Oce Linium PRO C6500 Scanner Manual

Océ
CS240
User Manual
Network scanner operations
Contents
1 Introduction
1.1 Welcome........................................................................................................................................... 1-3
1.2 Energy Star®.................................................................................................................................... 1-3
What is an ENERGY STAR® product? ............................................................................................. 1-3
1.3 Trademarks and registered trademarks ....................................................................................... 1-4
OpenSSL statement.......................................................................................................................... 1-4
NetSNMP licenses ............................................................................................................................ 1-5
1.4 About this manual ........................................................................................................................... 1-8
Structure of the manual..................................................................................................................... 1-8
Notation............................................................................................................................................. 1-8
1.5 Explanation of manual conventions .............................................................................................. 1-9
Safety advices................................................................................................................................... 1-9
Sequence of action ........................................................................................................................... 1-9
Tips.................................................................................................................................................... 1-9
Special text markings........................................................................................................................ 1-9
1.6 User manuals................................................................................................................................. 1-10
User manual .................................................................................................................................... 1-10
Copy Operations ............................................................................................................................. 1-10
Print Operations .............................................................................................................................. 1-10
Box Operations ............................................................................................................................... 1-10
Network Scanner Operations (this manual)..................................................................................... 1-10
Web Connection Operations........................................................................................................... 1-10
Fax Operations (Option) .................................................................................................................. 1-10
Network Fax Operations (Option).................................................................................................... 1-10
2 Before using scanning functions
2.1 Environment required for using scanning functions.................................................................... 2-3
2.2 Available scanning functions ......................................................................................................... 2-3
Sending scan data in an e-mail message ......................................................................................... 2-3
Sending scan data as files (FTP) ....................................................................................................... 2-4
Sending scan data to a computer on the network (SMB)................................................................. 2-4
Saving scan data in user boxes ........................................................................................................ 2-5
Using the machine as a scanner ....................................................................................................... 2-5
2.3 Settings to be specified in advance............................................................................................... 2-6
Network setting ................................................................................................................................. 2-6
Registering and specifying destinations ........................................................................................... 2-6
Specifying the e-mail address of the machine.................................................................................. 2-7
Specifying scan and transmission settings....................................................................................... 2-7
Fax/Scan programs........................................................................................................................... 2-7
Specifying screen settings................................................................................................................ 2-7
2.4 Connecting to the network............................................................................................................. 2-8
Connecting the network.................................................................................................................... 2-8
2.5 Setup and scanning operations ..................................................................................................... 2-9
3 Scanning
3.1 Control panel ................................................................................................................................... 3-3
3.2 Displaying the Fax/Scan mode screen.......................................................................................... 3-5
3.3 Using Scan/Fax programs.............................................................................................................. 3-6
Recalling a Scan/Fax program.......................................................................................................... 3-6
Registering Scan/Fax programs........................................................................................................ 3-9
Editing and deleting Scan/Fax programs........................................................................................ 3-12
Contents-2 CS240
3.4 Sending data in an e-mail message (Scan to e-mail)................................................................. 3-14
Scan to e-mail.................................................................................................................................. 3-14
Selecting a destination from the address book............................................................................... 3-14
Selecting a group destination.......................................................................................................... 3-15
Entering addresses directly ............................................................................................................. 3-17
Selecting a destination that was searched for ................................................................................ 3-18
Selecting a destination with an address search .............................................................................. 3-20
3.5 Sending data to a computer on the network (Scan to SMB) ..................................................... 3-23
Scan to SMB.................................................................................................................................... 3-23
Scan to SMB operations with Windows file sharing (Mac OS X)/Samba (Linux/Unix).................... 3-23
Scan to SMB operations with Windows 98 SE and Windows Me .................................................. 3-23
Selecting a destination from the address book............................................................................... 3-24
Entering addresses directly ............................................................................................................. 3-25
3.6 Sending data to a server (Scan to FTP)....................................................................................... 3-27
Scan to FTP ..................................................................................................................................... 3-27
Selecting a destination from the address book............................................................................... 3-27
Entering addresses directly ............................................................................................................. 3-29
3.7 Specifying scan and transmission settings
(Scan settings/Original settings/Communication settings)....................................................... 3-31
Settings that can be specified ......................................................................................................... 3-31
Original type..................................................................................................................................... 3-33
Simplex/Duplex ............................................................................................................................... 3-34
Resolution........................................................................................................................................ 3-35
File type ........................................................................................................................................... 3-36
Density............................................................................................................................................. 3-39
Separate Scan ................................................................................................................................. 3-39
Color (Quality adjustment) ............................................................................................................... 3-40
Background removal (Quality adjustment) ...................................................................................... 3-41
Sharpness (Quality adjustment)....................................................................................................... 3-42
Frame erase (Erase)......................................................................................................................... 3-43
Book copy (Book scan) ................................................................................................................... 3-44
