Konica Minolta IC-406 User Manual

Image Controller IC-406
User’s Guide
[Network Scanner Operations] [Copier Network Functions]

Introduction

Introduction
Thank you for choosing this machine.
This User’s Guide contains descriptions of the network scanning functions and operations that can be used from optional C352/C300 image controller IC-406 and the network functions that can be used from the copier when the IC-406 is installed. To ensure the best possible performance and most effec­tive use of the machine, read this manual thoroughly. After reading this Us­er’s Guide, store it in the designated holder for quick reference when problems or questions arise during operation.
Views of the actual equipment may be slightly different from the illustrations used in this manual.

Trademarks and Registered Trademarks

KONICA MINOLTA and the KONICA MINOLTA logo are trademarks of Koni­ca Minolta Holdings, Inc.
PageScope is a registered trademark of Konica Minolta Business Technolo­gies, Inc.
Apple and Macintosh are registered trademarks of Apple Computer, Inc.
Ethernet is a registered trademark of Xerox Corporation.
Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation.
PostScript is a registered trademark of Adobe Systems, Inc.
EFI, Fiery and the Fiery logo are registered trademarks of Electronics for Im­aging, Inc. and are legally registered in the United States and other countries.
The Electronics for Imaging logo, Fiery Remote Scan, Fiery WebScan, and Fiery WebTools are trademarks of Electronics for Imaging, Inc.
®
RC4
is a registered trademark or trademark of RSA Security Inc. in the Unit-
ed States and/or other countries.
RSA® is a registered trademark or trademark of RSA Security Inc. RSA BSAFE® is a registered trademark or trademark of RSA Security Inc. in the United States and/or other countries.
License information
This product includes RSA BSAFE Cryptographic soft­ware from RSA Security Inc.
Introduction
All other product names are either trademarks or registered trademarks of their respective companies.
Copyright © 2006 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC.
OpenSSL Statement
OpenSSL License
Copyright © 1998-2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modifica­tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
x-2 IC-406
Introduction
2. Redistributions in binary form must reproduce the above copyright no-
3. All advertising materials mentioning features or use of this software must
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used
5. Products derived from this software may not be called “OpenSSL” nor
6. Redistributions of any form whatsoever must retain the following ac-
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIM­ITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT­NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON­SEQENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE­MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@crypt-Soft.com). This product includes software written by Tim Hud­son (tjh@cryptsoft.com).
Original SSLeay License
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@crypt­soft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the fol­lowing conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, Ihash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the
tice, this list of conditions and the following disclaimer in the documen­tation and/or other materials provided with the distribution.
display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”
to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl­core@openssl.org.
may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
knowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)”
Introduction
same copyright terms except that the holder is Tim Hudson (tjh@crypt­soft.com). Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documen­tation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modifica­tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright no­tice, this list of conditions and the following disclaimer in the documen­tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@crypt-soft.com)” The word ‘cryptographic’ can be left out if the rouines from the library be­ing used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledge­ment: “This product includes software written by Tin Hudson (tjh@crypt­soft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EX­PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AU­THOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI­DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILI­TY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or de­rivative of this code cannot be changed. i.e. this code cannot simply be cop­ied and put under another distribution licence [including the GNU Public Licence.]
In order to incorporate improvements in the product, the content of this man­ual is subject to change without notice.
x-4 IC-406
Introduction

