by statutory or judicial law or hereinafter granted, including without limitations, material generated from the
software programs which are displayed on the screen, such as icons, screen displays, looks etc.
®
Xerox
, The Document Company®, the digital X®and all Xerox products mentioned in this publication are
trademarks of Xerox Corporation. Product names and trademarks of other companies are hereby acknowledged.
See the About License section for detailed information on licensed products.
The information in this document is correct at the time of publication. Xerox reserves the right at any time to
change the information without notice. Changes and technical updates will be added in subsequent editions of the
documentation. For the latest information go to www.xerox.com
.
WorkCentre Pro 123/128
Minimum Requirements
To enable Scanning Features
6/28/04
Version 1.1
701P42081
Page 3 of 28 701P42081
Table of Contents
GENERAL NETWORK SETUP................................................................................................................................................................. 5
CAN TO E-MAIL:...................................................................................................................................................................................... 8
S
CAN TO FTP/SMB:................................................................................................................................................................................. 8
SCAN TO FTP/SMB SETUP................................................................................................................................................................... 21
SCAN TO MAILBOX ............................................................................................................................................................................... 24
XAMPLES OF CONFIGURING THE LDAP FIELDS ON DIFFERENT SEVERS..................................................................................................... 26
E
Page 4 of 28 701P42081
Purpose
y
This document is intended to help the support centers and analysts in enabling Networking and Scanning features for use on a M123/M128 device.
This document is not a substitute for the system administrator’s guide or the user guide, rather it is intended to be used as a quick reference or
checklist when enabling the scanning features.
GGeenneerraall NNeettwwoorrkk SSeettuupp
These are the minimal settings required to enable the device on the network.
General Network Setup
Field Name Description Location Value
Host Name The device’s SMB Host Name. WUI :
Properties Æ Protocol Settings Æ TCP/IP
Enable “TCP/IP”
Port
Get IP Address The Method used to get an IP address.
IP Address
Page 5 of 28 701P42081
Port by which TCP/IP client
communicates with the TCP/IP server
Examples are;
•
DHCP or
• Manual,
• Etc.
This is Sheeta’s TCP/IP Address.
The IP Address is a unique address
that identifies a device in a network.
WUI :
Properties Æ Port Settings
LUI :
System Settings Æ System Settings Æ Network
Settings Æ Port Settings
WUI :
Properties Æ Protocol Settings Æ TCP/IP
LUI :
System Settings Æ System Settings Æ Network
Settings Æ Protocols Settings
WUI :
Properties Æ Protocol Settings Æ TCP/IP
LUI :
stem Settings Æ System Settings Æ Network
S
Ex: XRXxxxxxxxxxxxxxx
Default is DHCP Auto.
Note: If set for anything
other than Manual, skip
IP Address, Subnet
Mask and Gateway
fields.
_____._____._____._____
Ex: 192.168.1.50
General Network Setup
Field Name Description Location Value
Settings Æ Protocols Settings
Subnet Mask The Subnet mask address of the
device. The Subnet Mask identifies
which part of the IP Address contains
the Subnet Address and which part
contains the host (or device) address.
Gateway
Address
The Gateway Address is the IP
Address of the gateway, or ro ut e r , th at
the machine will use to access devices
on other subnets.
WUI :
Properties Æ Protocol Settings Æ TCP/IP
LUI :
System Settings Æ System Settings Æ Network
Settings Æ Protocols Settings
WUI :
Properties Æ Protocol Settings Æ TCP/IP
LUI :
System Settings Æ System Settings Æ Network
Settings Æ Protocols Settings
_____._____._____._____
Ex: 255.255.255.0
_____._____._____._____
Ex: 192.168.1.1
AAddvvaanncceedd NNeettwwoorrkk SSeettuupp
DNS and WINS information has to be populated if a server name has been specified. DNS and WINS are protocols that allow the device to use
names rather then IP addresses when specifying the hosts of services that the device uses (ex: LDAP Host, Kerberos Host, SMTP/ pop3 Host, etc).