Scan size (Application) .................................................................................................................... 3-46
Annotation (Application) .................................................................................................................. 3-48
Date/Time (Application) ................................................................................................................... 3-48
Page number (Application) .............................................................................................................. 3-51
Stamp (Application) ......................................................................................................................... 3-54
Header/Footer (Application)............................................................................................................. 3-57
Send & Print (Application)................................................................................................................ 3-61
Document name .............................................................................................................................. 3-63
Original settings............................................................................................................................... 3-65
E-mail setting................................................................................................................................... 3-67
URL notification setting ................................................................................................................... 3-68
E-mail encryption............................................................................................................................. 3-69
Digital signature............................................................................................................................... 3-70
3.8 Checking the settings ................................................................................................................... 3-71
Checking settings............................................................................................................................ 3-71
Deleting unnecessary destinations.................................................................................................. 3-73
3.9 Checking the scan transmission log............................................................................................ 3-74
Displaying the current jobs.............................................................................................................. 3-74
Displaying the job history list........................................................................................................... 3-75
Contents of job lists......................................................................................................................... 3-76
4 Specifying utility mode parameters
4.1 Settings that can be specified from utility mode.......................................................................... 4-3
Utility mode parameters .................................................................................................................... 4-3
Other related parameters................................................................................................................... 4-3
Web Connection................................................................................................................................ 4-3
4.2 Displaying settings screens............................................................................................................ 4-4
Displaying the create one-touch destination screen......................................................................... 4-4
Displaying the user settings screen................................................................................................... 4-5
Displaying the administrator settings screen .................................................................................... 4-6
4.3 Registering an address book destination..................................................................................... 4-8
E-mail destination.............................................................................................................................. 4-8
User box............................................................................................................................................ 4-9
PC (SMB)......................................................................................................................................... 4-11
FTP .................................................................................................................................................. 4-14
4.4 Registering a group destination .................................................................................................. 4-17
4.5 Specifying e-mail settings ............................................................................................................ 4-19
Subject ............................................................................................................................................ 4-19
E-mail text ....................................................................................................................................... 4-20
4.6 Limiting access to destinations ................................................................................................... 4-22
Limiting access to destinations....................................................................................................... 4-22
Specifying limited access settings.................................................................................................. 4-22
4.7 Customizing the Fax/Scan mode screen.................................................................................... 4-25
Default tab....................................................................................................................................... 4-25
Program default............................................................................................................................... 4-25
Address book index default ............................................................................................................ 4-26
Shortcut key .................................................................................................................................... 4-27
Default address book ...................................................................................................................... 4-28
4.8 Scan/Fax settings.......................................................................................................................... 4-29
JPEG compression level ................................................................................................................. 4-29
Black compression level ................................................................................................................. 4-30
TWAIN lock time.............................................................................................................................. 4-31
Default Scan/Fax settings ............................................................................................................... 4-32
Compact PDF compression level.................................................................................................... 4-33
4.9 Header/Footer settings................................................................................................................. 4-34
Registering headers/footers............................................................................................................ 4-34
Deleting headers/footers................................................................................................................. 4-38
4.10 Printing registered destination lists ............................................................................................ 4-40
Address book list............................................................................................................................. 4-40
Group list......................................................................................................................................... 4-41
Program list ..................................................................................................................................... 4-43
E-mail subject/text list..................................................................................................................... 4-45
4.11 Open API settings.......................................................................................................................... 4-46
Access setting................................................................................................................................. 4-46
Port number .................................................................................................................................... 4-47
SSL.................................................................................................................................................. 4-48
Authentication ................................................................................................................................. 4-49
5 Network settings
5.1 Available network settings parameters ........................................................................................ 5-3
5.2 Network settings with external server authentication................................................................. 5-4
When SSL is installed........................................................................................................................ 5-4
Using active directory........................................................................................................................ 5-4
Using NTLM v1 and NTLM v2........................................................................................................... 5-8
Using Novell NDS.............................................................................................................................. 5-9
Using LDAP..................................................................................................................................... 5-11
5.3 TCP/IP settings.............................................................................................................................. 5-13
Displaying the TCP/IP settings screen............................................................................................ 5-13
IP settings........................................................................................................................................ 5-14