Contents

Introduction
Trademarks and Registered Trademarks ...................................... x-2
Contents ............................................................................................ x-5
About This Manual .......................................................................... x-14
Structure of the Manual ................................................................x-14
Notation .........................................................................................x-14
Explanation of Manual Conventions ............................................. x-16
1 Before Using the Scan Functions
1.1 Environment Required for Using the Scan Functions ................... 1-2
1.2 Available Scanning Functions ......................................................... 1-3
Sending the Scanned Data in an E-Mail Message ......................... 1-3
Sending the Scanned Data as Files (FTP) ...................................... 1-4
Sending the Scanned Data to a Computer on the Network
(SMB) ............................................................................................. 1-5
Saving Scanned Data in Boxes on the Image Controller Hard Disk
(Save in Mailbox of Image Controller) ............................................ 1-6
Copier Box Functions .................................................................... 1-7
1.3 Settings for Using Network/Scanning Functions .......................... 1-8
Specifying Network Settings .......................................................... 1-8
Registering Destinations and Specifying Their Settings ................ 1-8
1.4 Settings for Scanning ..................................................................... 1-10
Specifying the Scan Settings ....................................................... 1-10
Specifying the Destination ........................................................... 1-10
1.5 Connecting to the Network ........................................................... 1-11
Network Connection .................................................................... 1-11
Turning On the System ................................................................ 1-11
1.6 Flow Chart of Setup and Scanning Operations ........................... 1-13
1.7 Frequently Used Screens ............................................................... 1-15
To display the Scan screen .......................................................... 1-15
To display the User Setting screen .............................................. 1-16
To display the Administrator Setting screen ................................ 1-17
2 Scanning Documents
2.1 Control Panel .................................................................................... 2-2
2.2 Displaying the Scan Screen ............................................................. 2-5
Introduction
2.3 Sending Data in an E-Mail Message (Scan to E-Mail) ....................2-6
Scan to E-Mail ................................................................................2-6
Using Programs ..............................................................................2-6
Selecting Group Addresses ............................................................2-9
Selecting Destinations From the Address Book ...........................2-12
Performing an LDAP Search .........................................................2-15
Entering the Addresses Directly ...................................................2-16
2.4 Sending Data to a Server (Scan to FTP) ........................................2-19
Scan to FTP ..................................................................................2-19
Using Programs ............................................................................2-19
Selecting Group Addresses ..........................................................2-21
Selecting Destinations From the Address Book ...........................2-24
Entering the Addresses Directly ...................................................2-27
2.5 Sending Data to a PC on the Network (Scan to SMB) .................2-31
Scan to SMB .................................................................................2-31
Using Programs ............................................................................2-31
Selecting Group Addresses ..........................................................2-33
Selecting Destinations From the Address Book ...........................2-35
Entering the Addresses Directly ...................................................2-38
2.6 Saving Data on the Hard Disk
(Save in Mailbox of Image Controller) ...........................................2-41
Save in Mailbox .............................................................................2-41
Types of Mailboxes .......................................................................2-41
Using Programs ............................................................................2-42
Selecting Group Addresses ..........................................................2-44
Selecting Destinations From the Address Book ...........................2-46
To save data to the specified mailbox ..........................................2-49
2.7 Specifying the Scan Settings ..........................................................2-52
Available Settings .........................................................................2-52
File Type ........................................................................................2-54
To specify the File Type settings ..................................................2-55
Resolution .....................................................................................2-56
Simplex/Duplex .............................................................................2-57
To specify the Simplex/Duplex setting .........................................2-57
Color .............................................................................................2-58
To specify the Color setting ..........................................................2-59
Scan Size ......................................................................................2-60
To specify the Scan Size setting ...................................................2-60
Brightness .....................................................................................2-62
Background Removal ...................................................................2-63
Original Setting .............................................................................2-64
To specify the Original Settings ....................................................2-64
Book Scanning (Application) .........................................................2-66
To use the “Book Scan” function .................................................2-66
x-6 IC-406
Introduction
Frame Erase (Application) ............................................................ 2-68
Separate Scan .............................................................................. 2-70
