therein are owned by ZIH Corp. and Zebra’s licensors. Unauthorized reproduction of this manual or the software and/
or firmware in the printer may result in imprisonment of up to one year and fines of up to $10,000 (17 U.S.C.506).
Copyright violators may be subject to civil liability.
Zebra, the Zebra head graphic, Link-OS, ZPL, and ZPL IIare trademarks of ZIH Corp., registered in many
jurisdictions worldwide. All rights reserved.
All other brand names, product names, or trademarks belong to their respective holders. For additional trademark
information, please see “Trademarks” on the product CD.
Proprietary Statement This manual contains proprietary information of Zebra Technologies Corporation and its
subsidiaries (“Zebra Technologies”). It is intended solely for the information and use of parties operating and
maintaining the equipment described herein. Such proprietary information may not be used, reproduced, or disclosed
to any other parties for any other purpose without the express, written permission of Zebra Technologies Corporation.
Product Improvements Continuous improvement of products is a policy of Zebra Technologies Corporation.
All specifications and designs are subject to change without notice.
Liability Disclaimer Zebra Technologies Corporation takes steps to ensure that its published Engineering
specifications and manuals are correct; however, errors do occur. Zebra Technologies Corporation reserves the right
to correct any such errors and disclaims liability resulting therefrom.
Limitation of Liability In no event shall Zebra T echnologies Corporation or anyone else involved in the creation,
production, or delivery of the accompanying product (including hardware and software) be liable for any damages
whatsoever (including, without limitation, consequential damages including loss of business profits, business
interruption, or loss of business information) arising out of the use of, the results of use of, or inability to use such
product, even if Zebra Technologies Corporation has been advised of the possibility of such damages. Some
jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation
or exclusion may not apply to you.
This is intended for use by any person who needs to perform routine maintenance, upgrade,
or troubleshoot problems with the printer.
How This Document Is Organized
The is set up as follows:
SectionDescription
Installation on page 9This chapter includes the procedure to install
Profile Manager.
Adding the Zebra Certificate
Authority on page 63
Changing Permissions on page 93This chapter includes the procedure to change
Getting Started Using Profile
Manager on page 97
This chapter includes the procedure to add the
Zebra Certificate Authority to the Trusted Root
Certifications Authorities Store.
permissions to allow the Zebra Certificate
Authority (CA) successfully.
This chapter provides an overview and description
of the steps necessary to set up and begin to use
Profile Manager. For additional details, please see
the help system contained within the Profile
Manager application.
P1065697-002 10/27/14
About This Document
Document Conventions
Document Conventions
The following conventions are used throughout this document to convey certain information.
Alternate Color (online only) Cross-references contain hot links to other sections in this guide. If you are
viewing this guide online in.pdf format, you can click the cross-reference (blue text) to jump directly to its
location.
Command Line Examples Command line examples appear in Courier New font. For example, type
ZTools to get to the Post-Install scripts in the bin directory.
Files and Directories File names and directories appear in Courier New font. For example, the
Zebra<version number>.tar file and the /root directory.
Icons Used
Important • Advises you of information that is essential to complete a task.
7
Note • Indicates neutral or positive information that emphasizes or supplements important
points of the main text.
Example • Provides an example, often a scenario, to better clarify a section of text.
2. Once Java is installed, the JRE_HOME environment variable needs to be set.
Note • The CATALINA_OPTS environment variable change listed here is recommended
based upon a 50 user, 500 printer configuration. As more printers or users are required the
individual memory values may need to be adjusted. Please contact your Reseller for
details on how to do this.
Note • A 64-bit Java Virtual Machine (JVM) is required to support the
CATALINA_OPTS parameters.
a.Open the Control Panel.
b.Select System.
c.See Figure 1. Click on Advanced system settings.
Figure 1 • Control Panel > System
P1065697-002 10/27/14
d.See Figure 2. Click on the Advanced tab.
e.Click on Environment Variables.
Figure 2 • Advanced Tab
Installation
Installation for Windows
13
10/27/14 P1065697-002
Installation
14
Installation for Windows
f.See Figure 3. To create a new environment variable under System variables, click on
New....
