Operating Instructions
Page 3
...preparation procedures for using the machine. Also refer to this manual for the procedures for registering administrators, as well as registering fax numbers, e-mail addresses, and user codes. Also refer to this manual before using the machine, how to enter text, and ...10070; General Settings Guide Explains User Tools settings, and Address Book procedures such as setting user and administrator authentication. ❖ Copy/ Document Server Reference Explains Copier and Document Server functions and operations. Manuals for This Machine Refer to the manuals that the administrators can use...
...preparation procedures for using the machine. Also refer to this manual for the procedures for registering administrators, as well as registering fax numbers, e-mail addresses, and user codes. Also refer to this manual before using the machine, how to enter text, and ...10070; General Settings Guide Explains User Tools settings, and Address Book procedures such as setting user and administrator authentication. ❖ Copy/ Document Server Reference Explains Copier and Document Server functions and operations. Manuals for This Machine Refer to the manuals that the administrators can use...
Operating Instructions
Page 9
... loss of About This Machine. They can be found in moderate or minor injury, or damage to the machine or to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes. How to property. Indicates important safety notes. Be sure to read...Machine. It indicates where you can be found in serious injury or death. This symbol is located at the end of keys on resolving user errors. Be sure to read these notes could result in the "Safety Information" section of data. Ignoring these notes. They can find ...
... loss of About This Machine. They can be found in moderate or minor injury, or damage to the machine or to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes. How to property. Indicates important safety notes. Be sure to read...Machine. It indicates where you can be found in serious injury or death. This symbol is located at the end of keys on resolving user errors. Be sure to read these notes could result in the "Safety Information" section of data. Ignoring these notes. They can find ...
Operating Instructions
Page 52
... the computer name is "desk01": \\desk01\user. For details about maximum number of specifying the destination using its path, you can send a file to a shared network folder. D Enter the path for the destination Entering the path to the destination manually You can 2 create the shared folder under ....0, Windows Server 2003, and Mac OS X. ❒ Depending on the right side of the client computer, access to the destination folder manually. Sending Scan Files by browsing the network for the folder. The soft keyboard appears. You can enter the path to the shared folder may...
... the computer name is "desk01": \\desk01\user. For details about maximum number of specifying the destination using its path, you can send a file to a shared network folder. D Enter the path for the destination Entering the path to the destination manually You can 2 create the shared folder under ....0, Windows Server 2003, and Mac OS X. ❒ Depending on the right side of the client computer, access to the destination folder manually. Sending Scan Files by browsing the network for the folder. The soft keyboard appears. You can enter the path to the shared folder may...
Operating Instructions
Page 53
...entered, press [Change] on the left side of the user name field to display the soft keyboard. 2 H Press [Connection Test]. J Press [OK]. Press [Manual Input] on the right side of the destination field. Press [Manual Input] for [Password] to display the soft keyboard. ...Specifying Scan to Folder Destinations F Depending on the destination setting, enter the user name for logging on to the destination in...
...entered, press [Change] on the left side of the user name field to display the soft keyboard. 2 H Press [Connection Test]. J Press [OK]. Press [Manual Input] on the right side of the destination field. Press [Manual Input] for [Password] to display the soft keyboard. ...Specifying Scan to Folder Destinations F Depending on the destination setting, enter the user name for logging on to the destination in...
Operating Instructions
Page 56
... Sending Files to an FTP Server This section explains how to specify destinations when sending files to an FTP server manually. The soft keyboard appears. C Press [Manual Input] on the right side of characters that can also use its IP address. Instead of specifying the destination... about maximum number of the path field. The soft keyboard appears. E Press [OK]. F Press [Manual Input] on the right side of a path where the folder name is "user" and the subfolder name is "lib": user\lib. A Press [Enter Destination]. B Press [FTP]. Entering the path to an FTP server...
... Sending Files to an FTP Server This section explains how to specify destinations when sending files to an FTP server manually. The soft keyboard appears. C Press [Manual Input] on the right side of characters that can also use its IP address. Instead of specifying the destination... about maximum number of the path field. The soft keyboard appears. E Press [OK]. F Press [Manual Input] on the right side of a path where the folder name is "user" and the subfolder name is "lib": user\lib. A Press [Enter Destination]. B Press [FTP]. Entering the path to an FTP server...
Operating Instructions
Page 57
...; You can register the path to display the soft keyboard. Enter a port number using the number keys, and then press the {q} key. Press [Manual Input] for the folder or there is set in [System Settings], press [Change] on the right side of the port number field. L Press [Connection... Test]. N Press [OK]. Press [Manual Input] on the right side of the user name field to the destination in the Address Book" 49 Specifying Scan to check whether the specified folder exists. J Enter the password...
