Command Center RX User Guide
Command Center RX User Guide
Command Center RX User Guide
com
Command Center RX
User Guide
About This Guide
This user guide is intended to help you configure the settings using the
embedded web server (Command Center RX) correctly and take simple
troubleshooting measures as needed so that the machine can always be
used in the optimum condition.
The settings and screens described in this guide may be different according
to the machine type.
Legal Notes
Unauthorized reproduction of all or part of this guide is prohibited.
We cannot be held liable for any problems arising from the use of this
product, regardless of the information herein.
Regarding Trademarks
Microsoft Windows is a registered trademark of Microsoft Corporation in the
U.S. and/or other countries. KPDL is a trademark of Kyocera Corporation. PCL
is a trademark of Hewlett-Packard Company. Google and Google Chrome are
trademarks of Google LLC.
All other brand and product names herein are registered trademarks or
trademarks of their respective companies.
1 Introduction .......................................................................... 1
System Requirements .......................................................................... 1
Accessing the Embedded Server ........................................................ 1
4 Document Box..................................................................... 10
Custom box ......................................................................................... 10
Sub Address......................................................................................... 14
Polling Box........................................................................................... 15
FAX Memory RX Box ........................................................................... 16
Job Box Settings .................................................................................. 17
7 Function Settings................................................................ 33
Common/Job Default.......................................................................... 33
Copy...................................................................................................... 38
Printer .................................................................................................. 39
E-mail.................................................................................................... 45
Scan to Folder...................................................................................... 49
FAX ........................................................................................................ 50
Send and Forward .............................................................................. 53
Forwarding .......................................................................................... 55
Operation Panel .................................................................................. 57
8 Network Settings................................................................ 59
General................................................................................................. 59
TCP/IP................................................................................................... 59
Protocol................................................................................................ 72
Wireless LAN........................................................................................ 79
9 Security Settings................................................................. 82
Device Security.................................................................................... 82
Network Security ................................................................................ 88
Certificates........................................................................................... 90
1 Introduction
With the embedded server, the administrator can remotely track paper and toner
usages per user and the status of optional equipment installed. The embedded
server also configures device settings, monitors jobs, and manages document
boxes and address books.
System Requirements
The embedded server operates in the following environment. Check the following
before use.
Protocol
• The TCP/IP protocol is installed on the PC.
• An IP address is assigned to the machine.
Web browser
• Microsoft Edge (Microsoft Edge operates on Microsoft Windows 10.)
• Mozilla Firefox 14.0 or later
• Safari 5.0 or later (Safari operates on Apple Mac OS X 10.4 or later.)
• Google Chrome 21.0 or later
Note: Do not access to other web sites for security reasons while operating the
Command Center RX.
2. Enter the device's host name or IP address as the URL. If you use the host name,
you must first specify the DNS server information. For example, https://
192.168.10.1.
User Guide 1
Introduction
When you select Login or Admin Login on the upper right corner of the screen,
the Admin Login screen appears. Enter the User Name and Password, and then
click Login button.
For initial login, use the predefined “Admin” as the User Name, and machine's
serial number as the Password to access all the pages. The serial number is the
factory setting. For the location of the serial number, refer to “Preface” in the
Operation Guide.
The embedded server's home page allows you to select a category from the
navigation menu on the left to view and set values for that category, as well as
displaying information on the device, user, and consumables on the right, which
changes according to the selection in the navigation menu.
Login
To fully access the features of the embedded server pages, enter the User Name
and Password and click Login. Entering the predefined administrator password
allows the user to access all pages, including Document Box, Address Book, and
Device Settings on the navigation menu.
User Guide 3
The Embedded Server Home Page
To access the embedded server pages, the users can be identified by choosing one
of network authentication, local authentication, and job accounting authentication
methods. For details, see 3 About Login Levels of Login on page.
Top Bar
At the top of the home page, you can perform the following:
Home
To quickly return to this home page (top page) from any other server page,
click Home.
Select language
Auto-refresh
To continuously update the embedded server's pages to the most recent sta-
tus, select the Auto-Refresh check box.
Note: If checking [Auto-refresh] check box, the login state continues without
the automatic logout. Do not check [Auto-refresh] for the safe connection.
Refresh
Click this circular arrow icon to refresh the embedded server pages any time.
Navigation Menu
The navigation menu at the left of the home page divides the following functions
onto separate bars. By clicking each bar, you can jump to the desired page as
outlined below:
This page includes this machine's various information. Access this menu when
executing Remote Operation. After clicking on Device Information/Remote
Operation, information is available in the following device information pages:
Configuration
This page includes this machine's various information that apply to the entire
machine, such as Device Defaults (basic, ID information, and capability) as well
as optional equipment installed, firmware, network parameters, and FAX
parameters.
Counter
This page includes the printed pages and scanned pages. You can narrow
details by pulling down Type.
Remote Operation
Click Start button to execute Remote Operation.
Note: To execute Remote Operation, Enhanced VNC (RFV) over TLS is set to
On in network protocol and enter the port number as necessary. Also, Remote
Operation is set to On in the Remote Operation Settings page and configure
the settings as necessary. For details, refer to Protocol on page 72 and Remote
Operation on page 107.
Job Status
This page includes information on all device jobs including job status for print-
ing, scanning, storing, and scheduled jobs as well as the job log. After clicking
on Job Status, information is available in the following job status pages: The
displayed items vary depending on the access level.
User Guide 5
The Embedded Server Home Page
Document Box
This page allows you to add, edit, or delete a document box, and delete docu-
ments in a document box. This page allows you to add, edit, or delete a docu-
ment box, and delete documents in a document box. Under Document Box,
Custom Box, Sub Address, Polling Box, FAX Memory RX Box, and Job Box
Settings are included. For more information, see Document Box on page 10.
Address Book
This page allows you to add, edit, or delete a contact address or a group of
addresses. Under Address Book, Machine Address Book, External Address
Book Settings, and One Touch Key are included. For more information, see
Address Book on page 18.
Device Settings
This page includes advanced settings that apply to the entire device. Under
Device Settings, Paper/Feed/Output, Original Document, Energy Saver/
Timer, Date/Time and System are included. For more information, see Device
Settings on page 24.
Function Settings
This page includes advanced settings of each function that the device has.
Under Function Settings, Common/Job Defaults, Copy, Printer, E-mail, Scan
to Folder, FAX, Send and Forward, Forwarding, and Operation Panel are
included. For more information, see Function Settings on page 33.
Network Settings
This page includes advanced network settings that apply to the device. Under
Network Settings, General, TCP/IP, and Protocol are included. For more
information, see Network Settings on page 59.