Figure 3 • Environment Variables Dialog
P1065697-002 10/27/14
Installation
Installation for Windows
g.See Figure 4. Enter the Variable name and Variable value shown below in the
appropriate boxes.
Note • When entering the variable name and variable value, do not enter surrounding
quotes.
Figure 4 • New System Variable
15
10/27/14 P1065697-002
Installation
16
Installation for Windows
h.See Figure 3. To create a new environment variable under System variables, click on
New....
i.See Figure 5. Enter the Variable name and Variable value in the appropriate boxes.
Variable value should be set to:
-XX:MaxPermSize=512M -Xms512m -Xmx4096m
Note • When entering the variable name and variable value, do not enter surrounding
quotes.
Figure 5 • Setting the CATALINA_OPTS Environment Variable
3. Download the Zebra Link-OS Application Server zip file:
www.zebra.com/profilemanager
4. Extract the Zebra Link-OS Application Server zip file contents to: C:\zebra\linkos
Figure 21 • Locate the Connector Element in the server.xml File
P1065697-002 10/27/14
Installation
Installation for Windows
20. See Figure 22. Paste the contents of the clipboard (copied in step 17) after the line located
in step 19.
Figure 22 • SSL Connector Added to server.xml File
31
10/27/14 P1065697-002
Installation
32
Installation for Windows
a.See Figure 23. Change redirectPort="8443" to redirectPort="443"
(The default value is 443. The redirect port should match the value specified in step
15).
Figure 23 • Change the Redirect Port Attribute
21. Close the Tomcat console window.
P1065697-002 10/27/14
Installation
Installation for Windows
22. See Figure 24. Start the Tomcat server by double-clicking on startup.bat.
Note • This will start the web application. In the future, when your server is rebooted, the
application will not automatically restart.
If you require the application to start automatically when the server is rebooted, you can
use the Windows Task Scheduler to run the startup.bat and shutdown.bat
scripts at the appropriate times. Alternatively, you can use the Tomcat Windows Service
Installer package.
For assistance with this, please contactyour IT organization, or Zebra Development
Services at
DevelopmentServices@zebra.com.
Figure 24 • Tomcat Server Start
33
10/27/14 P1065697-002
Installation
34
Installation for Windows
23. Open the Chrome browser and go to https://localhost/linkos/.
Note • If the port is something other than 443, it must be specified
https://localhost:4443/linkos).
(e.g.,
24. Which browser are you using?
If you are
using
a(n)…
Then…
Chrome
browser
Internet
Explorer
a. See Figure 25. Click on Proceed anyway.
b. To avoid this message in the future, please see Adding the Zebra
Certificate Authority on page 63.
a. See Figure 26. Click on Continue to this website (not
recommended).
b. To avoid this message in the future, please see Adding the Zebra
Certificate Authority on page 63.
Figure 25 • Site Security Certificate for Chrome
P1065697-002 10/27/14
Installation for Windows
Figure 26 • Site Security Certificate for Internet Explorer
Installation
35
10/27/14 P1065697-002
Installation
36
Installation for Windows
25. See Figure 27. Log into the Link-OS Application Server.
Note • The default username is admin and the default password is password.
Figure 27 • Login Screen
26. The first time you log into the Link-OS Application Server, change your password. Go to
User and Settings > Change password.
P1065697-002 10/27/14
Installation for Red Hat Enterprise Linux
Before You Begin
A note about root access: Installing applications, such as Java and Tomcat, require that you
have the proper permissions. Typically, applications like Java and Tomcat modify the
/usr/local or /opt/ directories, and therefore, you must have write and execute
permissions for those directories. T omcat will also require permission to listen on two network
ports. The default ports for HTTP and HTTPS are 80 and 443, respectively. These two ports
typically require root access and the user will need to be given access to run the T omcat server.
For the purposes of this document, it is assumed that the user is either running as root or the
user has the proper permissions to access the operations described below. This document will
provide directions and examples to run as root. For gaining access to a root console or creating
an admin account that has the proper permissions, please see the documentation for your
version of Linux.
