are the sole property of NEC Corporation, NEC Access
Technica and their licensors.
NEC Corporation, NEC Access Technica and their licensors own all
patents, copyrights and titles to this manual, from the design,
production and duplication to the use and marketing rights. However,
these limitations do not apply if written permission to transfer the
above-mentioned rights to another company is received.
8. The touch panel screens and computer windows and dialog boxes
shown in this manual may differ slightly from the actual products.
Introduction
1-2Scanner Mode
Introduction
1.2.2User Instructions
For the U.S.A. Users
FCC Part 15-Radio Frequency Devices
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation.
NOTE
This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and radiate radio frequency
energy and if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference in
which case the user will be required to correct the interference at his own expense.
WARNING
The design and production of this unit conform to FCC Regulations, and any changes or
modifications must be registered with the FCC and are subject to FCC control. Any changes
made by purchaser or user without first contacting the manufacturer will be subject to penalty
under FCC regulations.
FCC-F02
This device must be used with shielded interface cables. The use of non-shielded cables is
likely to result in interference with radio communications and is prohibited under FCC rules.
1
For Canada Users
Interference-Causing Equipment Standard (ICES-003 Issue 3)
This Class A digital apparatus complied with Canadian ICES-003
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
IC-F03
Scanner Mode1-3
1
Introduction
For European Users
CE Marking (Declaration of Conformity)
This product complies with the following EU directives:
89/336/EEC, 73/23/EEC and 93/68/EEC directives.
This declaration is valid for the area of the European Union.
This device must be used with shielded interface cables. The use of non-shielded cables is
likely to result in interference with radio communications and is prohibited under EU
directives.
For Users of the Class B regulation’s countries
This device must be used with shielded interface cables. The use of non-shielded cables is
likely to result in interference with radio communications and is prohibited under CISPR 22
rules and local rules.
For Users except the Class B regulation’s countries
WARNING
This is a Class A product. In a domestic environment this product may cause radio
interference in which case the user may be required to take adequate measures.
This device must be used with shielded interface cables. The use of non-shielded cables is
likely to result in interference with radio communications and is prohibited under CISPR 22
rules and local rules.
1-4Scanner Mode
Introduction
Precautions for using network applications
G Internet faxes and Scan to E-mail transmissions are sent and received
G If transmission from the mail server to the recipient is not possible for
G For some reason, the e-mail describing the error may not be received.
G Since the privacy of transmissions through the Internet or an intranet
G Telephones on a LAN cannot be used.
G It may take some time for a transmission to be sent due to Internet/
G Depending on the mail servers, it may not be possible to send
1
with the help of a mail server; they are not sent directly to the recipient
or received directly from the sender. In addition, as soon as
transmission with the server is finished correctly, the transmission is
considered complete.
some reason, an e-mail describing the error will be received from the
server.
If confirmation of the transmission is required, call the recipient after
transmission to confirm reception.
is limited, we recommend sending important documents directly to the
recipient through a common telephone line.
intranet traffic.
documents with a large number of pages or a large amount of image
data.
Functions that cannot use network applications
The following functions can be used with normal fax transmissions using
a common telephone line, but cannot be used with network applications.
G Batch transmission
G Polling transmission
G Real-Time transmission
G Password transmission
G Remote copying
G Confidential box
G Bulletin board registration
G On-hook
G Remote retrieval of bulletin board
✎
Note
Password transmission and remote copying can be specified in the
operation, but they will not function.
Scanner Mode1-5
1
Introduction
The following functions can be used with network applications.
G Image quality specification
G Density specification
G Non-reduction mode
G Scan area specification
G 2in1
G 2-sided transmission
G TX marker stamp (optional)
G TSI
G Destination insert
G Forward the received facsimile ducuments (Document Management)
G Priority transmission
G Timer transmission
G Rotation transmission
1-6Scanner Mode
Introduction
1.3Check for Enclosed Accessories
Check that all of the following are included.
If anything is missing or damaged, contact your service representative.
