Network |
This category describes network connectivity and setup instructions. |
Optional Equipment and System Requirements |
This section describes the optional equipment and system environments with which the machine is compatible. |
Remark |
|
|
|||||
Optional Equipment Requirements |
The following optional equipment is required for printing or sending a fax from a computer: |
Remark |
|
||||||
|
Remark |
|
|
|||||
|
System Requirements |
The following network and system environments are compatible when printing or sending a fax from a computer: |
Remark |
|
||||||
|
Remark |
|
||||||
|
Remark |
|
||||||
|
Remark |
|
||||||
|
System Requirements |
The following system environments are confirmed for using the e-mail/I-fax functions:
|
Remark |
|
|
|||||
System Requirements |
The following network and system environments are compatible when sending data from the machine to a file server, depending on the type of network used: |
Remark |
|
||||||
|
Remark |
|
||||||
|
Checking Your Network Environment |
Refer to the following examples to confirm the network environment that is connected to the machine, and then perform the necessary operations for that environment. |
Sample Windows Network |
In a Windows network environment, the TCP/IP or NetBIOS (NetBIOS over TCP/IP) protocol can be used. Multiple protocols can be used at the same time. In addition to IPv4 (Internet Protocol Version 4), the machine also supports IPv6 (Internet Protocol Version 6), and has a dual stack configuration that enables it to communicate with both IPv4 networks and IPv6 networks. You can select whether to use the functions of IPv4 or IPv6. You can also enable the functions of both IPv4 and IPv6. The IPv4 network and IPv6 network used by the machine supports IPSec (Security Architecture for Internet Protocol). (See "IPSec Settings.") To use the e-mail/I-fax function, the TCP/IP protocol is required. After configuring the settings in accordance with "Connecting the Machine to a Computer or Network," "Interface Settings," or "Communication Environment Setup," specify a TCP/IP or NetBIOS network, depending on the protocol. |
Remark |
|
|
|||||
Sample Macintosh Network |
In Mac OS 8/9, the AppleTalk (EtherTalk) protocol is used. In Mac OS X, either the AppleTalk (EtherTalk), TCP/IP, or NetBIOS (NetBIOS over TCP/IP) protocol can be used. To use the e-mail/I-fax function or to send data, the TCP/IP protocol is required. After configuring the settings in accordance with "Connecting the Machine to a Computer or Network," "Interface Settings," or "Communication Environment Setup," specify an AppleTalk (Macintosh), TCP/IP, or NetBIOS network, depending on the protocol. |
Remark |
|
|
|||||
Sample UNIX Network |
With UNIX computers, the TCP/IP protocol is used. After configuring the settings in accordance with "Connecting the Machine to a Computer or Network," "Interface Settings," or "Communication Environment Setup," specify a TCP/IP network. |
Using a Network with Various Types of Computers |
If there are various types of computers on the network, the network operations you are required to perform depend on the type of computers being used. For example, if you are using Windows XP and Macintosh computers, you will need to specify the settings described in both "Sample Windows Network" and "Sample Macintosh Network". To use the e-mail/I-fax function, the TCP/IP protocol is required. After configuring the settings in accordance with "Connecting the Machine to a Computer or Network," "Interface Settings," or "Communication Environment Setup," specify a TCP/IP, NetWare, NetBIOS, or AppleTalk (Macintosh) network, depending on the protocol. |
Remark |
|
||||||
Network Environment Setup Procedures |
Before using the machine in a network environment, it is necessary to perform the following setup procedures. |
Connect the machine to the network using the network cables.
Specify the interface settings for communication between the machine and computers on your network. To specify the settings, use:
Set up the environment for communication between the machine and computers on your network. |
Connecting the Machine to a Computer or Network |
The machine can be connected to a computer or network with a USB cable or 10Base-T/100Base-TX/1000Base-T Ethernet cable. |
Remark |
|
|
|||||
Connecting to a Network |
The machine supports TCP/IP, AppleTalk, and NetWare, which enables it to be used by Windows, Macintosh, UNIX, and Linux computers. It also has a 10Base-T/100Base-TX/1000Base-T connector that can be used on most LANs. When using 10Base-T/100Base-TX, connect the machine's RJ-45 connector to a hub port using a Category 5 twisted pair LAN cable. When using 1000Base-T, it is recommended you use an Enhanced Category 5 twisted pair LAN cable. |
Remark |
|
|
|||||
Connecting to a USB Interface |
You can connect the machine to a computer with a USB port via a USB cable. The machine is USB 2.0 Hi-Speed compatible. The drivers, and utility that matches the operating system on your computer will be installed. For more information on installing the driver through a USB connection, see Chapter 10, "Before Printing from Computers," or Chapter 11, "Before Sending Faxes from Computers," in Getting Started. For information on installing a utility, see the manuals provided with the utility. |
Remark |
|
|
|||||
Touch Panel Display Transition |
The following is a flow diagram of the touch panel display used in this category. Specify the network settings from the Additional Functions screen displayed by pressing |
Remark |
|
|
|||||
Interface Settings |
This section describes how to specify the interface settings from the control panel. If you are configuring the settings for the first time, use the control panel of the machine. After configuring the settings, you can change them using software other than the control panel of the machine. For details, see "Network Setting Items." |
[On]: If errors related to network connections occur, an error message is displayed on the touch panel display of the machine. If you want to use the machine in a network environment, select [On]. [Off]: Messages related to network connections are no longer displayed. If you want to use the machine without connecting to a network, select [Off].
|
|
If you reconnect the network cable (for example, reconnect the cable to a different Ethernet hub) with the machine's main power switch ON, the Auto Detect function will not work even if you set <Auto Detect> to [On]. Turn OFF the machine, wait at least 10 seconds, and then turn it ON. (Connect the cable with the machine's main power switch OFF.)
|
Select the appropriate items for <Communication Mode> and <Ethernet Type>, according to the network environment you are using.
|
Communication Environment Setup |
This section describes how to set up the environment for communication between the machine and computers on your network. If you are configuring the settings for the first time, use the control panel of the machine. After configuring the settings, you can change them using software other than the control panel of the machine. For details, see "Network Setting Items." |
Remark |
|
||||||
[On] for <Use SNMP v. 1>: Follow the procedure below to specify the MIB access permissions and community names.
|
You can also change the community name in [Community Name] to a name other than 'public'. |
You can also change the community name in [Community Name] to a name other than 'public2'. |
[On] for <Use SNMP v. 3>: Specify the user and context according to the following procedures.
|
If you select [Auth Yes/Encrypt Yes] from the Security Settings drop-down list, select the authentication algorithm → enter the passwords for authentication and encryption. If you select [Auth. Yes/Encrypt. No] from the Security Settings drop-down list, select the authentication algorithm → enter the password for authentication. |
Confirm the displayed information → change the settings if necessary. |
|
|
If you want to add a context, press [Register] to add a new context. If you want to change a context, select the context you want to change → press [Edit] to change the context. If you want to erase a context, select the context you want to erase → press [Erase].
|
[On] for <Get Printer Mgmt Info from Host>: If you are using Windows Vista and set [Standard TCP/IP port] for the printer driver port, the SNMP port monitoring function will be enabled automatically to obtain printer management information such as information on print applications and printer ports. |
[On]: You can set or browse detailed information on the machine with a Canon printer driver or utility (UFR II/PCL/PS printer drivers, NetSpot Device Installer, etc.).
|
[On]: You can spool print jobs transmitted to this machine on the machine's hard disk. Set the spooler if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, or the optional Super G3 FAX Board.
|
IEEE802.1X Authentication Settings |
This section describes how to set the IEEE802.1X authentication. For IEEE802.1X, the RADIUS server requires user authentication from the supplicant (machine) when connecting to a network. EAPOL (EAP over LAN) is used for communication between the supplicant and the authenticator (LAN switch) that performs access control of the terminal based on the authentication results. Authentication information is managed collectively with the RADIUS (Remote Authentication Dial In User Service) server, and then the supplicant is authenticated. Invalid access can be prevented because this authentication method permits only supplicants authenticated by the RADIUS server to connect to the network via an authenticator. The authenticator blocks communication from supplicants not authenticated by the RADIUS server. The machine supports the following methods of authentications: |
Remark |
|
||||||
For the EAP-TLS method, authentication is performed by issuing a digital certificate bilaterally to both the client and the RADIUS server. The key pair and client certificate sent from the machine are verified using the CA certificate on the RADIUS server. The server certificate sent from the RADIUS server is verified using the CA certificate on the client (the machine). The CA certificate used to verify the server certificate must be registered. For information on installing the CA certificate file using the Remote UI, see "Remote UI." For information on registering the installed CA certificate file, see "Registering a CA Certificate File Installed from a Computer." Furthermore, the settings for the key pair (in PKCS#12 format) and the client certificate are necessary to use the EAP-TLS with the machine. After installing the key pair file and client certificate file using the Remote UI (see "Remote UI"), set the key pair and client certificate for EAP-TLS as the default key with the control panel of the machine.
For the EAP-TTLS method, only the RADIUS server issues a digital certificate. The server certificate sent from the RADIUS server is verified using the CA certificate on the client. The CA certificate used to verify the server certificate must be registered. For information on installing the CA certificate file using the Remote UI, see "Remote UI." For information on registering the CA certificate file installed, see "Registering a CA Certificate File Installed from a Computer." Furthermore, the name of the user to authenticate with IEEE802.1X authentication and the password need to be set to use EAP-TTLS with the machine. The user can select two types of internal authentication protocol supported by EAP-TTLS: MS-CHAPv2 (Microsoft Challenge Handshake Authentication Protocol Version 2), or PAP (Password Authentication Protocol). You cannot set both MS-CHAPv2 and PAP simultaneously.
