This user’s guide contains details on the operation of the network connection
and scanner functions of the bizhub 360, precautions on its use, and basic
troubleshooting procedures. In order to ensure that this machine is used correctly and efficiently, carefully read this user’s guide before using the machine. After reading the manual, store it in the designated holder so that it
can easily be referred to when questions or problems arise during operation.
The illustrations used in this manual may appear slightly different from views
of the actual equipment.
bizhub 360x-1
Trademarks and Registered Trademarks
KONICA MINOLTA, KONICA MINOLTA Logo, and The essentials of imaging
are registered trademarks or trademarks of KONICA MINOLTA HOLDINGS,
INC.
PageScope and bizhub are registered trademarks or trademarks of KONICA
MINOLTA BUSINESS TECHNOLOGIES, INC.
Netscape Communications, the Netscape Communications logo, Netscape
Navigator, Netscape Communicator, and Netscape are trademarks of Netscape Communications Corporation.
This machine and PageScope Box Operator are based in part on the work of
the Independent JPEG Group.
Compact-VJE
Copyright 1986-2003 VACS Corp.
RC4® is a registered trademark or trademark of RSA Security Inc. in the United States and/or other countries.
RSA® is a registered trademark or trademark of RSA Security Inc. RSA
®
BSAFE
United States and/or other countries.
is a registered trademark or trademark of RSA Security Inc. in the
License information
This product includes RSA BSAFE Cryptographic software
from RSA Security Inc.
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit. (http://www.openssl.org/)”
x-2bizhub 360
Introduction
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used
5. Products derived from this software may not be called “OpenSSL” nor
6. Redistributions of any form whatsoever must retain the following ac-
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND
ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@crypt-Soft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact opensslcore@openssl.org.
may “OpenSSL” appear in their names without prior written permission
of the OpenSSL Project.
knowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit (http://www.openssl.org/)”
bizhub 360x-3
Introduction
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement:
“This product includes cryptographic software written by Eric Young
(eay@crypt-soft.com)”
The word ‘cryptographic’ can be left out if the routines from the library
being used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledgement:
“This product includes software written by Tin Hudson (tjh@cryptsoft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public
Licence.]
All other product names mentioned are trademarks or registered trademarks
of their respective companies
NetSNMP License
Part 1: CMU/UCD copyright notice: (BSD like)
Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California All
Rights Reserved
x-4bizhub 360
Introduction
Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that
the above copyright notice appears in all copies and that both that copyright
notice and this permission notice appear in supporting documentation, and
that the name of CMU and The Regents of the University of California not be
used in advertising or publicity pertaining to distribution of the software without specific written permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM
ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS
OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Part 2: Networks Associates Technology, Inc copyright notice (BSD)
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 3: Cambridge Broadband Ltd. copyright notice (BSD)
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
Part 4: Sun Microsystems, Inc. copyright notice (BSD)
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
x-6bizhub 360
Introduction
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
* Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/
or other materials provided with the distribution.
* Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
x-8bizhub 360
Introduction
Contents
Introduction
Trademarks and Registered Trademarks ...................................... x-2
This User’s Guide covers the bizhub 360 network and scanning functions.
This section introduces the structure of the manual and notations used for
product names, etc.
This manual is intended for users who understand the basic operations of
computers and the machine. For operating procedures of the Windows or
Macintosh operating system and application programs, refer to the respective manuals.
Structure of the Manual
This manual consists of the following chapters.
Chapter 1 Before Using the Scan Functions
Chapter 2 Scanning Documents
Chapter 3 Specifying Settings From the Control Panel
Chapter 4 Specifying Settings Using PageScope Web Connection
Chapter 5 Scan Function Troubleshooting
Chapter 6 Appendix
Lists the product specifications and the characters that can be entered from
the control panel.
Introduction
Notation
Product NameNotation in the Manual
bizhub 360This machine, 360
Microsoft Windows 98Windows 98
Microsoft Windows MeWindows Me
Microsoft Windows NT 4.0Windows NT 4.0
Microsoft Windows 2000 Windows 2000
Microsoft Windows XP Windows XP
When the operating systems above are written
together
Windows 98/Me
Windows NT 4.0/2000/XP
Windows 98/Me/NT 4.0/2000/XP
x-18bizhub 360
Introduction
Explanation of Manual Conventions
2
Note
Text highlighted in this manner
contains references and supplemental
information concerning operating
procedures and other descriptions.
