Без кейворда
The machine notifies you of the machine condition or status of an application with the (Check Status] indicator or a message displayed on the control panel. Check the status and resolve the problem accordingly.
- MessageDisplays a message indicating the status of the machine or application. Press the message to display it in full text. You can also view more than one message as a list.
- [Check Status) indicatorlf there is a problem such as a paper jam, the (Check Status] indicator lights up or flashes along with a message displayed on the screen, Press (Check Status) to check the status of the machine or application, and resolve the problem accordingly.When an Icon is Displayed with a Message When you need to resolve a problem such as a paper jam, an icon is displayed at the beginning of a message. See the table below for the meaning of each icon.
When the [Check Status] Indicator is lit or flashingThe [Check Status] indicator notifies the user when the machine requires immediate attention,Flashing in redThe machine is unavailable for use. Press [Check Status] and resolve the problem as soon as possible.
Flashing in yellowMaintenance on the machine needs to be performed soon. Perform the required procedure accordingly.You can display the status confirmation screen with [Check Status]. On the screen, check the detailed status of the machine or application.
- Press [Check Status].
- 2. Press [Check] to check the details, and perform the required procedure.When an Icon is Displayed with a Message : The machine cannot be used, : Some of the functions cannot be used, or the toner is almost depleted.
- Depending on the machine condition, such as a paper jam or open cover, the status confirmation screen may be displayed automatically without pressing [Check Status]. Section Top
- Download the collected logs from the internal storage on the machine converting into a CSV file,
- Use Web Image Monitor to download the collected logs, You can also use a log collect server instead of Web Image Monitor.
- Contact your sales representative for details about a log collect server.
Log TypesThe machine stores three types of logs as follows:Job log
- User file-related operations such as copying, storing in the Document Server, printing, sending faxes, and sending scan files
- Printing reports such as the configuration list output from the control panel |
- Authentications such as login and logout activities
- Stored file operations such as creating, editing, and deleting
- Customer engineer operations such as internal storage formatting
- System operations such as viewing log transfer results
- Security operations such as specifying settings for encryption, unprivileged access detection, user lockout, and firmware authentication
- Main power ON and OFF
- Transitions in power status
- Job run times or time interval between jobs
- Paper consumption per hour
- Power consumption of the machine
Specifying Logs to CollectSpecify the types and items of logs to collect.Specifying logs to collect using the control panel
- Log in to the machine as the machine administrator on the control panel.Logging in to the Machine as an AdministratorWhen custonrprivileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- On the Home screen, press [Settings].
- Press [System Settings].
- Press [Settings for Administrator] > [Data Management] » [Collect Logs Settings].
- For each log type, select [Active] from the list.
- Press [OK].
- Press [Home] ( ).
- When the confirmation dialog is displayed, press [Exit] The machine restarts automatically,
- Log in to the machine as the machine administrator from Web image Monitor.Logging in to the Machine as an AdministratorWhen custoneprivileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- Click [Configuration] on the [Device Management] menu.
- On the “Configuration” screen, click [Logs] in the “Device Settings” category,
- Select [Active] of “Collect Job Logs”, “Collect Access Logs”, or “Collect Ecos! friendly Logs” according to the log type to collect.
- Specify the items to record in each log for “Job Log Collect Level”, “AccessLog Collect Level”, or “Eco-friendly Log Collect Level”.Job Log Collect Level• Level 1: All job logs are collected,Access Log Collect Level• Level 1: The following items are recorded in the access log.Internal Storage Format, All Logs Deletion, Log Setting Change, and Log Collection Item Changs• Level 2: All access logs are collected.Eco-friendly Log Collect Level• Level 1: Eco-friendly Logs are not collected.• Level 2: All eco-friendly logs are collected,When a level is changed, the selection status of log details changes according to the level. You can change the settings of some of the items whether to collect or not.
- Click [OK>.
- “Updating…” appears. Wait for about one or two minutes, and then click [OK].If nothing appears on the screen after you click [OK], wait for a while, and then refresh the web browser screen.
- Log out of the machine, and then exit the Web browser.
- When you changed Active/Inactive of Log Collect, delete all logs. Deleting Ail Logs
Job Log lnformation Items
Access Log Information Items
- There is no “Login” log made for SNMPv3.
- If the internal storage is formatted, all the log entries up to the time of the format are deleted and a log entry indicating the completion of the format is made.
- Access Violation indicates the system has experienced frequent remote DoS attacks involving logon attempts through user authentication.
- The first log created after the power is turned on is the “Firmware: Structure” log.
Section TopEco-friendly Log Information Items
Downloading the LogsYou can download the logs recorded on the machine as a CSV file,
- Log in to the machine as the machine administrator from Web Image Monitor.Logging in to the Machine as an Administrator
- Click [Configuration] on the [Device Management] menu.
- On the “Configuration” screen, click [Download Logs] in the “Device Settings” category.
- Select the log type on “Logs to Download”, and then click [Download].• The downloaded log files are stored in the “Download” folder.• Security Logs: Downloads both job logs and access logs into a single file.• Security Logs (Job Log): Downloads job logs only.• Security Logs (Access Log): Downloads access logs only.• Eco-friendly Logs: Downloads eco-friendly logs only.
- Log out of the machine, and then exit the Web browser.
Number of logs that can be kept on the machine
Maximum numbers of logs that can be stored in the machine are as follows:
- If the number of logs that can be stored on the machine exceeds the limit and new logs are generated, old logs are overwritten by new ones. If logs are not downloaded periodically, it may not be possible to record the old logs onto files.
- The example below shows when the number of stored logs exceeds the maximum and old logs are overwritten.When the oldest two access logs are overwritten by the newest two access logs, the downloaded logs lack the log IDs.
- Check the message in the last line of the downloaded logs to determine whether overwriting occurs or not while the logs were downloading. The messages are shown below:
- When overwriting did not occur:Download completed.
