This User’s Guide contains details on making network connections and on
the operations required to use the scanning functions of the bizhub C550,
precautions on its use, and basic troubleshooting procedures. In order to ensure that this machine is used correctly and efficiently, carefully read this User’s Guide before using the machine.
In addition, for details on the operation of PageScope Web Connection,
which can be used to operate this machine over a network, refer to the User’s Guide [PageScope Web Connection Operations].
Views of the actual equipment may be slightly different from the illustrations
used in this manual.
Trademarks and registered trademarks
KONICA MINOLTA, KONICA MINOLTA Logo, and The essentials of imaging
are registered trademarks or trademarks of KONICA MINOLTA HOLDINGS,
INC.
PageScope and bizhub are registered trademarks or trademarks of KONICA
MINOLTA BUSINESS TECHNOLOGIES, INC.
Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries.
This machine and PageScope Box Operator are based in part on the work of
the Independent JPEG Group.
Compact-VJE
Copyright 1986-2003 VACS Corp.
®
is a registered trademark or trademark of RSA Security Inc. in the Unit-
RC4
ed States and/or other countries.
RSA® is a registered trademark or trademark of RSA Security Inc. RSA
BSAFE® is a registered trademark or trademark of RSA Security Inc. in the
United States and/or other countries.
C550x-1
Introduction
NetFront statement
This product contains ACCESS Co., Ltd.’s NetFront Internet browser software.
NetFront is a trademark or registered trademark of ACCESS Co., Ltd. in Japan and in other countries.
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
C550x-2
Introduction
3. All advertising materials mentioning features or use of this software must
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used
5. Products derived from this software may not be called “OpenSSL” nor
6. Redistributions of any form whatsoever must retain the following ac-
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND
ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim Hudson
(tjh@cryptsoft.com).
display the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit. (http://www.openssl.org/)”
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact opensslcore@openssl.org.
may “OpenSSL” appear in their names without prior written permission
of the OpenSSL Project.
knowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit (http://www.openssl.org/)”
C550x-3
Introduction
code are not to be removed. If this package is used in a product, Eric Young
should be given attribution as the author of the parts of the library used. This
can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
2. Redistributions in binary form must reproduce the above copyright no-
3. All advertising materials mentioning features or use of this software must
4. If you include any Windows specific code (or a derivative thereof) from
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public
Licence.]
of conditions and the following disclaimer.
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
display the following acknowledgement:
“This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)”
The word ‘cryptographic’ can be left out if the rouines from the library being used are not cryptographic related.
the apps directory (application code) you must include an acknowledgement:
“This product includes software written by Tin Hudson (tjh@cryptsoft.com)”
C550x-4
Introduction
NetSNMP Licenses
Part 1: CMU/UCD copyright notice: (BSD like)
Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California All
Rights Reserved
Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that
the above copyright notice appears in all copies and that both that copyright
notice and this permission notice appear in supporting documentation, and
that the name of CMU and The Regents of the University of California not be
used in advertising or publicity pertaining to distribution of the software without specific written permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM
ALLWARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL
IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS
OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Part 2: Networks Associates Technology, Inc copyright notice (BSD)
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice,
- Redistributions in binary form must reproduce the above copyright no-
- Neither the name of the Networks Associates Technology, Inc nor the
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
this list of conditions and the following disclaimer.
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
C550x-5
Introduction
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 3: Cambridge Broadband Ltd. copyright notice (BSD)
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice,
- Redistributions in binary form must reproduce the above copyright no-
- The name of Cambridge Broadband Ltd. may not be used to endorse or
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.IN NO EVENT
SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
Part 4: Sun Microsystems, Inc. copyright notice (BSD)
This distribution may include materials developed by third parties.
Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
this list of conditions and the following disclaimer.
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
promote products derived from this software without specific prior written permission.
C550x-6
Introduction
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice,
- Redistributions in binary form must reproduce the above copyright no-
- Neither the name of the Sun Microsystems, Inc. nor the names of its con-
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice,
- Redistributions in binary form must reproduce the above copyright no-
- Neither the name of Sparta, Inc nor the names of its contributors may be
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
this list of conditions and the following disclaimer.
