This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.
For safe and correct use of this machine, please be sure to read the Safety Information before you use
it.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine.
Notes:
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Laser Safety:
This machine is considered a class 1 laser device, safe for office/EDP use. The machine contains two
GaAIAs laser diodes, 5-milliwatt, 760-800 nanometer wavelength for each emitter. Direct (or indirect
reflected ) eye contact with the laser beam might cause serious eye damage. Safety precautions and
interlock mechanisms have been designed to prevent any possible laser beam exposure to the operator.
The following label is attached on the back side of the machine.
Caution:
Use of controls or adjustments or performance of procedures other than those specified in this manual
might result in hazardous radiation exposure.
Notes:
The model names of the machines do not appear in the following pages. Check the type of your machine before reading this manual. (For details, see p.15 “Machine Types”.)
•Type 1: LD225
•Type 2: LD230
Certain types might not be available in some countries. For details, please contact your local dealer.
Two kinds of size notation are employed in this manual. With this machine refer to the metric version.
For good copy quality, LANIER recommends that you use genuine LANIER toner.
LANIER shall not be responsible for any damage or expense that might result from the use of parts
other than genuine LANIER parts in your LANIER office product.
Power Source
220 - 240V, 50/60Hz, 7A or more
Please be sure to connect the power cord to a power source as above. For details about power source,
see p.144 “Power Connection”.
Manuals for This Machine
The following manuals describe the operational procedures of this machine. For
particular functions, see the relevant parts of the manual.
Note
❒ Manuals provided are specific to machine type.
❒ Adobe Acrobat Reader/Adobe Reader is necessary to view the manuals as a
PDF file.
❒ Two CD-ROMs are provided:
• CD-ROM 1 “Operating Instructions”
• CD-ROM 2 “Scanner Driver and Document Management Utility”
❖ General Settings Guide (this manual) (PDF file - CD-ROM1)
Provides an overview of the machine and describes System Settings (such as
Tray Paper Settings), Document Server functions, and troubleshooting.
Refer to this manual for Address Book procedures such as registering fax
numbers, e-mail addresses, and user codes.
❖ Security Reference
This manual is for administrators of this machine. It describes security functions that the administrators can use to protect data from being tampered, or
prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.
❖ Network Guide (PDF file - CD-ROM1)
Provides information about configuring and operating the printer in a network environment or using software.
This manual covers all models, and therefore contains functions and settings
that may not be available for your model. Images, illustrations, functions, and
supported operating systems may differ from those of your model.
❖ Copy Reference (PDF file - CD-ROM1)
Describes operations, functions, and troubleshooting for the machine's copier
function.
Describes advanced facsimile functions such as line settings and procedures
for registering IDs.
❖ Printer Reference (PDF file - CD-ROM1)
Describes system settings, operations, functions, and troubleshooting for the
machine's printer function.
i
❖ Scanner Reference (PDF file - CD-ROM1)
Describes operations, functions, and troubleshooting for the machine's scanner function.
❖ Manuals for DeskTopBinder Lite
DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner
Driver and Document Management Utility”.
• DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2)
Describes installation of, and the operating environment for DeskTopBinder Lite in detail. This guide can be displayed from the [Setup] display
when DeskTopBinder Lite is installed.
• DeskTopBinder Introduction Guide (PDF file - CD-ROM2)
Describes operations of DeskTopBinder Lite and provides an overview of
its functions. This guide is added to the [Start] menu when DeskTopBinder
Lite is installed.
•Auto Document Link Guide (PDF file - CD-ROM2)
Describes operations and functions of Auto Document Link installed with
DeskTopBinder Lite. This guide is added to the [Start] menu when DeskTopBinder Lite is installed.
❖ Other manuals
• PS3 Supplement (PDF file - CD-ROM1)
• Unix Supplement (Available from an authorized dealer, or as a PDF file on
our Web site.)
ii
What You Can Do with This Machine
The following introduces the functions of this machine, and the relevant manuals containing detailed information about them.
Products marked with * are optional. For details about optional products, see
p.156 “Options”, or contact your local dealer.
Copier, Facsimile, Printer, and
Scanner Functions
AHR002S
This machine provides copier, facsimile*, printer*, and scanner* functions.
• You can make copies of originals.
With a finisher*, you can sort and
staple copies. See Copy Reference.
• You can send originals by fax and
receive faxes from other parties.