For the PEAP method, only the RADIUS server issues a digital certificate. The server certificate sent from the RADIUS server is verified using the CA certificate on the client. The CA certificate used to verify the server certificate must be registered. For information on installing the CA certificate file using the Remote UI, see "Remote UI." For instructions on registering the installed CA certificate file, see "Registering a CA Certificate File Installed from a Computer." Furthermore, the name of the user to be authenticated with IEEE802.1X authentication and the password need to be set to use PEAP with the machine. The only internal authentication protocol supported by PEAP is MS-CHAPv2. |
Selecting the IEEE802.1X Authentication Method |
This section describes how to select the IEEE802.1X authentication method. |
|
Register the CA certificate (see "Registering a CA Certificate File Installed from a Computer") in advance. If setting the EAP-TLS method, also install the key pair file and the client certificate file (see "Remote UI"). |
|
|
|
TCP/IP Network Setup Procedures |
To use a TCP/IP network, it is necessary to perform the following procedures. |
Specify the protocol settings. To specify the settings, use:
Specify the settings for each computer you use for printing or sending a fax. (Optional equipment is required to print or send a fax from a computer. For the equipment needed, see "Optional Equipment and System Requirements.")
Specify the settings of the computer receiving data sent from the machine. (Optional equipment is required to send data. For the equipment needed, see "Optional Equipment and System Requirements.") |
Remark |
|
|
|||||
Protocol Settings |
This section describes how to specify the protocol settings for the machine using the control panel. If you are configuring the settings for the first time, use the control panel of the machine. After configuring the settings, you can change the content by using software other than the control panel of the machine. For details, see "Network Setting Items." |
Remark |
|
||||||
TCP/IPv4 Settings |
This section describes the procedure for setting TCP/IPv4 using the control panel. After specifying the settings for TCP/IPv4, follow the procedure in "Settings Common to TCP/IPv4 and TCP/IPv6" to specify the required settings, and the procedure in "Confirming TCP/IPv4 Settings" to check whether the network settings are correct. If the settings for TCP/IPv6 are already specified and you have finished specifying the settings common to TCP/IPv4 and TCP/IPv6, only check the network settings after completing this procedure. If you want to use IPv6 communications at the same time, follow the procedure in "TCP/IPv6 Settings," to specify the required settings, and the procedure in "Confirming TCP/IPv6 Settings," to confirm the settings. |
|
[On] for <Use IPv4>: IPv4 networks can be used. [Off] for <Use IPv4>: IPv4 networks cannot be used, regardless of the settings specified for IPv4 on the Additional Functions screen. The ARP (Address Resolution Protocol) table is also disabled.
|
|
Enter the appropriate values in [IP Address], [Subnet Mask], and [Gateway Address].
|
If this information cannot be obtained via DHCP, RARP, or BOOTP after you restart the machine, enter the IP address, subnet mask, and gateway address to use the settings entered in this step.
|
|
If you want to use dynamic DNS updating, enter the IPv4 address of the DNS server in [Primary DNS Server]. If you do not want to set up a secondary DNS server, enter <0.0.0.0>.
|
Enter the name of the machine as [Host Name], and the network domain name of the machine as [Domain Name]. If you want to use dynamic DNS updating, it is necessary to set a host name and domain name.
|
[On] for <DNS Dynamic Update>: If your environment includes a dynamic DNS server, you can automatically register the IPv4 address, host name, and domain name set for the machine in the DNS server using dynamic DNS updating.
|
You need to set <RX/Print Range> if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, the optional Super G3 FAX Board, or the optional Color Universal Send Kit.
|
|
Press [Register] → store only one IPv4 address or a range of IPv4 addresses that are to be permitted.
Press [Register] → store only one IPv4 address or a range of IPv4 addresses that are to be rejected. |
|
Press [Register] → store only one IPv4 address or a range of IPv4 addresses that are to be permitted.
Press [Register] → store only one IPv4 address or a range of IPv4 addresses that are to be rejected.
|
TCP/IPv6 Settings |
This section describes the procedure for setting TCP/IPv6 using the control panel. After specifying the settings for TCP/IPv6, follow the procedure in "Settings Common to TCP/IPv4 and TCP/IPv6" to specify the required settings, and the procedure in "Confirming TCP/IPv6 Settings" to check whether the network settings are correct. If the settings for TCP/IPv4 are already specified and you have finished specifying the settings common to TCP/IPv4 and TCP/IPv6, only check the network settings after completing this procedure. If you want to use IPv4 communications at the same time, follow the procedure in "TCP/IPv4 Settings" to specify the required settings, and the procedure in "Confirming TCP/IPv4 Settings" to check the settings. The machine can use up to seven of the following IPv6 addresses. With IPv6 communication, multiple IPv6 addresses can be used at the same time. |
Remark |
|
||||||
An address that is only valid within the same link. A link local address is automatically set using a specific prefix (fe80::) and an interface identifier generated from the MAC address of the machine. When the machine is using the functions of IPv6, one link local address is always registered.
A fixed address that is set from the control panel.
A stateless address is automatically set using the machine's MAC address and the prefix (information indicating the network belonged to) included in the RA (Router Advertisement) notified by the router when the machine is started.
A stateful address can be obtained from a DHCP server using DHCPv6. |
|
[On] for <Use IPv6>: You can use an IPv6 network. A link local address is automatically set. |
[On] for <Use Stateless Address>: A stateless address is automatically set when the machine is started.
|
[On] for <Use Manual Address>: You can set the IPv6 address manually. Enter the IPv6 address value in [Manual Address] and the IPv6 address prefix length in [Prefix Length]. Enter the default router address value in [Default Router Addr.]. If you do not want to specify the default router address, leave [Default Router Addr.] blank.
|
[On] for <Use DHCPv6>: You can use DHCPv6 to obtain a stateful address from a DHCP server. |
You need to set <RX/Print Range> if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, the optional Super G3 FAX Board, or the optional Color Universal Send Kit.
|
|
Press [Register] → store only one IPv6 address or a range of IPv6 addresses that are to be permitted. Also specify the prefix and prefix length for the IPv6 address.
Press [Register] → store only one IPv6 address or a range of IPv6 addresses that are to be rejected. Also specify the prefix and prefix length for the IPv6 address. |
|
Press [Register] → store only one IPv6 address or a range of IPv6 addresses that are to be permitted. Also specify the prefix and prefix length for the IPv6 address.
Press [Register] → store only one IPv6 address or a range of IPv6 addresses that are to be rejected. Also specify the prefix and prefix length for the IPv6 address.
|
|
If you want to use dynamic DNS updating, enter the IPv6 address of the DNS server in [Primary DNS Server]. If you do not want to specify a secondary DNS server, leave [Secondary DNS Server] blank.
|
[On] for <Use Same Host Name/Domain Name as IPv4>: You can set the same host name or domain name used with IPv4 communication for IPv6 communication. If you set <Use Same Host Name/Domain Name as IPv4> to 'Off', enter the name of the machine in [Host Name] and the name of the domain the machine belongs to in [Domain Name]. It is necessary to set a host name and domain name if you want to use dynamic DNS updating.
|
[On] for <DNS Dynamic Update>: If your environment includes a dynamic DNS server, you can automatically register the IPv6 address, host name, and domain name set for the machine in the DNS server using dynamic DNS updating. [On] for <Register Stateless Address>: You can automatically register a stateless address in the DNS server using dynamic DNS updating. [On] for <Register Manual Address>: You can automatically register a manual address in the DNS server using dynamic DNS updating. [On] for <Register Stateful Address>: You can automatically register a stateful address in the DNS server using dynamic DNS updating.
|
Settings Common to TCP/IPv4 and TCP/IPv6 |
This section describes the procedure for specifying the settings common to TCP/IPv4 and TCP/IPv6 using the control panel. Specify the settings required for your network environment. If you want to use both TCP/IPv4 communications and TCP/IPv6 communications, specify the settings required for both protocols. After performing this procedure, follow the procedure in "Confirming TCP/IPv4 Settings" and "Confirming TCP/IPv6 Settings" to check whether the network settings are correct. |
Specify the LPD print settings if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, or the optional Super G3 FAX Board. [On]: You can use LPD as the print application.
|
Specify the Raw print settings if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, or the optional Super G3 FAX Board. [On]: You can use Raw as the print application. If you want to establish bidirectional communication using Port 9100, press [On] for <Bidirectional Communication>. |
[On] for <Use SNTP>: You can perform time synchronization using SNTP. Select the interval for performing time synchronization in <Polling Interval>. In [NTP Server Address], enter the NTP server IP address or host name.
|
Specify the FTP print settings if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, or the optional PS Printer Kit. [On] for <Use FTP printing>: You can use FTP as the print application. In [User], enter the login user name for access to the FTP server. In [Password], enter the login password for access to the FTP server.
|
Specify the WSD print settings if you are using Windows Vista, and the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, or the optional Super G3 FAX Board. [On] for <Use WSD>: You can use WSD (Web Services for Devices) as the print application. <Use WSD Browsing> is automatically set to 'On' if you set <Use WSD> to 'On', and enables device information to be obtained using WSD. If you want to respond to multicast discovery requests, set <Use Multicast Discovery> to 'On'. |
Set the PASV mode for FTP if you are using the optional Color Universal Send Kit.
|
Specify the IPP print settings if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, or the optional Super G3 FAX Board. [On]: You can use IPP as the print application. Pressing [On] for [IPP Print Settings] automatically sets [Use HTTP] to 'On'. To use SSL to encrypt the IPP data, press [On] for <Use SSL>. If you are using IPP authentication, press [On] for <Use Authentication> → enter the user name to use for IPP authentication in [User], and the password to use for IPP authentication in [Password].
|
[On] for <Response>: You can use device information from other devices, such as an Address Book or Department ID Management settings, or respond to a multicast discovery from utilities. Optionally, press [Scope Name] and enter the scope name for a multicast discovery.
|
[On]: You can use the Remote UI or IPP. Pressing [Off] for [Use HTTP] automatically sets [Remote UI] (in the System Settings screen) and [IPP Print Settings] to 'Off'. |
In the following cases, specify the proxy settings, according to the network environment you are using:
In [Server Address], enter a proxy server IP address or FQDN (for example, starfish.company.com). In [Port Number], enter the port number of a proxy server using If you want to use a proxy in the same domain, press [On] for <Use Proxy within the Same Domain>. If you want to use proxy authentication, press [Authentication Settings] → [On] for <Use Proxy Authentication> → enter the user name to use for proxy authentication in [User], and the password to use for proxy authentication in [Password].
|
[On] for <Apply Settings>: You can enable a MAC address filter. Press [Register] → specify the MAC addresses to allow access to.