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
tributors may be used to endorse or promote products derived from this
software without specific prior written permission.
this list of conditions and the following disclaimer.
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
used to endorse or promote products derived from this software without
specific prior written permission.
C550x-7
Introduction
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice,
- Redistributions in binary form must reproduce the above copyright no-
- Neither the name of Cisco, Inc, Beijing University of Posts and Telecom-
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
All other product names mentioned are trademarks or registered trademarks
of their respective companies
this list of conditions and the following disclaimer.
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
munications, nor the names of their contributors may be used to endorse
or promote products derived from this software without specific prior
written permission.
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
C550x-8
Introduction
hereby granted, provided that the above copyright notice appear in all copies
and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission. Furthermore if you modify this software you must label your software as modified software and not distribute it in such a fashion
that it might be confused with the original MIT software.
M.I.T. makes no representations about the suitability of this software for any
purpose. It is provided “as is” without express or implied warranty.
THIS SOFTWARE IS PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
THIS SOFTWARE IS NOT ORIGINAL MIT SOFTWARE, MODIFIED BY KONICA MINOLTA BUSINESS TECHNOLOGIES, INC.
Mersenne Twister
A C-program for MT19937, with initialization improved 2002/1/26.
Coded by Takuji Nishimura and Makoto Matsumoto.
Before using, initialize the state by using init_genrand(seed) or
init_by_array(init_key, key_length).
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice,
2. Redistributions in binary form must reproduce the above copyright no-
3. The names of its contributors may not be used to endorse or promote
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETH-
this list of conditions and the following disclaimer.
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
products derived from this software without specific prior written permission.
C550x-9
Introduction
ER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Any feedback is very welcome.
http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/emt.html
email: m-mat @ math.sci.hiroshima-u.ac.jp (remove space)
C550x-10
Introduction
Contents
Introduction
Trademarks and registered trademarks .........................................x-1
This User’s Guide covers the bizhub C550 network and scanning functions.
This section introduces the structure of the manual and notations used for
product names, etc.
This manual is intended for users who understand the basic operations of
computers and the machine. For operating procedures of the Windows or
Macintosh operating system and application programs, refer to the respective manuals.
Structure of the manual
This manual consists of the following chapters.
Chapter 1 Before using scanning functions
Chapter 2 Scanning
Chapter 3 Specifying Utility mode parameters
Chapter 4 Network Settings
Chapter 5 Scan function troubleshooting
Chapter 6 Appendix
Chapter 7 Index
Lists the product specifications and the characters that can be entered from
the control panel.
Notation
Product nameNotation in the manual
bizhub C550This machine, C550
Microsoft Windows NT 4.0Windows NT 4.0
Microsoft Windows 2000 Windows 2000
Microsoft Windows XP Windows XP
Microsoft Windows VistaWindows Vista
When the operating systems above are written
together
Windows NT 4.0/2000/XP/Vista
C550x-18
Introduction
Explanation of manual conventions
C550x-19
Introduction
C550x-20
Introduction
User’s guides
This machine is provided with printed manuals and PDF manuals on the User’s Guide CD.
Printed manuals
Quick Guide [Copy/Print/Fax/Scan/Box Operations]
This manual contains operating procedures and descriptions of the most frequently used functions, allowing the machine to immediately be used.
In addition, this manual contains notes and precautions that should be followed for safe use of the machine.
Be sure to read this manual before using the machine.
User’s Guide [Enlarge Display Operations]
This manual contains details on operating procedures in Enlarge Display
mode.
Refer to this manual for details on using copy, network scanner and fax functions in Enlarge Display mode.
User’s Guide CD manuals
User’s Guide [Copy Operations]
This manual contains descriptions of the Copy mode operations and machine maintenance. Refer to this manual for details on the paper and documents, copy procedures using convenient Application functions, replacing
consumables, and troubleshooting operations such as clearing paper misfeeds.
User’s Guide [Print Operations]
This manual contains details of the printing functions that can be specified
with the standard built-in printer controller. Refer to this manual for operating
procedures on using the printing functions.
User’s Guide [Box Operations]
This manual contains operating procedures for using the user boxes on the
hard disk. Refer to this manual for details on saving data in user boxes, retrieving data from user boxes and transferring data.