- When overwriting occurred:Download completed.Apart of the logs before Log ID XXXX does not exist anymore. (The logs before “Log ID XXXX” are deleted.)
Order of printer job log and access log
Print log entries are recorded before the login entry is recorded in the access log. Details of jobs (reception, processing, output of the jobs’ data, and so on) are recorded as single entries. When the machine receives a print job, it creates a log ID for the job and records information about data reception in the job log. (1)The machine then creates a log ID for the authentication information and records it in the access log of login. (2)Log related to job data processing is added in the job log created first. (3)In the end, it creates a log ID for logout entry and records it in the access log. (4)In the result, when downloading job log, access log of login, and access log of logout, they are aligned in this order,
Deleting All LogsYou can delete all logs recorded on the machine,[Delete All Logs] appears when one of the job log. access log, or eco-friendly log is set to [Active].
- Log in to the machine as the machine administrator on the control panel.Logging in to the Machine as an AdministratorWhen customsprivileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- On the Home screen, press [Settings].
- Press [System Settings].
- Press [Settings for Administrator] » (Data Management] » [Delete All Logs].
- When the confirmation dialog is displayed, press [Yes].
- When the confirmation dialog is displayed, press [Exit].
- Press [Home) , and then log out of the machine,
- Log in to the machine as the machine administrator from Web Image Monitor.Logging in to the Machine as an AdministratorWhen custome-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- Click [Configuration] on the [Device Management] menu.
- On the “Configuration” screen, click [Logs] in the “Device Settings” category.
- Click [Delete] of “Delete All Logs”, and then click (OK),
- Log out of the machine, and then exit the Web browser,
Disabling Log Transfer to the Log Collection ServerDisabling log transfer to the log collection server using the control panel
- Log in to the machine as the machine administrator on the control panel.Logging in to the Machine as an AdministratorWhen customsprivileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- On the Home screen, press [Settings].
- Press [System Settings].
- Press [Settings for Administrator] > [Data Management] © [Transfer Log Setting).
- From the list next to Transfer Log Setting, select [Do not Forward].
- Press [OK].
- When the confirmation dialog is displayed, press (OK).
- Press [Home] , and then log out of the machine.
- Log in to the machine as the machine administrator from Web image Monitor.Logging in to the Machine as an AdministratorWhen custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- Click [Configuration] on the [Device Management] menu.
- On the “Configuration” screen, click [Logs] In the “Device Settings” category.
- Under “Common Settings for All Logs”, select [Inactive] of “Transfer Logs”, and then click [OK].
- Log out of the machine, and then exit the Web browser.
Confirming Log Files | Specifying Menu Protect
Top Page > Settings > System Settings Items > Date/Time/Timer Machine Sound
Date/Time/TimerThis section describes the settings in [Date/Time/Timer] under [System Settings].How to Use the “Settings”
Date/Time
Timer
Top Page > Introduction and Basic Operations > User Authentication > Logging in to Web Image MonitorRegistering the User Code in the Address…Confirming the Available Functions
Logging in to Web Image Monitor- Launch the Web browser,
- Enter “http:/((IP address of the machine or host name)/” on the address bar of the Web browser, and then press the Enter key,
- Click [Login].
- Enter the login user name and password, and then click [Login].
When [User Code Authentication] is specified on the machine for user authentication, enter the user code in [Login User Name], and then click [Login].
- Ask the administrator for the Login user name and Login password.
- When a time during which users can operate the machine is specified in [Time Settings Allowing Operating Machine by Logging in], you cannot login to the machine outside of that specified time.
Section TopChanging the Login Password by Using Web Image Monitor
Only the administrator can change the user code. To change the user code, log in to Web Image Monitor as an administrator.
- Launch the Web browser.
- Enter “http://(IP address of the machine or host name)/” on the address bar of the Web browser, and then press the Enter key,
- Click [Login].
- Enter the login user name and password, and then click [Login].
- Click [Address Book] on the [Device Management] menu.
- Select the user for whom to change the login password.
- Click [Change].
- Click [Change] in “Login Password” of “Authentication Information”.
- Enter the new password in [New Password], and then re-enter the password in [Confirm Password].
- Click [OK] three times.
You can scan an original and send it to a fax device at the destination via the telephone line orInternet. The machine is capable of sending a fax using the following methods:Communication methods
- G3 faxThe specifications for standard fax machines that use an analog telephone line. To send a fax, enter the fax number (telephone number) of the destination device such as an MFP or telephone with the fax function.
- IP-FaxSpecify the IP address or host name of the supporting device to send a fax over an IP network (intranet).
- Internet FaxA fax is sent via the Internet relayed by an e-mail server. Specify an e-mail address to send the fax to a supporting device or computer.
- You can send a document to the machine directly and send it by fax without printing it. Sending Faxes from a Computer
- By using an MFP with the fax function, you can send a fax from an MFP that does not have a fax function.Overview of the Remote Fax Function .
The machine scans the document to send on the exposure glass or in the auto document feeder (ADF). The machine stores the scanned data in the memory and then sends it (Memory Transmission). When using Memory Transmission, you can use various usefulfunctions such as redialing and broadcast transmission.
- Immediate Transmission is useful when you want to send a fax while confirming that it is received at the destination properly. You can use this feature when using G3 fax or IP- Fax.Sending a Fax While Scanning the Original
- Use the machine’s fax functions to reduce the communication time and cost and enhance security as needed,
- For details about the advantages of the transmission methods and Memory Transmission, see the following:
G3 faxA fax is sent over a public telephone line to the destination. Specify the fax number (telephone number) of the destination, You can use this function to send and receive faxes between the machine and a device that does not support IP-Fax or Internet Fax. Basic Procedure for Transmitting Faxes
- Connect an external telephone to talk to a person at the destination.
- Call charges are incurred depending on the telephone service contract and the distance to the destination.
