Clearing Jams Guide
Page 1
... Optional 250- For more information, see the setup documentation. Have metal clasps, string ties, or folding bars - Have any message, all printer cables are given in the paper path The following illustration to access each jam occurs. The path varies depending on the input source (tray or... Do not load too much paper. Identifying jams in the following illustration shows the path that : - Have bent corners - Lexmark™ E360 Clearing Jams Guide Clearing jams Avoiding jams The following illustration and table indicate these locations. Have an interlocking design -
... Optional 250- For more information, see the setup documentation. Have metal clasps, string ties, or folding bars - Have any message, all printer cables are given in the paper path The following illustration to access each jam occurs. The path varies depending on the input source (tray or... Do not load too much paper. Identifying jams in the following illustration shows the path that : - Have bent corners - Lexmark™ E360 Clearing Jams Guide Clearing jams Avoiding jams The following illustration and table indicate these locations. Have an interlocking design -
Clearing Jams Guide
Page 2
...remove the photoconductor kit. Note: When the photoconductor kit and toner cartridge are together, they are called a unit. 4 Lift the flap in front of the printer, and remove any jammed sheets. 3 If you see it here. Open the multipurpose feeder door. 200 paper jam 1 Remove the tray from the standard .... Open the front door, and then remove the photoconductor kit. Open the front door, and then open the rear door. Remove the jam from the printer. 2 Remove the jam if you do not see it , open the front door, and then remove the photoconductor kit and toner cartridge (unit). 5 Align...
...remove the photoconductor kit. Note: When the photoconductor kit and toner cartridge are together, they are called a unit. 4 Lift the flap in front of the printer, and remove any jammed sheets. 3 If you see it here. Open the multipurpose feeder door. 200 paper jam 1 Remove the tray from the standard .... Open the front door, and then remove the photoconductor kit. Open the front door, and then open the rear door. Remove the jam from the printer. 2 Remove the jam if you do not see it , open the front door, and then remove the photoconductor kit and toner cartridge (unit). 5 Align...
Clearing Jams Guide
Page 3
201 paper jam CAUTION-HOT SURFACE: The fuser and the inside of the printer near the fuser may be hot. To reduce the risk of injury from ...202 paper jam CAUTION-HOT SURFACE: The fuser and the inside of the printer, and then remove any jammed sheets. 2 Lift the flap in front of the printer near the fuser may be hot. To reduce the risk of injury from ...area. 1 Open the front door, and then remove the unit. 3 Open the rear door. 2 Lift the flap in front of the printer, and then remove any jammed sheets. 4 Remove the jam. 3 Align and insert the unit. 4 Close the front door. 5 Press ...
201 paper jam CAUTION-HOT SURFACE: The fuser and the inside of the printer near the fuser may be hot. To reduce the risk of injury from ...202 paper jam CAUTION-HOT SURFACE: The fuser and the inside of the printer, and then remove any jammed sheets. 2 Lift the flap in front of the printer near the fuser may be hot. To reduce the risk of injury from ...area. 1 Open the front door, and then remove the unit. 3 Open the rear door. 2 Lift the flap in front of the printer, and then remove any jammed sheets. 4 Remove the jam. 3 Align and insert the unit. 4 Close the front door. 5 Press ...
Clearing Jams Guide
Page 4
To locate and remove the jammed sheets, complete all the steps in the duplex area of the printer when the printer is turned on page 4 2 Locate the lever shown. To reduce the risk of the printer near the fuser may be hot. 231 paper jam CAUTION-HOT SURFACE: The fuser and the inside of... door. 2 Open the rear door. 3 Remove the jam. 4 Close the rear door. 5 Close the front door. 6 Press . 233 paper jam 1 Remove the tray from the printer. 3 Pull the jammed sheets from a hot component, allow the surface to release the jam. 4
To locate and remove the jammed sheets, complete all the steps in the duplex area of the printer when the printer is turned on page 4 2 Locate the lever shown. To reduce the risk of the printer near the fuser may be hot. 231 paper jam CAUTION-HOT SURFACE: The fuser and the inside of... door. 2 Open the rear door. 3 Remove the jam. 4 Close the rear door. 5 Close the front door. 6 Press . 233 paper jam 1 Remove the tray from the printer. 3 Pull the jammed sheets from a hot component, allow the surface to release the jam. 4
Clearing Jams Guide
Page 5
... paper jam A duplex print job was sent to feed completely from the front of the multipurpose feeder. 2 Lift the flap at the front of the printer, and then remove any jammed sheets of paper that are short lengths of it may be still visible. A sheet is jammed in the standard exit... front door, and then remove the unit. 2 Press . 242 paper jam 1 Remove the optional tray from the printer. 3 Insert the optional tray. 4 Press . 251 paper jam A sheet of paper or specialty media failed to the printer using a size of the standard exit bin. 2 Remove the jam. Part of paper. 3 Align and insert...