|
Select [On] or [Off] if you are using the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, or the optional Super G3 FAX Board. [On]: You can confirm the Department ID and password when printing using a driver that supports Windows Vista.
|
Confirming TCP/IPv4 Settings |
The following is the procedure for confirming that the network connections are properly set. |
|
Pressing [Start] after entering the desired IP address existing on the network displays the result of the PING command on the touch panel display. If this result is inappropriate, check the settings described in "Interface Settings," "TCP/IPv4 Settings," and "Settings Common to TCP/IPv4 and TCP/IPv6."
|
After pressing [NTP Server Check], if <OK> is displayed, time synchronization is working correctly via SNTP. If <Error> is displayed, check the settings for [NTP Server Address] set in step 3 of "Settings Common to TCP/IPv4 and TCP/IPv6." Even if you perform [NTP Server Check], time settings are not updated. Check that communications are possible between the machine and the NTP server. |
Confirming TCP/IPv6 Settings |
The following is the procedure for confirming that the TCP/IPv6 network connections are properly set. |
|
Pressing [Start] after entering an IPv6 address existing on the network in [IPv6 Address] displays the result of the PING command on the touch panel display. Pressing [Start] after entering the machine's host name in [Host Name] displays the result of the PING command on the touch panel display. If this result is inappropriate, check the settings described in "Interface Settings," "TCP/IPv6 Settings," and "Settings Common to TCP/IPv4 and TCP/IPv6."
|
After pressing [NTP Server Check], if <OK> is displayed, time synchronization is working correctly via SNTP. If <Error> is displayed, check the settings for [NTP Server Address] set in step 3 of "Settings Common to TCP/IPv4 and TCP/IPv6." Even if you perform [NTP Server Check], time settings are not updated. Check that communications are possible between the machine and the NTP server. |
Key Pair and Server Certificate Settings for Encrypted SSL Communication |
The key pair and server certificate are required for performing SSL encrypted communication, for use with the following items. This section describes how to specify the key pair and server certificate settings from the control panel of the machine.
|
Generating a Key Pair and Server Certificate |
It is necessary to generate and register a key pair in order to use encrypted SSL communication for IPP printing, e-mail and I-faxes, the Remote UI, MEAP functions via a web browser, and device information delivery, or confirm Department IDs and passwords. A key pair and server certificate are preinstalled in the machine. You can also use this key pair and server certificate to enable encrypted SSL communication. The procedure for generating and registering a key pair and self-signed server certificate using the control panel of the machine is as follows: |
Remark |
|
|
|||||
|
In [Key Name], enter a name for the key pair → select a key length.
|
You cannot set an end date which is earlier than the start date. Set at least one of the following items → press [Start Key Generatn] to generate a key. You cannot issue a server certificate if all the items are left blank. When using IPPS printing with Windows Vista, make sure to enter the IP address of the machine in [Common Name]. Items you can set:
|
Registering a Key Pair File and Server Certificate File Installed from a Computer |
You can install a key pair from a computer in order to use encrypted SSL communication for IPP printing, e-mail and I-faxes, the Remote UI, MEAP functions via a web browser, and device information delivery, or confirm Department IDs and passwords. A key pair file and server certificate file created on a computer can be installed in the machine using a web browser (Remote UI). The procedure for registering installed files in the machine using the control panel is as follows: |
Remark |
|
|
|||||
Select the file to register → press [Register] → enter the name of the private key in [Key Name], and the password for the private key in [Password]. To erase an unnecessary file, select the file → press [Erase].
|
Editing Key Pairs and Server Certificates |
You can confirm the settings of registered key pairs and server certificates. You can also delete an unnecessary key pair and certificate, and check how a key pair is currently being used. |
If
|
If [Certificate Verification] is grayed out or <The key is corrupted or invalid.> is displayed, you cannot use the key pair. After erasing the corrupted or invalid key pair, register a key pair (see "Generating a Key Pair and Server Certificate," or "Registering a Key Pair File and Server Certificate File Installed from a Computer."). |
|
|
Changing the Key Pair Used With SSL Encrypted Communications |
After checking the function that SSL encrypted communications are being used for, you can change the key pair being used. |
|
You cannot set to use "Device Signature Key" or "AMS" (key pair for access restrictions) for SSL. The key pair used with IPSec can be used as the key pair for SSL, but the key pair used with IPSec cannot be changed with this procedure.
|
Registering a CA Certificate File Installed from a Computer |
Apart from the X.509 (DER) format CA certificate preinstalled in the machine, you can also register a CA certificate file which has been installed using a web browser (Remote UI). The procedure for registering installed files in the machine using the control panel is as follows: |
Remark |
|
|
|||||
Select the file to register → press [Register]. To erase an unnecessary file, select the file → press [Erase]. When the confirmation message is displayed, press [Yes]. To confirm the CA certificate you have registered, see "Editing a CA Certificate." |
Editing a CA Certificate |
You can confirm the settings of registered CA certificates. You can also erase unnecessary CA certificates. |
|
|
|
Generating and Confirming a Key Pair and Device Signature Certificate and User Certificate for Adding Digital Signatures to PDF Files |
The machine can add the following two types of digital signatures to PDF files. This section describes the procedures for specifying and confirming the settings necessary for adding digital signatures to PDF files using the control panel of the machine. For instructions on how to add digital signatures to PDF files, see "Using the Main Unit to Send/Receive," or "Remote UI."
Enables the recipient to identify the device that scanned the document. This type of signature requires the optional Universal Send Security Feature Set. To add a device signature to a PDF, set a key pair and device certificate. (See "Setting a Key Pair and Device Certificate.")
Enables the recipient to identify the user who signed the document. This type of signature requires the optional Digital User Signature Kit. To add a user signature to a PDF, it is necessary to install a key pair and user certificate in the machine from a computer. (See "Remote UI.") You can confirm the installed key pair and user certificate using the control panel of the machine. (See "Confirming a Key Pair and User Certificate.") |
Setting a Key Pair and Device Certificate |
The following procedures describe how to generate and update the key pair and device certificate necessary for adding a device signature to a PDF. |
Remark |
|
||||||
|
|
Confirming a Key Pair and Device Certificate |
The following procedure describes how to confirm a key pair and device certificate generated/updated in "Setting a Key Pair and Device Certificate." |
If
|
If [Certificate Verification] is grayed out or <The key is corrupted or invalid.> is displayed, you cannot use the key pair. Follow the procedure in "Setting a Key Pair and Device Certificate," to generate/update a new key pair.
|
Confirming a Key Pair and User Certificate |
The following procedure describes how the system manager can confirm the key pairs and user certificates for all users. Install the key pair and user certificate used for adding a user signature to PDF files from a computer. (See "Remote UI.") |
Remark |
|
|
|||||
User key pairs with |
If [Certificate Verification] is grayed out or <The key is corrupted or invalid.> is displayed, you cannot use the key pair. After erasing the corrupted or invalid key pair, install a new key pair and user certificate from a computer. (See "Remote UI.") |
|
IPSec Settings |
If you install the optional IPSec Board to the machine, you can use IPSec communications by setting <Use IPSec> to [On] in the IPSec Settings screen on the touch panel display of the machine. IPSec is a protocol for ensuring the security of IP packets sent and received over an IP network by protecting it from threats such as theft, modification, and impersonation. IPSec is applied for TCP packets, UDP (User Datagram Protocol) packets, and ICMP (Internet Control Message Protocol) packets. The reason why IPSec is superior to other security protocols is that since it adds security functions to IP, the basic protocol of the internet, it does not depend on the application software and network configuration. This section describes the procedure for creating a security policy to set IPSec communications, using the control panel of the machine. A security policy registers the settings for IPSec, such as the packets to process with IPSec, and the algorithm to use for authentication and encryption. A logical connection established for traffic by conducting negotiations according to an IPSec security policy is called an IPSec SA (Security Association). The features of the IPSec used by the machine are as follows. |
Remarks |
|
||||||
Since the IPSec of the machine only supports the transport mode, authentication and encryption is only applied to the data part of the IP packets.
At least one of the following methods must be set for the machine. You cannot set both methods at the same time.
Supports IKEv1 (Internet Key Exchange version 1) for exchanging keys based on ISAKMP (Internet Security Association and Key Management Protocol). IKE includes two phases; in phase 1 the SA used for IKE (IKE SA) is created, and in phase 2 the SA used for IPSec (IPSec SA) is created. To set authentication with the pre-shared key method, it is necessary to decide upon a pre-shared key in advance, which is a keyword (24 characters or less) used for both devices to send and receive data. Use the control panel of the machine to set the same pre-shared key as the destination to perform IPSec communications with, and perform authentication with the pre-shared key method. To select authentication with the digital signature method, it is necessary to install a key pair file and CA certificate file created on a PC in advance using the Remote UI, and then register the installed files using the control panel of the machine. Authentication is conducted with the destinations for IPSec communication using the CA certificate. The types of key pair and CA certificate that can be used for authentication with the digital signature method are indicated below.
|
Remarks |
|
|
|||||
Registering a Security Policy |
This section describes the procedure for registering a new security policy. |
Remarks |
|
||||||
|
[Allow]: Allows the sending/receiving of packets that are not encrypted because they do not correspond to the security policy set on the IPSec Settings screen, in plain text. [Reject]: Rejects the sending/receiving of packets that do not correspond to the security policy set on the IPSec Settings screen. |
|
When receiving IP packets, the registered security policy is applied if the destination IP address in the packets matches the local IP address specified in this procedure. When sending IP packets, the registered security policy is applied if the source IP address in the packets matches the local IP address specified in this procedure.