DNS host ......................................................................................................................................... 5-15
DNS domain .................................................................................................................................... 5-16
DNS server settings......................................................................................................................... 5-17
RAW port number............................................................................................................................ 5-19
IP filtering (Permit access) ............................................................................................................... 5-20
IP filtering (Deny access) ................................................................................................................. 5-21
IPv6 settings.................................................................................................................................... 5-22
IKE settings (IPsec settings)............................................................................................................ 5-23
IPsec SA settings (IPsec settings)................................................................................................... 5-24
Peer (IPsec settings)........................................................................................................................ 5-26
Contents-4 CS240
5.4 NetWare settings ........................................................................................................................... 5-29
IPX settings...................................................................................................................................... 5-29
NetWare print settings..................................................................................................................... 5-30
User authentication setting (NDS) ................................................................................................... 5-33
5.5 http server settings........................................................................................................................ 5-34
Support information......................................................................................................................... 5-36
Printer information ........................................................................................................................... 5-36
5.6 FTP settings ................................................................................................................................... 5-39
FTP TX settings ............................................................................................................................... 5-39
FTP server settings.......................................................................................................................... 5-41
5.7 SMB settings.................................................................................................................................. 5-42
Client settings.................................................................................................................................. 5-42
Print setting...................................................................................................................................... 5-43
WINS settings.................................................................................................................................. 5-44
5.8 LDAP settings ................................................................................................................................ 5-46
Enabling LDAP................................................................................................................................. 5-46
Setting up LDAP .............................................................................................................................. 5-47
Default search settings.................................................................................................................... 5-52
5.9 E-Mail TX (SMTP) ........................................................................................................................... 5-53
SMTP server address ...................................................................................................................... 5-57
SMTP authentication ....................................................................................................................... 5-58
5.10 E-mail RX (POP) ............................................................................................................................. 5-60
POP server address......................................................................................................................... 5-63
5.11 S/MIME communication settings................................................................................................. 5-64
5.12 SNMP settings ............................................................................................................................... 5-67
SNMP v1/v2c settings..................................................................................................................... 5-68
SNMP v3 settings............................................................................................................................ 5-70
5.13 AppleTalk settings......................................................................................................................... 5-75
5.14 Bonjour settings............................................................................................................................. 5-76
5.15 TCP socket settings ...................................................................................................................... 5-77
TCP socket ...................................................................................................................................... 5-77
TCP socket (ASCII mode)................................................................................................................ 5-79
5.16 Device setting ................................................................................................................................ 5-80
5.17 Time adjustment setting ............................................................................................................... 5-81
NTP server address ......................................................................................................................... 5-82
5.18 Status notification setting............................................................................................................. 5-83
Specifying an IP address................................................................................................................. 5-83
Specifying an IPX address............................................................................................................... 5-85
Specifying an e-mail address .......................................................................................................... 5-87
Notification item............................................................................................................................... 5-88
5.19 Total counter notification settings............................................................................................... 5-89
Notification schedule setting ........................................................................................................... 5-90
Address setting................................................................................................................................ 5-92
5.20 PING confirmation ......................................................................................................................... 5-94
5.21 SLP setting ..................................................................................................................................... 5-96
5.22 LPD setting..................................................................................................................................... 5-97
5.23 Prefix/Suffix setting ....................................................................................................................... 5-98
ON/OFF setting................................................................................................................................ 5-98
Prefix/Suffix setting ......................................................................................................................... 5-99
5.24 Action for invalid certificate........................................................................................................ 5-101
6 Scan function troubleshooting
6.1 Troubleshooting............................................................................................................................... 6-3
If an error message appears when connecting to the machine from a computer............................. 6-3
If "MTP cannot be used." or "FTP cannot be used." appears .......................................................... 6-3
If the HDD ready indicator indicates an HDD malfunction ................................................................ 6-3
6.2 Network error message list ............................................................................................................ 6-3
7 Appendix
7.1 Product specifications.................................................................................................................... 7-3
Scanning functions............................................................................................................................ 7-3
Network functions ............................................................................................................................. 7-3
7.2 Entering text..................................................................................................................................... 7-4
Enlarging the keyboard ..................................................................................................................... 7-5
To type text ....................................................................................................................................... 7-6
List of available characters................................................................................................................ 7-6
7.3 Glossary ........................................................................................................................................... 7-7
8Index
Contents-6 CS240
1
Introduction
CS240 1-3
Introduction
1
1 Introduction
1.1 Welcome
Thank you for choosing this machine.