Security Settings
This page includes advanced security settings that apply to the device. Under
Security Settings, Device Security, Send Security, Network Security, and
Certificates are included. For more information, see Security Settings on page
82.
Management Settings
This page includes advanced management settings that apply to the device.
Under Management Settings, Job Accounting, Authentication, ID Card,
Notification/Report, History Settings, SNMP, System Stamp, Message
Board, Restart/Reset and Remote Operation are included. For more infor-
mation, see Management Settings on page 94.
Links
Links to our websites. Visit the following website for more information and
downloads.
HyPAS Applications
The link information is displayed when the HyPAS applications are installed
and configuring their settings.
Network options
When the optional network interface kit (IB-50 or IB-51) is attached to the
machine, the link information to web page of IB-50 or IB-51 is displayed.
Device Status
The home page displays information on the status of the device, operation panel
usage, and consumables, to the right of the page. This page allows you to quickly
verify the device's current settings and statuses.
Status Displays
Shows the user currently logged in to the device from the operation panel and
its operating status. Note that settings made using the operation panel may
override those made using the embedded server.
Paper
Shows the size, type, maximum capacity, and the current supply by paper
source.
Toner
Shows the toner supply. The status of the waste toner box is also shown.
Maintenance
User Guide 7
About Login
3 About Login
This section provides information to help the administrator manage domain and
local users. The administrator can set authentication that allows the predefined
users to access the embedded server pages and set administrator passwords.
Levels of Login
An administrator can configure the device to require a user login before it is
accessed, in either of three different ways of authentication as described in this
section.
If you select local or network authentication, User Login must be turned on.
The factory default local authentication administrator user name is “Admin” and
the password is the serial number of the machine.
Local Authentication
Users are registered in this device and one-to-one authentication is performed
between this machine and a PC. A local account user accesses the embedded
server by entering a User Name and Password and selecting Local in the
drop-down list (if shown) below the entries, followed by clicking the Login but-
ton.
A user logged in with a general user account cannot add or delete document
boxes, nor view the Address Book, Device Settings, Function Settings, Net-
work Settings, Security Settings, and Management Settings.
Network Authentication
If the device is configured for network authentication, the device and the rele-
vant PC's need to be under the management of a Windows domain network.
Select the domain you want to login to in the drop-down list, enter a User
Name and Password, and then click the Login button.
A user logged in with a general user account cannot add or delete document
boxes, nor view the Address Book, Device Settings, Function Settings, Net-
work Settings, Security Settings, and Management Settings.
For access using a job account ID, My Information, Device Information, Job
Status, Document Box, Address Book, and Links are displayed in the naviga-
tion menu.
User Guide 9
Document Box
4 Document Box
This page is accessible when you have logged in using a general user or
administrator account. It allows you to add or delete a document box, as well as
deleting documents in a document box. A general user is not allowed to add or
delete a document box.
There are several types of document boxes, which vary depending on models:
Custom Box, Sub Address, Polling Box, FAX Memory RX Box, and Job Box
Settings as described below. Note that Sub Address, Polling Box, and FAX
Memory RX Box are available only if the device is equipped with a FAX kit.
The users with a general user account can delete the documents which were
created and added in their own document boxes.
Custom box
The section below explains how to add, edit or delete custom boxes as well as
working with their contents.
2. Click Add icon. The New Box - Property page will open.
3. Make entries required to define the custom box, such as Number, Name, etc.
2. Select the custom box you want to edit by clicking on its Number or Box Name. The
documents contained in the custom box are displayed with its name, date of
creation, size, etc. You can choose List View or Thumbnail to view the box
contents.
Alternatively, you can open the list of the user boxes, directly enter the box number
in the Box # window and click Go to, or enter the box name in the Box Name
window and click the magnifying glass icon, to quickly search the custom box.
4. Make entries required to modify the custom box properties such as Number,
Name, etc.
First select the document to apply any of the above actions by following the steps
below:
1. Click Custom Box under Document Box on the navigation menu. The Document
Box : Custom Box page opens.
2. Select the custom box you want to work with by clicking on its Number or Box
Name. If the box is password-protected, enter the password. The documents
contained in the custom box are displayed with its name, date of creation, size, etc.
You can choose List View or Thumbnail to view the box contents.
To search the document in the custom box, you can open the custom box, enter
the document name in the File Name window and click the magnifying glass icon.
3. In the custom box, select the check box next to the name of the document that you
want to apply the action. You can select more than one document simultaneously.
Deleting a Document
2. Click Move icon. The Move Settings page opens. The selected file is shown in
Selected Files.
3. Select the box to move the document to in Destination. If the box is password-
protected, enter the password.
2. Click Copy icon. The Copy Settings page opens. The selected file is shown in
Selected Files.
3. Select the box to store the copied document in Destination. If the box is password-
protected, enter the password.
2. Click Join icon. The Join Settings page opens. The selected file is shown in Selected
Files (Join Order).
User Guide 11
Document Box
3. If desired, change the order of the documents to be joined by clicking Top, Up,
Down, and Bottom. You can exclude a document from the Selected Files (Join
Order) list by clicking Delete.
4. Name the new document which the documents selected are joined in File Name.
5. Click Join button. The documents are joined in the new document.
Downloading a Document to a PC
1. Select a document you want to download and store into your PC as described
above. You can download only one document at a time.
2. Click Download icon. The Download Settings page opens. The selected file is
shown in Selected Files.
If you want to download the selected page in a file, click Settings in Selected Files.
After selecting the desired pages, click Submit button.
3. Use the Color Selection drop-down list if you want to change the color of the
document after downloading. For example, you can download a color document
as a monochrome document when it is stored in a PC.
4. Use the File Format drop-down list to select the type of the document you want to
send.
5. Click Download button to begin downloading. Enter the name and destination of
the document as you are prompted.
• For example, on Microsoft Edge, go to ... > Settings > Cookies and site
permissions > Pop-ups and redirects, and switch off Block (recommended)
to turn off pop-up blocking. Or, click Add on Allow and enter the machine's IP
address in Add a site.
• If pop-up blocking is still engaged, on Microsoft Edge, select ... > Extensions
and switch off the toggle switches of the extensions registered in Installed
extensions.
1. Select a document you want to send as described above. You can send only one
document at a time.
2. Click Send icon. The Send Settings page opens. The selected file is shown in
Selected Files.
3. In Destination, select a destination from Address Book, E-mail, Folder, FAX and
FAX Server.
To delete a destination from Destinations, click Delete icon. If you want to print
the selected page in a file, click Settings in Selected Files. After selecting the
desired pages, click Submit button.