We recommend that this information
be read carefully.
[]
Names highlighted as shown above
indicate keys on the control panel
and buttons in the touch panel.
Touch panel screens are shown to
check the actual display.
2
Reminder
Text highlighted in this manner
indicates operation precautions.
Carefully read and observe this
type of information.
Titles indicate the contents of the section.
Basic Copy Operations
3.6 Selecting a Paper Setting
The paper size can be selected automatically according to the document
size or it can be specified manually. Specify the paper size acc ording to the
corresponding procedure, depending on the desired copy settings.
2
Note
The default setting is “Auto Paper Select”.
Automatically Selecting the Paper Size (“Auto Paper Select” Setting)
The size of the loaded document is detected, and copies are produced using
paper of the same size.
1
In the Basic screen, touch [Paper].
The Paper screen appears.
2
Reminder
Be careful that your fingers are not pinched when the front door is closed.
!
Detail
For details on the positions of paper mis feeds, refer to “Paper Misfeed Indications” on page 5-7.
7
7 CAUTION
7 7
Metallic parts on the inside of the upper cover are very hot.
!
Detail
Text highlighted in this manner
provides more detailed information
concerning operating procedures or
references to sections containing
additional information. If necessary,
refer to the indicated sections.
%Touching any part other than the paper may result in
burns.
3
Basic Copy Operations Chapter 3
3-31
WARNING , CAUTION
7
Text highlighted in this manner indicates precautions to ensure safe use of this machine.
"Warning" indicates instructions that, when not observed, may result in fatal or critical injuries.
"Caution" indicates instructions that, when not observed, may result in serious injuries or
property damage.
(The page shown above is an example only.)
bizhub 360x-19
User’s Guides
The following User’s Guides have been prepared for this machine.
User’s Guide [Copy Operations]
This manual contains details on basic operations and the operating procedures for the various copy functions.
- Refer to this User’s Guide for details on operating procedures for copy
functions, including precautions on installation/use, turning the machine
on/off, loading paper, and troubleshooting operations such as clearing
paper misfeeds.
This manual contains details on specifying network settings for standard
equipment and on operations for scanning functions.
- Refer to this User’s Guide for details on operating procedures for network
functions and for using Scan to E-Mail, Scan to FTP and Scan to SMB.
User’s Guide [Box Operations]
This manual contains details on operating procedures for using the boxes.
- Refer to this User’s Guide for details on operating procedures for using
the boxes on the hard disk.
Introduction
User’s Guide [Enlarge Display Operations]
This manual contains details on operating procedures for using copy, network scanner and fax functions in Enlarge Display mode.
- Refer to this User’s Guide for details on operating procedures in Enlarge
Display mode.
User’s Guide [FK-502 Facsimile Operations]
This manual contains details on operating procedures for faxing.
- Refer to this User’s Guide for details on operating procedures for fax
functions when the fax kit is installed.
User’s Guide [Network Fax Operations]
This manual contains details on operating procedures for network faxing.
- Refer to this User’s Guide for details on operating procedures for network
fax functions (Internet Fax/IP Address Fax).
x-20bizhub 360
Introduction
IC-204 User’s Guide/Quick Guide
This manual contains details on operating procedures using the optional Image Controller (IC-204).
- Refer to the User’s Guide (PDF data) provided in the User Software CD-
ROM or Quick Guide (printed matter) attached to IC-204 for the procedures to use the printer functions.
bizhub 360x-21
1
Before Using the Scan
Functions
Before Using the Scan FunctionsChapter 1
1
Before Using the Scan Functions
1Before Using the Scan Functions
1.1Environment Required for Using the Scan Functions
The following conditions are required to use the network and scanning functions of this machine.
- The machine is connected to the network. (required)
The functions can be used over a TCP/IP network. For details on the connection, refer to “Connecting to the Network” on page 1-10. Also, network parameters such as the IP address of this machine must be
specified in order to use the machine on the network. For details, refer to
“Settings for Using Network/Scanning Functions” on page 1-7.