...; You can register the path to display the soft keyboard. Enter a port number using the number keys, and then press the {q} key. Press [Manual Input] for the folder or there is set in [System Settings], press [Change] on the right side of the port number field. L Press [Connection... Test]. N Press [OK]. Press [Manual Input] on the right side of the user name field to the destination in the Address Book" 49 Specifying Scan to check whether the specified folder exists. J Enter the password...
Operating Instructions
Page 59
..., the machine may not be able to display the soft keyboard. F Press [OK]. A connection test is "folder", the path will be "user.context". J Check the connection test result, and then press [Exit]. Press [Manual Input] for logging on to [NDS], the NDS tree name is "tree", the name of the... user name field. If you do not have write privileges for the file or there is "context", the user name will be "\\server\volume\folder". 2 For ...
..., the machine may not be able to display the soft keyboard. F Press [OK]. A connection test is "folder", the path will be "user.context". J Check the connection test result, and then press [Exit]. Press [Manual Input] for logging on to [NDS], the NDS tree name is "tree", the name of the... user name field. If you do not have write privileges for the file or there is "context", the user name will be "\\server\volume\folder". 2 For ...
Operating Instructions
Page 65
...files. This Machine You can be sent by specifying passwords. ❒ Scan file stored in the machine and then send the stored files by other users on the machine's hard disk. tor, you can be accessed by e-mail or Scan to Folder. For details about DeskTopBinder Lite, see Web Image... delivery scanner. We advise against using DeskTopBinder. For details, contact your local dealer. 1. For details about Web Image Monitor, see DeskTopBinder Lite-related manuals. For long-term storage of files, we recommend the use of failure occurs. Using Web Image Moni-
...files. This Machine You can be sent by specifying passwords. ❒ Scan file stored in the machine and then send the stored files by other users on the machine's hard disk. tor, you can be accessed by e-mail or Scan to Folder. For details about DeskTopBinder Lite, see Web Image... delivery scanner. We advise against using DeskTopBinder. For details, contact your local dealer. 1. For details about Web Image Monitor, see DeskTopBinder Lite-related manuals. For long-term storage of files, we recommend the use of failure occurs. Using Web Image Moni-
Operating Instructions
Page 80
For details about Web Image Monitor, see the manuals supplied with DeskTopBinder. The list of stored files appears. C Select the file containing the file information you select a password-protected stored file, a screen for entering ... select the file, enter the correct password, and then press [OK]. Storing Files Using the Scanner Function ❒ You can change the user name for a stored file. Changing a user name You can also delete files stored in the machine by accessing the machine from a client computer using Web Image Monitor or DeskTopBinder...
For details about Web Image Monitor, see the manuals supplied with DeskTopBinder. The list of stored files appears. C Select the file containing the file information you select a password-protected stored file, a screen for entering ... select the file, enter the correct password, and then press [OK]. Storing Files Using the Scanner Function ❒ You can change the user name for a stored file. Changing a user name You can also delete files stored in the machine by accessing the machine from a client computer using Web Image Monitor or DeskTopBinder...
Operating Instructions
Page 81
....] may appear instead of a file stored in [System Settings]. Priv.], consult your administrator. 73 Managing Stored Files The user names shown here are names that the user name was changed as necessary, and press [Exit]. For details about specifying [Change Acs. Note ❒ Using Web ...Image Monitor or DeskTopBinder, you can also change a user name not shown here, press [Non-programmed Name], and then enter the user name. For details about Web Image Monitor, see the manuals supplied with DeskTopBinder. ❒ Depending on the [Administrator Tools] tab in ...
....] may appear instead of a file stored in [System Settings]. Priv.], consult your administrator. 73 Managing Stored Files The user names shown here are names that the user name was changed as necessary, and press [Exit]. For details about specifying [Change Acs. Note ❒ Using Web ...Image Monitor or DeskTopBinder, you can also change a user name not shown here, press [Non-programmed Name], and then enter the user name. For details about Web Image Monitor, see the manuals supplied with DeskTopBinder. ❒ Depending on the [Administrator Tools] tab in ...
Operating Instructions
Page 148
...Function Palette, you to use DeskTopBinder functions such as Scan using DeskTopBinder Extended Features. For details about Function Palette, see DeskTopBinder manuals. • SmartDeviceMonitor for Client SmartDeviceMonitor for Client provides functions for continuous device status monitoring on the client computer monitors in-...trays of the delivery server periodically, retrieves files delivered to in-trays, and notifies the user of delivery. • Function Palette Function Palette allows you must first configure them using TWAIN scanner or Print without starting DeskTopBinder...
