This User’s Guide contains descriptions of the network scanning functions
and operations that can be used from optional C352/C300 image controller
IC-406 and the network functions that can be used from the copier when the
IC-406 is installed. To ensure the best possible performance and most effective use of the machine, read this manual thoroughly. After reading this User’s Guide, store it in the designated holder for quick reference when
problems or questions arise during operation.
Views of the actual equipment may be slightly different from the illustrations
used in this manual.
IC-406x-1
Trademarks and Registered Trademarks
KONICA MINOLTA and the KONICA MINOLTA logo are trademarks of Konica Minolta Holdings, Inc.
PageScope is a registered trademark of Konica Minolta Business Technologies, Inc.
Apple and Macintosh are registered trademarks of Apple Computer, Inc.
Ethernet is a registered trademark of Xerox Corporation.
Microsoft, Windows and Windows NT are registered trademarks of Microsoft
Corporation.
PostScript is a registered trademark of Adobe Systems, Inc.
EFI, Fiery and the Fiery logo are registered trademarks of Electronics for Imaging, Inc. and are legally registered in the United States and other countries.
The Electronics for Imaging logo, Fiery Remote Scan, Fiery WebScan, and
Fiery WebTools are trademarks of Electronics for Imaging, Inc.
®
RC4
is a registered trademark or trademark of RSA Security Inc. in the Unit-
ed States and/or other countries.
RSA® is a registered trademark or trademark of RSA Security Inc. RSA
BSAFE® is a registered trademark or trademark of RSA Security Inc. in the
United States and/or other countries.
License information
This product includes RSA BSAFE Cryptographic software from RSA Security Inc.
Introduction
All other product names are either trademarks or registered trademarks of
their respective companies.
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
x-2IC-406
Introduction
2. Redistributions in binary form must reproduce the above copyright no-
3. All advertising materials mentioning features or use of this software must
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used
5. Products derived from this software may not be called “OpenSSL” nor
6. Redistributions of any form whatsoever must retain the following ac-
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND
ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@crypt-Soft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
tice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
display the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit. (http://www.openssl.org/)”
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact opensslcore@openssl.org.
may “OpenSSL” appear in their names without prior written permission
of the OpenSSL Project.
knowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit (http://www.openssl.org/)”
IC-406x-3
Introduction
same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the
code are not to be removed. If this package is used in a product, Eric Young
should be given attribution as the author of the parts of the library used. This
can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement:
“This product includes cryptographic software written by Eric Young
(eay@crypt-soft.com)”
The word ‘cryptographic’ can be left out if the rouines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledgement:
“This product includes software written by Tin Hudson (tjh@cryptsoft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public
Licence.]
In order to incorporate improvements in the product, the content of this manual is subject to change without notice.
x-4IC-406
Introduction
Contents
Introduction
Trademarks and Registered Trademarks ...................................... x-2
This User’s Guide provides descriptions of the network scanning functions
available with IC-406 (the optional image controller for C352/C300). In addition, supplementary descriptions are provided in chapter 6 for the network
functions that can be used from the copier when IC-406 is installed.
This section introduces the structure of the manual and the notations used
for product names, etc.
This manual is intended for users who understand the basic operations of
computers and this machine. For operating procedures of the Windows or
Macintosh operating system and software applications, refer to the corresponding manuals.
Structure of the Manual
This manual consists of the following chapters.
Chapter 1 Before Using the Scan Functions
Chapter 2 Scanning Documents
Chapter 3 Registering Destinations (Recipients) for Network Scanning
Chapter 4 Other Network Scanning Settings
Chapter 5 Specifying Network Scanning Settings
Chapter 6 Copier Network Functions
Chapter 7 Using PageScope Web Connection
Chapter 8 Print Job Management
Chapter 9 Appendix
Lists the characters that can be entered from the control panel.