Section TopIP-FaxDocuments are sent and received between devices that support IP-Fax, Connect the devices via an IP network (a network that uses TCP/IP as the communication protocol) to send documents. Specify the destination by entering the IP address, host name or Own Fax No.according to the connection environment. You can use this function to send and receive faxes between the machine and an other manufacturer’s device that supports IP-Fax,
- You can reduce communication costs because no call charges are incurred.
- You can communicate faster over an IP network compared to an analog phone line. Also, it does not require an e-mail server to relay the message, so you can send and receive documents without any delay.
- This function is suitable for communicating between devices in the same local area network such as your company intranet,
- You can send a fax to a G3 fax by relaying the communication from the machine through a VoIP gateway to a public telephone line.
- IP-Fax supported by this machine is ITU-T Recommendation T.38 compliant.
- To send to a G3 fax via a gateway connected to a public telephone line, you must specify it’s the receiver’s machine telephone number, For example, if the receiver’s fax number is “0312345678”, specify “5678”, To send from an |P-Fax to G3 fax without using gatekeeper or SIP server, you must register the gateway also.
- An alias telephone number is a number that is registered in the gatekeeper, and is available only in the network to which the gatekeeper is connected.
- Pay attention to the number of telephone number digits set in the gateway/IP address conversion table to avoid transmission error.
- Although the machine can have multiple IP addresses in an IPv6 environment, only one address can receive [P-Faxes,
Section TopIntemet FaxDocuments are sent and received via an Internet connection between devices that support Intemet Fax. When sending a fax, specify the destination by entering its e-mail address. The document is sent as an attachment in an e-mail. You can use this function to send and teceive faxes between the machine and an other manufacturer’s device that supports Internet Fax, Preparing the Machine for Sending and Receiving Documents by Internet Fax
- Using this function, you can also send a fax to a computer,
- No call charges are incurred, and you can reduce communication costs especially when sending a fax to a destination in a remote location.
- You can apply encryption and attach a digital signature to send the e-mail more safely and securely.Applying Encryption and Using a Signature for Enhanced Security When Sending an Internet Fax
- The Internet Fax function of the machine allows you to:
- Receive a reception confirmation from the destination of an Internet Fax. You can also obtain the performance details of the destination device and send a fax to the same destination using the send settings that are optimized for the destination device, Confirming the Reception of an Internet Fax at the Destination
- You can send a broadcast transmission by Internet Fax to a destination specified in the Bcc field instead of the To field. Sending a Document by Internet Fax to a Destination Specified in the Bcc Field
- You can specify the destination domain directly when sending an Internet Fax, This shortens the time required to go through the SMTP server and reduces the load on the server as well.
Sending Internet Faxes without Using SMTP Server
Section TopAdvantages of Memory TransmissionThe machine stores the scanned original in the memory temporarily and then sends it. This is convenient when sending a large number of originals, because you can start dialing and sending without waiting for all the originals to be scanned (Parallel Memory Transmission), Basic Procedure for Transmitting FaxesYou can use the following useful features when sending a fax:
- The machine automatically tries redialing at five-minute intervals when the line at the destination is busy or a transmission error occurs, You can change the number of times to redial in [Fax Settings] [Send Settings] [Number of Resends Settings].Send Settings
- You can scan another original while the machine is sending or receiving a fax or printing a report, so that you can send the next fax immediately.
- You can send the same fax to more than one destination after scanning the original one time (Broadcast transmission).
- You can scan the original and then send it later at a specified time.Sending a Fax at a Specified Time
- The machine displays a warning message when sending a fax to more than one destination.Preventing a Fax Transmission to the Wrong Destination
Memory Transmission and Parallel Memory Transmission
- Afax is sent by Memory Transmission in the following cases:
- The destination line was busy and could not be connected
- The machine was communicating with another destination
- An original was placed on the exposure glass when sending a fax
- More than one destination was specified
- The time for transmission was specified
- [Preview] was specified
- Afax may be sent in normal memory transmission if the remaining amount of memory is low, The remaining amount of memory at which the machine switches to normal memory transmission varies according to whether the optional fax memory unit is attached to the machine.
- Transmission is terminated and the Communication Result Report is printed when you press [Stop], the original is jammed, or the remaining amount of memory becomes low. The stored document is deleted.
- You can specify not to use Parallel Memory Transmission and to store all documents in the memory before sending.List of Parameter Settings
- On both sides of the control panel, interfaces for connecting external devices and slots to insert an USB flash memory device are provided.
- Even when the screen is turned off, the LED indicators on the frame of the control panel show the status of the machine.
Touch Panel/Interface
1, Media slotsInsert an USB flash memory device, You can store the scanned data or print the file stored on the media,
- Use the media formatted in FAT16 or FAT32.
- Certain types of USB flash memory devices cannot be used in the machine.
- AUSB extension cable, hub, or card reader cannot be used.
- If the power of the machine is turned off or the media is removed from the machine while the machine is reading the data in the media, check the data in the media.
- Before removing the media from the slot, press the icon displayed on the screen ( to cancel the connection,
- Do not change the write protection switch of the USB flash memory device while the USB flash memory device is inserted.
2. Touch PanelDisplays the Home screen, operation screen of applications, and messages. Operate with the fingertips.How to Use the Home ScreenIntuitive Screen Operation Using Fingertips3. Touch markUsed to connect the machine and a smart device with the RICOH Smart Device Connector,Using the Machine Functions from a Mobile DeviceLogging In Using a Mobile Device
- Fax indicatorIndicates the status of the fax function.Flashing: transmitting and receiving dataLit: receiving data (Substitute RX File/Memory Lock Reception/Personal Box)
- Data In indicatorFlashes when the machine is receiving data sent from the printer driver or LAN-Fax driver,
- Status indicatorIndicates the status of the system, Stays lit when an error occurs or toner runs out.Checking the Indicators, Icons, and Messages on the Control Panel
- Main power indicatorThe main power indicator lights up when you turn on the main power switch. In Sleep mode, it flickers slowly.