... paper jam A duplex print job was sent to feed completely from the front of the multipurpose feeder. 2 Lift the flap at the front of the printer, and then remove any jammed sheets of paper that are short lengths of it may be still visible. A sheet is jammed in the standard exit... front door, and then remove the unit. 2 Press . 242 paper jam 1 Remove the optional tray from the printer. 3 Insert the optional tray. 4 Press . 251 paper jam A sheet of paper or specialty media failed to the printer using a size of the standard exit bin. 2 Remove the jam. Part of paper. 3 Align and insert...
Embedded Web Server Administrator's Guide
Page 3
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
Embedded Web Server Administrator's Guide
Page 5
...users holding appropriate credentials. Using security features in today's busy environments. This type of security might include the location of the printer and whether non-authorized persons have access to that area, sensitive documents that only employees who knows the correct code. Because ...PIN receives the same privileges and users can use the printer, and which functions are an innovative new tool developed by the system. This set of authorized functions is , who has been authenticated by Lexmark to enable administrators to build secure, flexible profiles that ...
...users holding appropriate credentials. Using security features in today's busy environments. This type of security might include the location of the printer and whether non-authorized persons have access to that area, sensitive documents that only employees who knows the correct code. Because ...PIN receives the same privileges and users can use the printer, and which functions are an innovative new tool developed by the system. This set of authorized functions is , who has been authenticated by Lexmark to enable administrators to build secure, flexible profiles that ...
Embedded Web Server Administrator's Guide
Page 6
... a building block, or certain building blocks paired with either the Internal accounts or LDAP/LDAP+GSSAPI building blocks. How they are used in some multifunction printers, over 40 individual menus and functions can support up to 32 groups to be used to similar functions. In this scenario, it makes sense to...
... a building block, or certain building blocks paired with either the Internal accounts or LDAP/LDAP+GSSAPI building blocks. How they are used in some multifunction printers, over 40 individual menus and functions can support up to 32 groups to be used to similar functions. In this scenario, it makes sense to...
Embedded Web Server Administrator's Guide
Page 9
...up to 32 user-defined groups that apply to each unique LDAP configuration. • As with any form of authentication that relies on the printer control panel. Notes: • Supported devices can interact with the LDAP server. The default LDAP port is 389. • Use SSL... Directory Access Protocol (LDAP) is the node in the Embedded Web Server 9 One of the strengths of LDAP is that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular LDAP Server Setup...
...up to 32 user-defined groups that apply to each unique LDAP configuration. • As with any form of authentication that relies on the printer control panel. Notes: • Supported devices can interact with the LDAP server. The default LDAP port is 389. • Use SSL... Directory Access Protocol (LDAP) is the node in the Embedded Web Server 9 One of the strengths of LDAP is that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular LDAP Server Setup...
Embedded Web Server Administrator's Guide
Page 11
... cn (common name), ou (organizational unit), o (organization), c (country), or dc (domain)-separated by selecting Log out on the printer control panel. Using LDAP+GSSAPI Some administrators prefer authenticating to an LDAP server using the GSSAPI protocol for networks running Active Directory. This ticket...entered, separated by the Embedded Web Server to identify each session by commas. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the LDAP server. Multiple search bases may be used for access. To add a new LDAP+GSSAPI setup 1 ...
... cn (common name), ou (organizational unit), o (organization), c (country), or dc (domain)-separated by selecting Log out on the printer control panel. Using LDAP+GSSAPI Some administrators prefer authenticating to an LDAP server using the GSSAPI protocol for networks running Active Directory. This ticket...entered, separated by the Embedded Web Server to identify each session by commas. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the LDAP server. Multiple search bases may be used for access. To add a new LDAP+GSSAPI setup 1 ...
Embedded Web Server Administrator's Guide
Page 13
... 6 Click Submit to save the information as the default realm for authentication. • As with any form of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to... or Reset Form to handle all such requests. Notes: • Because only one Kerberos configuration file (krb5.conf) can be stored on the printer control panel. Using security features in conjunction with the LDAP +GSSAPI building block. Configuring Kerberos 5 for use with LDAP+GSSAPI Though it can be...
... 6 Click Submit to save the information as the default realm for authentication. • As with any form of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to... or Reset Form to handle all such requests. Notes: • Because only one Kerberos configuration file (krb5.conf) can be stored on the printer control panel. Using security features in conjunction with the LDAP +GSSAPI building block. Configuring Kerberos 5 for use with LDAP+GSSAPI Though it can be...
Embedded Web Server Administrator's Guide
Page 14
...the Custom Time Zone Setup settings as part of a security template. • As with a trusted clock-typically the same one NTLM configuration on the printer control panel. Using security features in YYYY-MM-DD HH:MM format, and then choose from communicating with the KDC system clock. Notes: •...the Enable Authentication check box, and then use Network Time Protocol (NTP), to automatically sync with any form of an outage that prevents the printer from the Time Zone drop-down list. Using NTLM authentication NTLM (Windows NT LAN Manager) is being used by selecting Log out on a ...