5. Enter the date of sending and job ID in Additional Information. These entries are
appended in the file name.
6. Use the File Format drop-down list to select the type of the document you want to
send.
8. Click Send button. If you are prompted to confirm sending, in case Confirmation
Screen is activated on the device's operation panel, make confirmation. The
document is sent to the destination.
Printing a Document
2. Click Print button. The Print Settings page opens. The selected file is shown in
Selected Files (Print Order).
3. If desired, change the order of the documents to be joined by clicking Top, Up,
Down, and Bottom. You can exclude a document from the Select Pages (Print
Order) list by clicking Delete.
If you want to print the selected page in a file, click Settings in Selected Pages to
Process. After selecting the desired pages, click Submit button.
4. Enter the number of copies to print in Copies. When clicking Delete after Print,
the document is deleted after printing.
5. Use the Paper Selection drop-down list if you want to change the paper source.
6. In Functions, change settings for Duplex, Combine, EcoPrint, and Toner Save
Level as desired.
2. Click Delete icon once. This will not delete any custom box yet, but this will let the
checkboxes (Select) appear to the left.
3. Select the custom box you want to delete by selecting the checkbox to the left. You
can select only one custom box to delete at a time.
4. You can enter the box name in the Box Name window and click the magnifying
glass icon to quickly search the custom box.
User Guide 13
Document Box
Sub Address
The section below explains how to add, edit or delete Sub Address Boxes as well as
working with their contents.
2. Select the Sub Address Box you want to edit by clicking on its Number or Box
Name. The documents contained in the Sub Address Box are displayed with its
name, date of creation, size, etc. You can choose List View or Thumbnail to view
the box contents.
Alternatively, you can directly enter the box number in the Box # window and click
Go to, or enter the box name in the Box Name window and click the magnifying
icon, to quickly search the Sub Address Box.
4. Make entries required to modify the Sub Address Box properties such as Number,
Name, etc.
2. Select the Sub Address Box you want to work with by clicking on its Number or Box
Name. If the box is password-protected, enter the password. The documents
contained in the Sub Address Box are displayed with its name, date of creation,
size, etc. You can choose List View or Thumbnail to view the box contents. To view
details on a document in the Sub Address Box, click its Name. The Property page
opens and you can view the number of pages, resolution, etc. You can also change
the file name by clicking Change File Name or preview by clicking Preview on this
page.
To search the document in the Sub Address Box, you can open the Sub Address
Box, enter the document name in the File Name window and click the magnifying
glass icon.
3. In the Sub Address Box, select the check box next to the name of the document
that you want to apply the action. You can select more than one document
simultaneously.
4. Select either of Delete, Download, and Print to apply to the document. To perform
either of these actions, follow the same procedure as described in Custom box on
page 10.
2. Click Delete icon. This will not delete any Sub Address Box yet, but this will let the
checkboxes (Select) appear to the left.
3. Select the Sub Address Box you want to delete by selecting the check box to the
left. You can select only one Sub Address Box to delete at a time. You can enter the
box name in the Box Name window and click the magnifying glass icon to quickly
search the custom box.
4. Click Delete icon once. If required, enter the password and click OK.
Polling Box
This page allows you to print or delete documents in polling boxes. Also, you can
determine whether documents are automatically deleted or retained after polling.
1. Click Polling Box under Document Box on the navigation menu. The Polling Box
page opens.
2. Click Box Property. The Polling Box - Property opens to select whether the
document which was sent is deleted, or overwritten and retained.
1. Click Polling Box under Document Box on the navigation menu. The Polling Box
page opens. You can choose List View or Thumbnail to view the box contents. To
view details on a document in the polling box, click its Name. The Property page
opens and you can view the number of pages, resolution, etc. You can also change
the file name by clicking Change File Name or preview by clicking Preview on this
page.
2. Select the document(s) you want to delete by selecting the check box to the left.
You can select more than one check box to delete the documents simultaneously.
User Guide 15
Document Box
1. Click Polling Box under Document Box on the navigation menu. The Polling Box
page opens. You can choose List View or Thumbnail to view the box contents. To
view details on a document in the polling box, click its Name. The Property page
opens and you can view the number of pages, resolution, etc. You can also change
the file name by clicking Change File Name or preview by clicking Preview on this
page.
2. Select the document(s) you want to print by checking the checkbox to the left. You
can select more than one checkbox to print the documents in succession.
4. You can immediately start to print the documents in the order shown in Selected
Files by clicking Print. If you want to change the order of printing, highlight a
document and press Top, Up, etc. If you want to omit a document from the list,
click Delete icon.
1. Click FAX Memory RX Box under Document Box on the navigation menu. The FAX
Memory RX Box page opens. You can choose List View or Thumbnail to view the
box contents. To view details on a document in the FAX Memory RX Box, click its
Name. The Property page opens and you can view the number of pages,
resolution, etc. You can also change the file name by clicking Change File Name
or preview by clicking Preview on this page.
2. Select the document(s) you want to delete by selecting the check box to the left.
You can select more than one check box to delete the documents simultaneously.
1. Click FAX Memory RX Box under Document Box on the navigation menu. The FAX
Memory RX Box page opens. You can choose List View or Thumbnail to view the
box contents. To view details on a document in the FAX Memory RX Box, click its
Name. The Property page opens and you can view the number of pages,
resolution, etc. You can also change the file name by clicking Change File Name
or preview by clicking Preview on this page.
2. Select the document(s) you want to print by checking the checkbox to the left. You
can select more than one checkbox to print the documents in succession.
4. You can immediately start to print the documents in the order shown in Selected
Files by clicking Print. If you want to change the order of printing, highlight a
document and press Top, Up, etc. If you want to omit a document from the list,
click Delete icon.
1. Click Job Box Settings under Document Box on the navigation menu. The
Document Box : Job Box Settings page opens.
2. Enter the value in Quick Copy Job Retention. You can select Quick Copy jobs from
0 to 300.
3. To delete automatically the temporary retained jobs after printing, select 1 hour,
4 hours, 1 day, or 1 week on the Deletion of Job Retention drop-down list. If you
do not want to delete the jobs after printing, select Off on the Deletion of Job
Retention drop-down list.
4. To delete a PIN print document when the power is turned off, set Deletion of PIN
Print at Power Off to On.
User Guide 17
Address Book
5 Address Book
This page is accessible when you have logged in using a general user or
administrator account.
Address Book contains Machine Address Book and External Address Book. You
can also specify the address quickly by assigning it to the One-Touch key.
Contacts
This subsection explains how to add, edit or delete contacts in the machine
address book.