File Name ..................................................................................... 2-70
To change the file name ............................................................... 2-71
Despeckle .................................................................................... 2-72
2.8 Checking the Settings .................................................................... 2-73
Checking the Settings .................................................................. 2-73
To check a job .............................................................................. 2-74
Deleting Unneeded Destinations ................................................. 2-78
Changing the File Name and Other Settings ............................... 2-80
To change the e-mail settings ...................................................... 2-81
2.9 Checking the Scan Job List ........................................................... 2-82
Displaying the Job List for Scan to E-mail, Scan to FTP and
Scan to SMB Operations ............................................................. 2-82
Checking the Box Job List ........................................................... 2-83
3 Registering Destinations (Recipients) for Network
Scanning
3.1 Registering Abbreviated Destinations ............................................ 3-2
E-Mail Destinations ........................................................................ 3-2
FTP Destinations ............................................................................ 3-5
SMB Destinations .......................................................................... 3-9
Mailbox Destinations .................................................................... 3-13
3.2 Registering Group Destinations .................................................... 3-16
To register a group destination .................................................... 3-16
3.3 Registering Program Destinations ................................................ 3-18
To register a program destination ................................................ 3-18
4 Other Network Scanning Settings
4.1 Specifying E-Mail Settings ............................................................... 4-2
Subject ........................................................................................... 4-2
Text ................................................................................................ 4-4
4.2 Setting the Main Scan Mode Screen .............................................. 4-6
Default Tab ..................................................................................... 4-6
Program Default ............................................................................. 4-7
Address Book Default Index .......................................................... 4-8
Address Type Symbol Display ....................................................... 4-9
4.3 Setting the Save Format of the Data to Be Scanned .................. 4-10
JPEG Compression Level ............................................................ 4-10
To specify the compression level ................................................. 4-10
4.4 Prefix/Suffix Settings ......................................................................4-12
Prefix/Suffix Parameters ...............................................................4-12
To specify the prefix/suffix settings ..............................................4-12
Prefix/Suffix Setting ......................................................................4-14
4.5 Authentication Function ..................................................................4-16
User Authentication/Account Track and Scan Functions .............4-16
Authentication Method and Fiery Remote Scan Software ...........4-17
5 Specifying Network Scanning Settings
5.1 Available Settings ..............................................................................5-2
5.2 Entering the Image Controller Setup Screen ..................................5-4
Displaying the Setup Screen ..........................................................5-4
5.3 Specifying Settings for E-Mail Transmissions ................................5-5
Checking Copier E-Mail Transmission Settings .............................5-5
To check the e-mail transmission setting .......................................5-5
Checking TCP/IP Settings ..............................................................5-5
E-Mail Transmission Settings .........................................................5-5
URL Notification E-Mail Messages .................................................5-6
5.4 Specifying Settings for Save in Mailbox of Image Controller
Operations ..........................................................................................5-7
Checking the use of the copier’s network settings ........................5-7
Checking TCP/IP Settings ..............................................................5-7
Creating a Mailbox ..........................................................................5-8
Downloading the Image Data to the Computer ............................5-12
Creating a Mailbox 1 .....................................................................5-14
Creating a Mailbox 2 .....................................................................5-15
5.5 Specifying Settings for FTP File Transmissions ...........................5-17
Checking TCP/IP Settings ............................................................5-17
Enabling the FTP Transfer Function .............................................5-17
Proxy Settings ...............................................................................5-17
5.6 Specifying Settings for SMB Server Transmissions .....................5-18
Checking Copier SMB Settings ....................................................5-18
To check the SMB setting ............................................................5-18
Checking TCP/IP Settings ............................................................5-18
5.7 Setting the Error Notification Destination .....................................5-19
To set the error notification destination ........................................5-19
5.8 Setting the Sender (From) Address ...............................................5-20
To set the sender (from) address ..................................................5-20
5.9 Hold Period of the Image Data .......................................................5-21
To specify the hold period of the image data ...............................5-21
Introduction
x-8 IC-406
Introduction
6 Copier Network Functions
6.1 Copier Network Settings .................................................................. 6-2
6.2 FTP Settings ...................................................................................... 6-5
FTP Parameters ............................................................................. 6-5
To specify FTP settings .................................................................. 6-5
6.3 SMB Settings ..................................................................................... 6-6