Prerequisite
Complete the Network Installation. Refer to Æ General Network Setup
Advanced Network Setup
Field Name Description Location Value
DNS Server
Address (up to 3
DNS server
addresses can be
specified)
Page 6 of 28 701P42081
Dynamic Name Service. Specifying
hosts by IP address is error prone and
difficult. DNS allows names to be
assigned to IP addresses. A DNS
server allows a client (like
WUI :
Properties Æ Protocol Settings Æ TCP/IP
_____._____._____._____
Ex: 192.168.1.2
If DHCP box is check via
Web UI, then DNS address
Advanced Network Setup
Field Name Description Location Value
M123/M128) to ask the DNS server
to look up the IP address for hosts
specifie d b y na me.
DNS Address 1-3 These three fields allow the entry of
DNS server IPs. For the device to use
any Hostname…
DNS Name This is the Domain name of the
device.
Domain Name
(up to 3 DNS
Domain Names
addresses can be
specified).
WINS Server Used in Microsoft Networking
If DNS Server Address (IP address)
is left blank, then the DNS domain
names need to be specified
(SMB). WINS allow names to be
assigned to IP addresses. A WINS
server allows a client (like Shee ta) to
ask the WINS server to look up the
IP address for hosts specified by
name
WUI :
Properties Æ Protocol Settings Æ TCP/IP
WUI :
Properties Æ Protocol Settings Æ TCP/IP
WUI :
Properties Æ Protocol Settings Æ TCP/IP
WUI :
Properties Æ Protocol Settings Æ TCP/IP
information is populated
automatically.
_____._____._____._____
Ex: 192.168.1.2
Ex:
<DNSName>.<company>.com
Ex:
<DNSName>.<company>.com
Ex:
<DNSName>.<company>.com
If DHCP box is check via
Web UI, then WINS address
information is populated
automatically.
The M123/M128 device performs user authentication using Kerberos for windows and Kerberos for Solari s. When enabled, user access to scanning
features (excluding scan to mailbox) will be prevented for un-authorized users. Access to the scanning features will be enabled once the user is
authenticated by Kerberos.
However, since the username/password provided to utilize the scanning features (i.e. Scan to SMB, Scam to FTP, e-mail, Network Scanning) IS
NOT the same username / password used to au thenticate with the Kerberos server, trac king each user when accessing the netwo rking features of the
device will not be possible.
The following procedure describes how Kerberos works with different scanning functions.
Scan to E-Mail:
• The user selects <Scan to email>
•
A login/password popup is displayed requiring the user to provide a username and password to the Kerberos server.
• The user enters the login and password.
• The device passes the login and password to the Kerberos server and if a match is found the user is successfully authenticated.
•
“From:” field of the e-mail is automatically populated with the device login name and e-mail address created at the time of the device
configuration.
•
If SMTP server requires authentication, the device will use the SMTP username/passw ord c reated at the configuration of the device to send an
email to the server.
Scan to FTP/SMB:
• The user selects <Scan to FTP/SMB>
• A login/password popup will be displayed to authenticate users with the Kerberos server.
•
The user enters the login and passwo r d.
• The login and password is passed on to the Kerberos serv er and if a match is found the user is successfully authenticated.
• The user needs to enter a valid login and password for the FTP/SMB server. This may or may not be the use r’s Ke rberos login/password,
rather it is a login/password that is accepted by the FTP/SMB server.
Page 8 of 28 701P42081
Network Scanning:
• The user selects <Network Scanning>
• A login/password popup will be displayed to authenticate users with the Kerberos server.
•
User enters the login and password.
•
The login and password is passed on to the Kerberos server and if a match is found the user is successfully authenticated.
• Through the templates/reposito ries, the users will enter a valid login/password for FTP/SMB servers. This may or may not be the user
login/password; rather it is a login/password that is accepted by the FTP/SMB server.
• Public templates are accessible to any user. Private templates require a password that may or may not be different from the Kerberos
password.
Prerequisite
Complete the Network Installation. Refer to Æ General Network Setup
Complete DNS/WINS set up if Host names are provided for the mail servers, rather than IP addresses. Refer to Æ Ad vanced Network Setup