|
|
|
|
|
|
When receiving IP packets, the registered security policy is applied if the source IP address in the packets matches the remote IP address specified in this procedure. When sending IP packets, the registered security policy is applied if the destination IP address in the packets matches the remote IP address specified in this procedure. |
|
|
|
|
|
When receiving IP packets, the registered security policy is applied if the destination port in the packets matches the port number specified in this procedure. When sending IP packets, the registered security policy is applied if the source port in the packets matches the port number specified in this procedure. |
[All ports]: Select to specify all the local ports or all the remote ports. [Specify Port]: Select to specify a single local port or remote port according to the port number. |
|
[Main]: Select to set the Main mode. This mode has strong security because the IKE session itself is encrypted. [Aggressive]: Select to set the Aggressive mode. This mode speeds up IKE sessions because they are not encrypted. |
If you want to select the pre-shared key method, prepare a pre-shared key. To select the digital signature method, it is necessary to install a key pair file and CA certificate file created on a PC in advance using the Remote UI. |
|
You cannot set to use "Device Signature Key" or "AMS" (key pair for access restrictions). The key pair used for SSL can also be used as the key for IPSec.
|
|
[SHA1] for <Authentication>: Select to set SHA1 (Secure Hash Algorithm 1) for the authentication algorithm. 160-bit hash values are supported. [MD5] for <Authentication>: Select to set MD5 (Message Digest Algorithm 5) for the authentication algorithm. 128-bit hash values are supported. [3DES-CBC] for <Encryption>: Select to set 3DES (Triple Data Encryption Standard) for the encryption algorithm, and CBC (Cipher Block Chaining) for the encryption mode. 3DES takes longer to process because it performs DES three times, but enables increased encryption strength. CBC links the encryption result of the previous block with the next block to make it harder to decipher the encryption. [AES-CBC] for <Encryption>: Select to set AES (Advanced Encryption Standard) for the encryption algorithm, and CBC for the encryption mode. AES supports encryption keys with a key length of 128, 192, or 256 bits. As the supported key lengths are long, it enables increased encryption strength. CBC links the encryption result of the previous block with the next block to make it harder to decipher the encryption. [Group1(762)] for <DH Group>: Select to set Group 1 for the DH (Diffie-Hellman) key exchange method. In Group 1, 762-bit MODP (Modular Exponentiation) is supported. [Group2(1024)] for <DH Group>: Select to set Group 2 for the DH key exchange method. In Group 2, 1024-bit MODP is supported. [Group14(2048)] for <DH Group>: Select to set Group 14 for the DH key exchange method. In Group 14, 2048-bit MODP is supported. |
The priority for the authentication and encryption algorithms is indicated below.
|
[Time] and [Size] for <Validity>: Specify the validation period for the generated IKE SA and IPSec SA. In IPSec communications to which a valid security policy is applied, packets can be sent and received without conducting key exchange negotiations. Make sure to set either [Time] and [Size]. If you set both, the SA becomes invalid when the value set for either [Time] or [Size] is reached. [On] for <PFS>: If you enable the PFS function, you can increase the confidentiality because even if one encryption key is exposed to a third party, the problem does not spread to other encryption keys. [Off] for <PFS>: If you disable the PFS function, if one encryption key is exposed to a third party, other encryption keys may be able to be guessed. If you set <PFS> to 'On', the destination for PFS communication must also have PFS enabled. |
|
[SHA1] for <ESP Auth.>: Select to set SHA1 as the algorithm for the ESP authentication method. 160-bit hash values are supported. [MD5] for <ESP Auth.>: Select to set MD5 as the algorithm for the ESP authentication method. 128-bit hash values are supported. [NULL] for <ESP Auth.>: Select to not set the algorithm for the ESP authentication method. [3DES-CBC] for <ESP Encryption>: Select to set 3DES for the ESP encryption algorithm, and CBC for the encryption mode. 3DES takes longer to process because it performs DES three times, but enables increased encryption strength. CBC links the encryption result of the previous block with the next block to make it harder to decipher the encryption. [AES-CBC] for <ESP Encryption>: Select to set AES for the ESP encryption algorithm, and CBC for the encryption mode. AES supports encryption keys with a key length of 128, 192, or 256 bits. As the supported key lengths are long, it enables increased encryption strength. CBC links the encryption result of the previous block with the next block to make it harder to decipher the encryption. [NULL] for <ESP Encryption>: Select to not set the algorithm for the ESP encryption method. [SHA1] for <AH Auth.>: Select to set SHA1 as the algorithm for the AH authentication method. 160-bit hash values are supported. [MD5] for <AH Auth.>: Select to set MD5 as the algorithm for the AH authentication method. 128-bit hash values are supported. |
The ESP authentication/encryption methods are set. The priority for the authentication and encryption algorithms is indicated below.
|
Editing a Security Policy |
This section describes the procedure for changing the settings of a registered security policy. It also describes the procedure for enabling a security policy. |
|
|
|
|
For more information on each setting, see "Registering a Security Policy." |
E-Mail/I-Fax Settings |
Remark |
|
||||||
|
The machine supports both the SMTP and POP3 functions. The machine can receive I-fax images and communication error notices only. |
Press [On] for <SMTP Receipt> → press [Off] for <POP>. In [E-mail Address], enter the e-mail address your machine will use. You can specify any user name (the part of the address located in front of the @ symbol). Enter the host name after the "@" symbol in the e-mail address. If you select [SSL] for <Allow SSL (SMTP Receive)>, reception of only data encrypted using SSL is allowed and communications from the host not using SSL are rejected. If you select [On] for <Allow SSL (SMTP Receive)>, depending on the request from the host, reception of data encrypted using SSL is allowed only when there is a request from the host.
|
In [E-mail Address], enter the e-mail address your machine will use. In [POP Server], enter the IP address or name of the POP server using the keyboard on the touch panel display. In [POP Address], enter the login name for access to the POP server. In [POP Password], enter the password for access to the POP server. Set [POP Interval] to the interval you want the POP server to check for incoming e-mail. If the interval is set to '0', the POP server is not checked automatically. For instructions on how to manually check the POP server, see "Using the Main Unit to Send/Receive." Select the authentication method supported by the POP server from [Standard], [APOP], or [POP AUTH] for <POP AUTH Method>. If you want to send encrypted data, press [On] for <Allow SSL (POP)>.
|
|
Press [On] for <POP Authentication before Sending> → press [Off] for <SMTP Authentication (SMTP AUTH)>. |
Press [On] for <SMTP Authentication (SMTP AUTH)> → press [Off] for <POP Authentication before Sending>. In [User], enter the user name used for logging in to the SMTP server. If you are using a Microsoft SMTP server, enter the user name in [User] using the following format: user name@domain name. In [Password], enter the password used for logging in to the SMTP server. To encrypt data to be sent using SSL, select [On] for <Allow SSL (SMTP Send)>.
|
Press [Off] both for <SMTP Authentication (SMTP AUTH)> and <POP Authentication before Sending>. |
Startup Time Settings |
If you connect the machine to a switching hub, it may not be able to connect to a network even though your network settings are set correctly. This occurs because the spanning tree process performed between switching hubs prevents them from communicating with each other immediately after the machine connects to a switching hub. In this case, use the following procedure to delay the start of communication. |
Press [-] or [+] to set the time period to delay the startup of network communications for the machine. |
Setting Up a Computer for Printing/Sending a Fax |
After you have completed the protocol settings for printing and sending a fax with the machine, you are ready to set up each of the computers for printing or sending a fax.
All computers that use the printer must have TCP/IP client software installed and must be enabled for TCP/IP network use. For details, see the manuals provided with the operating system.
To print or send a fax from a computer, you must install a driver and specify a port setting. The port setting differs depending on the print application used for printing or sending a fax. Use the following information as a guide to determine the print application you are using, and then perform the necessary operations.
|
Remark |
|
|
|||||
Windows 2000/XP/Server 2003/Vista |
In the following procedures, items displayed on the screens for Windows 2000 are used. The items displayed may differ according to your operating system. |
Remark |
|
||||||
Installing a New Driver |
|
Install the driver according to the following procedures indicated in the manual for each driver:
|
Changing the Port after Installing the Driver |
|
|
If the dialog box displays <Additional Port Information Required>, follow the instructions on the screen to search again, or click [Standard] → click [Canon Network Printing Device with P9100] under [Device type]. |
If you use LPD, you can specify one of the following print queues in [Queue Name].
|
Mac OS X 10.3 or later |
|
Install the driver according to the instructions in the manual for each driver.
|
UNIX |
The machine supports the LPD print application for printing over TCP/IP networks. The following procedures are only examples. The setup procedures for your environment may differ. |
Remark |
|
||||||
|
<Print queue name>|<comment>:\ |
|
Windows 2000/XP/Server 2003/Vista |
In the following procedures, items displayed on the screens for Windows 2000 are used. The items displayed may differ according to your operating system. |
Remark |
|
|
|||||
|
|
If you want to use regular IPP printing, enter the following URL in [URL]. If you want to use encrypted communication and perform IPPS printing, enter the following URL in [URL]. |
|
Mac OS X 10.3 or later |
If you are using the optional PS Printer Kit, and a PS printer driver provided by Apple Inc. with the Mac OS, you can use IPP as the print application. After installing the PPD file according to Chapter 10, "Before Printing from Computers," in Getting Started, specify the print settings according to the instructions in the documentation provided with your Macintosh. |
Printer Connection Method (FTP) |
The following procedure describes how to perform printing by using FTP. |
For details on user names and passwords, see step 4 in "Settings Common to TCP/IPv4 and TCP/IPv6." Command to be executed 2. ftp> put <file name to be printed> *Upload the file to be printed 3. ftp> bye *Cut off server connection The following is a UNIX command example. 2. Name (172.24.176.244:none): user_name *User login 3. Password: *Enter password 4. ftp> bin *Set file type 5. ftp> put print.txt *Upload print file 6. ftp> bye *Cut off server connection
|
Printer Connection Method (WSD) |
The following procedure describes how to perform printing with WSD when using Windows Vista. If a dialog box is displayed while you are performing this procedure, enter a user name and password. For more information, see the documentation provided with Windows Vista. |
|
|
|
|
Setting Up a Computer as a File Server |
To send data from the machine to a computer on your network, you need to specify the settings of the computer for receiving data. You can send data over a TCP/IP network to any of the following:
This section describes how to set up a computer as an FTP/WebDAV server. For instructions on how to configure a Windows and Samba shared folder, see "Setting Up a Computer as a File Server." |
Remark |
|
|
|||||
Windows 2000/XP/Server 2003/Vista |
This section describes the procedures for using the default home directory under [Default FTP Site]. To use other settings, enter the FTP site and home directory by referring to the IIS documentation. It is recommended that the FTP server be configured by the network administrator. In the following procedures, items displayed on the screens for Windows 2000 are used. The items displayed may differ according to your operating system. |
Remark |
|
|
|||||
Depending on your environment, the access rights settings for a drive or directory may differ. For details, see the Windows manual. |
|
|
|
|
Enter a user name and a password not longer than 24 alphanumeric characters. If [User must change password at next logon] is selected, any new users added must change their passwords in order to send data from the machine. (You cannot change the password from the control panel.)