SMB Parameters ............................................................................ 6-6
To specify SMB settings ................................................................ 6-7
6.4 Enabling LDAP Settings ................................................................... 6-8
Enabling LDAP Parameters ............................................................ 6-8
To specify Enabling LDAP settings ................................................ 6-8
6.5 Setting Up LDAP Settings .............................................................. 6-10
LDAP Server Registration Parameters ......................................... 6-10
To specify Setting Up LDAP settings ........................................... 6-13
Initial Setting for Search Details ................................................... 6-17
6.6 Search Default Setting ................................................................... 6-19
To specify the detect default server settings ............................... 6-19
6.7 E-Mail TX (SMTP) Settings ............................................................. 6-20
E-Mail TX (SMTP) Parameters ...................................................... 6-20
To specify E-Mail TX (SMTP) settings .......................................... 6-22
SMTP Server Address .................................................................. 6-24
SMTP Detail ................................................................................. 6-25
SMTP Authentication ................................................................... 6-26
6.8 E-Mail RX (POP) Settings ............................................................... 6-28
E-Mail RX (POP) Parameters ........................................................ 6-28
To specify E-Mail RX (POP) settings ............................................ 6-29
POP Server Address .................................................................... 6-31
6.9 MAC Address .................................................................................. 6-33
Device Parameters ....................................................................... 6-33
To check the MAC address ......................................................... 6-33
6.10 Time Adjustment Settings ............................................................. 6-35
Time Adjustment Parameters ....................................................... 6-35
To specify time adjustment settings ............................................ 6-35
NTP Server Address ..................................................................... 6-36
6.11 Status Notification Settings ........................................................... 6-38
Status Notification Parameters .................................................... 6-38
To specify status notification settings ......................................... 6-38
Notification Item Setting .............................................................. 6-39
6.12 Total Counter Report Setting ........................................................ 6-40
To specify the total counter notification settings ......................... 6-40
Schedule Setting ...........................................................................6-41
To specify the notification schedule settings ................................6-43
Notification Address Setting .........................................................6-43
6.13 PING Confirmation ..........................................................................6-45
PING Confirmation Parameters ....................................................6-45
To specify PING confirmation settings .........................................6-45
PING TX Address ..........................................................................6-47
6.14 Job for the disable proof ................................................................6-49
To specify the Job for the disable proof settings .........................6-49
6.15 TCP Socket Setting .........................................................................6-51
To specify the TCP socket settings ..............................................6-51
6.16 OpenAPI Settings ............................................................................6-53
Access Setting ..............................................................................6-53
Port No. .........................................................................................6-54
SSL ...............................................................................................6-54
Authentication ...............................................................................6-56
6.17 NetWare Settings .............................................................................6-58
NetWare Parameters .....................................................................6-58
To display the NetWare Setting screen ........................................6-58
7 Using PageScope Web Connection
Introduction
7.1 System Requirements .......................................................................7-2
Computer ........................................................................................7-2
7.2 Accessing PageScope Web Connection .........................................7-3
To access PageScope Web Connection ........................................7-3
Page Structure ................................................................................7-4
7.3 Logging On and Logging Off ............................................................7-6
Logging Off .....................................................................................7-6
Logging On to User Mode (Public User) .........................................7-7
Logging On to User Mode (Registered User/Box Administrator) ...7-8
Administrator Modes ......................................................................7-9
Logging On to the Image Controller’s Administrator Mode ..........7-10
Logging On to the Copier’s Administrator Mode ..........................7-11
Changing the Administrator Password .........................................7-12
Changing the Image Controller’s Administrator Password ..........7-12
Changing the Copier’s Administrator Password ..........................7-12
7.4 System Tab (User Mode) .................................................................7-13
7.5 Job Tab (User Mode) .......................................................................7-14
7.6 Box Tab (User Mode) .......................................................................7-15
7.7 Print Tab (User Mode) .....................................................................7-16
x-10 IC-406
Introduction
7.8 Address Book .................................................................................. 7-17
Registering New Destinations ...................................................... 7-17
To register new destinations in the address book ....................... 7-20
Editing abbreviated destinations .................................................. 7-21