Network Scan Kit (SU-2)
G TWAIN driver CD-ROM containing electronic manuals
This CD-ROM contains the TWAIN driver, the Scanner Mode User
Manual and the PageScope Light User Manual.
Internet Fax & Network Scan Kit (SU-3)
G TWAIN driver CD-ROM containing electronic manuals
This CD-ROM contains the TWAIN driver, the Scanner Mode User
Manual and the PageScope Light User Manual.
G Utility Disk (CD-ROM)
The Utility Disk contains the utilities (e.g., IP Scanner and Network
FAX), the IP Scanner User Manual and the Network FAX User
Manual.
✎
Tip
In order to use the Network Scan Kit or the Internet FAX & Network
Scan Kit, the Printer Controller (Pi3505e or Pi3505e/PS) and the
Network Interface Card must be installed.
1
✎
Note
The LAN cable (cable for Fast Ethernet 100BASE-TX) is not included.
CAUTION
Only use the CD-ROM in a player that is CD-ROM-compatible.
➜ If a player not compatible with the CD-ROM format is used, your ears
or speakers may be damaged by the loud noise produced.
Scanner Mode1-7
1
Introduction
1-8Scanner Mode
Overview
2Overview
Paper documents can easily be converted to electronic data and used, for
example, with electronic filing. Scanned image data (scan data) can be
sent to other computers through a network as either a TIFF file or a PDF
file.
The scanned image can be sent using any of the following methods.
Choose the appropriate method according on the network environment
and purpose.
2.1Scan to E-mail
G Scan data is attached to an e-mail message as a TIFF or PDF file, then
sent to a computer through an intranet or the Internet.
G A network environment that includes a mail server is required.
2
Mail server
Client computer
Intranet
Internet
Mail server
Client computer
Scanner Mode2-1
2
2.2Scan to Server (FTP)
G Scan data can be uploaded as TIFF or PDF files to a specified
directory on an FTP server.
G A network environment that includes an FTP server is required.
G An FTP server on the Internet can be accessed through a proxy
server.
G A maximum of five FTP server can be registered, and a maximum of
five directories can be set up on each FTP server.
Overview
FTP server
Intranet
Internet
FTP server
2-2Scanner Mode
Overview
2
G With the “URL Report” function, a notification of the URL where the
scan data is saved can be sent by e-mail. (If the “URL Report” function
is used, a mail server is required.)
FTP server
FTP server
Internet
Client computer
Intranet
Internet
Mail server
Client computer
Scanner Mode2-3
2
2.3Scan to PC (FTP)
G Scan data can be sent as TIFF or PDF files to client computers using
FTP.
G The FTP server application must be running on the client computers.
G The forwarding destination on the client computer is the root folder
specified with the FTP server application. This setting cannot be
specified from the copier’s control panel or from PageScope Light.
Overview
FTP server
application
Intranet
Client computer
2-4Scanner Mode
Overview
2.4Scan to HDD
G Scan data is saved on the copier’s hard disk as TIFF or PDF files.
The saved files can be retrieved with PageScope Light or TWAIN
driver.
G With the “URL Report” function, a notification of the URL where the
scan data is saved can be sent by e-mail.
(If the “URL Report” function is used, a mail server is required.)
Scan
data
HDD
Intranet
Client
computer
2
Scanner Mode2-5
2
2.5Internet Faxing
G As opposed to a normal fax, which transmits through telephone lines,
Internet fax sends and receives fax images through the Internet.
Internet fax uses the Internet electronic mail (e-mail) setup to send and
receive fax images. Image data scanned at an Internet fax terminal is
attached to an e-mail message as a TIFF-F file, then sent to the
recipient’s Internet fax terminal. The file attached to the received email message is printed by the Internet fax terminal on the receiving
end.
In addition, since e-mail is used, the fax can be sent to an individual email address, not just an Internet fax terminal. In this case, the fax
image arrives at the receiving end as an attachment to an e-mail
message received with the usual mail client software.