|
Sample recipient setting:
|
UNIX/Linux |
For more information on the system requirements for using a UNIX/Linux computer as an FTP server, see "System Requirements." In some environments, detailed settings may be required in order to use FTP. For details, consult your network administrator. |
Enter a user name and a password not longer than 24 alphanumeric characters. |
|
Sample recipient setting:
For a sample screen, see the example of Windows 2000/XP/Server 2003/Vista screen.
|
Mac OS X |
|
|
Enter a user name, and a password not longer than 24 alphanumeric characters. |
Sample setting: |
|
Sample recipient setting:
|
FTP Server for iW Document Manager Gateway |
An FTP server for iW Document Manager Gateway is required for receiving data from the machine, when used with iW Document Manager Gateway. |
For more information, see the manual provided with the iW Document Manager Gateway.
|
For more information, see the manual provided with the iW Document Manager Gateway.
|
For instructions on how to import the destination data, see "Remote UI."
|
WebDAV Server Settings |
The WebDAV sending function is a function for sending scanned image files, image files for received faxes, or image files sent from the User Inboxes or Memory RX Inbox of the machine, to a WebDAV server directory on the Internet or your intranet, using the WebDAV protocol. This section describes the procedure for setting up a WebDAV publishing directory. Setting up a publishing directory enables users who have the necessary access privileges to manage files in the directory. It is recommended that the WebDAV server be configured by the network administrator. |
IIS for Windows 2000/2000 Server/XP/Server 2003 |
The procedure below uses items of Windows 2000 as an example. Depending on your environment, the items you see on the screen may differ. |
Remark |
|
|
|||||
|
Specify the directory path created in step 1 as a physical path to the virtual directory. |
If you are using Windows Server 2003, click [Allow] for [WebDAV] in [Web Service Extensions] in IIS Manager. |
|
Sample recipient settings:
|
Apache for Windows 2000/2000 Server/XP/Server 2003/UNIX/Linux/Mac OS X |
The following procedures describe how to create the "users/user_name/WebDAV" directory using the procedure for creating the directory under "C:/Program Files/Apache Group/Apache2" in the Windows file system as an example. |
Remark |
|
|
|||||
Directive to be changed:
Directive to be changed:
Directive to be changed:
<Location /~user_name/WebDAV> DAV On </Location> |
For more information, see the Apache Software Foundation Web site at http://www.apache.org/. |
|
Sample recipient settings:
|
NetWare Network Setup Procedures |
To use a NetWare network, it is necessary to perform the following procedures. |
Specify the NetWare print service settings. (Optional equipment is required to print or send a fax from a computer. For the equipment needed, see "Optional Equipment and System Requirements.")
Specify the protocol settings. To specify the settings, use:
Specify the settings of each computer you use for printing or sending a fax. (Optional equipment is required to print or send a fax from a computer. For the equipment needed, see "Optional Equipment and System Requirements.")
Specify the settings of the computer receiving data sent from the machine. (Optional equipment is required to send data. For the equipment needed, see "Optional Equipment and System Requirements.") |
Remark |
|
|
|||||
NetWare Print Service Settings |
To print using a NetWare network, you need to specify print service settings, including print server and queue settings. You can use the software listed below to specify the print service settings from your computer.
|
Remark |
|
|
|||||
Types of Print Service |
Before specifying print service settings, refer to the following descriptions to determine the type of print service you are using. |
Remark |
|
|
|||||
The machine network supports both the NDS and Bindery mode. Determine the appropriate mode according to the network environment you are using. (If you are using NetWare 3.2, only the Bindery mode is available.)
The machine supports both the queue server mode and the remote printer mode.
|
Using NetWare Administrator in the NDS Queue Server Mode or the Remote Printer Mode (NetWare 4.x or Later) |
|
To use an existing print server, click the button to the right of [Print Server name] → select a print server from the list box. Be sure to remember the name of the print server. You need it to specify the machine's protocol settings.
Select [LPT1] from [Port], and [Manual load] under [Connection type]. Under [Interrupts], specify the appropriate setting for your environment → click [OK] to close the [Parallel Communication] window.
To use an existing print server, click the button to the right of [Volume] → select a print server from the list box.
|
|
Using PCONSOLE in the Queue Server Mode or Remote Printer Mode in the Bindery Mode (NetWare 3.2) |
|
Be sure to remember the name of the print server. You need it to specify the printer's protocol settings.
|
|
|
|
|
|
|
Protocol Settings |
This section describes how to specify the protocol settings for the machine using the control panel. If you are configuring the settings for the first time, use the control panel of the machine. After configuring the settings, you can change them using software other than the control panel of the machine. For details, see "Network Setting Items." |
<NetWare>: [On] Select the frame type for your environment from the Frame Type drop-down list. If you select [Auto Detect], the frame type is automatically determined. Select the print service specified in "NetWare Print Service Settings," from the Print Service drop-down list. The following print services are available:
|
Specify the same tree, context, file server, and print server names that you specified in "NetWare Print Service Settings." (Settings differ depending on the print service. For print service settings, see "Network Setting Items.") You can specify the print service settings either by selecting the desired options from the list on the screen that appears when you press [Browse], or by entering the desired character string for each item.
|
If the browse right is not limited to the specific user, you can specify the print service without having to log in to NetWare.
|
If the browse right is limited to the specific user, it is necessary to log in to NetWare as a user to whom the browse right is granted. Enter a user name prefixed with 'CN='. If the password is not specified, leave [Password] blank.
|
If the password is not specified, leave [Password] blank.
|
|
|
Setting Up a Computer for Printing/Sending a Fax |
After you have completed specifying the NetWare print service settings and printer protocol settings, you are ready to set up each of the computers for printing or sending a fax. |
Remark |
|
||||||
Connecting to a NetWare Network |
In order to use a NetWare network, all computers that will perform printing or sending a fax need to have NetWare client software installed. For details, see your NetWare and operating system manuals. |
Printer Connection Method |
Install the driver according to the following procedures indicated in the manual for each driver.
When the dialog box for selecting the port appears during installation, click [Use Network Printer] → [Settings]. From the list, select the print queue that you created in "NetWare Print Service Settings." |
Setting Up a Computer as a File Server |
To send data from the machine to a computer on your network, you need to specify the settings of the computer for receiving data. This section describes how to set up a computer as a file server. |
Remark |
|
|
|||||
Enter a user name, and a password not longer than 24 alphanumeric characters. |
|
There are two methods for specifying the recipient address; selecting the desired address from the list that appears when you press [Browse], or entering the address using the keyboard on the touch panel display. Sample recipient settings: NDS Mode Example If you send data to the "data" directory under "share_vol" in the above tree structure, the settings of the host name and the folder path differ depending on the location of a user account.
Sample recipient settings: Bindery Mode Example:
Set \CSG in the SYS volume as the recipient.
|
NetBIOS Network Setup Procedures |
To use a NetBIOS network, it is necessary to perform the following procedures. |
Specify the protocol settings. To specify the settings, use:
Specify the settings of each computer you use for printing or sending a fax. (Optional equipment is required to print or send a fax from a computer. For the equipment needed, see "Optional Equipment and System Requirements.")
Specify the settings of the computer receiving data sent from the machine. (Optional equipment is required to send data. For the equipment needed, see "Optional Equipment and System Requirements.") |
Remark |
|
|
|||||
Protocol Settings |
This section describes how to specify the protocol settings for the machine using the control panel. If you are configuring the settings for the first time, use the control panel of the machine. After configuring the settings, you can change them using software other than the control panel of the machine. For details, see "Network Setting Items." |
TCP/IP Settings (IPv4) |
If you have not entered the TCP/IPv4 settings yet, enter them now. (For more information, see "TCP/IPv4 Settings," or "Settings Common to TCP/IPv4 and TCP/IPv6.")
|
SMB and WINS Settings |
To use the machine on a NetBIOS network, specify the SMB settings. To resolve a name with WINS, specify the WINS settings using the following procedure. To specify the SMB settings, you need to use the optional UFR II Printer Kit, the optional UFR II/PCL Printer Kit, the optional PCL Printer Kit, the optional PS Printer Kit, the optional Super G3 FAX Board, or the optional Color Universal Send Kit. WINS (Windows Internet Name Service) is a service for associating a NetBIOS name (which is a computer name or printer name on a NetBIOS network) with an IP address. To use WINS, specify the IP address settings for the WINS server. |
[On] for <Use SMB Server>: You can use the SMB server. In [Server], enter the name of a computer that the machine connects to, using the keyboard on the touch panel display. Be sure to enter a unique name that does not exist as a name for another computer or printer on the same network. In [Workgroup], enter the name of the workgroup the machine belongs to, using the keyboard on the touch panel display. If there is no workgroup on your environment, create a workgroup in the Windows environment, and then enter the workgroup name. In [Comment], enter a comment about the printer, if necessary. If you display the printer information, the comment you specified here appears. If you want the machine to notify the LAN Manager of its existence on the network, press [On] for <LM Announce>. If the LAN Manager does not have to refer to the machine, you can control the traffic over your network by selecting [Off]. To set up an SMB printer, press [SMB Printer Settings] → [On] for <Use SMB> → enter the printer name of the machine in [Printer].
|
[On] for <WINS Resolution>: You can resolve the name with WINS. Enter the IPv4 address of a WINS server in [WINS Server Address]. Enter the [Scope ID] settings if a scope ID is set on the computer in the network environment you are using. The scope ID is an identifier for determining the range available to a printer or computer. The scope ID set here is used regardless of the setting for <WINS Resolution>.
|
Setting Up a Computer for Printing/Sending a Fax |
After you have completed the protocol settings, you are ready to set up each of the computers for printing or sending a fax. |
Remark |
|
||||||
Connecting to a TCP/IP Network |
All computers that use the machine for printing or sending a fax must have TCP/IP client software installed and must be enabled for TCP/IP network use. For details, see the manuals provided with your operating system. |
Connecting to a NetBIOS Network |
All computers that use the machine for printing or sending a fax must be enabled for NetBIOS network use. The setup procedures differ depending on your operating system. See the procedures below to set the computers.
|
Remark |
|
||||||
Windows 2000/XP/Server 2003/Vista |
The following is the procedure for specifying a NetBIOS network with Windows 2000/XP/Server 2003/Vista. In the following procedures, items displayed on the screens for Windows 2000 are used. The items displayed may differ according to your operating system. |
Remark |
|
||||||
|
|
|
|
Windows 2000/XP/Server 2003/Vista |
Remark |
|
||||||
|
Install the driver according to the following procedures indicated in the manual for each driver.