This user manual contains details on making network connections and on the operations required to use the scanning functions of the Linium
PRO C6500, precautions on its use, and basic troubleshooting procedures. In order to ensure that this machine is used correctly and efficiently, carefully read this user manual before using the machine.
In addition, for details on the operation of Web Connection, which can be used to operate this machine over a network, refer to the User manual – Web Connection Operations.
Views of the actual equipment may be slightly different from the illustrations used in this manual.
1.2 Energy Star®
As an ENERGY STAR® Partner, we have determined that this machine meets the ENERGY STAR® Guidelines for energy efficiency.
What is an ENERGY STAR® product?
An ENERGY STAR® product has a special feature that allows it to automatically switch to a "low-power mode" after a period of inactivity. An ENERGY STAR
®
product uses energy more efficiently, saves you money
on utility bills and helps protect the environment.
1
Introduction
1-4 CS240
1.3 Trademarks and registered trademarks
Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries.
This machine and Box Operator are based in part on the work of the Independent JPEG Group. Compact-VJE
Copyright 1986-2003 VACS Corp.
RC4® is a registered trademark or trademark of RSA Security Inc. in the United States and/or other countries.
RSA® is a registered trademark or trademark of RSA Security Inc. RSA BSAFE® is a registered trademark or trademark of RSA Security Inc. in the United States and/or other countries.
License information
This product includes RSA BSAFE Cryptographic software from RSA Security Inc.
OpenSSL statement
OpenSSL license
Copyright © 1998-2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@crypt-Soft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
CS240 1-5
Introduction
1
Original SSLeay license
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, Ihash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@crypt-soft.com)" The word ‘cryptographic’ can be left out if the rouines from the library being used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tin Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
NetSNMP licenses
Part 1: CMU/UCD copyright notice: (BSD like)
Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work - 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California All Rights Reserved
Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the University of California not be used in advertising or publicity pertaining to distribution of the software without specific written permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALLWARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Part 2: Networks Associates Technology, Inc copyright notice (BSD)
Copyright © 2001-2003, Networks Associates Technology, Inc
All rights reserved.
1
Introduction
1-6 CS240
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the Networks Associates Technology, Inc nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 3: Cambridge Broadband Ltd. copyright notice (BSD)
Portions of this code are copyright © 2001-2003, Cambridge Broadband Ltd.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
- The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER "AS IS" AND ANYEXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 4: Sun Microsystems, Inc. copyright notice (BSD)
Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved.
Use is subject to license terms below.
This distribution may include materials developed by third parties.
Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
CS240 1-7
Introduction
1
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 5: Sparta, Inc copyright notice (BSD)
Copyright © 2003-2004, Sparta, Inc All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of Sparta, Inc nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 6: Cisco/BUPTNIC copyright notice (BSD)
Copyright © 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
All other product names mentioned are trademarks or registered trademarks of their respective companies
1
Introduction
1-8 CS240
1.4 About this manual
This user manual covers the Linium PRO C6500 network and scanning functions.
This section introduces the structure of the manual and notations used for product names, etc.