1. Install Java JRE version 6. For more details about how to install Java for Linux, go to
Note • The CATALINA_OPTS environment variable change listed here is
recommended based upon a 50 user, 500 printer configuration. As more printers or
users are required the individual memory values may need to be adjusted.
Note • A 64-bit Java Virtual Machine (JVM) is required to support the
CATALINA_OPTS parameters.
Figure 29 • Adding Environment Variables
Installation
39
e.Press CTRL+O and press Enter to save. Press CTRL+X to exit the editor.
f.Restart the Red Hat Enterprise server for these options to take effect.
10/27/14 P1065697-002
Installation
40
Installation for Red Hat Enterprise Linux
g.See Figure 30. Verify that the environment variables are present by typing and
verifying that both commands print the environment variable name and value
env | grep CATALINA_OPTS
env | grep JRE_HOME
Figure 30 • Verify Environment Variables are Set
3. Download the Zebra Link-OS Application Server zip file
www.zebra.com/profilemanager
4. Extract the Zebra Link-OS Application Server zip file contents to:
GeoTrustSSLCA, Aug 5, 2013, trustedCertEntry,
Certificate fingerprint (MD5):
DF:F1:B7:6B:25:8D:BE:73:48:E3:76:68:97:A9:38:71
Figure 34 • Verifying the Certificate Installation
P1065697-002 10/27/14
Installation for Red Hat Enterprise Linux
11. See Figure 35. Copy the zebra.war and linkos.war files from the
/opt/zebra/linkos directory into the
/opt/zebra/linkos/tomcat/webapps directory.
Figure 35 • Result of copying the “zebra.war” and “linkos.war” files
Installation
45
10/27/14 P1065697-002
Installation
46
Installation for Red Hat Enterprise Linux
12. See Figure 36. Change the current directory to /opt/zebra/linkos/tomcat/bin/
and change the permissions of the scripts so that they can be executed.
a.Enter the following command: chmod 744 startup.sh
b.Enter the following command: chmod 744 shutdown.sh
c.Enter the following command: chmod 744 catalina.sh
Figure 36 • Change Script Permissions
P1065697-002 10/27/14
Installation for Red Hat Enterprise Linux
13. See Figure 37. Start the Tomcat server by executing ./startup.sh
Figure 37 • Starting the Tomcat Server
Installation
47
10/27/14 P1065697-002
Installation
48
Installation for Red Hat Enterprise Linux
14. See Figure 38. Verify that Tomcat started correctly by viewing the last 20 lines of the
catalina.out log.
a.To view the latest log entries:
b.Look for the line that starts:
c.CTRL+C exits the tail command.
tail -n20 ../logs/catalina.out
tail -f ../logs/catalina.out
INFO: Server startup in xxxxx ms
Figure 38 • Verifying Tomcat Start
P1065697-002 10/27/14
Installation for Red Hat Enterprise Linux
15. See Figure 39. Configure your firewall by performing the following:
a.At the command prompt, type the following commands:
service iptables save
nano /etc/sysconfig/iptables
Figure 46 • Locate the Connector Element in the server.xml File
P1065697-002 10/27/14
Installation
Installation for Red Hat Enterprise Linux
23. See Figure 47. Paste the contents of the clipboard (copied in step 20) after the line located
in step 22.
Figure 47 • SSL Connector Added to server.xml File
57
10/27/14 P1065697-002
Installation
58
Installation for Red Hat Enterprise Linux
a.See Figure 48. Change redirectPort="8443" to redirectPort="443"
(The default value is 443. The redirect port should match the value specified in step
17).
Figure 48 • Change the Redirect Port Attribute
24. Start the Tomcat server by typing:
./startup.sh
Note • This will start the web application. In the future, when your server is rebooted, the
application will not automatically restart. If you require the application to start
automatically when the server is rebooted, you can configure a System V init script to
execute the startup.sh and shutdown.sh scripts at the appropriate times.
For assistance with this, please contact your IT organization, or Zebra Development
Services at
DevelopmentServices@zebra.com.