Introduction
Notation
Product NameNotation in the Manual
bizhub C352Copier, C352
bizhub C300Copier, C300
IC-406 Image ControllerImage Controller
Microsoft Windows 98Windows 98
Microsoft Windows MeWindows Me
Microsoft Windows NT 4.0Windows NT 4.0
Microsoft Windows 2000 Windows 2000
Microsoft Windows XP Windows XP
x-14IC-406
Introduction
Product NameNotation in the Manual
Microsoft Windows Server 2003Windows Server 2003
When the operating systems above are written
together
Windows 95/98/Me
Windows NT 4.0/2000/XP/Server 2003
Windows 95/98/Me/NT 4.0/2000/XP/Server
2003
Text highlighted in this manner indicates precautions to ensure safe use of this machine.
“Warning” indicates instructions that, when not observed, may result in fatal or critical injuries.
“Caution” indicates instructions that, when not observed, may result in serious injuries or
property damage.
1.1Environment Required for Using the Scan Functions
The following conditions are required to use the network scanning functions.
- The machine is connected to the network.
The functions can be used over a TCP/IP network.
– For details on connecting the network cable, refer to “Connecting to the
Network” on page 1-11.
– In order to use this machine on a network, settings such as the IP address
of the image controller must be specified. For details, refer to “Settings
for Using Network/Scanning Functions” on page 1-8.
Before Using the Scan FunctionsChapter 1
1-2IC-406
Before Using the Scan Functions
1.2Available Scanning Functions
“Scanning” refers to the operation of reading the image of a document fed
through the automatic document feeder or placed on the original glass of the
copier. The scanning functions can be used to send scanned data in an email message over a network or upload the data to a file server.
Sending the Scanned Data in an E-Mail Message
The scanned data can be sent to a specified e-mail address. The destination
is specified from the touch panel of this copier, and the scanned data is sent
as an e-mail attachment.
For details, refer to “Sending Data in an E-Mail Message (Scan to E-Mail)” on
page 2-6.
Original
E-mail and scan data
Copier
1
Before Using the Scan FunctionsChapter 1
E-mail reception
Image controller
IC-4061-3
SMTP serverPOP server
Internet
1
Before Using the Scan Functions
Sending the Scanned Data as Files (FTP)
The scanned data is uploaded to a specified FTP server. The FTP server address, login password, and other information are entered from the touch
panel of this copier.
The data files uploaded to the FTP server can be downloaded from a computer on the network.
For details, refer to “Sending Data to a Server (Scan to FTP)” on page 2-19.
Original
Before Using the Scan FunctionsChapter 1
Copier
Scan data
Image controller
Download
FTP server
Internet
1-4IC-406
Before Using the Scan Functions
Sending the Scanned Data to a Computer on the Network (SMB)
The scanned data can be sent to a shared folder on a specified computer.
The name of the destination computer, login password, and other information are entered from the touch panel of this copier.
For details, refer to “Sending Data to a PC on the Network (Scan to SMB)”
on page 2-31.
Original
1
Copier
Scan data
Image controller
Save to a shared folder
Before Using the Scan FunctionsChapter 1
IC-4061-5
1
Before Using the Scan FunctionsChapter 1
Before Using the Scan Functions
Saving Scanned Data in Boxes on the Image Controller Hard Disk (Save
in Mailbox of Image Controller)
The scanned data can be saved in a mailbox created on the hard disk of the
image controller, and the saved data can be downloaded from a computer
on the network. For details, refer to “Saving Data on the Hard Disk (Save in
Mailbox of Image Controller)” on page 2-41.
Scan data
Image controller
1-6IC-406
Before Using the Scan Functions
Copier Box Functions
With the copier Box functions, documents can be saved on the hard disk installed in the copier or they can be outputted. These functions can also be
used with an image controller installed. This manual provides a description
of the Save in Mailbox operation using the hard disk installed in the image
controller. For details on the copier Box functions, refer to the User’s Guide
[Box Operations] included with the copier.
Output
1
Image controller
Before Using the Scan FunctionsChapter 1
Hard disk
The User’s Guide [Box Operations] provides descriptions of functions that
can be used when the standard printer controller is installed. Some functions
that are described cannot be used when the image controller is installed.
Functions that cannot be used
- Functions for using scanning functions to save a document in a public
mailbox/personal mailbox on the copier and to route it
- Functions for using scanning functions to save a document in an annota-
tion user box and to route it
IC-4061-7
1
Before Using the Scan Functions
1.3Settings for Using Network/Scanning Functions
It is recommended that the settings described below be specified before using the network scanning functions. The network settings described in
“Specifying Network Settings” must be specified first. Set other items as
necessary.