See Facsimile Reference <Basic Fea-
tures> , and Facsimile Reference
<Advanced Features>.
• You can print documents created
using applications. See Printer Ref-erence.
• You can scan originals and send
the scan file to a computer. See
Scanner Reference.
Utilizing Stored Documents
GCKONN2J
• You can store file from originals
scanned by this machine, or file
sent from other computers, into
the machine's hard disk. You can
print and fax stored documents as
required. You can also change
print settings and print multiple
documents (Document Server).
See p.37 “Using the Document
Server”.
• With DeskTopBinder Professional*/Lite, you can search, check,
print, and delete stored documents
using your computer. You can also
retrieve stored documents scanned
in scanner mode. File Format Converter*, you can even download
documents stored in copy and
printer functions to your computer. See Network Guide.
iii
Paperless Fax Transmission
Fax Transmission and
and Reception
Reception
GCKONN3J
• You can store received fax messages on the machine's hard disk, instead of printing them onto paper.
You can use ScanRouter Professional or a Web Image Monitor to
check, print, delete, retrieve, or
download documents using your
computer (Storing received documents). See Facsimile Reference<Advanced Features>.
Transmission
Reception Through the
Internet
GCKONN9J
•
You can send fax documents through
e-mail by specifying the recipient's
e-mail address (Internet Fax Transmission).
You can receive sent documents
via Internet Fax, or from computers (Internet Fax Reception). See
Facsimile Reference <Basic Features>
• You can send faxes by using data
such as the IP address to specify
the IP-Fax destination (IP-Fax
Transmission).
The transmitted files can be received using an Internet fax machine (IP-Fax Reception). See
Facsimile Reference <Basic Features>
• You can send documents created
using applications to another party's fax machine directly, without
performing a print job (LAN-Fax).
See Facsimile Reference <AdvancedFeatures>.
iv
AHR003S
Using the Scanner in a
Administrating the
Network Environment
AHR004S
• You can send scanned documents
to other network computers using
e-mail (Sending stored scan file by
e-mail). See Scanner Reference.
• With ScanRouter delivery software, you can save scanned documents in specified destinations on
network computers (File storage).
See Scanner Reference.
• You can send scanned documents
to other network folders (Scan to
Folder). See Scanner Reference
Machine/Protecting
Documents (Security
Functions)
AHR005S
• You can protect documents from
unauthorized access and stop
them from being copied without
permission. See Security Reference.
• You can control the use of the machine, as well as prevent machine
settings from being changed without authorization. See Security Ref-erence.
• By setting passwords, you can prevent unauthorized access via the
network. See Security Reference.
• You can erase the data on the hard
disk to prevent the information
from leaking out. See the manual
for the DataOverWriteSecurity
Unit* and Security Reference.
v
Monitoring the Machine Via
Preventing an Unauthorized
Computer
You can monitor machine status and
change settings using a computer.
• Using SmartDeviceMonitor for
Admin, SmartDeviceMonitor for
Client, or a Web Image Monitor,
you can use a computer to view the
machine's status, such as to check
on paper quantities, or misfeeds,
etc. See Network Guide.
• You can also use a Web Image
Monitor to make network settings.
See Network Guide.
• You can also use a Web Image
Monitor to register and manage
items such as user codes, fax numbers, e-mail addresses, and folders
in the Address Book. See the Web
Image Monitor Help.
•Using Web Image Monitor, you
can receive e-mails notifying you
when toner runs out or a paper
misfeed occurs. See the Web Image
Monitor Help.
•Using Web Image Monitor, you
can receive information on the machine status via e-mail. See the
Web Image Monitor Help.
vi
AHR006S
Copy
AHR023S
• Using the printer driver, you can
embed a pattern in the printed
document. If the document is copied on a machine with the Copy
Data Security Unit(*), protected
pages are grayed out in the copy,
preventing confidential information from being copied. If the document is copied on a machine
without the Copy Data Security
Unit(*), the hidden text becomes
conspicuous in the copy, showing
that the copy is Unauthorized.
See the printer driver Help.
See Printer Reference.
• Using the printer driver, you can
embed text in the printed document for unauthorized copy prevention. If the document is copied,
scanned, or stored in a Document
Server by a copier or multifunction
printer, the embedded text appears conspicuous in the copy, discouraging such unauthorized
copying.
See the printer driver Help.