This manual is intended for users who understand the basic operations of computers and the machine. For operating procedures of the Windows or Macintosh operating system and application programs, refer to the respective manuals.
Structure of the manual
This manual consists of the following chapters.
Chapter 1 Introduction
Chapter 2 Before using scanning functions
Chapter 3 Scanning
Chapter 4 Specifying utility mode parameters
Chapter 5 Network settings
Chapter 6 Scan function troubleshooting
Chapter 7 Appendix
Chapter 8 Index
Lists the product specifications and the characters that can be entered from the control panel.
Notation
Product name Notation in the manual
Linium PRO C6500 This machine, Linium PRO C6500
Microsoft Windows 98 Windows 98
Microsoft Windows Me Windows Me
Microsoft Windows NT 4.0 Windows NT 4.0
Microsoft Windows 2000 Windows 2000
Microsoft Windows XP Windows XP
When the operating systems above are written together Windows 98/Me
Windows NT 4.0/2000/XP Windows 98/Me/NT 4.0/2000/XP
CS240 1-9
Introduction
1
1.5 Explanation of manual conventions
The marks and text formats used in this manual are described below.
Safety advices
6 DANGER
Failure to observe instructions highlighted in this manner may result in fatal or critical injuries in fact of electrical power.
% Observe all dangers in order to prevent injuries.
7 WARNING
Failure to observe instructions highlighted in this manner may result in serious injuries or property damage.
% Observe all warnings in order to prevent injuries and to ensure safe use of the machine.
7 CAUTION
Failure to observe instructions highlighted in this manner may result in slight injuries or property damage.
% Observe all cautions in order to prevent injuries and to ensure safe use of the machine.
Sequence of action
1 The number 1 as formatted here indicates the first step of a
sequence of actions.
2 Subsequent numbers as formatted here indicate subsequent
steps of a sequence of actions.
?
Text formatted in this style provides additional assistance.
% Text formatted in this style describes the action that will
ensure the desired results are achieved.
Tips
2
Note
Text highlighted in this manner contains useful information and tips to ensure safe use of the machine.
2
Reminder
Text highlighted in this manner contains information that should be reminded.
!
Detail
Text highlighted in this manner contains references for more detailed information.
Special text markings
[Stop] key The names of keys on the control panel are written as shown above.
MACHINE SETTING
Display texts are written as shown above.
An illustration inserted
here shows what operations
must be performed.
1
Introduction
1-10 CS240
1.6 User manuals
This machine is provided with printed manuals and PDF manuals on the user manual CD.
User manual
This manual contains operating procedures and descriptions of the most frequently used functions.
Copy Operations
This manual contains descriptions of the Copy mode operations and machine maintenance. Refer to this manual for details on the paper and documents, copy procedures using convenient Application functions, replacing consumables, and troubleshooting operations such as clearing paper misfeeds.
Print Operations
This manual contains details of the printing functions that can be specified with the standard built-in printer controller. Refer to this manual for basic operating procedures for the printing functions.
Box Operations
This manual contains operating procedures for using the user boxes on the hard disk. Refer to this manual for details on saving data in user boxes, retrieving data from user boxes and transferring data.
Network Scanner Operations (this manual)
This manual contains descriptions on specifying network settings for standard equipment and operating procedures for scanning functions. Refer to this user manual for details on using network functions and the Scan to E-Mail, Scan to FTP and Scan to SMB operations.
Web Connection Operations
This manual contains descriptions on the machine settings that can be specified remotely with Web Connection from a Web browser on a computer. Refer to this manual for details on operating procedures for using Web Connection.
Fax Operations (Option)
This manual contains descriptions of the G3 fax operations. Refer to this manual for details on using the G3 fax operations when the optional fax kit is installed.
In order to use the fax functions, the optional fax kit must be purchased separately.
Network Fax Operations (Option)
This manual contains details on the network fax functions. Refer to this manual for operating procedures on Internet faxing and IP address faxing.
2
Before using scanning functions
CS240 2-3
Before using scanning functions
2
2 Before using scanning functions
2.1 Environment required for using scanning functions
The following conditions are required in order to use the network scanning features.