This manual contains descriptions on specifying network settings for standard equipment and operating procedures for scanning functions. Refer to
this User’s Guide for details on using network functions and the Scan to EMail, Scan to FTP and Scan to SMB operations.
C550x-21
Introduction
User’s Guide [PageScope Web Connection Operations]
This manual contains descriptions on the machine settings that can be specified remotely with PageScope Web Connection from a Web browser on a
computer. Refer to this manual for details on operating procedures for using
PageScope Web Connection.
User’s Guide [Fax Operations]
This manual contains descriptions of the G3 fax operations. Refer to this
manual for details on using the G3 fax operations when the optional fax kit is
installed.
In order to use the fax functions, the optional fax kit must be purchased separately.
User’s Guide [Network Fax Operations]
This manual contains details on the network fax functions. Refer to this manual for operating procedures on Internet faxing and IP address faxing.
User’s Guide [Fax Driver Operations]
This manual contains details of the fax driver functions that can be used to
send a fax directly from a computer.
Refer to this manual for operating procedures on using the PC-FAX functions.
In order to use the fax functions, the optional fax kit must be purchased separately.
User’s Guide [Advanced Function Operations]
This User’s Guide describes overview and usage of functions that become
available by registering the optional license kit and enabling its function, and
functions that become available by connecting the MFP with applications.
In order to use the functions effectively, please read this User’s Guide.
The following models support the advanced function.
bizhub C650/C550/C451/C353/C253/C203
C550x-22
1
Before using scanning
functions
Before using scanning functions
1Before using scanning functions
1.1Environment required for using scanning functions
The following conditions are required in order to use the network scanning
features.
- The machine is connected to the network. (required)
The machine can be used over a TCP/IP network. First, connect the cable
for connecting to the network. For details, refer to “Network connection”
on page 1-10. In order to use this machine on a network, settings such
as the IP address of the machine must be specified. For details, refer to
chapter 4, “Network Settings” on page 4-2.
- The driver software is installed on the computer.
In order to use this machine as a scanner, the dedicated software KONICA MINOLTA TWAIN must be installed. For details, refer to the TWAIN
driver manual on the User Software CD-ROM.
1
C5501-2
Before using scanning functions
1.2Available scanning functions
“Scanning” refers to the operation of reading the image of a document fed
through the ADF or placed on the original glass. The Scan functions can be
used to temporarily store the scan data on the internal memory of the machine and transmit the data over the network.
Scan to E-Mail
The scan data can be sent to the specified e-mail address. Destinations can
be selected from the touch panel of this machine, and the scan data is sent
as an e-mail attachment.
Original
1
Machine
Memory
E-mail and scan data
E-mail reception
SMTP serverPOP server
Internet
C5501-3
Before using scanning functions
Scan to FTP
The scan data can be uploaded to the specified FTP server. The FTP server
address, logon password and other information are entered from the touch
panel of this machine.
The data uploaded to the FTP server can be downloaded from a computer
on the network.
Original
1
Machine
Memory
Scan data
Download
FTP server
Internet
C5501-4
Before using scanning functions
Scan to SMB
The scan data can be sent to a shared folder on a specified computer. The
host name, file path and other information are entered from the touch panel
of this machine.
Original
Machine
1
Scan data
Memory
Save to a shared folder
C5501-5
Before using scanning functions
Saving in user boxes
The scan data can be saved in a user box created on the hard disk of this
machine, allowing the data to be reused. The file name can be entered from
the touch panel of this machine when the data is saved.
Other data such as received fax data can also be stored in user boxes. For
details, refer to the User’s Guide [Box Operations].
Hard disk
1
Machine
C5501-6
Before using scanning functions
Scan to WebDAV
Scanned data can be uploaded to a specified server. Enter the server address, login password and other information from the touch panel of the machine.
The data uploaded to the server can be downloaded from a computer on the
network.
Original
1
Machine
Scan data
Memory
Download
Server
Internet
!
Detail
Since HTTP extensions are used, WebDAV allows HTTP security technology to be used as it is. Files can be transmitted more safely when communications with the WebDAV server are encrypted with SSL.
If a proxy server is available in the network environment, a WebDAV server on the Internet can be accessed through the proxy server.
C5501-7
Loading...
+ 385 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.