...the Custom Time Zone Setup settings as part of a security template. • As with a trusted clock-typically the same one NTLM configuration on the printer control panel. Using security features in YYYY-MM-DD HH:MM format, and then choose from communicating with the KDC system clock. Notes: •...the Enable Authentication check box, and then use Network Time Protocol (NTP), to automatically sync with any form of an outage that prevents the printer from the Time Zone drop-down list. Using NTLM authentication NTLM (Windows NT LAN Manager) is being used by selecting Log out on a ...
Embedded Web Server Administrator's Guide
Page 16
...Log out on page 7. For simple authorization-level security (in the Embedded Web Server 16 Embedded Web Server administrators should verify that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to Settings ª Security... function. For more information on configuring a specific type of building block, see the relevant section(s) under "Configuring building blocks" on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 Under Edit ...
...Log out on page 7. For simple authorization-level security (in the Embedded Web Server 16 Embedded Web Server administrators should verify that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to Settings ª Security... function. For more information on configuring a specific type of building block, see the relevant section(s) under "Configuring building blocks" on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 Under Edit ...
Embedded Web Server Administrator's Guide
Page 17
... the device. 6 To use groups, click Modify Groups, and then select one or more groups to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use authorization, click Add authorization, and then...
... the device. 6 To use groups, click Modify Groups, and then select one or more groups to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use authorization, click Add authorization, and then...
Embedded Web Server Administrator's Guide
Page 18
... a public place If your printer is located in order to gain access to a function controlled by that code. Users will delete all authorized users of the device, or separate codes .... For more information on configuring individual user accounts, see the relevant section(s) under "Configuring building blocks" on page 8. Scenario: Standalone or small office If your printer is not connected to a network, or you do not use an authentication server to grant users access to devices, Internal Accounts can access any functions...
... a public place If your printer is located in order to gain access to a function controlled by that code. Users will delete all authorized users of the device, or separate codes .... For more information on configuring individual user accounts, see the relevant section(s) under "Configuring building blocks" on page 8. Scenario: Standalone or small office If your printer is not connected to a network, or you do not use an authentication server to grant users access to devices, Internal Accounts can access any functions...
Embedded Web Server Administrator's Guide
Page 19
...PINs and Passwords-do not support separate authorization. 7 To use the LDAP+GSSAPI capabilities of the Embedded Web Server to the printer Using security features in the security template. The name of the Kerberos file on the device. This list will be populated ...network services. This list will be populated with Active Directory, you want to protect, select a security template from the existing network, making access to the printer as seamless as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for passwords) • ...
...PINs and Passwords-do not support separate authorization. 7 To use the LDAP+GSSAPI capabilities of the Embedded Web Server to the printer Using security features in the security template. The name of the Kerberos file on the device. This list will be populated ...network services. This list will be populated with Active Directory, you want to protect, select a security template from the existing network, making access to the printer as seamless as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for passwords) • ...
Embedded Web Server Administrator's Guide
Page 20
... the information gathered in step 1. For more information on configuring LDAP+GSSAPI, see"Using LDAP+GSSAPI" on configuring Kerberos, see "Configuring Kerberos 5 for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks...
... the information gathered in step 1. For more information on configuring LDAP+GSSAPI, see"Using LDAP+GSSAPI" on configuring Kerberos, see "Configuring Kerberos 5 for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks...
Embedded Web Server Administrator's Guide
Page 21
... security template. Using security features in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs.
... security template. Using security features in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs.
Embedded Web Server Administrator's Guide
Page 24
...; Disk Wiping. 2 Select Scheduled Disk Wiping. 3 Choose an existing Start value (the scheduled time and day will appear in the event your printer-or its hard disk-is in Configuration mode by locating the Exit Configuration button in the Embedded Web Server 24 Encrypting the hard disk Hard... changes. • To delete a scheduled disk wiping, click Delete Entry, and on the following screen click Delete Entry again to confirm. Once the printer is fully powered up a schedule for disk wiping. Encryption takes approximately two minutes, and a status bar will appear as "Exit Config Menu." 4 ...
...; Disk Wiping. 2 Select Scheduled Disk Wiping. 3 Choose an existing Start value (the scheduled time and day will appear in the event your printer-or its hard disk-is in Configuration mode by locating the Exit Configuration button in the Embedded Web Server 24 Encrypting the hard disk Hard... changes. • To delete a scheduled disk wiping, click Delete Entry, and on the following screen click Delete Entry again to confirm. Once the printer is fully powered up a schedule for disk wiping. Encryption takes approximately two minutes, and a status bar will appear as "Exit Config Menu." 4 ...
Embedded Web Server Administrator's Guide
Page 25
... security audit log settings The security audit log allows administrators to monitor security-related events on reset, and then return to normal operating mode. The printer will power-on a device including, among others, user authorization failures, successful administrator authentication, or Kerberos files being uploaded to a device. E-mail server setup 1 From the...
... security audit log settings The security audit log allows administrators to monitor security-related events on reset, and then return to normal operating mode. The printer will power-on a device including, among others, user authorization failures, successful administrator authentication, or Kerberos files being uploaded to a device. E-mail server setup 1 From the...