See Printer Reference
• If a document protected by unauthorized copy guard is copied on a
machine that is equipped with the
Copy Data Security Unit(*), the
machine beeps to notify users that
unauthorized copying is being attempted.
See Security Reference.
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
What You Can Do with This Machine..................................................................iii
Copier, Facsimile, Printer, and Scanner Functions................................................... iii
Utilizing Stored Documents....................................................................................... iii
Paperless Fax Transmission and Reception............................................................. iv
Fax Transmission and Reception Through the Internet............................................ iv
Using the Scanner in a Network Environment ........................................................... v
Administrating the Machine/Protecting Documents (Security Functions) ..................v
Monitoring the Machine Via Computer...................................................................... vi
Preventing an Unauthorized Copy ............................................................................ vi
This product complies with the essential requirements and provisions of Directive 1999/5/EC of the European Parliament and of the Council of 9 March 1999
on radio equipment and telecommunications terminal equipment and the mutual recognition of their conformity.
The CE Declaration of Conformity is available on the Internet at URL:
http://www.ricoh.co.jp/fax/ce_doc/.
This product is only for use in EEA or other authorized countries. Outdoor use
of this product in Belgium, France, Germany, Italy, or the Netherlands is prohibited.
1
Copyrights and Trademarks
Trademarks
Microsoft®, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries.
Acrobat
The Bluetooth
any use of such marks by Ricoh Company, Ltd. is under license.
NetWare is a registered trademark of Novell, Inc.
Other product names used herein are for identification purposes only and might
be trademarks of their respective companies. We disclaim any and all rights to
those marks.
The proper names of the Windows operating systems are as follows:
• The product name of Windows
• The product name of Windows
• The product name of Windows
• The product names of Windows
• The product names of Windows
• The product names of Windows Server™ 2003 are as follows:
• The product names of Windows
®
is a registered trademark of Adobe Systems Incorporated.
®
word mark and logos are owned by the Bluetooth SIG, Inc. and
Edition (Windows Me)
Microsoft
Microsoft
Microsoft
Microsoft
Microsoft
Microsoft
Microsoft
Microsoft
Microsoft
Microsoft
®
Windows® 2000 Advanced Server
®
Windows® 2000 Server
®
Windows® 2000 Professional
®
Windows® XP Professional
®
Windows® XP Home Edition
®
Windows Server™ 2003 Standard Edition
®
Windows Server™ 2003 Enterprise Edition
®
Windows Server™ 2003 Web Edition
®
Windows NT® Server 4.0
®
Windows NT® Workstation 4.0
®
95 is Microsoft® Windows® 95
®
98 is Microsoft® Windows® 98
®
Me is Microsoft® Windows® Millennium
®
2000 are as follows:
®
XP are as follows:
®
NT are as follows:
2
Information about Installed Software
expat
• The software including controller, etc. (hereinafter "software") installed on
this product uses the expat under the conditions mentioned below.
• The product manufacturer provides warranty and support to the software of
the product including the expat, and the product manufacturer makes the initial developer and copyright holder of the expat, free from these obligations.
• Information relating to the expat is available at:
http://expat.sourceforge.net/
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
NetBSD
1. Copyright Notice of NetBSD
For all users to use this product:
This product contains NetBSD operating system:
For the most part, the software constituting the NetBSD operating system is not
in the public domain; its authors retain their copyright.
The following text shows the copyright notice used for many of the NetBSD
source code. For exact copyright notice applicable for each of the files/binaries,
the source code tree must be consulted.
A full source code can be found at http://www.netbsd.org/.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
A Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
B Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
C All advertising materials mentioning features or use of this software must
display the following acknowledgment:
This product includes software developed by The NetBSD Foundation, Inc.
and its contributors.
D Neither the name of The NetBSD Foundation nor the names of its contribu-
tors may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2.Authors Name List
All product names mentioned herein are trademarks of their respective owners.
The following notices are required to satisfy the license terms of the software
that we have mentioned in this document:
• This product includes software developed by the University of California,
Berkeley and its contributors.
• This product includes software developed by Jonathan R. Stone for the NetBSD Project.
•This product includes software developed by the NetBSD Foundation, Inc.
and its contributors.
• This product includes software developed by Manuel Bouyer.
• This product includes software developed by Charles Hannum.
• This product includes software developed by Charles M. Hannum.
• This product includes software developed by Christopher G. Demetriou.
• This product includes software developed by TooLs GmbH.
• This product includes software developed by Terrence R. Lambert.