This section describes the settings in [Reception Settings] under [Fax Settings].How to Use the “Settings”Reception File Settings
Reception Mode Settings
Register Special Sender
Specifying the Action to Perform When Receiving a Fax from Different Senders Preventing Unwanted Faxes
Receiving Faxes to Personal BoxesTransferring Received Fax Documents to Another Fax Destination
Remote Reception Setting per LineThis setting item is displayed when a fax connection unit is installed on the machine.
Maximum Reception Size
Trays for Paper Tray Selection
Top Page > Introduction and Basic Operations > User Authentication > Registering a User in the Address Book and Specifying the Login Information Logging In from the Control Panel Registering the User Code in the Address…Registering a User in the Address Book and Specifying the Login InformationWhen “Basic Authentication” is specified on the machine as the User Authentication, specify the login user name and password for each user who uses the machine.
- Press [Address Book] on the Home screen.
- On the Address Book screen, press [Register] and enter the user name.
- Press the [User Management / Other] tab » (User Management].
- Enter the login information.
- Enter the Login User Name.
- Enter the password in (Login Password], and then re-enter the password in [Confirm Login Password] for confirmation.
- Press[OK
- Press (LDAP Authentication Info).
- Select [Specify Other Authentication Information] in “LDAP Authentication Info”, and then enter the Login User Name and Login Password to access the LDAP Server,Resenter the password in [Confirm Login Password]. Ask the administrator of the LOAP server for the Login user name and Login password,When you select an item other than (Specify Other Authentication Information] in “LDAP Authentication Info”, the login user name and login password specified in [Register/Change/Delete LDAP Server> are enabled.(System Settings] > [Settings for Administrator] ® [Authentication/Charge] > [Administrator Authentication/User Authentication/App Auth.)
- Press [OK].
- Press (OK),
- After completing the procedure, press [Home] .
- When a message prompting you to back up the address book appears on the screen, press [Go to Backup] to back up the address book,
- Ifa message prompting you to contact the administrator to back up the address book appears on the screen, ask the administrator to back up the address book.
- If you select [Close], you can close the address book without backing up and go back to the Home screen.
Making a Backup or Restoring the Address Book
Registering/Changing/Deleting Fax Numbers in the Address Book- Press [Address Book] on the Home screen.
- Press [Register] on the Address Book screen.
- Enter the information of the destination on the [Name] tab, and then select a title to classify it,
- Press [Destinations] tab > [Fax],
- Specify the Fax Destinations and send conditions. • Select Line: Select the line to use,• Fax Destination: Register the fax destination.• International Transmission Mode: Specify whether to reduce errors occurring when sending abroad.• Fax Header: Select the name of the sender printed on the reception sheet of the destination, Register the fax header in advance, Printing the Destination Name, Fax Header, and Standard Message on the Fax Received at the Destination• Labat Insertion: Specify the name (title + name) and fixed phrase printed on the reception sheet of the destination.Printing the Destination Name, Fax Header, and Standard Message on the Fax Received at the Destination• Advanced Feature: Register SUB code or SEP code.
- Press the [User Management / Other] tab as necessary, and specify the settings.• User Management: Enter the authentication information to login and use the machine,• Add to Group: Select a group to which this destination belongs as necessary.Register the group in advance.Registering/Changing/Deleting Groups in the Address Book• Display Priority: When the destinations are sorted in the order of priority, a destination with higher priority is displayed prior to that with lower priority, The destinations with the same priority are displayed in the order of registration.• Destination Protection: Select this check box to require entering of the protection code to select the destination,Using the Protection Function to Prevent the Misuse of Addresses
- Press [OK].
- After completing the procedure, press [Home] .
- When a message prompting you to back up the address book appears on the screen, press (Go to Backup] to back up the address book.• If a message prompting you to contact the administrator to back up the address book appears on the screen, ask the administrator to back up the address book, If you select [Close], you can close the address book without backing up and go back to the Home screen,Making a Backup or Restoring the Address Book
Changing/Deleting the Registered Data Such as Fax NumberIf you delete the destination used for the personal box, file transmission will fail. Exclude the destination from the personal box before deleting it,Receiving Faxes to Personal Boxes
- Press [Address Book] on the Home screen,
- Select the destination to change or delete on the Address Book screen.You can delete multiple destinations at one time.
- Press [Edit] or (Delete> to change or delete the destination information,
- When changing or deleting is complete, press [Home] .
- When a message prompting you to back up the address book appears on the screen, press [Go to Backup] to back up the address book,
- If a message prompting you to contact the administrator to back up the address book appears on the screen, ask the administrator to back up the address book, If you select [Close], you can close the address book without backing up and go back to the Home screen,
How to Use the Address Book Registering Destinations in the Address Book from the Fax Screen
Settings for AdministratorThis section describes the settings in [Settings for Administrator] under (System Settings>.How to Use the “Settings”Security Pattem/Stamp
Data Managment
File Managment
Security
Specifying the Extended Security FunctionsThis section describes settings displayed in [Extended Security Settings]. You can encrypt transmitted data and data in the Address Book. An administrator who can changes the settings depends on the setting item.
Remote Panel Operation
Function Restriction
Authentication/ChargeAdministrator Authentication/User Authentication/App Auth.
Print Volume Use Limitation External Charge Unit ManagementAuto Firmware Update
Specifying Access Privileges for Documents Saved in Document ServerYou can specify access privileges (authority to read or edit a document) for documents saved in the document server so as to prevent unauthorized use, Only the user who has access privileges can perform operations on the document within his/her privileges.