P1065697-002 10/27/14
Installation for Red Hat Enterprise Linux
25. Open the Chrome browser and go to https://localhost/linkos/.
Note • If the port is something other than 443, it must be specified
https://localhost:4443/linkos).
(e.g.,
26. Which browser are you using?
Installation
59
If you are
using a…
Chrome
browser
Internet
Explorer
Then…
a. See Figure 49. Click on Proceed anyway.
b. To avoid this message in the future, please see Adding the Zebra
Certificate Authority on page 63.
a. See Figure 50. Click on Continue to this website (not
recommended).
b. To avoid this message in the future, please see Adding the Zebra
Certificate Authority on page 63.
Figure 49 • Site Security Certificate for Chrome
10/27/14 P1065697-002
Installation
60
Installation for Red Hat Enterprise Linux
Figure 50 • Site Security Certificate for Internet Explorer
P1065697-002 10/27/14
Installation for Red Hat Enterprise Linux
27. See Figure 51. Log into the Link-OS Application Server.
Note • The default username is admin and the default password is password.
Figure 51 • Login Screen
Installation
61
28. The first time you log into the Link-OS Application Server, change your password. Go to
These instructions include the steps to add the Zebra Certificate Authority (CA) to the Trusted
Root Certifications Authorities Store. By adding the Zebra CA to the Trusted Root
Certifications Authorities Store, the browser will no longer warn the user that the certificate is
not from a trusted authority. These instructions are not required in order to use Profile
Manager, however, adding the Zebra CA will improve the overall experience with the Profile
Manager application.
Caution • To add the Zebra Certificate Authority (CA) to the Trusted Root Certification
Authorities Store and modify the registry, you must have administrator permissions.
Additionally, some of the screens and steps may differ slightly depending upon the User
Account Control (UAC) level set for your computer, and the version of Windows that
you are using. For questions about your version of Windows, administration
permissions, or UAC, please contact your local IT department for assistance.
Installation
1. Which browser are you using?
If you are installing...Then
ChromeContinue with Installation for Chrome on page 65.
Internet ExplorerGo to Installation for Internet Explorer 10 on page 82.
P1065697-002 10/27/14
Installation for Chrome
1. Click on the lock icon that has the red 'x' in the browser location input bar.
2. See Figure 52. Click on the Connection tab and click on the Certificate Information
link.
Figure 52 • Certificate Information within Chrome Browser
Adding the Zebra Certificate Authority
Installation
65
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
66
Installation
3. See Figure 53. Click on the Certification Path tab.
Figure 53 • Certificate Information
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
4. See Figure 54. Click on zebradevice at the top of the tree and click on View
Certificate.
Figure 54 • Certificate Path
Installation
67
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
68
Installation
5. See Figure 55. The untrusted Zebra certificate will be shown.
Figure 55 • Untrusted CA Root Certificate
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
6. See Figure 56. Click on the Details tab and click Copy to File.
Figure 56 • Zebra CA Certificate Details Tab
Installation
69
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
70
Installation
7. See Figure 57. The Certificate Export Wizard will be shown. Click Next.
Figure 57 • Certificate Export Wizard
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
8. See Figure 58. Select Base-64 encoded X.509 (.CER) and click Next.
Figure 58 • Certificate Export Format
Installation
71
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
72
Installation
9. See Figure 59. Select a destination folder that is easily accessible (e.g., the Desktop).
Enter the name of the certificate: ZebraRootCA.cer
Figure 59 • Certificate Export Destination
10. Click Next.
The Export Success dialog box will appear.
Figure 60 • Export Success Dialog Box
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
11. See Figure 61. Select Finish on the final wizard screen.
Figure 61 • Completing the Certificate Export Wizard
Installation
73
12. Locate the certificate saved in step 9 and step 11. Double-click on it to open it.
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
74
Installation
13. See Figure 62. Click on Install Certificate….
Figure 62 • Install Certificate
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
14. See Figure 63. The Certificate Import Wizard will appear.
Figure 63 • Certificate Import Wizard
Installation
75
15. Click Next.
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
76
Installation
16. See Figure 64. Select Place all certificates in the following store.
Figure 64 • Certificate Import Wizard Destination Store
17. Click Browse.
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
Installation
18. See Figure 65. Click on the Show physical stores and navigate to Trusted Root
Certification Authorities\Local Computer.