• This product includes software developed by Adam Glass and Charles Hannum.
• This product includes software developed by Theo de Raadt.
4
• This product includes software developed by Jonathan Stone and Jason R.
Thorpe for the NetBSD Project.
• This product includes software developed by the University of California,
Lawrence Berkeley Laboratory and its contributors.
• This product includes software developed by Christos Zoulas.
• This product includes software developed by Christopher G. Demetriou for
the NetBSD Project.
• This product includes software developed by Paul Kranenburg.
• This product includes software developed by Adam Glass.
• This product includes software developed by Jonathan Stone.
• This product includes software developed by Jonathan Stone for the NetBSD
Project.
• This product includes software developed by Winning Strategies, Inc.
•This product includes software developed by Frank van der Linden for the
NetBSD Project.
• This product includes software developed for the NetBSD Project by Frank
van der Linden
• This product includes software developed for the NetBSD Project by Jason R.
Thorpe.
• The software was developed by the University of California, Berkeley.
• This product includes software developed by Chris Provenzano, the University of California, Berkeley, and contributors.
The application software installed on this product includes the Sablotron software Version 0.82 (hereinafter, "Sablotron 0.82"), with modifications made by the
product manufacturer. The original code of the Sablotron 0.82 is provided by Ginger Alliance Ltd., the initial developer, and the modified code of the Sablotron 0.82
has been derived from such original code provided by Ginger Alliance Ltd.
b) The product manufacturer provides warranty and support to the application
software of this product including the Sablotron 0.82 as modified, and the product manufacturer makes Ginger Alliance Ltd., the initial developer of the Sablotron 0.82, free from these obligations.
c)
The Sablotron 0.82 and the modifications thereof are made available under the
terms of Mozilla Public License Version 1.1 (hereinafter, "MPL 1.1"), and the application software of this product constitutes the "Larger Work" as defined in
MPL 1.1. The application software of this product except for the Sablotron 0.82 as
modified is licensed by the product manufacturer under separate agreement(s).
d) The source code of the modified code of the Sablotron 0.82 is available at:
http://support-download.com/services/device/sablot/notice082.html
e)
The source code of the Sablotron software is available at: http://www.gingerall.com
f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html
5
JPEG LIBRARY
• The software installed on this product is based in part on the work of the In-
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
A Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
B Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
C The name "Carnegie Mellon University" must not be used to endorse or pro-
mote products derived from this software without prior written permission.
For permission or any other legal details, please contact:
Office of Technology Transfer
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh, PA 15213-3890
(412) 268-4387, fax: (412) 268-7395
tech-transfer@andrew.cmu.edu
D Redistributions of any form whatsoever must retain the following acknowl-
edgment:
"This product includes software developed by Computing Services at Carnegie Mellon University (http://www.cmu.edu/computing/)."
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE
MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD4 MessageDigest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD5 MessageDigest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
7
Samba(Ver 2.2.2-ja-1.1)
For SMB transmission, this machine uses Samba ver 2.2.2-ja-1.1 (hereinafter referred to as Samba 2.2.2-ja-1.1).
This program is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
License for more details.
You should have received a copy of the GNU General Public License along with
this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave,
Cambridge, MA 02139, USA
Note
❒ The source code for SMB transmission by this machine can be downloaded
from the following website:
http://support-download.com/services/scbs
RSA BSAFE
®
• This product includes RSA BSAFE® cryptographic or security protocol soft-
ware from RSA Security Inc.
• RSA and BSAFE are registered trademarks of RSA Security Inc. in the United
States and/or other countries.
• RSA Security Inc. All rights reserved.
8
How to Read This Manual
R
R
Symbols
This manual uses the following symbols:
WARNING:
This symbol indicates a potentially hazardous situation that might result in
death or serious injury if you misuse the machine by not following these instructions under this symbol. Be sure to read these instructions, all of which are included in the Safety Information section in the General Settings Guide.
CAUTION:
This symbol indicates a potentially hazardous situation that might result in minor or moderate injury or property damage not involving bodily injury, if you
misuse the machine by not following these instructions under this symbol. Be
sure to read the instructions, all of which are included in the Safety Information
section in the General Settings Guide.
* The above statements are for your safety.
Important
If this instruction is not followed, paper might be misfed, originals damaged, or
data lost. Be sure to read this.
Preparation
This symbol indicates the prior knowledge or preparation required before operation.