- Register the users to whom you want to grant access privileges in the address book in advance.Registering a User in the Address Book and Specifying the Login Information
- The user who saved the document, the file administrator, or a custom-privileges administrator who has privileges equal to the file administrator can specify the access privileges, For details about the file administrator and custom-privileges administrator, see the following section:Registering Standard-Privileges AdministratorsRegistering Custom-Privileges Administrators
- In advance, specify user authentication in the machine. To protect a document when user authentication is not specified, specify a password on the document when saving.
- On the Home screen, press [Document Server].
- On the document server screen, press [Edit Folder/File].
- Press [Open]. Press [Search Folder] to search for a folder by folder name or number,If you select a password-protected folder, enter the password, and then press [OK].
- Select the document to specify the access privileges, and then press [Access Privileges].
- Press [Add].
- Select the user to grant access privileges, and then press [OK].
- Select the user to grant access privileges, and then press [Change Privilege].* To grant access privileges to all users, check [All Users].To grant access privileges to individual users, make sure that [All Users] is unchecked, and then check the individual users. You can also check multiple users at the same time.
- Select a level of access privileges for the user.The contents of the access privileges are as follows:No Privilege: Not able to read or edit the document. You can select this when you check [All Users].Read-only: Authorized to read and print the document,Edit: The privileges of [Read-only], and authorized to change the printer settings.Edit/Delete: The privileges of [Edit], and authorized to delete the document.Full Control: The privileges of [Edit/Delete], and authorized to specify the access privileges.
- Press [OK] » [Close].
- Enter the IP address of the machine in the address bar of the Web browser. You can check the IP address of the machine in by accessing [Network] in Check Status.Example: when the IP address of the machine is “192,168.1.10”If SSL is specified https://192.168.1.10/If SSLis not specified http://192.168.1.10/When you do not know whether SSL is specified on the machine, enter the address starting with https. When you fail the connection, enter the address starting with http.When entering the IPv4 address, do not enter “0” for each segment. If “192.168.001.010” is entered, you cannot access the machine.
- Confirming the machine status or settings on the top page of Web Image Monitor.
The machine status and remaining amount of consumables are displayed.You can access Web Image Monitor more quickly by registering the machine’s URL as a bookmark. Note that the URL you register must be the URL of the top page, which is the page that appears before login. If you register the URL of a page that appears after login, Web Image Monitor will not open properly from the bookmark.To change the settings, click [Login] at the top right on the screen and enter the User Name and Password.
Operating or Configuring the Machine from Computer (Web Image Monitor)Web Image Monitor is a tool that can check the machine status and configure machine settings from your computer.If the machine and your computer are ready to connect to the network, you can access Web Image Monitor just by entering the IP address or host name of the machine in the address bar of your web browser,The settings that can be set by using the control panel can also be set by using the Web Image Monitor, except for some functions.For example, you can also view documents on the document server by using your computer. As mentioned above, it is recommended that you use Web Image Monitor if you want to operate the machine from your own desk.Also, downloading of documents on the document server can be performed only by using Web Image Monitor. Useful functions available by using Web Image MonitorTo check the help of Web Image Monitor, see to the procedure below.Specifying Web Image Monitor HelpRecommended functions for administrators
Recommended functions for userTo use the functions below, users must be registered to the machine and logged in to Web Image Monitor.
Recommended Web Browser
You can use the screen reader software JAWS 2018.0 or later on Windows 10 and JAWS 2021 or later on Windows 11.
When a Message Appears and the Machine Cannot Be Operated- If the message persists even after you have performed the operations as instructed in the following message, a malfunction may temporarily occur on the machine. Turn off the power of the machine, wait for 10 seconds or more after confirming that the main power indicator is turned off, and then turn on the power,• “Cover Open”• “Add Toner”• “Waste Toner Bottle is full.”• “Original(s) left on exposure glass.”• “No paper.”
Turning On and Off the PowerWhen Messages Appear | When a Message Appears While Using the Copy Function
Access ControlThe administrator can limit devices or protocols that can be connected to the machine to avoid unintended access,Also, the administrator can select a security level at which to enable or disable a protocol and to configure the port status,Limiting machine access (access control)You can limit the IP addresses from which devices can access the machine or limit machine access with a firewall.For example, when specifying the range of IP address from “192.168.15.1” to “192,168,15,99”, the machine cannot be accessed from IP addresses in the range from 192.168.15.100 to 255, Disabling unused protocolsThe protocol setting can be changed on the control panel, in Web Image Monitor, or by using other setting methods. The protocols that can be configured vary depending on the method.Confirm the protocol to configure in Protocol Setting Method List and follow the instruction, Limiting Machine AccessLimiting the IP addresses from which devices can access the machine
Specify the range of the IP address that can access the machine.
- You can limit access from the following protocols.LPR, RCP/RSH, FTP, Bonjour, WSD (Device), WSD (Printer), IPP, DIPRINT, SNMP, telnet, NBT
- The machine also limits access from Web Image Monitor.
- Log in to the machine as the network administrator from Web Image Monitor.Logging in to the Machine as an Administrator
- Click [Configuration] on the [Device Management] menu.
- Click [Access Control] in the “Security” category.
- In “Access Control Range”, click [Active] and specify the range of IP addresses that have access to the machine,• To specify an IPv4 address, enter a range that has access to the machine i [Access Control Range].• To specify an IPv6 address, select [Range] or [Mask] in “Access Contro Range”, and then enter a range that has access to the machine.• To allow guest users to print directly via Wi-Fi using smart devices, selec [Active] for “Access Control for Direct Connection (Group Owner Mode Only)”.
- Click [OK].
- Log out of the machine, and then exit the Web browser,
Limiting machine access with a firewall
You can block machine access and then allow access only from/to the IP addresses specified in reception/transmission filters, Specify sets of an IP address, a port number, and a protocol as filters. You can configure up to five filters each for reception andtransmission,
- Log in to the machine as the network administrator from Web knage Monitor.Logging in to the Machine as an Administrator
- Click [Configuration] on the [Device Management] menu,
- Click [Access Control] in the “Security” category.