- The machine is connected to the network. (required) The machine can be used over a TCP/IP network. First, connect the cable for connecting to the network. For details, refer to
"Connecting to the network" on page 2-8. In order to use this machine on a network, settings such as the IP address of the machine must be specified. For details, refer to "Network settings" on page 5-3.
- The driver software is installed on the computer.
In order to use this machine as a scanner, the dedicated software TWAIN must be installed. For details, refer to the TWAIN driver manual on the User Software CD-ROM.
2.2 Available scanning functions
"Scanning" refers to the operation of reading the image of a document fed through the ADF or placed on the original glass. The scanning functions can be used to temporarily store the scan data on the internal memory of the machine and transmit the data in an e-mail message over the network or upload the data to a file server.
In addition, the data can be stored on the internal hard disk of this machine. This function can be used from Box mode, which is described in the User manual – Box Operations.
Furthermore, this machine can be used simply as a scanner.
Sending scan data in an e-mail message
The scan data can be sent to the specified e-mail address. Destinations can be selected from the touch panel of this machine, and the scan data is sent as an e-mail attachment.
For details, refer to "Sending data in an e-mail message (Scan to e-mail)" on page 3-14.
Original
Machine
Internet
Memory
E-mail and scan data
SMTP server POP server
E-mail reception
2
Before using scanning functions
2-4 CS240
Sending scan data as files (FTP)
The scan data can be uploaded to the specified FTP server. The FTP server address, logon password and other information are entered from the touch panel of this machine.
The data uploaded to the FTP server can be downloaded from a computer on the network.
For details, refer to "Sending data to a server (Scan to FTP)" on page 3-27.
Sending scan data to a computer on the network (SMB)
The scan data can be sent to a shared folder on a specified computer. The host name, file path and other information are entered from the touch panel of this machine.
For details, refer to "Sending data to a computer on the network (Scan to SMB)" on page 3-23.
Original
Machine
Memory
Scan data
Download
FTP server
Internet
Original
Machine
Memory
Scan data
Save to a shared folder
CS240 2-5
Before using scanning functions
2
Saving scan data in user boxes
The scan data can be saved in a user box created on the hard disk of this machine, allowing the data to be reused. The file name can be entered from the touch panel of this machine when the data is saved.
For details on saving data in user boxes and reusing the saved data, refer to the User manual – Box Operations.
Using the machine as a scanner
This machine can be used as a scanner. The scanner can be controlled from a computer connected to the network, and the scanned image can be imported into an application on the computer to be processed.
For more details, refer to the TWAIN driver manual on the User Software CD-ROM.
Hard disk
Machine
Original
Machine
Memory
2
Before using scanning functions
2-6 CS240
2.3 Settings to be specified in advance
It is recommended that the settings described below be specified before using the network scanning functions. The settings described in "Network Setting" must be specified, and any other settings should be specified as necessary.
!
Detail
For details on specifying network settings, refer to the sections listed below.
"Network settings" on page 5-3
User manual – Web Connection Operations
Network setting
An IP address must be assigned to the machine and settings, such as the SMTP server, must be specified in order to use the machine on the network. Be sure to specify these settings.
Settings can be specified by using the machine’s touch panel or by using Web Connection from a Web browser on a computer on the network.
Registering and specifying destinations
The destinations (recipients) for scan data can be registered in either of the following ways.
- Using the touch panel of the machine
- Using Web Connection from a computer on the network
The following destinations can be registered.
2
Note
A destination can also be entered from the machine’s touch panel before scanning, even if the destination has not been registered in advance. This is called "direct input". For details, refer to "Entering addresses directly" on page 3-17.
!
Detail
For details on registering and specifying settings for destinations, refer to the sections listed below.
"Registering an address book destination" on page 4-8
"Registering a group destination" on page 4-17
Type Description
Address book destinations A single destination is assigned a single registration number.
Group destinations Multiple destinations can be registered together. In addition, E-mail, FTP, SMB, and
user box destinations can be registered together in a single group.
CS240 2-7
Before using scanning functions
2
Specifying the e-mail address of the machine
In order to send scan data by e-mail, the From address of this machine must be registered. The From address indicates the e-mail address of the sender when data is sent. It is recommended that the e-mail address registered for the administrator be used.