When the dialog box for selecting the port appears during installation, click [Use Network Printer] → [Settings]. From the list, select [Workgroup], [Server], and [Printer] you set in "SMB and WINS Settings." |
Mac OS X 10.3 or later |
If you are using the optional PS Printer Kit, and a PS printer driver provided by Apple Inc., you can use SMB as the print application. After installing the PPD file according to Chapter 10, "Before Printing from Computers," in Getting Started, specify the print settings according to the instructions in the documentation provided with your Macintosh. |
Setting Up a Computer as a File Server |
To send data from the machine to a computer on your network, you need to specify the settings of the computer for receiving data. You can send data over a NetBIOS network to a Windows or Samba (UNIX/Linux/Mac OS X) shared folder. This section describes how to configure a shared folder. |
Remark |
|
|
|||||
Connecting to a TCP/IP Network |
A computer that receives data sent from the machine must have TCP/IP client software installed and must be enabled for TCP/IP network use. For details, see the manuals provided with your operating system. You can send data over a TCP/IP network from the machine to an FTP server. For instructions on how to set up an FTP server, see "Setting Up a Computer as a File Server." |
Windows 2000/XP/Server 2003/Vista |
It is recommended that the file server be configured by the network administrator. The number of users or clients that can access a server running Windows 2000/XP/Server 2003/Vista is limited. After this number of users or clients is reached, it is not possible to send to a server running Windows 2000/XP/Server 2003/Vista. In the following procedures, items displayed on the screens for Windows 2000 are used. The items displayed may differ according to your operating system. |
Remark |
|
||||||
|
|
|
|
If you are using Windows 2000, right-click the [My Computer] icon → click [Manage] to open the [Computer Management] window. Right-click the [Computer Management (Local)] icon → click [Properties] to open the [Computer Management (Local) Properties] dialog box. On the [Network Identification] sheet, confirm the [Computer name] setting. If you are using Windows XP/Server 2003, right-click [My Computer] → click [Properties] → on the [Computer Name] sheet, click [Change]. In the [Computer Name Changes] dialog box, click [More] to open the [DNS Suffix and NetBIOS Computer Name] dialog box → confirm [NetBIOS computer name]. If you are using Windows Vista, perform the same operation as with other operating systems to open the [DNS Suffix and NetBIOS Computer Name] dialog box → confirm the name in [NetBIOS computer name]. |
|
Enter a user name not longer than 20 alphanumeric characters, and a password not longer than 14 alphanumeric characters. If [User must change password at next logon] is selected, any new users added must change their passwords in order to send data from the machine. (You cannot change the password from the control panel.)
|
|
|
Select or add the users or groups to whom you want to give access to the shared folder → under [Permissions], select both [Change] and [Read]. |
Select or add the users or groups to whom you want to give access to the shared folder → under [Permissions], select both [Write] and [Read & Execute], or a higher access authority. For data in the folder, check both [Write] and [Read], or a higher access authority.
|
There are three methods for specifying the recipient address; selecting the desired address from the list that appears when you press [Browse], searching for the address by pressing [Host Search], or entering the address using the keyboard on the touch panel display. Sample recipient setting:
|
Samba (UNIX/Linux/Mac OS X) |
Samba 2.2.8a or later is supported. In some environments, detailed settings may be required in order to use the Samba. For details, consult your network administrator. |
Set a user name not longer than 20 alphanumeric characters, and a password not longer than 14 alphanumeric characters. |
|
|
There are three methods for specifying the recipient address; selecting the desired address from the list that appears when you press [Browse], searching for the address by pressing [Host Search], or entering the address using the keyboard on the touch panel display. Sample recipient setting:
|
AppleTalk Network Setup Procedures |
To print via an AppleTalk network, it is necessary to perform the following procedures. |
To specify AppleTalk network settings, enable AppleTalk according to the instructions in the documentation provided with your Macintosh.
Specify the protocol settings. To specify the settings, use:
Specify the settings for each computer you use for printing. |
Remark |
|
|
|||||
Protocol Settings |
This section describes how to specify the protocol settings for the machine using the control panel. If you are configuring the settings for the first time, use the control panel of the machine. After configuring the settings, you can change them using software other than the control panel of the machine. For details, see "Network Setting Items." |
Remark |
|
||||||
[On] for <AppleTalk>: You can use the AppleTalk network. In [Service Name], enter a name for the printer not longer than 32 characters. The name you enter here appears on the Macintosh screen. If you are using a network that is set up in zones, enter the name of the zone in [Zone].
|
Setting Up a Computer for Printing |
After you have completed the machine protocol settings, install the printer driver on the Macintosh that will do the printing, and then make the settings for the print destination. Specify the following settings according to the instructions in the manual for each driver. |
Remark |
|
||||||
1. Installation of the UFR II printer driver 2. Print settings
1. Installation of the PPD file 2. Print settings 3. Selection of the printer name
|
Network Connection Problems and Remedies |
This section describes the causes of network connection problems, and how to resolve them. |
![]() |
Cause | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy | |
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
Printing Problems and Remedies |
This section describes how to resolve basic printing problems. |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy |
|
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
Cause 5 | |
Remedy | |
Cause 6 | |
Remedy | |
Cause 7 | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy |
|
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
Cause 5 | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy |
|
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
Cause 5 | |
Remedy | |
Cause 6 | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy |
|
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
Data Sending/File Sharing Problems and Remedies |
This section describes how to resolve data sending/file sharing problems. |
![]() |
Cause 1 | |
Remedy |
|
Cause 2 | |
Remedy | |
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
![]() |
Cause 1 | |
Remedy |
|
Cause 2 | |
Remedy |
|
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy | |
Cause 3 | |
Remedy |
|
Cause 4 | |
Remedy | |
Cause 5 | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy | |
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
Cause 5 | |
Remedy | |
Cause 6 | |
Remedy | |
![]() |
Cause 1 | |
Remedy | |
Cause 2 | |
Remedy | |
Cause 3 | |
Remedy | |
Cause 4 | |
Remedy | |
Cause 5 | |
Remedy | |
Cause 6 | |
Remedy | |
![]() |
Cause | |
Remedy | |
Encrypted SSL Data Communication Problems and Remedies |
This section describes how to resolve encrypted SSL data communication problems. |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause1 | |
Remedy | |
Cause2 | |
Remedy | |
Cause3 | |
Remedy |
|
![]() |
Cause | |
Remedy | |
![]() |
Cause1 | |
Remedy | |
Cause2 | |
Remedy | |
IEEE802.1X Authentication Problems and Remedies |
This section describes how to resolve IEEE802.1X authentication problems. |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
![]() |
Cause | |
Remedy | |
Network Setting Items |
If you are configuring the settings for the first time in "Interface Settings," "TCP/IPv4 Settings," "TCP/IPv6 Settings," or "Settings Common to TCP/IPv4 and TCP/IPv6," use the control panel of the machine. After configuring the TCP/IP settings, you can change them using the Remote UI. In the NetWare or AppleTalk network, the TCP/IP protocol must be used to specify the settings with software other than the control panel of the machine. The setting items are shown below. |
Remark |
|
|
|||||
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Change Settings/Display Connection Confirm. | On/Off | Off | N/A | ![]() |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
IPv4 Settings: Use IPv4 | ||||
Use IPv4 | On/Off | On | ![]() |
N/A |
IPv4 Settings: IP Address Settings | ||||
IP Address | IP address | 0.0.0.0 | ![]() |
N/A |
Subnet Mask | IP address | 0.0.0.0 | ![]() |
N/A |
Gateway Address | IP address | 0.0.0.0 | ![]() |
N/A |
DHCP | On/Off | Off | ![]() |
![]() |
RARP | On/Off | Off | ![]() |
![]() |
BOOTP | On/Off | Off | ![]() |
![]() |
IPv4 Settings: PING Command | ||||
PING Command | IP address | 0.0.0.0 | N/A | N/A |
IPv4 Settings: IP Address Range Settings*1 | ||||
RX/Print Range: Reject IPv4 Address |
Apply Settings: On/Off Up to 8 IPv4 addresses can be stored. |
Off | ![]() |
N/A |
RX/Print Range: Permit IPv4 Address |