Note
This symbol indicates precautions for operation, or actions to take following
mal-operation.
Limitation
This symbol indicates numerical limits, functions that cannot be used together,
or conditions under which a particular function cannot be used.
Reference
This symbol indicates where further relevant information can be found.
[]
Keys that appear on the machine's display panel.
{}
Keys built into the machine's control panel.
9
Safety Information
R
R
When using this machine, the following safety precautions should always be followed.
Safety During Operation
In this manual, the following important symbols are used:
WARNING:
CAUTION:
Indicates a potentially hazardous situation which, if instructions
are not followed, could result in death or serious injury.
Indicates a potentially hazardous situation which, if instructions are not
followed, may result in minor or moderate injury or damage to property.
R WARNING:
•Connect the power cord directly into a wall outlet and do not use an
extension cord.
•Disconnect the power plug (by pulling the plug, not the cable) if the
power cable or plug becomes frayed or otherwise damaged.
•To avoid hazardous electric shock or laser radiation exposure, do not
remove any covers or screws other than those specified in this manual.
•Turn off the power and disconnect the power plug (by pulling the plug,
not the cable) if any of the following occurs:
•You spill something into the machine.
•You suspect that your machine needs service or repair.
•The external housing of your machine has been damaged.
•Do not incinerate used toner or toner containers. Toner dust might ig-
nite when exposed to an open flame.
•Disposal can take place at our authorized dealer.
•Dispose of used toner containersin accordance with local regulations.
•Keep the machine away from flammable liquids, gases, and aerosols.
A fire or an electric shock might occur.
•Connect the machine only to the power source described on the inside front cover of this manual.
•Do not damage, break or make any modifications to the power cord.
Do not place heavy objects on it. Do not pull it hardnor bend it more
than necessary.These actions could cause an electric shock or fire.
•Do not incinerate the photoconductor unit. Toner dust might ignite
when exposed to an open flame. Dispose of the used photoconductor
unit in accordance with local regulations.
10
R CAUTION:
•Protect the machine from dampness or wet weather, such as rain and snow.
•Unplug the power cord from the wall outlet before you move the machine.
While moving the machine, you should take care that the power cord will not
be damaged under the machine.
•When you disconnect the power plug from the wall outlet, always pull the
plug (not the cable).
•Do not allow paper clips, staples, or other small metallic objects to fall inside
the machine.
•Keep toner (used or unused) and toner containers out of reach of children.
•For environmental reasons, do not dispose of the machine or expended
supply waste at household waste collection points. Disposal can take place
at an authorized dealer.
•The inside of the machine could be very hot. Do not touch the parts with a
label indicating the “hot surface”. Otherwise, an injury might occur.
•If toner or used toner is inhaled, gargle with plenty of water and move into a
fresh air environment. Consult a doctor if necessary.
•If toner or used toner gets into your eyes, flush immediately with large
amounts of water. Consult a doctor if necessary.
•If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary.
•Avoid getting toner on your clothes or skin when removing a paper jam or
replacing toner. If your skin comes into contact with toner, wash the affected
area thoroughly with soap and water.
•If toner gets on your clothing, wash with cold water. Hot water will set the
toner into the fabric and may make removing the stain impossible.
•Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur.
•Do not place the machine on an unstable or tilted surface. If it topples over,
an injury might occur.
•If you use the machine in a confined space, make sure there is a continuous
air turnover.
•The fusing section of this machine might be very hot. Caution should be taken when removing misfed paper.
•Do not use aluminum foil, carbon paper, or similar conductive paper to avoid
a fire or machine failure.
11
Positions of Labels and Hallmarks
forRWARNING and RCAUTION
This machine has labels for RWARNING and RCAUTION at the positions
shown below. For safety, please follow the instructions and handle the machine
as indicated.
12
ZLEH010J
ENERGY STAR Program
As an ENERGY STAR Partner, we have determined
that this machine model meets the ENERGY STAR
Guidelines for energy efficiency.
The ENERGY STAR Guidelines intend to establish an international energy-saving system for
developing and introducing energy-efficient office equipment to deal with environmental issues, such as global warming.
When a product meets the ENERGY STAR Guidelines for energy efficiency, the Partner shall
place the ENERGY STAR logo onto the machine model.
This product was designed to reduce the environmental impact associated with office equipment by means of energy-saving features, such as Low-power mode.