In the Address Book : Machine Address Book page, contacts and groups are
listed together. Contacts are identified by the single person icon and groups by the
triple person icon. You can filter to display only the contacts or groups by choosing
Contact or Group on the Type drop-down list.
You can also enter SMB and FTP access information for the contact including a
shared folder accessible from Microsoft Windows Network. Specify Host Name,
Port Number, Path to the shared folder, Login User Name, and Login Password
for the contact. When the Test button is pressed, this machine tries to connect to
the SMB or FTP server.
If you use the host name, you must first specify the DNS server information.
If the FAX system is installed is activated in the system, you can include a FAX
number.
After selecting S/MIME to On, when registering the mail address, the New
Contact - Property screen appears. Among Encryption Certificate, Root
Certificate (S/MIME), Intermediate Certificate 1(to 3), click Import button of
required Certificate. The Import Certificate screen appears. Click Open button to
specify the Certificate, and click Submit, OK button sequentially. The setting is
registered.
Editing a Contact
The steps below allow you to modify the number or name, e-mail address, SMB
and FTP information, FAX settings of a contact.
1. Click Machine Address Book under Address Book on the navigation menu. The
Address Book : Machine Address Book page opens.
2. Click the contact's Number or Name you want to edit. The Property page appears.
Alternatively, you can directly enter the address number in the Address # window
and click Go to, or enter the address name in the Address Name window and click
the magnifying icon, to quickly search the contact.
3. Modify Number, Name, or E-mail of the contact. Click Settings button on S/MIME
Certificate. The Property page appears. Click Import button to import the
necessary encryption certificate file. If the system is installed with a FAX system has
activated, you can modify these settings.
4. Modify the settings for SMB and FTP accesses as desired. When the Test button is
pressed, this machine tries to connect to the SMB or FTP server.
Note: You can also select Connection Test (Encrypted TX) when you try to connect
to the FTP server.
Deleting a Contact
1. Click Machine Address Book under Address Book on the navigation menu. The
Address Book : Machine Address Book page opens.
Select the contact(s) you want to delete by selecting the checkbox to the left.
2. If you want all contacts displayed on the page deleted, click Check All icon. To
deselect all, click None icon.
2. Click Add Group button. The New Group - Property page opens.
4. Add contacts to the group by clicking the Add icon. The Addresses page appears.
5. Select the contact to join the group by checking the Select checkbox to the left. You
can select more than one document simultaneously. Note that the contacts to join
must already have been existent on the Addresses page.
6. Click Submit button. You are returned to the Property page. To delete a contact,
select a contact and click the Delete icon.
7. Click Submit button. Repeat the above steps to add more groups.
User Guide 19
Address Book
Edit Group
1. Click Machine Address Book under Address Book on the navigation menu. The
Address Book : Machine Address Book page opens.
2. Click the group’s Number or Name you want to edit. The Property page of the
group opens.
Alternatively, you can directly enter the group number in the Address # window
and click Go to, or enter the group name in the Address Name window and click
the magnifying icon, to quickly search the group.
4. Add contacts to the group by clicking the Add icon. The Addresses page appears.
5. Select the contact to join the group by checking the Select checkbox to the left. You
can select more than one document simultaneously.
You can filter contacts by selecting E-mail, E-mail (Encrypted), Folder, FAX on the
Type drop-down list.
6. Click Submit button to add the contacts. You are returned to the Property page.
Delete group
1. Click Machine Address Book under Address Book on the navigation menu. The
Address Book : Machine Address Book page opens.
2. Select the group(s) you want to delete by selecting the check box to the left.
If you want all groups displayed on the page deleted, click Check All icon. To
deselect all, click None icon.
Note: Deleting a group does not delete the contacts joined in the group.
1. Click External Address Book Settings under Address Book on the navigation
menu. Address Book : External Address Book Settings page opens.
2. Confirm that LDAP is set to On. If the LDAP is Off, make settings in Protocol.
3. Click On of the desired external address book(s), and then click Settings button.
External Address Book 1 (to 8) Settings page opens.
Note: External Address Book 5 (to 8) is used for sending a fax via FAX server.
LDAP Server
To search through the "Sales div" Organizational Unit (OU) in the Active
Directory "serv.example.com" domain:
ou="Sales div",dc=serv,dc=example,dc=com
If there are one or more blank spaces in each of value, you have to enclose
the value in double quotation marks (").
8. LDAP Security: Configure this setting in the Protocol Settings page under
Network Settings.
9. Authentication Type: Select an authentication type from the drop-down list.
10.Connection Test: This will test one transmission for each press, attempting
to establish communication with the LDAP server.
Display Sequence
Select a Display Mode from Display from the first name and Display from
the family name on the drop-down list.
5. If prompted, configure the following settings for External Address Book (FAX
Server).
User Guide 21
Address Book
To search through the "Sales div" Organizational Unit (OU) in the Active
Directory "serv.example.com" domain:
ou="Sales div",dc=serv,dc=example,dc=com
If there are one or more blank spaces in each of value, you have to enclose
the value in double quotation marks (").
8. LDAP Security: Configure this setting in the Protocol Settings page under
Network Settings.
9. Authentication Type: Select an authentication type from the drop-down list.
10.Connection Test: This will test one transmission for each press, attempting
to establish communication with the LDAP server.
Select a Display Mode from Display from the first name and Display from
the family name on the drop-down list.
2. Click Settings of the One Touch Key which you want to register. The One Touch
Key Property page opens.
3. Enter the Display Name and Destination in the One Touch Key Property. You can
call the address registered in the Address Book by clicking Address Book. You can
select the type of addresses using the Type drop-down list in the Addresses page.
Click No. or Name of the address you want to register. The address name and the
property information are shown. Select the contact you want to register by
checking the radio button to the left. You can check only one contact to assign at a
time.
You can enter the address name in the Address Name window and click the
magnifying glass icon to quickly search the contact.
2. Enter the key number in the Key # windows and click Go to. The Property page
appears.
3. Make entries required to modify the Display Name and the Destination. Click
Delete to delete the destination.
2. Click Delete of the One Touch Key which you want to delete.
User Guide 23
Device Settings
6 Device Settings
This page is accessible when you have logged in the embedded server with
administrator privilege, while network authentication or local authentication is
enabled.
If prompted, configure the following settings. See the sections below for detailed
information.
• Paper/Feed/Output
• Original Document
• Energy Saver/Timer
• Date/Time
• System
Paper/Feed/Output
This section includes settings that apply to paper size and media type for the paper
loaded in the MP tray, the cassettes and the Bulk Feeder, configuring cassette
group, paper output, and the other detailed properties.
Cassette Settings
1. Click Paper/Feed/Output under Device Settings on the navigation menu. The
Device Settings : Paper/Feed/Output page opens.