...Function Palette, you to use DeskTopBinder functions such as Scan using DeskTopBinder Extended Features. For details about Function Palette, see DeskTopBinder manuals. • SmartDeviceMonitor for Client SmartDeviceMonitor for Client provides functions for continuous device status monitoring on the client computer monitors in-...trays of the delivery server periodically, retrieves files delivered to in-trays, and notifies the user of delivery. • Function Palette Function Palette allows you must first configure them using TWAIN scanner or Print without starting DeskTopBinder...
Operating Instructions
Page 155
M Managing stored files, 71 Manual entry, 19, 44 Message, 28 Mixed sizes, 101, 131 Multi-pages, 137 N NCP, 50, 52 NDS, 50, 52 NetWare, 35, 50, 52 Network Delivery, 134 O ... Screen e-mail, 11 network delivery scanner, 80 Scan to Folder, 37 stored files, 64 Search by comment, 86 Searching by file name, 67 Searching by user name, 66, 90 Searching the delivery server's destination list, 86 Searching the list of stored files, 66 Searching the machine's address book, 18 Selecting destinations...
M Managing stored files, 71 Manual entry, 19, 44 Message, 28 Mixed sizes, 101, 131 Multi-pages, 137 N NCP, 50, 52 NDS, 50, 52 NetWare, 35, 50, 52 Network Delivery, 134 O ... Screen e-mail, 11 network delivery scanner, 80 Scan to Folder, 37 stored files, 64 Search by comment, 86 Searching by file name, 67 Searching by user name, 66, 90 Searching the delivery server's destination list, 86 Searching the list of stored files, 66 Searching the machine's address book, 18 Selecting destinations...
Operating Instructions
Page 3
... install the CD-ROMs provided. ❖ General Settings Guide Explains User Tools settings, and Address Book procedures such as registering fax numbers, e-mail addresses, and user codes. Also refer to this manual for the procedures for explanations on how to view the manuals as setting user and administrator authentication. ❖ Copy Reference Explains Copier functions...
... install the CD-ROMs provided. ❖ General Settings Guide Explains User Tools settings, and Address Book procedures such as registering fax numbers, e-mail addresses, and user codes. Also refer to this manual for the procedures for explanations on how to view the manuals as setting user and administrator authentication. ❖ Copy Reference Explains Copier functions...
Operating Instructions
Page 7
...of keys that appear on the machine's display panel. { } Indicates the names of About This Machine. Be sure to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. How to read these notes could result in the "Safety Information" section of keys on... resolving user errors. Name of Major Item Major item of this manual: • Auto Document Feeder capable of scanning both sides of data. Indicates important safety notes. Ignoring these ...
...of keys that appear on the machine's display panel. { } Indicates the names of About This Machine. Be sure to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. How to read these notes could result in the "Safety Information" section of keys on... resolving user errors. Name of Major Item Major item of this manual: • Auto Document Feeder capable of scanning both sides of data. Indicates important safety notes. Ignoring these ...
Operating Instructions
Page 22
... Combine, parts of the image are identical in the ARDF, the last page should be copied. 16 Copies are not copied. Set a narrower margin with User Margin function, parts the opposite side of the image are not in - You can set the width be - See "Copier Features", General Settings Guide. ...order. When placing a stack of margin space on the bottom. If you specify a reproduction tio that does not match the sizes ratio using the Manual Paper Seof your originals and the copy paper. (Select the correct reproduction ratio before using the Duplex You set a wide erased margin.
... Combine, parts of the image are identical in the ARDF, the last page should be copied. 16 Copies are not copied. Set a narrower margin with User Margin function, parts the opposite side of the image are not in - You can set the width be - See "Copier Features", General Settings Guide. ...order. When placing a stack of margin space on the bottom. If you specify a reproduction tio that does not match the sizes ratio using the Manual Paper Seof your originals and the copy paper. (Select the correct reproduction ratio before using the Duplex You set a wide erased margin.
Operating Instructions
Page 64
... E-mail has • Set [Divide & Send E-mail] to authenticate. See "Confirmation Displays", Scanner Reference. The entered login user name or password is correct, and then enter it again. Cannot specify more groups. Send- dest. tact the administrator. The ... protection code was being sent, a net- been exceeded. ters. Troubleshooting When Using the Scanner Function Message Cause Solution Cannot enter manually more than 100 destinations. Press the {Job Information} key to 32. 5 Exceeded max. network may be entered, and then ...
... E-mail has • Set [Divide & Send E-mail] to authenticate. See "Confirmation Displays", Scanner Reference. The entered login user name or password is correct, and then enter it again. Cannot specify more groups. Send- dest. tact the administrator. The ... protection code was being sent, a net- been exceeded. ters. Troubleshooting When Using the Scanner Function Message Cause Solution Cannot enter manually more than 100 destinations. Press the {Job Information} key to 32. 5 Exceeded max. network may be entered, and then ...