❖ Low-Power mode and Off mode or Sleep mode
This product automatically lowers its power consumption when it is not operated for a fixed time (standard setting time: 1 minute). This is called “Off
mode” on a single function copying machine, and “Sleep mode” on a multiple
function machine equipped with optional facsimile and printing functions.
• Off mode: Same as the condition when the operation switch is turned off.
• Sleep mode: Same as the condition when the operation switch is turned off.
Receiving fax messages and printing from a computer are possible.
If you want to operate this product while it is in either of these modes, do one
of the following:
• Turn on the operation switch.
• Place an original in the Auto Document Feeder (ADF).
• Lift and lower the exposure glass cover or the ADF.
The default interval before entering Off mode or Sleep mode can be adjusted.
To change it, see p.59 “Auto Off Timer”.
The ENERGY STAR Program establishes two modes which lower the power
consumption of the product when it is not operated for a fixed time. These
modes are the Low-power mode and the Off mode or Sleep mode. This product has only one mode, the Off mode or Sleep mode. This mode meets the requirements of both the Low-power mode and Off mode or Sleep mode. In this
manual, the Off mode is called the Auto Off mode.
❖ Duplex Priority
The ENERGY STAR Program recommends the duplex function. By conserving paper resources this function is less of a burden to the environment. For
applicable machines, duplex function (one-sided originals→ two-sided copies) can be selected preferentially when the operation switch or the main power switch is turned on, the {Energy Saver} key is pressed, or the machine resets
automatically.
13
Reference
To change the settings of the Duplex Priority mode, see “Duplex Mode Priority”in “General Features 2/4”, Copy Reference.
Specifications
Low- Power mode, Off
Mode
Duplex Priority1 Sided→1 Sided
Power consumption1.2W
Default interval1 minute
Recovery time10 seconds or less
❖ Recycled Paper
In accordance with the ENERGY STAR Program, we recommend use of environmentally friendly recycled paper. Please contact your sales representative
for recommended paper.
14
Machine Types
This machine comes in two models which vary in copy speed. To ascertain
which model you have, see the inside front cover.
Type 1Type 2
Copy speed25 copies/minute
(A4K, 8
1
/2" × 11" K)
30 copies/minute
(A4K, 81/2" × 11"K)
15
16
1. Getting Started
Guide to Components
1. Exposure glass cover (optional) or
Auto Document Feeder (ADF) (optional)
Lower the exposure glass cover over
originals placed on the exposure glass. If
you have the ADF, load a stack of originals here. They will be fed automatically,
one by one.
(The illustration shows the ADF.)
2. Exposure glass
Place originals face down.
3. Internal tray
Copied, printed paper or fax messages
are delivered here.
4. Ventilation holes
Prevents overheating. Do not obstruct
the ventilation holes by placing anything
near it or leaning objects against it. If the
machine overheats, a fault might occur.
AHR007S
5. Main power switch
If the machine does not operate after
turning on the operation switch, check
the main power switch is turned on. If it
is off, turn it on.
6. Main power indicator
This indicator lights when the main power switch is turned on, and goes off when
the switch is turned off.
7. On indicator
This indicator lights when the operation
switch is turned on, and goes off when
the switch is turned off.
8. Operation switch
Press this switch to turn the power on
(the On indicator lights up). To turn the
power off, press this switch again (the On
indicator goes off).
17
Getting Started
1
9. Control panel
See p.21 “Control Panel”.
10. Remove Paper Indicator
The indicator lights when paper is delivered to the internal tray 2 (1 bin tray).
When paper is removed from the internal
tray 2, the indicator goes off.
Note
❒ Internal tray 2 (1 bin tray) is optional.
11. Duplex unit (Unit for two-sided
copies) (optional)
Makes two-sided copies.
See p.19 “External Options”
12. Front cover
Open to access the inside of the machine.
13. Paper tray
Load paper. See p.121 “B Loading Paper”.
14. Paper tray 2
Use when copying onto OHP transparencies, label paper (adhesive labels), translucent paper, postcards, envelopes and
custom size paper. See p.121 “B Loading
Paper”.
15. Paper tray unit (optional)
Load paper. See p.121 “B Loading Paper”, p.19 “External Options”.
1. Bypass tray (optional)
See p.19 “External Options”
18
ZEWH020E
2. Paper tray cover
Open this cover to remove jammed paper.
3. Lower right cover
Open this cover to remove jammed paper.
Loading...
+ 152 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.