- In Access Control Range, click [Active (Firewall)) and specify reception and transmission filters.Specify the following for each reception/transmission filter.• IPv4• Remote IP Address: Enter source IP addresses from which to allow incoming communications, To allow incoming communications from all IP addresses, select • Local Port Number: Enter a port number on the machine through which to allow incoming communications. To allow incoming communications to all ports, select [All].• Protocol: Select a protocol in which to allow communications,• IPv4/Pv6 transmission filter• Remote IP Address: Enter destination IP addresses to which to allow autgoing communications, To allow outgoing access to all IP addresses, select [All].• Remote Port Number: Enter port numbers to which to allow outgoing communications. To allow outgoing communications to all ports, select [All].• Protocol: Select a protocol in which to allow communications,
- Click [OK],
- Log out of the machine, and then exit the Web browser,
- When filters are not configured properly, access to the machine is not possible. In such a case, specify [Inactive] for [System Settings] [Settings for Administrator> [Security] [Access Control Function] on the control panel.
Protocol Setting Method ListYou can view the protocol setting methods in the following list:
- 1: Control Panel 2: Web Image Monitor 3: telnet 4: Device Manager NX 5: Remote Communication Gate S
- For details about the telnet command, see “Device Monitoring (TELNET)” on our website.
- For details about the settings in Device Manager NX or Remote Communication Gate S, see the user’s manual of each tool.
- Log in to the machine as the machine administrator on the control panel.Logging in to the Machine as an AdministratorWhen custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Network/interface privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- On the Home screen, press [Settings].
- Press [System Settings).
- Press [Network/Interface] > [Effective Protocol].
- From the list next to each unused protocol, select [Inactive].
- Press [OK].
- Press [Home] (a), and then log out of the machine,
- Log in to the machine as the network administrator from Web Image Monitor,Logging in to the Machine as an AdministratorWhen custom-privileges administrators are registered, you can log in to the machine as a customeprivileges administrator with the Security privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- Click [Configuration] on the [Device Management] menu.
- Click [Network Security] in the “Security” category.
- Specify protocols to disable or port numbers to close.
- Click [OK].
- Log out of the machine, and then exit the Web browser.
Specifying the Policy on Login/LogoutEncrypting Network Communication
Encrypting Data to Prevent Data Leaks Caused by a Stolen or Disposed Machine- Keep SD cards and USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately.
- The machine cannot be operated while encrypting data or canceling encryption,
- Do not tum off the power of the machine while encrypting data or canceling encryption. If you tum off the power. the internal storage may be damaged and all data may be unusable,
- After completing this procedure on the machine’s control panel, turn off the main power and restart the machine to enable the new settings by turning it back on, Restarting can be slow when there is data to be carried over to the internal storage.
- The process for encrypting the standard internal storage takes several minutes.
- The encryption key is required for data recovery or migration to another machine, Be sure to keep the encryption key secure by printing it on a sheet or storing it ina USB flash memory device,
- To transfer data from the machine to another machine, you must decrypt the encrypted data. Contact your service representative for data migration.
- If you specify both the Erase All Memory function and the encryption function, the Erase All Memory function is performed first. Encryption starts after the Erase All Memory function has been completed and the machine has been rebooted,
- When you execute encryption/decryption function, the data in the internal storage will be initialized, so the device certificate will be deleted. After completing the encryption/decryption, install device certificate again and restart the machine as necessary. Installing a Self-signed Certificate/Certificate Issued by a Certificate Authority
- Log in to the machine as the machine administrator on the control panel.Logging in to the Machine as an AdministratorWhen custom-privilages administrators are registered, you can log in to the machine as a custom-privileges administrator with the File Management privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- On the Home screen, press [Settings].
- Press [System Settings).
- Press [Sattings for Administrator] [File Management] [Machine Data Encryption Settings].
- Press [Encrypt]. • If the data has been encrypted, you can decrypt the data or back up the data,• Cancel Encryption: Cancels encryption.• Back Up Encryption Key: Makes a backup of the encryption key. The encryption setting is not changed.
- Select the location to store the encryption key,• Save to Media: Saves the encryption key to a USB flash memory device. Insert a USB flash memory device into the media slot, and then press (Save to Media] [OK]. • Print on Paper: Prints the encryption key on a sheet of paper, Press [Print on Paper] > [Print].
- Press [OK].
- When the confirmation dialog is displayed, press [Exit].
- Press [Home] . and then [og out of the machine,
- Turn off the main power of the machine, and then tum it back on, When the main power is turned on, the machine starts to convert the data on the memory, Wait until the message “Memory conversion complete. Tum the main power switch off.” appears. After that, turn off the main power again.
Enabling the Auto Erase Memory Setting Function
- When the Auto Erase Memory Setting function is set to [On], temporary data that temained on the hard disk while the Auto Erase Memory Setting function was set to [Off] might not be overwritten,
- If the main power switch is turned off before the Auto Erase Memory Setting process is completed, overwriting will stop and data will be left on the hard disk, Do not stop the overwrite mid-process, Doing so will damage the hard disk.If the main power switch is turned off before the Auto Erase Memory Setting process is completed, overwriting will continue once the main power switch is tumed back on, fan error occurs before the overwriting process is completed, turn off the main power.Tum it back on, and then repeat from Step 1,
- The machine will not enter Sleep mode untd the overwriting process is completed.
- Log in to the machine as the machine administrator on the control panel.Logging in to the Machine as an AdministratorWhen custom=privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.Logging in to tha Machine as a CustonPrivileges Administrator
- On the Home screen, press [Settings].
- Press (System Settings].
- Press (Settings for Administrator] > [Data Management] > [Auto Erase Memory Setting).