Before Using the Scan FunctionsChapter 1
1-2bizhub 360
Before Using the Scan Functions
1.2Available Scanning Functions
“Scanning” refers to the operation of reading the image of a document fed
through the ADF or placed on the original glass. The scanning functions can
be used to temporarily store the scanned data in the internal memory of the
machine and transmit the data in an e-mail message over the network or upload the data to a file server.
With the scanning functions, data can be sent to up to 516 destinations at
the same time.
In addition, if an optional hard disk is installed, the data can be stored on the
hard disk of this machine. This function can be used from the Box mode,
which is described in the User’s Guide [Box Operations].
2
Note
The maximum number of destinations that can be selected at the same
time is 516 (500 programmed destinations, 5 e-mail, FTP and SMB destinations entered directly and 1 box destination (Only when the hard disk
is installed)).
Sending the Scanned Data in an E-Mail Message
The scanned data can be sent to a specified e-mail address. The destination
is specified from the touch panel of this machine, and the scanned data is
sent as an e-mail attachment.
For details, refer to “Sending Data in an E-Mail Message (Scan to E-Mail)” on
page 2-6.
1
Before Using the Scan FunctionsChapter 1
bizhub 3601-3
1
Before Using the Scan FunctionsChapter 1
Before Using the Scan Functions
Sending the Scanned Data as Files (FTP)
The scanned data is uploaded to a specified FTP server. The FTP server address, login password, and other information are entered from the touch
panel of this machine.
The data files uploaded to the FTP server can be downloaded from a computer on the network.
For details, refer to “Sending Data to a Server (Scan to FTP)” on page 2-19.
1-4bizhub 360
Before Using the Scan Functions
Sending the Scanned Data to a Computer on the Network (SMB)
The scanned data can be sent to a shared folder on a specified computer.
The name of the destination computer, login password, and other information are entered from the touch panel of this machine.
For details, refer to “Sending Data to a PC on the Network (Scan to SMB)”
on page 2-31.
1
Before Using the Scan FunctionsChapter 1
bizhub 3601-5
1
Before Using the Scan FunctionsChapter 1
Before Using the Scan Functions
Saving the Scanned Data in Boxes
The scanned data can be saved in boxes created on the machine’s internal
hard disk. The data can be used in other applications. The file name can be
entered from the touch panel of the machine.
In addition, if the scanned data is saved in “Annotation User box”, you can
deliver it over the Internet by adding any domain name and the delivery date
and time.
For the procedure to save in an annotation user box, refer to “Annotations
(Application)” on page 2-65. For saving other data in a box or reusing the
data that has been saved, refer to User’s Guide “Box Operations”.
1-6bizhub 360
Before Using the Scan Functions
1.3Settings for Using Network/Scanning Functions
It is recommended that the settings described below be specified before using the network/scanning functions. The network settings described in
“Specifying Network Settings” must be specified first. Set other items as
necessary.
!
Detail
For details on specifying network settings, refer to the chapters listed below.
“TCP/IP Settings” on page 3-46
“E-Mail TX (SMTP) Settings” on page 3-87
“4 Specifying Settings Using PageScope Web Connection”
Specifying Network Settings
An IP address must be assigned to the machine and settings such as the
SMTP server must be specified to use the machine on the network. Be sure
to set them.
There are two methods for specifying settings. One method is to specify the
settings from the touch panel of this machine. The other method is to use PageScope Web Connection from a Web browser on a computer on the network.
1
Before Using the Scan FunctionsChapter 1
Registering Destinations and Specifying Their Settings
The destinations (recipients) of scanned data must be registered.
The following registration methods are available.
- Register from the touch panel of the machine.
- Use PageScope Web Connection from a computer on the network.
The following types of destinations can be registered.
TypeDescription
Abbreviated DestinationThe destination can be selected with one button.
GroupMultiple destinations can be registered in groups. E-mail, FTP,
SMB, and box destinations can be registered together in a single
group.
2
Note
The destination can also be entered before scanning. This is called “direct input”. For details, refer to “Entering the Addresses Directly” on
page 2-16.
bizhub 3601-7
Loading...
+ 384 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.