Deleting the Address Book .......................................................... 7-21
7.9 Group Destination ........................................................................... 7-22
To register new destination .......................................................... 7-22
7.10 Program Registration ..................................................................... 7-24
To register new destinations ........................................................ 7-31
7.11 Temporary One-Touch Registration ............................................. 7-33
To register temporary destinations .............................................. 7-33
7.12 Subject Registration ....................................................................... 7-35
To register the subject ................................................................. 7-36
7.13 Text Registration ............................................................................ 7-37
To register text ............................................................................. 7-38
7.14 System Tab (Image Controller Administrator Mode) .................. 7-39
Device Information ....................................................................... 7-39
Online Assistance ......................................................................... 7-40
7.15 Box Tab (Image Controller Administrator Mode) ......................... 7-41
Mailbox ......................................................................................... 7-41
7.16 System Tab (Copier Administrator Mode) .................................... 7-43
7.17 Box tab (Copier Administrator Mode) ........................................... 7-44
7.18 Prefix/Suffix ..................................................................................... 7-45
To register prefixes and suffixes .................................................. 7-45
7.19 Import/Export .................................................................................. 7-47
Importing ...................................................................................... 7-47
Exporting ...................................................................................... 7-47
7.20 Other ................................................................................................ 7-48
7.21 NetWare ........................................................................................... 7-49
7.22 FTP ................................................................................................... 7-50
7.23 SMB .................................................................................................. 7-51
7.24 LDAP Setting ................................................................................... 7-52
LDAP Setting ................................................................................ 7-52
LDAP Server Registration ............................................................ 7-53
7.25 E-Mail Setting .................................................................................. 7-56
E-Mail Receive ............................................................................. 7-56
E-Mail Transmission ..................................................................... 7-57
IC-406 x-11
7.26 SSL/TLS ............................................................................................7-60
SSL/TLS Setting ...........................................................................7-62
To create a certificate ...................................................................7-63
SSL/TLS Setting — Install a Certificate ........................................7-65
SSL/TLS Setting — Set a Encryption Strength ............................7-66
SSL/TLS Setting — Remove a Certificate ....................................7-67
SSL/TLS Setting — Set Mode using SSL .....................................7-68
Processing Method .......................................................................7-69
To specify the mode using SSL ....................................................7-69
7.27 Authentication ..................................................................................7-70
User Authentication/Account Track ..............................................7-70
To specify the user authentication and account track settings ....7-71
Auto Logout ..................................................................................7-72
7.28 OpenAPI ...........................................................................................7-73
7.29 TCP Socket Setting .........................................................................7-74
To specify the TCP socket settings ..............................................7-75
8 Print Job Management
8.1 Proof Print ..........................................................................................8-2
Setting procedure (for Windows) ....................................................8-2
Setting procedure (for Macintosh OS X) .........................................8-3
Recalling Jobs (Proof Print) ............................................................8-4
8.2 HDD Stored ........................................................................................8-6
Setting procedure (for Windows) ....................................................8-6
Setting procedure (for Macintosh OS X) .........................................8-7
8.3 Printing With This Machine When Account Track Settings Have
Been Applied ......................................................................................8-8
Setting procedure (for Windows) ....................................................8-9
Setting procedure (for Macintosh OS X) .......................................8-10
8.4 Lock Job ...........................................................................................8-11
Setting procedure (for Windows) ..................................................8-11
Setting procedure (for Macintosh OS X) .......................................8-12
8.5 Printing on Banner Paper ...............................................................8-13
Setting procedure .........................................................................8-14
Printing ..........................................................................................8-15
8.6 Printing to Suit the Paper Size .......................................................8-18
Introduction
x-12 IC-406
Introduction
9 Appendix
9.1 Entering Text ..................................................................................... 9-2
To type text .................................................................................... 9-5
List of Available Characters ........................................................... 9-5
Number of Characters That Can Be Entered ................................. 9-6
9.2 Glossary ............................................................................................. 9-7
9.3 Index ................................................................................................ 9-12
IC-406 x-13