2. Configure the paper size and media type for each cassette.
MP Tray Settings
1. Click Paper/Feed/Output under Device Settings on the navigation menu. The
Device Settings : Paper/Feed/Output page opens.
2. Configure the paper size and media type for Bulk Feeder.
Group Settings
1. Click Paper/Feed/Output under Device Settings on the navigation menu. The
Device Settings : Paper/Feed/Output page opens.
Other Settings
1. Click Paper/Feed/Output under Device Settings on the navigation menu. The
Device Settings : Paper/Feed/Output page opens.
You can select the cassette or MP Tray feed the paper with priority. When you
select a large capacity feeder, Default Paper Source (Auto) is displayed. You
can select On or Off to switch the paper source automatically.
Paper Selection
You can select Auto or Default Paper Source by clicking the drop-down list.
You can select Most Suitable Size or Same as Original Size by clicking the
drop-down list.
You can select Adjust Print Direction or Speed Priority by clicking the drop-
down list.
You can select the media type when Auto is selected in Paper Selection for
color printing.
You can select the media type when Auto is selected in Paper Selection for
black and white printing.
You can select whether display (On) or not (Off) the confirmation screen when
loading the paper in each paper source.
User Guide 25
Device Settings
2. Click Settings in Paper Detail Settings. The Paper Details Settings page opens.
You can change the size of paper for cassette and MP tray . When you want to
change the settings, enter the length (X) and width (Y) of the Custom Paper.
You can select the paper weight for each media type by clicking the drop-down
list. When you select the Custom 1 to 4, you can select the paper weight as well
as specifying whether or not to use duplex printing and entering the custom
paper name.
Original Document
This section explains how to configure the original.
Auto Detect
System of Units
If On is selected, then select the default value of the size of the original placed
on the platen. Select an original size (A4, A5, A6, B5, B6, Letter, 216×340 mm,
Statement, Legal, Executive, 16K, Oficio II, Folio, ISO B5, Envelope #10, Enve-
lope #9, Envelope #6, Envelope Monarch, Envelope DL, Envelope C5, Hagaki,
Oufukuhagaki, Youkei 4, Youkei 2, Nagagata 3, Nagagata 4, Younaga 3) from
the drop-down list.
2. Select On or Off for each Custom Original (1 to 4). When you want to change the
settings, enter the length (X) and width (Y) of the Custom Paper.
Note: You can enter the length of Custom Paper without selecting On or Off
according to the machine.
Energy Saver/Timer
This section explains how to configure the Energy Saver Settings and Timer
Settings.
Sleep Level
Select Quick Recovery or Energy Saver. Even if you selected either sleep level,
the machine can recover from the sleep mode when you press any key on the
operation panel or the machine received the print or fax job.
Quick Recovery recovers from the sleep mode faster than Energy Saver.
Energy Saver reduces power consumption even more than Quick Recovery,
and allows sleep mode to be set separately for each function. The time
required for the machine to wake up from the sleep mode and resume normal
operation will be longer than for Quick Recovery.
Alternatively, the Sleeping page appears on the embedded web server while
the system is engaged in Energy Saver. You can click Start on the Sleeping
page.
Sleep Rule
If you have selected Energy Saver as a sleep level, Card Reader and Applica-
tion are displayed. If you engage in Energy Saver, select On. Select Off if you
do not want to engage Energy Saver.
Note: Card Reader is displayed when Card Authentication kit is activated.
Sleep Timer
Specify the time period in the drop-down list, after that time period the system
enters Auto Sleep Mode.
Specifies the time from 1 hour to 1 week after which the system enters the
power off mode, where the device automatically turns off after a certain
amount of time elapses the device was last used.
User Guide 27
Device Settings
Click On of the appropriate radio button for the interface or device you would
like to engage in power off mode. Click Off if you do not want to engage power
off mode for the interface or device.
Timer Settings
1. Click Energy Saver/Timer under Device Settings on the navigation menu. The
Device Settings : Energy Saver/Timer page opens.
This determines the time period before the machine reverts to normal mode,
after WSD scan mode has been engaged. The range is 10 to 495 seconds (in 1-
second increments).
Weekly timer
This page allows the following settings: Activate or deactivate this setting. To
make advanced settings, click Settings. The Weekly Timer Settings page
appears. In Schedule, set to turn power on or off for each day of the week.
Enter time for activation. To set the time of retries, specify the limit of retries in
Retry Times and enter a value in Retry Times and Retry Interval.
Set the time to automatically delete stored documents in the custom box.
Date/Time
This section includes advanced settings on date and time.
Date/Timer
1. Click Date/Time under Device Settings on the navigation menu. The Device
Settings : Date/Time page opens.
Displays the Greenwich Mean Time that is currently set in the machine.
Select Date, Year, Month, Day, Time, Date Format, Time Zone, or Summer Time
which you want to make a change.
Synchronization
1. Click Date/Time under Device Settings on the navigation menu. The Device
Settings : Date/Time page opens.
If a time server is used to synchronize the time as well, the current time can be
adjusted regularly and easily. Enter the host name or IP address of the time server
and click the Synchronize button.
If you use the host name, you must first specify the DNS server information.
Time information is required when you receive reports from this machine via E-
mail. It is recommended that you set the time when the report mail function is
enabled.
System
This section includes advanced settings that apply to the system.
If the settings for the item marked with an asterisk (*) has been changed, you must
restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
Device Information
1. Click System under Device Settings on the navigation menu. The Device Settings
: System page opens.
If you use the host name, you must first specify the DNS server information.
General
1. Click System under Device Settings on the navigation menu. The Device Settings
: System page opens.
User Guide 29
Device Settings
Language
Optional Memory
Override A4/Letter
Specifies whether or not the A4 and Letter size paper should be interchange-
able. When turned On, for example, if the A4 paper is not in the tray, the Letter
size paper will be selected for printing. When turned Off, the Letter size paper
will not be used in place of the A4 paper, when A4 is selected for printing but
the A4 tray is empty.
Measurement
Preset Limit
Default Screen
Select machine address book or external address book as the default address
book.
Click Reset button when you want to reset the destination history.
Altitude Adjustment
Select an altitude from the drop-down list according to your operating environ-
ment.
Orientation Confirmation
Activate or deactivate the prompt that confirms the orientation of original doc-
uments.
Bluetooth
Set whether to clear the function settings to the default after job started.
The card position on the platen can be selected from Free or Upper Left.
The Layout for ID Card Copy can be selected from Align Upper Right or Align
Center.
If you set Display Status or Display Status and Error under Notify via Opera-
tion Panel, the fact that the time for periodic inspection is approaching is noti-
fied on the operation panel.