If the e-mail address registered for the administrator is not specified, the sender’s e-mail address must be entered for each Scan to E-mail operation. Note that Scan to E-Mail operations are not possible if a From address is not entered.
To register the e-mail address of this machine, specify a setting for "E-Mail Address" (displayed by touching [Administrator/Machine Settings] on the Administrator Settings screen, then [Imput Machine Address]). For a detailed operating procedure, refer to the User manual – Copy Operations.
2
Note
When user authentication settings are specified, the e-mail address specified for each user becomes the From address.
Specifying scan and transmission settings
When scanning, the following document scanning conditions and transmission details can be specified.
Use the touch panel of the machine to specify the settings.
!
Detail
For details on the scan settings, refer to "Specifying scan and transmission settings (Scan settings/Original settings/Communication settings)" on page 3-31.
Fax/Scan programs
The destination and scan settings can be registered together as a single program. This is convenient for frequently scanning documents and sending data under the same conditions.
Use the touch panel of the machine to specify the settings.
!
Detail
For details, refer to "Registering Scan/Fax programs" on page 3-9.
Specifying screen settings
The settings that are selected when [Fax/Scan] key in the control panel is pressed can be specified.
!
Detail
For details, refer to "Customizing the Fax/Scan mode screen" on page 4-25.
Parameter Description
Scan Settings Select the scan conditions, such as the document quality to be saved and the file
format.
Original Settings Select the orientation of the document loaded into the ADF or placed on the original
glass.
Communication Settings Specify the necessary settings for sending data.
2
Before using scanning functions
2-8 CS240
2.4 Connecting to the network
Connect the machine to the network.
2
Reminder
Be sure to connect the machine to the network in order to use the scan functions.
Connecting the network
Connect a UTP cable (category 5 or later recommended) from the network to the Ethernet connector on the machine.
CS240 2-9
Before using scanning functions
2
2.5 Setup and scanning operations
The settings required for using the scan functions and the general scan operation are shown below.
User Settings screen in Utility mode *Specify settings for the basic parameters such as the format in which scan data is saved. "Customizing the Fax/Scan mode screen" on page 4-25 "Scan/Fax settings" on page 4-29
[Network Setting] on Administrator Settings screen in Utility mode *Specify the settings in order to use the machine on the network. "TCP/IP settings" on page 5-13 "NetWare settings" on page 5-29 "http server settings" on page 5-34 "FTP settings" on page 5-39 "SMB settings" on page 5-42 "LDAP settings" on page 5-46 "E-Mail TX (SMTP)" on page 5-53 "E-mail RX (POP)" on page 5-60 "S/MIME communication settings" on page 5-64 "SNMP settings" on page 5-67 "AppleTalk settings" on page 5-75 "Bonjour settings" on page 5-76 "TCP socket settings" on page 5-77 "Device setting" on page 5-80 "Time adjustment setting" on page 5-81 "Status notification setting" on page 5-83 "Total counter notification settings" on page 5-89 "PING confirmation" on page 5-94 "SLP setting" on page 5-96 "LPD setting" on page 5-97 "Prefix/Suffix setting" on page 5-98 "Action for invalid certificate" on page 5-101
One-Touch Destination/User Box Registration screen in Utility mode *Specify e-mail addresses for e-mail transmissions, register FTP servers, and specify destination computers. "Registering an address book destination" on page 4-8 "Registering a group destination" on page 4-17 "Specifying e-mail settings" on page 4-19
Position the document.
Specify a recipient.
Specify the scan settings. "Specifying scan and transmission settings (Scan settings/Original settings/Communication settings)" on page 3-31
Press the [Start] key in the control panel.
Scanning begins, and the data is sent.
2
Before using scanning functions
2-10 CS240
!
Detail
Some of the settings that can be specified from the control panel can also be specified from a computer over a network using Web Connection. For details, refer to the User manual – Web Connection Operations.
For details on external server authentication, refer to "Network settings with external server authentication" on page 5-4.
For details on registering a destination using a Scan/Fax program, refer to "Using Scan/Fax programs" on page 3-6.
3
Scanning
Loading...
+ 246 hidden pages