About This Manual

This User’s Guide provides descriptions of the network scanning functions available with IC-406 (the optional image controller for C352/C300). In addi­tion, supplementary descriptions are provided in chapter 6 for the network functions that can be used from the copier when IC-406 is installed.
This section introduces the structure of the manual and the notations used for product names, etc.
This manual is intended for users who understand the basic operations of computers and this machine. For operating procedures of the Windows or Macintosh operating system and software applications, refer to the corre­sponding manuals.

Structure of the Manual

This manual consists of the following chapters.
Chapter 1 Before Using the Scan Functions
Chapter 2 Scanning Documents
Chapter 3 Registering Destinations (Recipients) for Network Scanning
Chapter 4 Other Network Scanning Settings
Chapter 5 Specifying Network Scanning Settings
Chapter 6 Copier Network Functions
Chapter 7 Using PageScope Web Connection
Chapter 8 Print Job Management
Chapter 9 Appendix
Lists the characters that can be entered from the control panel.
Introduction

Notation

Product Name Notation in the Manual
bizhub C352 Copier, C352
bizhub C300 Copier, C300
IC-406 Image Controller Image Controller
Microsoft Windows 98 Windows 98
Microsoft Windows Me Windows Me
Microsoft Windows NT 4.0 Windows NT 4.0
Microsoft Windows 2000 Windows 2000
Microsoft Windows XP Windows XP
x-14 IC-406
Introduction
Product Name Notation in the Manual
Microsoft Windows Server 2003 Windows Server 2003
When the operating systems above are written together
Windows 95/98/Me Windows NT 4.0/2000/XP/Server 2003 Windows 95/98/Me/NT 4.0/2000/XP/Server 2003
IC-406 x-15

Explanation of Manual Conventions

Titles indicate the contents of the section.
Text that appears in this manner describes the function limitations and options required to use certain functions.
Application functions
8.6 Producing separate copies of each page in a page spread (Book Copy function)
A page spread, such asin an open book or catalog, can be copied with the left and right pages on separate pages or both on the same page.
To copy using the Book Copy function
0
Place the original on the original glass.
Text that appears in this manner describes supplemental information, such as precautions, references and actions, relating to steps.
Text that appears in this manner provides answers to problems and questions that may occur during operation.
7777
Handling toner and the toner cartridges
%
Do not throw toner or the toner cartridge into a fire.
%
Toner expelled from the fire may cause burns.
1
Place the pages on the original glass, starting with the first page. For details on positioning theoriginal, refer toFeeding the original
To add copies of the covers, load them first.
?
%
2
Load the paper to be used into the desired paper tray.
3
Touch [Application], and then touch [Book Copy/Repeat]. To cancel all settings for the Application functions, touch [Reset].
Introduction
CAUTION
on page 3-7.
How are the front and back covers copied? Scan the front cover, then the back cover, and then scan the re- mainder of the original.
8
Application functions Chapter 8
The Book Copy/Repeat screen appears.
IC-406 8-21
WARNING , CAUTION
7
Text highlighted in this manner indicates precautions to ensure safe use of this machine. “Warning” indicates instructions that, when not observed, may result in fatal or critical injuries. “Caution” indicates instructions that, when not observed, may result in serious injuries or property damage.
(The page shown above is an example only.)
x-16 IC-406
Introduction
[] Names highlighted as shown above indicate keys on the control panel, buttons in the touch panel, and the power switches.
8
Application functions Chapter 8
8-22
Application functions
4
Touch [Book Copy].
The Book Scanning screen appears. [Booklet Original] is not available if optional saddle stitcher is not in- stalled.
5
Touch the button for the desired setting.
2
Reminder
Do not replacethe toner cartridge until themessage There isno Toner. appears. In addition,do not replace the tonercartridge ofany color other than the one indicated in the message on the touch panel.
2
Note
Even though the setting can be specifiedin incrementsof 1/3, the setting will appear at the nearest full increment in the Adjust Color screen.
!
Detail
If the Single Color function is set, the colors are inversed with the se- lected color. If the Background Color function is set, the colors, includ- ing the selected background color, are inversed.
Touch panel screens are shown to check the actual display.
2
Reminder
Text highlightedin this manner indicates operationprecautions. Carefully readand observe this type ofinformation.
IC-406
!
Detail
Text highlighted in this manner provides more detailed information concerning operating procedures or references to sections containing additional information. If necessary, refer to the indicated sections.
2
Note
Text highlighted in this manner contains references and supplemental information concerning operating procedures and other descriptions. We recommend that this information be read carefully.
(The page shown above is an example only.)
IC-406 x-17
Introduction
x-18 IC-406
1
Before Using the Scan Functions
Before Using the Scan Functions Chapter 1
1
Before Using the Scan Functions