Under Notify Externally (for administration use), select whether to notify
the administrator. If is set, the notification timing is set within a time period
until the periodic inspection. The setting range is 5 to 100% (in 1% increments).
Error Settings
1. Click System under Device Settings on the navigation menu. The Device Settings
: System page opens.
MP tray Empty
Activate or deactivate the attention display when the MP tray has become
empty.
User Guide 31
Device Settings
Set the amount of remaining toner to notify the administrator when to order a
toner when the toner is running low.
This notification is used for event report, Status Monitor, SNMP Trap.
Selecting Off alerts you low toner when the amount of remaining toner
becomes 5%.
If On is selected, set the amount of remaining toner to alert. The setting range
is 5 to 100%.
Select whether to display the error notification on the operation panel when an
error occurs.
Select All users or Job owners only as the target users who can cancel or con-
tinue operations on jobs paused due to error.
Note: Administrator can cancel all jobs regardless of this setting.
7 Function Settings
This page is accessible when you have logged in the embedded server with
administrator privilege, while network authentication or local authentication is
enabled. If needed, make the following settings: See below for detailed
information.
• Common/Job Default
• Copy
• Printer
• E-mail
• Sending Job - Folder
• FAX
• Send and Forward
• Forwarding
• Operation Panel
Common/Job Default
In this section, you can make settings for the following items:
Common Settings
1. Click Common/Job Defaults under Function Settings on the navigation menu.
The Function Settings : Common/Job Defaults page opens.
Priority Setting
You can select this item when the optional Scan Extension kit (A) is activated.
Document name
Additional Info.
User Guide 33
Function Settings
You can select Auto, Top Edge on Top or Top Edge on Left as the original ori-
entation.
Note: Auto can be configured when an optional OCR Expansion kit is activated.
You can select Auto, Top Edge on Top or Top Edge on Left as the original ori-
entation.
Note: Auto can be configured when an optional OCR Expansion kit is activated.
This selects color mode for scanning or storing. Auto Color (Color/Grayscale)
and Auto Color (Color/Black & White) allow you identify color for the original
document to scan. You can manually select Black & White to forcedly switch
color mode.
Scan Resolution
Specifies the resolution for scanning. The resolutions available differ depend-
ing on the model, current color mode, and the saving format of files. To scan in
full color or grayscale with a solution of 400 dpi or greater, the internal mem-
ory must be expanded for some models.
The original quality for scanning or storing must be selected according to the
type of the original. Select from Text+Photo (Printer), Text+Photo (Maga-
zine), Photo (Printer), Photo (Magazine), Photo (Photo Paper), Text, Text
(Fine Line), Graphic/Map (Printer), and Graphic/Map (Magazine).
Note: You can select Color table from the drop-down list when it is down-
loaded.
The original quality for scanning or storing must be selected according to the
type of the original. Switch the original quality from Text+Photo, Photo, Text,
Text (for OCR), and Text (Fine Line).
Zoom %
This switches the zoom ratio between Auto and 100%. The default setting is
100%.
Select the type of border erase from the drop-down menu when copying. Set
the width of the outer and inner borders to erase in 0 to 50mm. You can set
border erase for the reverse side.
Select the type of border erase from the drop-down menu when sending or
storing. You can also select Full Scan which scans all area of original as image.
Set the width of the outer and inner borders to erase in 0 to 50mm. You can set
border erase for the reverse side.
Select the type of border erase from the drop-down menu when sending fax.
You can also select Full Scan which scans all area of original as image. Set the
width of the outer and inner borders to erase in 0 to 50mm. You can set border
erase for the reverse side.
Select whether to detect an original with bent corners when reading an origi-
nal from the document processor.
User Guide 35
Function Settings
Select whether to detect a size outside the standard sizes during copying.
Select whether to detect a size outside the standard sizes during sending or
storing.
Noise Removal
EcoPrint
Switches EcoPrint On or Off to control toner consumption for saving the print-
ing costs. The default setting is Off. When selecting On, you can select Toner
Save Level from 1 (Low) to 5 (High), according to the machine.
JPEG/TIFF Print
This determines the physical size of JPEG images when printing them from a
USB flash device. Choices include Fit to Paper Size, Image Resolution, and Fit
to Print Resolution.
This determines the page size for printing XPS data. Turn On to fit print data
over the page size and turn Off to print in the original size.
Collate
FAX TX Resolution
E-mail Template
This allows to create a template for entering a subject and body information of
E-mail. Up to three templates can be created and configured with the default
settings according to the machine.
DP Read Action
You can prioritize to use the document processor either in faster scanning or
better quality scanning.
File Format
The file format is available from PDF, TIFF, JPEG, XPS, High Compression PDF,
Open XPS, Word, Excel and PowerPoint.
Note: Word, Excel and PowerPoint can be configured when an optional OCR
Expansion kit is activated.
Image Quality
This determines the quality of the image when saved, from 1 Low Quality
(High Comp.) to 5 High Quality (Low Comp.).
PDF/A
You can convert the scanned document to the text data when you selected PDF
or High Compression PDF as the file format.
You can choose the primary OCR language from the drop-down list.
You can choose the OCR output format from the drop-down list.
Text + Graphics converts the scanned documents into the editable and
searchable Microsoft Office data format.
Text + Graphics with Scanned Image converts the scanned documents into
two types of data: one is the editable and searchable Microsoft Office data for-
mat and the other one is the Microsoft Office data format with scanned image.
You can edit text and layout of the editable data by referring the scanned
image.
Scanned Image with Searchable Text converts the scanned documents into
the searchable Microsoft Office data format (scanned image).
User Guide 37
Function Settings
Note: OCR Text Recognition, Primary OCR Language, and OCR Output Format
can be configured when an optional OCR Expansion kit is activated.
This allows to select TIFF V6 or TTN2 format for compression of color TIFF
images.
File Separation
This extract pages as separate files from an output file. You can specify the
number of file separation from 1 to 2500 when setting to On. Also, select All
Files in 1 E-mail or 1 file per E-mail as Method of Attachment to E-mail.
Digital Signature
Specifies whether or not to add the digital signature. Select Off, Specify Each
Job, or On.
Signing Certificate
Click Settings button. The Certificate Setting screen appears. Select a certifi-
cate from the list, click Submit button. Configure the certificate setting in the
Security Settings: Certificates page.
Select OSCP, CRL, or CRL & OSCP as the method to confirm the revocation of
digital certificate.
Specified whether or not confirm the password when setting the digital signa-
ture.
When selecting On, you can configure the password.