Specifying Network Settings
In order to use this machine on a network, the network settings for the image
controller must be specified.
Specify the network settings from the image controller screen, which appears in the control panel of the copier.
!
Detail
For details on specifying network settings and using the control panel of
Before Using the Scan FunctionsChapter 1
the image controller, refer to “5 Specifying Network Scanning Settings”.
Registering Destinations and Specifying Their Settings
The destinations (recipients) of scanned data must be registered.
The following registration methods are available.
- Register from the touch panel of the copier.
- Use PageScope Web Connection from a PC on the network.
The three types of destinations described below can be registered.
Destination (Recipient)Characteristics
Abbreviated DestinationThe destination can be selected with one button. The registered
GroupMultiple destinations can be registered in groups. E-mail, FTP,
ProgramThe destination and scan settings can be registered together as a
destinations are displayed by press the [Scan] key, then touching
[Address Book].
SMB, and mailbox destinations can be registered together in a
single group. The registered destinations are displayed by press
the [Scan] key, then touching [Group].
single program. This is convenient for frequently scanning documents and sending data under the same conditions. The registered
destinations are displayed by press the [Scan] key, then touching
[Program].
1-8IC-406
Before Using the Scan Functions
2
Note
The destination can also be entered from the copier’s control panel before scanning, even if no destination has been registered in advance.
The destination can also be entered before scanning. This is called “direct input”. For details, refer to “Entering the Addresses Directly” on
page 2-16.
!
Detail
For details on registering destinations and specifying settings, refer to the
sections listed below.
“Registering Abbreviated Destinations” on page 3-2
“Registering Group Destinations” on page 3-16
“Registering Program Destinations” on page 3-18
1
Before Using the Scan FunctionsChapter 1
IC-4061-9
1
1.4Settings for Scanning
Specifying the Scan Settings
The following scan settings can be specifying when scanning a document.
These settings are specified from the touch panel of the copier.
ItemDescription
File TypeSets the file type to be saved.
ResolutionSets the scan resolution.
Simplex/DuplexSelects whether to scan one side of the document or both sides.
ColorSets the color of the scanned document.
Scan SizeSets the size to be scanned.
BrightnessAdjusts the brightness of the document.
Background RemovalAdjusts the density of the background (blank areas) of the docu-
Before Using the Scan FunctionsChapter 1
Original SettingSpecifies the type and characteristics of the loaded document.
ApplicationProvides functions for adjusting the print image, for example, for
Separate ScanThe scan operation can be divided into several sessions when all
File NameChanges the file name to be saved.
DespeckleRemoves the speckles from the slit glass and scans the document
Before Using the Scan Functions
ment.
scanning books and for erasing the surrounding area.
pages of a document cannot be loaded into the automatic document feeder or when placing the document on the original glass. In
addition, the documents can be scanned separately according to
their type, such as when single-sided documents are mixed with
double-sided documents.
that is loaded in the ADF.
!
Detail
For details on the scan settings, refer to “Specifying the Scan Settings”
on page 2-52.
An annotation user box cannot be selected, when the image controller is
installed. For details on the Box functions, refer to “Copier Box Functions” on page 1-7.
Specifying the Destination
Specify the destination (recipient) for the scan data. If the destination has
been registered in advance, select a destination from those that are already
registered. If the destination has not been registered, specify the destination
through direct input.
1-10IC-406
Before Using the Scan Functions
1.5Connecting to the Network
The image controller can be connected to the network.
Network Connection
Connect a UTP cable (category 5E or more) from the network to the Ethernet
connector on the image controller.
1
Before Using the Scan FunctionsChapter 1
Turning On the System
Follow the procedure described below to turn on the system.
1Turn on the image controller.
2Wait a little while and turn on the copier.
– If the network functions of the copier are operating correctly, turn
the copier off, then on.
!
Detail
If the copier is turned on before the image controller has finished starting
up and is ready to be used, the copier’s network functions may not operate correctly. Therefore, before turning on the copier, be sure to wait a
little while after turning on the image controller.
IC-4061-11
Loading...
+ 318 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.