1 Before Using the Scan Functions

1.1 Environment Required for Using the Scan Functions

The following conditions are required to use the network scanning functions.
- The machine is connected to the network.
The functions can be used over a TCP/IP network.
– For details on connecting the network cable, refer to “Connecting to the
Network” on page 1-11.
– In order to use this machine on a network, settings such as the IP address
of the image controller must be specified. For details, refer to “Settings for Using Network/Scanning Functions” on page 1-8.
Before Using the Scan Functions Chapter 1
1-2 IC-406
Before Using the Scan Functions

1.2 Available Scanning Functions

“Scanning” refers to the operation of reading the image of a document fed through the automatic document feeder or placed on the original glass of the copier. The scanning functions can be used to send scanned data in an e­mail message over a network or upload the data to a file server.

Sending the Scanned Data in an E-Mail Message

The scanned data can be sent to a specified e-mail address. The destination is specified from the touch panel of this copier, and the scanned data is sent as an e-mail attachment.
For details, refer to “Sending Data in an E-Mail Message (Scan to E-Mail)” on page 2-6.
Original
E-mail and scan data
Copier
1
Before Using the Scan Functions Chapter 1
E-mail reception
Image controller
IC-406 1-3
SMTP server POP server
Internet
1
Before Using the Scan Functions

Sending the Scanned Data as Files (FTP)

The scanned data is uploaded to a specified FTP server. The FTP server ad­dress, login password, and other information are entered from the touch panel of this copier.
The data files uploaded to the FTP server can be downloaded from a com­puter on the network.
For details, refer to “Sending Data to a Server (Scan to FTP)” on page 2-19.
Original
Before Using the Scan Functions Chapter 1
Copier
Scan data
Image controller
Download
FTP server
Internet
1-4 IC-406
Before Using the Scan Functions

Sending the Scanned Data to a Computer on the Network (SMB)

The scanned data can be sent to a shared folder on a specified computer. The name of the destination computer, login password, and other informa­tion are entered from the touch panel of this copier.
For details, refer to “Sending Data to a PC on the Network (Scan to SMB)” on page 2-31.
Original
1
Copier
Scan data
Image controller
Save to a shared folder
Before Using the Scan Functions Chapter 1
IC-406 1-5
1
Before Using the Scan Functions Chapter 1
Before Using the Scan Functions

Saving Scanned Data in Boxes on the Image Controller Hard Disk (Save in Mailbox of Image Controller)

The scanned data can be saved in a mailbox created on the hard disk of the image controller, and the saved data can be downloaded from a computer on the network. For details, refer to “Saving Data on the Hard Disk (Save in Mailbox of Image Controller)” on page 2-41.
Scan data
Image controller
1-6 IC-406
Before Using the Scan Functions

Copier Box Functions

With the copier Box functions, documents can be saved on the hard disk in­stalled in the copier or they can be outputted. These functions can also be used with an image controller installed. This manual provides a description of the Save in Mailbox operation using the hard disk installed in the image controller. For details on the copier Box functions, refer to the User’s Guide [Box Operations] included with the copier.
Output
1
Image controller
Before Using the Scan Functions Chapter 1
Hard disk
The User’s Guide [Box Operations] provides descriptions of functions that can be used when the standard printer controller is installed. Some functions that are described cannot be used when the image controller is installed.
Functions that cannot be used
- Functions for using scanning functions to save a document in a public
mailbox/personal mailbox on the copier and to route it
- Functions for using scanning functions to save a document in an annota-
tion user box and to route it
IC-406 1-7
1
Before Using the Scan Functions

1.3 Settings for Using Network/Scanning Functions

It is recommended that the settings described below be specified before us­ing the network scanning functions. The network settings described in “Specifying Network Settings” must be specified first. Set other items as necessary.