Note • See Figure 65. If 'Local Computer' is not shown under the 'Trusted Root
Certification Authorities' entity, please ensure that you have administrator permissions for
the computer on which you are attempting to install the Zebra CA. The User Account
Control (UAC) on some versions of Windows may also prevent you from seeing the
'Local Computer' option. Please contact your local IT department for more information on
administrator permissions and UAC.
Figure 65 • Certificate Import Wizard Store Selection
77
19. Click OK.
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
78
Installation
20. See Figure 66. The certificate store should be updated.
Figure 66 • Certificate Import Wizard Destination Store
21. Click Next.
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
Installation
22. See Figure 67. Click Finish to install the certificate authority to the local computer.
Figure 67 • Completing the Certificate Import Wizard
79
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
80
Installation
23. You will likely be presented with the Security Warning dialog that indicates the certificate
authority origin is unknown. See Figure 68. Click
Authority as a Trusted Certificate Authority.
Yes to install the Zebra Root Certificate
Figure 68 • Agree to Install the Certificate
24. See Figure 69. A dialog box will appear to confim the import’s success.
Figure 69 • Import Successful
25. Close the Chrome browser and open it again for the new certificate permission to take
effect.
26. Return to the Link-OS Profile Manager Application.
27. The lock should no longer have a red 'x' on it. The lock and 'https' portion of the URL
should be green.
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
Installation
28. See Figure 70. Clicking on the lock should indicate that the identity of the site is verified.
Figure 70 • Verification of Certificate Installation
81
If the lock is not green, it is likely that you do not have permissions to allow the Zebra Root
CA. To change your permissions to allow a new certificate authority, see
Changing
Permissions on page 93.
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
82
Installation
Installation for Internet Explorer 10
1. Click on the Certificate error text in the browser location input bar.
2. See Figure 71. Click on the View Certificates link in the dialog box.
Figure 71 • Certificate Information within Internet Explorer
P1065697-002 10/27/14
3. See Figure 72. Click on the Certification Path tab.
Figure 72 • Certificate Information
Adding the Zebra Certificate Authority
Installation
83
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
84
Installation
4. See Figure 73. Click on zebradevice at the top of the tree and click on View
Certificate.
Figure 73 • Certificate Path
The untrusted Zebra certificate will be shown.
P1065697-002 10/27/14
5. See Figure 74. Click on Install Certificate….
Figure 74 • Install Certificate
Adding the Zebra Certificate Authority
Installation
85
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
86
Installation
6. See Figure 75. The Certificate Import Wizard will appear.
Figure 75 • Certificate Import Wizard
7. Click Next.
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
8. See Figure 76. Select Place all certificates in the following store.
Figure 76 • Certificate Import Wizard Destination Store
Installation
87
9. Click Browse.
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
88
Installation
10. See Figure 77. Click on the Show physical stores and navigate to Trusted Root
Certification Authorities\Local Computer.
Note • See Figure 77. If 'Local Computer' is not shown under the 'Trusted Root
Certification Authorities' entity, please ensure that you have administrator permissions for
the computer on which you are attempting to install the Zebra CA. The User Account
Control (UAC) on some versions of Windows may also prevent you from seeing the
'Local Computer' option. Please contact your local IT department for more information on
administrator permissions and UAC.
Figure 77 • Certificate Import Wizard Store Selection
11. Click OK.
12. See Figure 78. The certificate store should be updated.
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
Figure 78 • Certificate Import Wizard Destination Store
Installation
89
13. Click Next.
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
90
Installation
14. See Figure 79. Click Finish to install the certificate authority to the local computer.
Figure 79 • Completing the Certificate Import Wizard
P1065697-002 10/27/14
Adding the Zebra Certificate Authority
Installation
15. You will likely be presented with the Security Warning dialog that indicates the certificate
authority origin is unknown. See Figure 80. Click
Yes to install the Zebra Root Certificate
Authority as a Trusted Certificate Authority.