Note: Password Confirmation on Signature Permission is displayed only
when Specify Each Job is selected in Digital Signature.
Password
Copy
This section includes advanced settings for copying.
1. Click Copy under Function Settings on the navigation menu. The Function
Settings : Copy page opens.
Function Default
The default settings can be changed in Common/Job Defaults Settings page.
Printer
This section includes advanced settings for printing.
If the settings for the item marked with an asterisk (*) has been changed, you must
restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
General
1. Click Printer under Function Settings on the navigation menu. The Function
Settings : Printer page opens.
Emulation
Determines the behavior of paper feed selection when the paper you
requested of size and/or type is not available in the current paper source. Auto
lets the machine to search for the matching paper including all the paper
sources. Fixed does not perform searching in the other paper sources.
Adjusts the form feed timeout between 5 and 495 seconds in 5-second incre-
ments. A form feed will occur in the absence of data during this time period.
Job Name
User Name
Each time a banner page is printed, the machine halts and displays a message
that prompts you to continue banner printing. You can activate (On) or deacti-
vate (Off) this message.
Wide A4
User Guide 39
Function Settings
You can select the actions when the paper runs out in the paper source while
printing.
When selecting Off, the machine displays message to load paper in paper cas-
sette and stops printing. Load the paper according to the paper source dis-
played to resume printing. You can also select the desired paper source.
When selecting On, the machine continues printing automatically if the other
paper cassette contains the same paper as the currently-used paper cassette.
You can select the condition which regarded as a job termination if the print
job could not be processed until the end due to your environment and the
other reason.
When selecting EOJ (End of Job), the termination of the job data (R RES;!! EXIT;)
is regarded as one job until it is detected.
When selecting End of Network Session, the data included in a network ses-
sion at network connection is regarded as one job.
When selecting UEL (Universal Exit Language), the UEL included in the termi-
nation of the job data is regarded as one job until it is detected.
Remote Printing
When you execute direct printing from Command Center RX, select Allowed.
Note: To execute direct printing from Command Center RX, select Allowed on
Direct Printing from Web in Function Settings : Printer page.
2. Enter "https://" and host name of the machine to start up the Command Center RX.
4. Click Direct Printing button on the right of the Printer icon in Device Status.
5. Click the button on the right of the Direct Printing File to select the file to print
from the list.
1. Use the Paper Selection drop-down list if you want to change the paper
source.
2. Select the number of copies to print in Copies.
3. Select 1-sided, 2-sided (Binding Left/Right), or 2-sided (Binding Top) as
duplex mode.
4. Switches EcoPrint On or Off to control toner consumption for saving the
printing costs. When selecting On, you can select Toner Save Level from 1
(Low) to 5 (High) according to the machine.
5. If the PDF is encrypted, enter the password in Encrypted PDF Password.
6. Specify the page size for printing XPS data. Turn On to fit print data over the
page size and turn Off to print in the original size.
7. Use Paper Output drop-down list to configure the default output tray.
8. Select the default collate/offset settings. When Collate is set to On, the
documents are collated by copy (Offset is set to Each Set). When Collate is set
to Off, the documents are collated by page.
7. Click Print button. The selected file will be printed without printer driver.
AirPrint Settings
1. Click Printer under Function Settings on the navigation menu. The Function
Settings : Printer page opens.
AirPrint
Bonjour Name
Location
Enter the location of the machine on Location of the System Settings page
under Device Settings.
Note: When you enter Location, the location appears under the printing
device name appears on the printer selection screen using the mobile device.
The location also appears on the title (upper right) of Command Center RX.
Geolocation
Latitude
Longitude
Altitude
User Guide 41
Function Settings
1. Click Protocol under Network Settings on the navigation menu. The Network
Settings : Protocol page opens.
3. Set Use Default Settings to Off and confirm Certificate Auto Verification and
Hash. Change the settings as necessary. If you do not have to change the settings,
set Use Default Settings to On.
5. Click Printer under Function Settings on the navigation menu. The Function
Settings: Printer page opens.
7. You can configure settings for General. Make the following setting:
1. Printer Name: Displays the device name. You can modify the name as
necessary.
2. Proxy: Click Settings button. The TCP/IP Settings page opens.
If you do not use a proxy server, set Proxy to Off.
If you configure the proxy, set Proxy to On, and specify the following items as
necessary. For details, see Proxy settings on page 60.
After configuring settings, return to the Universal Print Settings page.
3. Proxy Authentication: Enter User Name and Password for proxy
authentication.
The operation from registering the printer to adding it to the computer should
be completed within 15 minutes.
2. You can configure settings for Universal Print. Click Register button. The URL and
access code of the Microsoft web page are displayed.
3. Click the URL. The Microsoft web page are displayed. Enter an access code and click
Next button.
Note: If you do not install the Microsoft Authenticator yet, follow the on-screen
instructions to install it on your mobile device.
Note: Permission is required only when registering for the first time.
5. Click Accept button for the accept request from Microsoft Authenticator.
6. Close the Microsoft web page and return to the Command Center RX.
7. Click OK button.
Note: When pressing OK button, Register button on the Universal Print Setting
page changes to the Unregister button, and the Certificate Expiration is
displayed. If it is not displayed, click refresh button.
8. Click Edit button in Universal Print Preferences and drag & copy the
Unregisteration URL.
9. Open the new tab on the browser and paste the copied URL. The Universal Print
web page is displayed.
11. Check the checkbox next to the name of the printer you want to share and click
Share button. The user list is displayed.
12. Select the users with whom you want to share the printer and click Share Printer
button.
For example, if the Proxy server IP is 10.184.212.160, the port number is 8080, and
the bypass list is * .local, enter the following.
3. Click Window icon, then the Settings icon. The Windows settings screen is
displayed.
6. Confirm that the Azure administrator account name appears in Work or school
account.
Note: If you don't see your Azure administrator account name, click + (Connect)
and log in using your Azure administrator account name and password.
7. Return to the Windows settings screen and click Device icon. The Bluetooth and
other devices screen is displayed.
8. Click Printers & scanners. The Printers & scanners screen is displayed.
User Guide 43
Function Settings
10. Select the shared printer (Cloud printer) from the list and click Add device button.
The shared printer is added to your computer.
1. Click Printer under Function Settings on the navigation menu. The Function
Settings: Printer page opens.
2. Click Settings button in Universal Print Settings. The Universal Print Settings
page is displayed.
6. Check the checkbox next to the printer name you want to unshare, then click
Remove button and then OK button.
8. Check the check box next to the printer name you want to unregister and click
Unregister button and then OK button.
9. Close the web page and return to the Command Center RX.
Duplex
Select 1-sided, 2-sided Bind Long Edge, or 2-sided Bind Short Edge as duplex
mode.