Specifying Network Settings

In order to use this machine on a network, the network settings for the image controller must be specified.
Specify the network settings from the image controller screen, which ap­pears in the control panel of the copier.
!
Detail
For details on specifying network settings and using the control panel of
Before Using the Scan Functions Chapter 1
the image controller, refer to “5 Specifying Network Scanning Settings”.

Registering Destinations and Specifying Their Settings

The destinations (recipients) of scanned data must be registered.
The following registration methods are available.
- Register from the touch panel of the copier.
- Use PageScope Web Connection from a PC on the network.
The three types of destinations described below can be registered.
Destination (Recipient) Characteristics
Abbreviated Destination The destination can be selected with one button. The registered
Group Multiple destinations can be registered in groups. E-mail, FTP,
Program The destination and scan settings can be registered together as a
destinations are displayed by press the [Scan] key, then touching [Address Book].
SMB, and mailbox destinations can be registered together in a single group. The registered destinations are displayed by press the [Scan] key, then touching [Group].
single program. This is convenient for frequently scanning docu­ments and sending data under the same conditions. The registered destinations are displayed by press the [Scan] key, then touching [Program].
1-8 IC-406
Before Using the Scan Functions
2
Note
The destination can also be entered from the copier’s control panel be­fore scanning, even if no destination has been registered in advance. The destination can also be entered before scanning. This is called “di­rect input”. For details, refer to “Entering the Addresses Directly” on page 2-16.
!
Detail
For details on registering destinations and specifying settings, refer to the sections listed below. “Registering Abbreviated Destinations” on page 3-2 “Registering Group Destinations” on page 3-16 “Registering Program Destinations” on page 3-18
1
Before Using the Scan Functions Chapter 1
IC-406 1-9
1

1.4 Settings for Scanning

Specifying the Scan Settings

The following scan settings can be specifying when scanning a document.
These settings are specified from the touch panel of the copier.
Item Description
File Type Sets the file type to be saved.
Resolution Sets the scan resolution.
Simplex/Duplex Selects whether to scan one side of the document or both sides.
Color Sets the color of the scanned document.
Scan Size Sets the size to be scanned.
Brightness Adjusts the brightness of the document.
Background Removal Adjusts the density of the background (blank areas) of the docu-
Before Using the Scan Functions Chapter 1
Original Setting Specifies the type and characteristics of the loaded document.
Application Provides functions for adjusting the print image, for example, for
Separate Scan The scan operation can be divided into several sessions when all
File Name Changes the file name to be saved.
Despeckle Removes the speckles from the slit glass and scans the document
Before Using the Scan Functions
ment.
scanning books and for erasing the surrounding area.
pages of a document cannot be loaded into the automatic docu­ment feeder or when placing the document on the original glass. In addition, the documents can be scanned separately according to their type, such as when single-sided documents are mixed with double-sided documents.
that is loaded in the ADF.
!
Detail
For details on the scan settings, refer to “Specifying the Scan Settings” on page 2-52.
An annotation user box cannot be selected, when the image controller is installed. For details on the Box functions, refer to “Copier Box Func­tions” on page 1-7.

Specifying the Destination

Specify the destination (recipient) for the scan data. If the destination has been registered in advance, select a destination from those that are already registered. If the destination has not been registered, specify the destination through direct input.
1-10 IC-406
Before Using the Scan Functions

1.5 Connecting to the Network

The image controller can be connected to the network.

Network Connection

Connect a UTP cable (category 5E or more) from the network to the Ethernet connector on the image controller.
1
Before Using the Scan Functions Chapter 1

Turning On the System

Follow the procedure described below to turn on the system.
1 Turn on the image controller.
2 Wait a little while and turn on the copier.
– If the network functions of the copier are operating correctly, turn
the copier off, then on.
!
Detail
If the copier is turned on before the image controller has finished starting up and is ready to be used, the copier’s network functions may not oper­ate correctly. Therefore, before turning on the copier, be sure to wait a little while after turning on the image controller.
IC-406 1-11
Loading...
+ 318 hidden pages