- From the list next to Auto Erase Memory Setting, select [On], and then select an erase method,The default erase method is [Random Numbers], and the default number of overwrites is [3]. • NSA’: Overwrites data twice with random numbers and once with zeros.• DoO’2: Overwrites data with a random number, then with its complement. then with another random number, and the data is verified.• Random Numbers: Overwrites data multiple times with random numbers. Select the number of overwrites from one to nine,*1 National Security Agency (U.S.A)*2 Department of Defense (U.S.A)
- Press [OK],
- Press [Home] , and then log out of the machine.
If you enable the Auto Erase Memory Setting function along with the data encryption function, the overwriting data will also be encrypted.
To check the overwriting process on the control panel
- The machine will not enter Sleep mode while overwriting is in progress, When overwriting has been completed, the machine enters Sleep mode.
- Do not tum off the main power of the machine while overwriting is in progress, Be sure to check the data status with the data overwrite icon on the screen.
- Even though there is Hold Print’Stored PrinvLocked PrintSample Print data in the hard disk, the “No data remains” icon is displayed as the data overwrite icon,
Initializing the Machine with the Erase All Memory Function
- If the main power switch is turned off before the Erase All Memory process is completed, overwriting will be stopped and data will be left on the internal storage. Do not stop the overwrite mid-process. Doing so will damage the internal storage.
- Before you start the Erase All Memory process, we recommend that you back up the user codes, the counters for each user code. and the Address Book. You can back up the user codes and the counters for each user code using Device Manager NX, For details, see Device Manager NX Help. You can back up the Address Book using the controll panel.Backing Up/Restoring the Address Book Using Control Panel
- If the method of Random Numbers is selected and overwrite three times is set on the machine with the standard intemal storage, the Erase All Memory process takes up to 2 hours and 15 minutes. You cannot operate the machine during overwriting.
- The Erase All Memory function also clears the machine’s security settings, so that neither machine nor user administration will be possible. Ensure that users do not save any data on the machine after the Erase All Memory process is completed.
Controlling Access to Untrusted Websites from the Control PanelRestricting Operations of the Customer Engineer without the Supervision of the Machine Administrator
Limiting Available Functions- Log in to the machine as the user administrator on the control panel.Logging in to the Machine as an AdministratorWhen custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Address Book privilege as well.Logging in to the Machine as a Custom-Privileges Administrator
- On the Home screen, press [Address Book].
- On the Address Book screen, select a user, and then press [Edit].
- Press the [User Management / Other] tab > [User Management].
- Press [Available Functions / Applications] under Restrict Use, and then select available functions.
- Press [OK] several times until the Address Book screen is displayed,
- Press [Exit].
- When the confirmation dialog box is displayed, press [Close], and then log out of the machine.To back up the changed contents, press [Go to Backup].Backing Up/Restoring the Address Book Using Control Panel
Logging in to the Machine Using an IC Card or a Smart DeviceExecuting a Print Job with Authentication Information Only
Registering/Changing/Deleting User Codes Logging in to the Machine Using an IC Ca…
Preparing the Server to Use for User AuthenticationWhen using Windows authentication or LDAP authentication as the user authentication method for the first time, check that your server environment meets the requirements for user authentication, and configure the required settings,To use Windows authenticationPrepare the server as follows:
- Check the requirements of Windows authentication.
- Install the Web server (IIS) and the Active Directory Certificate Service in the server,
- Create a server certificate,You do not need to create a server certificate to transmit user information that is not encrypted,
To use LDAP authenticationCheck the requirements of LDAP authentication, and configure the settings according to the server environment as necessary,
Requirements of Server Authentication Used for User AuthenticationWindows authentication
- The server can authenticate users managed in other domains, but cannot obtain information such as an e-mail address.
- When Kerberos authentication is enabled together with SSL/TLS, the e-mail address cannot be obtained,
- Even if you edit an authenticated user’s information, such as an e-mail address, in the machine’s Address Book, it may be overwritten by the information from the server when authentication is performed,
- If you created a new user in the domain controller and selected “User must change password at next logon” at password configuration, first log on the computer and change the password,
- If the Guest account on the Windows server is enabled, users not registered in the domain controller can be authenticated, When this account is enabled, users are registered in the Address Book and can use the functions available under [* Default Group].
LDAP authentication
- When Kerberos authentication is enabled together with SSL/TLS, the e-mail address cannot be obtained.
- Anonymous authentication might be available. To improve security, set anonymous authentication to Disable.
- Even if you edit an authenticated user’s information, such as an e-mail address, in the machine’s Address Book, it may be overwritten by the information from the server when authentication is performed.
- Under LDAP authentication, you cannot specify access limits for groups registered in the server,
- Do not use double-byte Japanese, Traditional Chinese, Simplified Chinese, or Hangul characters when entering the login user name or password. If you use double-byte characters, you cannot authenticate using Web Image Monitor.
- When using the machine for the first time, the user can use Available Functions specified in [User Authentication Management].
- To specify Available Functions for each user, register the user together with Available Functions in the Address Book, or specify Available Functions in the user registered automatically in the address book.
- On the [Start] menu, click [Server Manager].
- On the [Manage] menu, click [Add Roles and Features].
- Click [Next].
- Select [Role-based or feature-based installation], and then click [Next].
- Select a server, and then click [Next].
- Select the [Active Directory Certificate Service] and [Web Server (IIS)] check boxes, and then click [Next].If a confirmation message appears, click [Add Features].
- Check the features to install, and then click [Next].
- Read the content information, then click [Next],
- Make sure that [Certification Authority] is selected in the Role Services area in Active Directory Certificate Services, and then click [Next].
- Read the content information, then click [Next]. When using Windows Server 2016, proceed to Step 12 after reading the content information,
- Check the role services to install under Web server (11S), and then click [Next].
- Click [Install].
- When using Windows Server 2019 or Windows Server 2022, click [Close].
- After completing the installation, click the notification icon of the server manager, and then click [Configure Active Directory Certificate Service on the destination server].
- Click [Next].
- Check [Certification Authority] in the role service, and then click [Next].