Apply Settings: On/Off Up to 8 IPv4 addresses can be stored. |
Off | ![]() |
N/A |
Setting/Browsing Range: Reject IPv4 Address |
Apply Settings: On/Off Up to 8 IPv4 addresses can be stored. |
Off | ![]() |
N/A |
Setting/Browsing Range: Permit IPv4 Address |
Apply Settings: On/Off Up to 8 IPv4 addresses can be stored. |
Off | ![]() |
N/A |
IPv6 Settings: Use IPv6 | ||||
Use IPv6 | On/Off | Off | ![]() |
N/A |
IPv6 Settings: Stateless Address Settings | ||||
Use Stateless Address | On/Off | On | ![]() |
N/A |
IPv6 Settings: Manual Address Settings | ||||
Use Manual Address | On/Off | Off | ![]() |
N/A |
Manual Address | IPv6 Address (39 Characters maximum) | - | ![]() |
N/A |
Prefix Length | 0 to 128 | 64 | ![]() |
N/A |
Default Router Addr. | 39 Characters maximum | - | ![]() |
N/A |
IPv6 Settings: Use DHCPv6 | ||||
Use DHCPv6 | On/Off | Off | ![]() |
![]() |
IPv6 Settings: PING Command | ||||
IPv6 Address | 39 Characters maximum | - | ![]() |
N/A |
Host Name | 48 Characters maximum | - | ![]() |
N/A |
IPv6 Settings: IP Address Range Settings*1 | ||||
RX/Print Range: Reject IPv6 Address |
Apply Settings: On/Off Up to 8 IPv6 addresses can be stored. |
Off | ![]() |
N/A |
RX/Print Range: Permit IPv6 Address |
Apply Settings: On/Off Up to 8 IPv6 addresses can be stored. |
Off | ![]() |
N/A |
Setting/Browsing Range: Reject IPv6 Address |
Apply Settings: On/Off Up to 8 IPv6 addresses can be stored. |
Off | ![]() |
N/A |
Setting/Browsing Range: Permit IPv6 Address |
Apply Settings: On/Off Up to 8 IPv6 addresses can be stored. |
Off | ![]() |
N/A |
*1 | This item is available only if you are using the following optional equipment:
|
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
DNS Settings: DNS Server Address Settings: IPv4 | ||||
Primary DNS Server | IP Address | 0.0.0.0 | ![]() |
N/A |
Secondary DNS Server | IP Address | 0.0.0.0 | ![]() |
N/A |
DNS Settings: DNS Server Address Settings: IPv6 | ||||
Primary DNS Server | IPv6 Address | - | ![]() |
N/A |
Secondary DNS Server | IPv6 Address | - | ![]() |
N/A |
DNS Settings: DNS Host Name/Domain Name Settings: IPv4 | ||||
Host Name | 47 Characters maximum | Canon ****** ("******" represents the last six digits of a MAC address) |
![]() |
N/A |
Domain Name | 47 Characters maximum | (NULL) | ![]() |
N/A |
DNS Settings: DNS Host Name/Domain Name Settings: IPv6 | ||||
Use Same Host Name/Domain Name as IPv4 | On/Off | Off | ![]() |
N/A |
Host Name | 47 Characters maximum | Canon ****** ("******" represents the last six digits of a MAC address) |
![]() |
N/A |
Domain Name | 47 Characters maximum | - | ![]() |
N/A |
DNS Settings: DNS Dynamic Update Settings: IPv4 | ||||
DNS Dynamic Update | On/Off | Off | ![]() |
N/A |
DNS Settings: DNS Dynamic Update Settings: IPv6 | ||||
DNS Dynamic Update | On/Off | Off | ![]() |
N/A |
Register Stateless Address | On/Off | Off | ![]() |
N/A |
Register Manual Address | On/Off | Off | ![]() |
N/A |
Register Stateful Address | On/Off | Off | ![]() |
N/A |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
WINS Configuration | ||||
WINS Resolution | On/Off | Off | ![]() |
N/A |
WINS Server Address | IP address | 0.0.0.0 | ![]() |
N/A |
Node Type | Auto Set, display only | - | - | N/A |
Scope ID | 63 Characters maximum | (NULL) | ![]() |
N/A |
LPD Print Settings*2 | ||||
LPD Print Settings | On/Off | On | ![]() |
![]() |
LPD Banner Page*3 | On/Off | Off | ![]() |
![]() |
RAW Print Settings*2 | ||||
RAW Print Settings | On/Off | On | ![]() |
![]() |
Bidirectional Communication | On/Off | Off | ![]() |
![]() |
SNTP Settings | ||||
Use SNTP | On/Off | Off | ![]() |
N/A |
Polling Interval | Interval for performing time synchronization (1 to 48 hours) | 24 | ![]() |
N/A |
NTP Server Address | IP address or host name | (NULL) | ![]() |
N/A |
NTP Server Check | - | - | ![]() |
N/A |
FTP Print Settings*4 | ||||
Use FTP printing | On/Off | Off | ![]() |
![]() |
User | User name for FTP server login (24 Characters maximum) | (NULL) | ![]() |
N/A |
Password | Password for FTP server login (24 Characters maximum) | (NULL) | ![]() |
N/A |
WSD Print Settings*2 | ||||
Use WSD | On/Off | On | ![]() |
![]() |
Use WSD Browsing | On/Off | On | ![]() |
![]() |
Use Multicast Discovery | On/Off | On | ![]() |
![]() |
Use PASV Mode for FTP*5 | ||||
Use PASV Mode for FTP | On/Off | Off | ![]() |
![]() |
IPP Print Settings*2 | ||||
IPP Print Settings | On/Off | On | ![]() |
![]() |
Use SSL | On/Off | Off | ![]() |
N/A |
Use Authentication | On/Off | Off | ![]() |
N/A |
User | User name for IPP authentication (24 Characters maximum) | (NULL) | ![]() |
N/A |
Password | Password for IPP authentication (24 Characters maximum) | (NULL) | ![]() |
N/A |
Multicast Discovery | ||||
Response | On/Off | On | ![]() |
![]() |
Scope Name | Scope name to be used for a multicast discovery (32 Characters maximum) | (default) | ![]() |
N/A |
*2 | This item is available only if you are using the following optional equipment:
|
*3 | This item is available only if you are using the following optional equipment:
|
*4 | This item is available only if you are using the following optional equipment:
|
*5 | This item is available only if the optional Color Universal Send Kit is activated by registering a license key. |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Certificate Settings: Generate Network Communication Key | ||||
Key Name | 24 Characters maximum | (NULL) | ![]() |
N/A |
Key Algorithm | RSA, display only | - | - | N/A |
Key Length (bit) | 512/1024 | 512 | ![]() |
N/A |
Start Date of Validity | Year, Month, Date (01/01/2000 - 31/12/2048) | (NULL) | ![]() |
N/A |
End Date of Validity | Year, Month, Date (01/01/2000 - 31/12/2048) | (NULL) | ![]() |
N/A |
Country/Region | Country/Region name and code (2 Characters maximum) | Singapore (SG) | ![]() |
N/A |
State | 24 Characters maximum | (NULL) | ![]() |
N/A |
City | 24 Characters maximum | (NULL) | ![]() |
N/A |
Organization | 24 Characters maximum | (NULL) | ![]() |
N/A |
Orgnztion Unit | 24 Characters maximum | (NULL) | ![]() |
N/A |
Common Name | IP address or FQDN (24 Characters maximum) | (NULL) | ![]() |
N/A |
Certificate Settings: Generate Key | ||||
Generate/Update Device Signature Key*6 | - | - | ![]() |
N/A |
Certificate Settings: Key and Certificate List: Key and Certificate List for this Machine | ||||
Certificate Details | Version/Serial Number/Signature Algorithm/Issue Destination/Start Date of Validity/End Date of Validity/Issuer/Public Key/Certificate Thumbprint/Certificate Verification | - | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
Display Use Location | Displays what the key pair is being used for | - | ![]() |
N/A |
Certificate Settings: Key and Certificate List: Key and Certificate List for Users*7 | ||||
Certificate Details | Version/Serial Number/Signature Algorithm/Issue Destination/Start Date of Validity/End Date of Validity/Issuer/Public Key/Certificate Thumbprint/Certificate Verification | - | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
Certificate Settings: CA Certificate List | ||||
Certificate Details | Version/Serial Number/Signature Algorithm/Issue Destination/Start Date of Validity/End Date of Validity/Issuer/Public Key/Certificate Thumbprint/ Certificate Verification | - | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
Certificate Settings: Register Key and Certificate | ||||
Register | Key Name (24 Characters maximum) Password (24 Characters maximum) |
- | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
Certificate Settings: Register CA Certificate | ||||
Register | - | - | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
*6 | [Generate/Update Device Signature Key] is enabled if the optional Universal Send Security Feature Set is activated by registering a license key. |
*7 | [Key and Certificate List for Users] is enabled if the optional Digital User Signature Kit is activated by registering a license key. |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Use HTTP | ||||
Use HTTP | On/Off | On | ![]() |
![]() |
SSL Settings | ||||
SSL Settings | Functions using SSL encrypted communications | - | ![]() |
N/A |
Key and Certificate | ||||
Set as the Default Key | - | - | ![]() |
N/A |
Certificate Details | Version/Serial Number/Signature Algorithm/Issue Destination/Start Date of Validity/End Date of Validity/Issuer/Public Key/Certificate Thumbprint/Certificate Verification | - | ![]() |
N/A |
Display Use Location | Displays what the key pair is being used for | - | ![]() |
N/A |
Proxy Settings*8 | ||||
Use Proxy | On/Off | Off | ![]() |
N/A |
Server Address | IP address or FQDN (128 Characters maximum) | (NULL) | ![]() |
N/A |
Port Number | 1 to 65535 | 80 | ![]() |
N/A |
Use Proxy within the Same Domain |
On/Off | Off | ![]() |
N/A |
Authentication Settings | ||||
Use Proxy Authentication | On/Off | Off | ![]() |
N/A |
User | 24 Characters maximum | (NULL) | ![]() |
N/A |
Password | 24 Characters maximum | (NULL) | ![]() |
N/A |
Permitted Receiving MAC Address Settings | ||||
Permitted Receiving MAC Address Settings | Apply Settings: On/Off MAC addresses (a maximum of 100 addresses can be registered) |
Off | ![]() |
N/A |
Dept. ID Management Password Confirmation*2 | ||||
Dept. ID Management Password Confirmation | On/Off | On | ![]() |
N/A |
*2 | This item is available only if you are using the following optional equipment:
|
*8 | This item is available only if you are using the following optional equipment:
|
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Use IPSec | On/Off | Off | ![]() |