Overview
Mail server
Client computer
Internet fax
terminal
Intranet
Internet
Mail server
Client computer
2-6Scanner Mode
Overview
2.6IP Address FAX (LAN-FAX)
G Scan data is sent to a copier of the same type (Internet fax) through
the Intranet, without passing through a mail server.
Intranet
1 Program a one-touch key with the IP address or the host name of the
recipient.
2
Internet fax terminal
(Same type of unit
as copier)
2 Use the one-touch key to specify the recipient, and then specify the
settings for sending the data (IP address fax transmission).
3 The recipient receives the fax image (IP address fax reception).
Scanner Mode2-7
2
2.7Scan to PC (SMTP)
G Scan data can be sent as TIFF or PDF files to client computers using
SMTP.
G From the client computer, the enclosed IP Scanner application must
be used to first specify the folder where data is saved. In addition, the
IP Scanner application can be set to save the data in a folder that was
created using the name of the one-touch key.
G In order to receive the data at a client computer and save it as an
image file, the enclosed utilities IP Scanner and Image Receiver are
required.
G If there is a DHCP server on the network, this function may not operate
correctly since IP addresses are automatically distributed to each
computer. In this case, specify a fixed IP address for the computer or
use IP Scanner.
Intranet
Overview
Client computer
1 Program a one-touch key with the IP address of the computer
receiving the data.
2 Using the same procedure for sending e-mail messages, specify that
the data is to be sent to a computer.
3 The sent scan data is received by the recipient computer.
4 The IP Scanner application converts the data to a TIFF or PDF file,
then saves the file in the specified folder.
2-8Scanner Mode
Overview
2.8IP Scanner
G Scan data is sent to a client computer, where it is saved in a folder that
is created using the name of the scanner button.
G After programming a button (Scan data destination and scan settings)
from the client computer when scanning, a paper document can easily
be saved as an electronic file with just the touch of a button in the
copier’s touch panel.
In order to receive the data at a client computer and save it as an
image file, the enclosed utilities IP Scanner and Image Receiver are
required.
G This function can be used in a network without a LAN if a crossover
cable is used to connect the copier to a client computer. (Network
settings are required.)
2
Client computer
1 From the computer, program a button (recipient of the scan data).
2 Touch the programmed button to send the scan image.
3 The sent scan image is received by the recipient computer.
4 The IP Scanner application converts the data to a TIFF or PDF file,
then saves the file in the specified folder.
Scanner Mode2-9
2
2.9Document Forwording/Archive Distribution
G Image data received from a fax machine on a common telephone line
can be sent directly to a computer or attached to an e-mail message.
In order to transmit the fax document by e-mail, a network environment
that includes a mail server is required.
G The fax document can be be received at your own computer.
G Received fax documents can be classified as “F-Code”, “Port” or
“Public Document”, and the distribution destinations for each type of
document can be specified.
Overview
Facsimile
terminal
Facsimile
communication
Telephone
line
Client computer
Mail server
1 From the copier, select a Doc. Manage setting to classify the fax
image.
2 The fax image is sent to the computer specified as the recipient.
3 The fax image is received by the recipient computer as an image file.
2-10Scanner Mode
Overview
2.10Network Fax Transmission
G To use Network Fax transmission, “Network FAX” is required, one of
the attached utilities. Be sure to confirm the network environment, then
perform the network setting and the setup of Network FAX.
G A document created in an application, such as word-processing
software, can be faxed by specifying the telephone (fax) number of the
recipient, without first printing the document.
In addition, the result of the fax transmission can be checked from the
computer.
G An e-mail address or a telephone (fax) number can be specified for the
recipient.
G In order to perform direct faxing operations using a mail server, the
DNS settings must be specified.
Client computer
2
Mail server
Telephone
line
Facsimile
communication
Facsimile terminal
1 Specify the fax number of the destination (specify the recipient after
specifying printing from the application).
2 The image data is transmitted from the client computer or mail server.
3 The data received by the computer is sent to the specified fax number.
Scanner Mode2-11
Loading...
+ 304 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.