Figure 80 • Agree to Install the Certificate
91
10/27/14 P1065697-002
Adding the Zebra Certificate Authority
92
Installation
16. See Figure 81. A dialog box will appear to confim the import’s success.
17. Close the Internet Explorer browser and open it again for the new certificate permission to
take effect.
18. Return to the Link-OS Profile Manager Application.
The certificate errors should be resolved and the address bar should be green indicating
that the site is trusted.
Figure 81 • Import Successful
19. See Figure 82. Clicking on the lock should indicate that the identity of the site is verified.
Figure 82 • Verification of Certificate Installation
If the address bar is not green, it is likely that you do not have permissions to allow the Zebra
Root CA. To change your permissions to allow a new certificate authority, see
Changing
Permissions on page 93.
P1065697-002 10/27/14
Changing Permissions
This chapter includes the procedure to change permissions to allow the Zebra Certificate
Authority (CA) successfully.
Contents
Changing Permissions to Allow a New Certificate Authority . . . . . . . . . . . . . . . . . . . . 94
10/27/14 P1065697-002
Changing Permissions
94
Changing Permissions to Allow a New Certificate Authority
Changing Permissions to Allow a New Certificate
Authority
If you encountered difficulties when importing the Zebra CA, you may need to change your
permissions to store the CA successfully.
Follow these steps to change your permissions:
1. See Figure 83. Click on the Windows Logo in the bottom left corner of your screen and
regedit.
type
Figure 83 • Command to Edit the Windows Registry
P1065697-002 10/27/14
Changing Permissions
Changing Permissions to Allow a New Certificate Authority
11. Right-click on Protected Roots and select 'Permissions….
12. Select the local user and uncheck Allow permission of Full Control.
13. Click Apply and then, click OK.
14. Close the Registry Editor.
P1065697-002 10/27/14
Getting Started Using Profile
Manager
This chapter provides an overview and description of the steps necessary to set up and begin to
use Profile Manager. For additional details, please see the help system contained within the
Profile Manager application.
After you have completed installation, open Profile Manager. Profile Manager opens to the
Devices page.
To set up Profile Manager, follow these steps:
1. Add Your Devices on page 98.
2. Set Tags on page 98.
3. Create Base Profile on page 99.
4. Deploy Profile to Printers on page 99.
1. Add Y our Devices
Profile Manager automatically detects all the devices on your network. Begin by adding the
devices you want to manage.
a. In the Devices tab, click +Add Device.
b. In the Add Device field, add your printers by performing ONE of the following:
c. Click Apply to add the printer.
You can manage your devices individually, or you can filter or group them by status, models,
printer types, or media types.
2. Set Tags
Group printers by creating Tags, and adding printers to each Tag.
Begin by creating a Tag to group your devices.
a. On the Tags tab, select +Add Tag.
b. Enter Tag Name and Tag Description.
c. Click Create Tag.
After you create a Tag, go to the Devices tab to associate one or more devices with your Tag.
a. On the Devices tab, select the device you want to associate with your Tag.
b. On the Tags bar on your left, click the Edit link.
c. Click on the tags that you want to assign to the device.
•Select the device from the ones shown.
•Enter the device name, IP address, or device description.
•Click
A new dialog box will appear and show all the tags in the system.
View Configured Printers… and select the device from those shown.
P1065697-002 10/27/14
3. Create Base Profile
Copy a printer’s “personality profile” and store it for use later to copy to other printers.
a. On the Profiles tab, click +Create Profile.
b. On the Filter Devices screen, select a printer and click Create Profile.
The profile will be copied and stored for later use.
4. Deploy Profile to Printers
Set up multiple printers at the same time by copying the Base Profile that you set up and
sending it out to other printers. Apply these clone files to new printers as needed.
a. On the Profiles tab, click on the device whose profile you want to send out to other
devices.
b. Click Send Profile To…
A list of all your devices will appear.
c. Select the device you want to receive this profile.
d. Click Apply Profile.