N/A |
Receive Non-policy Packets | Allow/Reject | Allow | ![]() |
N/A |
Edit | - | - | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
Policy On/Off | - | - | ![]() |
N/A |
Register: Policy Name | ||||
Policy Name | 24 Characters maximum | (NULL) | ![]() |
N/A |
Register: Selector Settings | ||||
Local Address | All IP addresses/IPv4 Address/IPv6 Address/IPv4 Manual Settings/IPv6 Manual Settings | All IP addresses | ![]() |
N/A |
Remote Address | All IP addresses/All IPv4 addresses/All IPv6 addresses/IPv4 Manual Settings/IPv6 Manual Settings | All IP addresses | ![]() |
N/A |
Port | Specify by Port Number/Specify by Service Name | Specify by Port Number | ![]() |
N/A |
Register: IKE Settings | ||||
IKE Mode | Main/Aggressive | Main | ![]() |
N/A |
Authentication Method | Pre-Shared Key Method/Digital sig. Method | Pre-Shared Key Method | ![]() |
N/A |
Auth./Encryption Algorithm | Auto/Manual Settings | Auto | ![]() |
N/A |
Register: IPSec Network Settings | ||||
Validity: Time | 1 to 65535 minutes | 480 | ![]() |
N/A |
Validity: Size | 1 to 65535MB | 65535 | ![]() |
N/A |
PFS | On/Off | Off | ![]() |
N/A |
Auth./Encryption Algorithm | Auto/Manual Settings | Auto | ![]() |
N/A |
Connect. Mode | Transport, display only | - | - | N/A |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
NetWare | On/Off | Off | ![]() |
![]() |
Frame Type | Auto Detect/Ethernet II/Ethernet 802.2/Ethernet 802.3/Ethernet SNAP | Auto Detect | ![]() |
N/A |
IPX External Network Number | Auto Set, display only | - | - | N/A |
Node Number | Auto Set, display only | - | - | N/A |
Print Service | Bindery PServer/R Printer/NDS PServer/NPrinter | NDS PServer | ![]() |
N/A |
Packet Signature | Auto Set, display only | - | - | N/A |
Bindery PServer Settings | ||||
Print Server | 47 Characters maximum | (NULL) | ![]() |
N/A |
File Server | 47 Characters maximum | (NULL) | ![]() |
N/A |
Print Server Password | 20 Characters maximum | (NULL) | ![]() |
N/A |
Printer Number | 0 to 15 | 0 | ![]() |
N/A |
Polling Interval | 1 to 15 seconds | 5 | ![]() |
N/A |
Printer Form | 0 to 255 | 0 | ![]() |
N/A |
Buffer Size | 1 to 20 (KB units) | 20 | ![]() |
N/A |
Service Mode | Service only currently mounted form/Change forms as needed/Minimize form changes across print queues/Minimize form changes within print queues | Minimize form changes within print queues | ![]() |
N/A |
RPrinter Settings | ||||
Print Server | 47 Characters maximum | (NULL) | ![]() |
N/A |
File Server | 47 Characters maximum | (NULL) | ![]() |
N/A |
Printer Number | 0 to 15 | 0 | ![]() |
N/A |
NDS PServer Settings | ||||
Print Server | 64 Characters maximum | (NULL) | ![]() |
N/A |
Tree | 32 Characters maximum | (NULL) | ![]() |
N/A |
Context | 256 Characters maximum | (NULL) | ![]() |
N/A |
Print Server Password | 20 Characters maximum | (NULL) | ![]() |
N/A |
Printer Number | 0 to 254 | 0 | ![]() |
N/A |
Polling Interval | 1 to 255 seconds | 5 | ![]() |
N/A |
Printer Form | 0 to 255 | 0 | ![]() |
N/A |
Buffer Size | 3 to 20 (KB units) | 20 | ![]() |
N/A |
Service Mode | Service only currently mounted form/Change forms as needed/Minimize form changes across print queues/Minimize form changes within print queues | Minimize form changes within print queues | ![]() |
N/A |
NPrinter Settings | ||||
Print Server | 64 Characters maximum | (NULL) | ![]() |
N/A |
Tree | 32 Characters maximum | (NULL) | ![]() |
N/A |
Context | 256 Characters maximum | (NULL) | ![]() |
N/A |
Printer Number | 0 to 254 | 0 | ![]() |
N/A |
*1 | This item is available only if you are using the following optional equipment:
|
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
AppleTalk | On/Off | Off | ![]() |
![]() |
Phase | Phase 2 (fixed) | - | - | N/A |
Service Name | 32 Characters maximum | Model name | ![]() |
N/A |
Zone | 32 Characters maximum | * | ![]() |
N/A |
*1 | This item is available only if you are using the following optional equipment:
|
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Use SMB Server | On/Off | On | ![]() |
N/A |
Server | 15 Characters maximum | (NULL) | ![]() |
N/A |
Workgroup | 15 Characters maximum | (NULL) | ![]() |
N/A |
Comment | 48 Characters maximum | (NULL) | ![]() |
N/A |
LM Announce | On/Off | Off | ![]() |
N/A |
SMB Printer Settings | ||||
Use SMB | On/Off | On | ![]() |
N/A |
Printer | 13 Characters maximum | (NULL) | ![]() |
N/A |
*1 | This item is available only if you are using the following optional equipment:
|
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Get Printer Mgmt Info from Host | On/Off | Off | ![]() |
![]() |
Use SNMP v. 1 | On/Off | On | ![]() |
![]() |
Community Name 1 Settings | ||||
Community Name 1 | On/Off | On | ![]() |
N/A |
MIB Access Permission | Read/Write/Read Only | Read Only | ![]() |
N/A |
Community Name | Community Name (32 Characters maximum) | public | ![]() |
N/A |
Community Name 2 Settings | ||||
Community Name 2 | On/Off | Off | ![]() |
N/A |
MIB Access Permission | Read/Write/Read Only | Read Only | ![]() |
N/A |
Community Name | Community Name (32 Characters maximum) | public2 | ![]() |
N/A |
Use SNMP v. 3 | On/Off | Off | ![]() |
N/A |
User Settings | ||||
User On/Off | - | - | ![]() |
N/A |
Register | User/MIB Access Permission/Security Settings/Authent. Algorithm/Authent. Password/Encryption Algorithm/Encryption Password | - | ![]() |
N/A |
Details/Edit | User/MIB Access Permission/Security Settings/Authent. Algorithm/Authent. Password/Encryption Algorithm/Encryption Password | - | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
Context Settings | ||||
Register | Context name (32 Characters maximum) | - | ![]() |
N/A |
Edit | Context name (32 Characters maximum) | - | ![]() |
N/A |
Erase | - | - | ![]() |
N/A |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Enable Dedicated Port | On/Off | On | ![]() |
![]() |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Use Spooler | On/Off | Off | ![]() |
![]() |
*1 | This item is available only if you are using the following optional equipment:
|
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Startup Time Settings | 30 to 300 seconds | 30 | ![]() |
N/A |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Auto Detect | On/Off | On | ![]() |
N/A |
Communication Mode | Half Duplex/Full Duplex | Half Duplex |
![]() |
N/A |
Ethernet Type | 10 Base-T/100 Base-TX/1000 Base-T | 10 Base-T | ![]() |
N/A |
MAC Address | Display only | - | - | N/A |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
SMTP Receipt | On/Off | On | ![]() |
![]() |
POP | On/Off | On | ![]() |
![]() |
SMTP Server | Server name or IP address (48 Characters maximum) | (NULL) | ![]() |
N/A |
E-mail Address | 64 Characters maximum | (NULL) | ![]() |
N/A |
POP Server | Server name or IP address (48 Characters maximum) | (NULL) | ![]() |
N/A |
POP Address | 64 Characters maximum | (NULL) | ![]() |
N/A |
POP Password | 32 Characters maximum | (NULL) | ![]() |
N/A |
POP Interval | 0 to 99 (If the interval is set to '0', the incoming e-mail is not checked automatically.) | 0 | ![]() |
N/A |
Authent./Encryption | ||||
POP AUTH Method | Standard/APOP/POP AUTH |
Standard | N/A | ![]() |
POP Authentication before Sending | On/Off | Off | N/A | N/A |
SMTP Authentication (SMTP AUTH) | On/Off | Off | N/A | N/A |
User | User name for SMTP authentication (64 Characters maximum) | (NULL) | N/A | N/A |
Password | Password for SMTP authentication (32 Characters maximum) | (NULL) | N/A | N/A |
Allow SSL (POP) | On/Off | Off | N/A | N/A |
Allow SSL (SMTP Send) | On/Off | Off | N/A | N/A |
Allow SSL (SMTP Receive) | SSL/On/Off | Off | N/A | N/A |
*1 | This item is available only if the optional Color Universal Send Kit is activated by registering a license key. |
|
Item | Setting Description | Default Setting | Can be set in Remote UI | Device Information Delivery |
Use IEEE802.1X | On/Off | Off | ![]() |
N/A |
User | Name of the user to be authenticated with IEEE802.1X authentication | (NULL) | ![]() |
N/A |
Password | Password of the user to be authenticated with IEEE802.1X authentication | (NULL) | ![]() |
N/A |
TLS Settings | ||||
Use TLS | On/Off | Off | ![]() |
N/A |
Key and Certificate | ||||
Set as the Default Key | - | - | ![]() |
N/A |
Certificate Details | Version/Serial Number/Signature Algorithm/Issue Destination/Start Date of Validity/End Date of Validity/Issuer/Public Key/Certificate Thumbprint/Certificate Verification | - | ![]() |
N/A |
Display Use Location | Displays what the key pair is being used for. | - | ![]() |
N/A |
TTLS Settings | ||||
Use TTL | On/Off | Off | ![]() |
N/A |
MSCHAPv2 | - | - | ![]() |
N/A |
PAP | - | - | ![]() |
N/A |
PEAP Settings | ||||
Use PEAP | On/Off | Off | ![]() |
N/A |
Remark |
|
||||||
Viewing the Network Access Log |
This machine logs attempts to gain access from IP addresses that it has been set to reject. The procedure for referring to the access log is as follows. For instruction on how to set the machine to permit or reject specific IP addresses, see step 8 in "TCP/IPv4 Settings" or step 6 in "TCP/IPv6 Settings." |
Remark |
|
||||||
The log pertaining to the rejected IP addresses is displayed. Up to 100 logs can be displayed. You can export the log to a CSV format file, using the Remote UI. For instructions, see "Remote UI." |
Obtaining the Public Key of the Machine to Use SSL with Windows Vista |
If you want to use IPPS printing, it is necessary to obtain the public key of the machine and install it in Windows Vista by following the procedure below. |
|
|
|
|
|
|
|
|
|
|