- Select [Enterprise CA], and then click [Next].
- Select [Root CA], and then click [Next].
- Select [Create a new private key], and then click [Next].
- Select a cryptographic provider, key length, and hash algorithm to create a new private key, and then click [Next].
- In [Common name for this CA:], enter the Certificate Authority name, and then click [Next].
- Select the validity period, and then click [Next].
- Leave [Certificate database location:] and [Certificate database log location:] without change, and then click [Next].
- Click [Configure].
- When the message “Configuration succeeded” appears, click [Close].
- On the [Start] menu, point to [Ail Applications], and then click [Internet Information Service (IIS) Manager] of [Administrative Tools].
- In the left column, click [Server Name], and then double-click [Server Certificate].
- In the right column, click [Create Certificate Request…].
- Enter all the information, and click [Next].
- In [Cryptographic service provider:], select a provider, and then click [Next].
- Click […], and then specify a file name for the certificate request.
- Specify a location in which to store the file, and then click [Open].
- Click [Finish].
Top Page > Security > Introduction > Registering Standard-Privileges AdministratorsTaking Measures to Prevent Security Thre… Registering Custom-Privileges Administra…
Registering Standard-Privileges Administrators- User Management: Manages information registered in the Address Book. You can add users to the Address Book and change the registered information,
- Machine Management: Mainly manages the settings of the devices, You can configure the settings so that the settings for each function can be changed only by the administrator.
- Network Management: Manages the settings for connecting to the network,
- File Management: Manages the permission to access the stored files. You can specify the settings so that only the registered users or permitted users can view or edit the files stored in the machine.
- Activate Administrator Authentication.Activate the Administrator Authentication function of the machine from [Settings].Activating Administrator Authentication
- Log in to the machine as an administrator.Enter the login user name and login password of a built-in administrator to log in to the machine.Logging in to the Machine as an Administrator
- Add built-in administrators or change the privileges.Assign the privileges to each administrator. You can register up to four built-in administrators.Adding Built-in Administrators or Changing the Privileges
- Activate Administrator Authentication.Activate the Administrator Authentication function of the machine from [Settings].Activating Administrator Authentication
- Log in to the machine as an administrator,Enter the login user name and login password of a built-in administrator to log in to the machine,Logging in to the Machine as an Administrator
- Register external administrator groups and assign the privileges.Register external administrator groups and assign standard administrator privileges.Registering External Administrator Groups and Assigning the Standard Administrator Privileges
The built-in administrators are distinguished from the users registered in the Address Book, The login user name registered in the Address Book cannot be used as the login user name of a built-in administrator,Activating Administrator AuthenticationAn administrator can manage the machine by activating the management function, Select whether to activate the management function according to the range of information to manage, and then specify the allowable range of settings by users.
If you have activated Administrator Authentication, make sure not to forget the login user names and login passwords of the built-in administrators. If you forget an administrator login user name or password, you must specify a new password using the supervisor’s privilege.
- On the Home screen, press [Settings].
- Press [System Settings].
- Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Administrator Authentication Management].
- For each standard administrator privilege to activate Administrator Authentication, select [On] from the list.• User Management: To manage the information registered in the Address Book, select [On].• Machine Management: To configure the settings so that the initial settings for each function can be changed only by the administrator, select [On] • Network Management: To manage the network settings, select [On].• File Management: To manage the files stored in the machine, select [On].
- From Available Settings, select the items subject to management. The selected items cannot be changed by users.User ManagementAdministrator Tools: Mainly restrict the settings for the Address Book. |Machine ManagementPress [Not Selected] next to Available Settings, select the items subject to management on the Available Settings screen, and then press [OK].• General Features: Restrict the settings for the control panel and paper output tray.• Tray Paper Settings: Restrict the settings for the size and type of the paper set in the paper tray.• Timer Settings: Restrict the settings for the time and processing hours.• Interface Settings: Restrict the settings related to the network.• File Transfer: Restrict the settings related to the e-mail send and receive functions.• Administrator Tools: Mainly restrict the settings related to the machine,• Maintenance: Restrict the settings for print correction,Network Management• Interface Settings: Restrict the settings related to the network,• File Transfer: Restrict the settings related to the e-mail send and receive functions,• Administrator Tools: Mainly restrict the settings related to the network and security,File Management• Administrator Tools: Restrict the settings for the File Protection and Document Server functions,
- Press [OK].
- Press [Home]
- When the confirmation dialog is displayed, press [OK] to log out of the machine.
- On the Home screen, press [Login].
- Enter the login user name and login password of an administrator, and then press [Login].When you log in, the user icon is displayed at the upper left on the screen. To register or change a built-in administrator, follow the procedures described in Adding Built-in Administrators or Changing the Privileges.
- After completing machine operations, press [Logout],You can also log out of the machine by pressing the energy saver key.
- If you log in to the machine using one of the standard administrator privileges, the name of the built-in administrator logging in appears. When you log in with a user name that has multiple standard administrator privileges, one of the standard administrator privileges associated with that name is displayed.
- For the characters that can be used for login user names and passwords, see Usable Characters for User Names and Passwords.
- Launch the Web browser.
- Enter “http:/(IP address of the machine or host name)/” on the address bar of the Web browser, and then press the Enter key.Accessing to Web Image Monitor
- Click [Login].
- Enter the login user name and login password of the administrator, and then click (Login).
- After completing machine operations, click [Logout].Delete the cache memory of a web browser after logging out.
- Do not forget the login user names and login passwords of the added built-in administrators.
- A built-in administrator cannot change the login user names and passwords for other built-in administrators.
- Log in to the machine as an administrator with all the standard administrator privileges on the control panel.Logging in to the Machine as an Administrator
- On the Home screen, press [Settings].
- Press [System Settings].
- Press (Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth,] (Register/Change Administrator] [Set Administrator Login User Name/Login Password].
- Press the desired built-in administrator (