Copies
Page Orientation
LF Action
CR Action
KIR
EcoPrint
Switches EcoPrint On or Off to control toner consumption for saving the print-
ing costs. The default setting is Off. When selecting On, you can select Toner
Save Level from 1 (Low) to 5 (High) according to the machine.
Resolution
E-mail
This section includes advanced settings for E-mail.
SMTP protocol
1. Click E-mail under Function Settings on the navigation menu. The Function
Settings : E-mail page opens.
SMTP Protocol
Enter the SMTP server name or its IP address. If entering the name, rather
than the IP address, a DNS server address must also be configured. The DNS
server address may be entered on the TCP/IP Settings page.
Enter the port number that SMTP will use (default is 25). Normally, use port 25,
but you can change the port number to suit the email server’s application and
operation. For example, the default port number for SMTP connections over
TLS is 465. The default port number for SMTP authentication is 587.
Sets the timeout in seconds during which this device tries to connect to the
SMTP server.
User Guide 45
Function Settings
Authentication Protocol
SMTP Security
Sets the timeout in seconds during which this device tries to connect to the
POP3 server. You can configure this item when you selected POP before SMTP
as Authentication Protocol.
Connection Test
Tests to confirm that the settings on this page are correct. When Test button is
clicked, this machine tries to connect to the SMTP server.
Domain Restriction
POP3
1. Click E-mail under Function Settings on the navigation menu. The Function
Settings : E-mail page opens.
POP3 Protocol
Check Interval
Displays the interval, in minutes, for connecting to the POP3 server to check for
incoming e-mails at specific interval. Specify the interval of performing checks
in the range from 3 minutes to 60 minutes. The default is 15 minutes.
Click Receive button to immediately receive E-mail from the POP3 server.
When Remote Printing is set to Permit, the machine prints the received E-
mail.
Domain Restriction
Click Settings button and configure the following user settings. Up to three
users can be set.
1. User Profile 1 (to 3): Enables or disables the user.
2. E-mail Address: Enter the E-mail address.
3. POP3 Server Name: Enter the POP3 server host name or IP address. If you
use the host name, you must first specify the DNS server information.
4. POP3 Port Number: Enter the port number that POP3 will use (default is
110). Normally, use port 110, but you can change the port number to suit the
email server’s application and operation. For example, the default port
number for POP3 over TLS is 995.
5. POP3 Server Timeout: Enter the timeout in seconds during which this
machine tries to connect to the POP3 server.
6. Login User Name: Enter the login name of the user for the POP3 account.
7. Login Password: Enter the password to log in the POP3 account.
8. Use APOP: Enables or disables APOP. APOP is an encryption mechanism used
for encrypting the Login Password during communication with the POP3
server. When Use APOP is Off, the Login Password is sent using plain ASCII
text. When Use APOP is On, the Login Password is encrypted, therefore
cannot be read.
APOP requires that the POP3 server supports APOP, and has APOP enabled.
9. POP3 Security: Enables or disables POP3 Security. When this protocol is
enabled, either TLS/TLS or STARTTLS must be selected. To enable POP3
security, the POP3 port may have to be changed according to the server
settings.
10.Connection Test: This will test one transmission for each press, attempting
to establish communication with the POP3 server.
11.Delete e-mail after retrieval: Enables or disables the Delete E-mail after
retrieval function. When this item is set to On, the retrieved E-mail is deleted
from the POP3 server. When this item is set to Off, the E-mail will not be
deleted after retrieved from the POP3 server.
12.E-mail Size Limit: Enter maximum E-mail size in kilobytes. When the value is
0, the limitation for E-mail size is disabled.
13.Cover Page: Specifies whether to print the body of an E-mail in addition to
the attached files. When this item is set to On, the attached files and the body
of an E-mail are printed. When no attached files exist, only the body of an E-
mail is printed. When this item is set to Off, only the attached files are printed.
When no attached files exist, nothing is printed.
14.Certificate Auto Verification: Select Validity Period, Server Identity, Chain
or Revocation as the method to confirm the validity of certificate obtained
from the server. You can use more than one option at a time.
15.Hash: Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use
more than one algorithm at a time.
User Guide 47
Function Settings
Enter the maximum size of E-mail that can be sent in kilobytes. When the value
is 0, the limitation for E-mail size is disabled.
Sender Address
Displays the sender address used for E-mails sent from this machine.
Signature
Select the information source (cites destination) of login user name, password,
and e-mail address used for SMTP authentication, and e-mail sender address.
When you select Use Device Settings, Login User Name and Login Password
configured in Function Settings : E-mail page are used as SMTP authentica-
tion user information. Sender Address configured in Function Settings : E-
mail page is used as the sender address information.
When you select Use Login User Information, the login user name and pass-
word for log in to this machine are used as SMTP authentication user informa-
tion. This information also applies when you configure for local authentication
and network authentication. An e-mail address included in user information
(property) which was used to log in to the machine is used as the sender
address information.
Configure the function default as necessary. The default settings for e-mail send
can be changed in Function Settings : Common/Job Default Settings page.
S/MIME Settings
1. Click E-mail under Function Settings on the navigation menu. The Function
Settings : E-mail page opens.
3. Configure the Encryption Certificate. You can make changes for the following items
as required.
4. Configure the Signing Certificate. You can make changes for the following items as
required.
Scan to Folder
This section includes advanced settings for copying.
FTP Settings
1. Click Scan to Folder under Function Settings on the navigation menu. The
Function Settings : Scan to Folder page opens.
FTP
Display whether a FTP connection is available or not. Set FTP Client (Transmis-
sion) to On on the Protocol Settings page.
Display the FTP port number. Enter Port Number on the Protocol Settings
page.
SMB Settings
1. Click Scan to Folder under Function Settings on the navigation menu. The
Function Settings : Scan to Folder page opens.
SMB
Display the SMB port number. Enter Port Number on the Protocol Settings
page.
User Guide 49
Function Settings
Function Defaults
1. Click Scan to Folder under Function Settings on the navigation menu. The
Function Settings : Scan to Folder page opens.
FAX
This section includes advanced settings for FAX.
If the settings for the item marked with an asterisk (*) has been changed, you must
restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
Common Settings
1. Click FAX under Function Settings on the navigation menu. The Function
Settings : FAX page opens.
2. You can configure settings for Transmission. Make the following settings:
3. You can configure settings for Reception. Make the following settings:
1. Media Type: Sets the media type to print the received documents.
2. FAX Exclusive Paper Source: Selects the exclusive paper source (cassette)
when printing received faxes.
3. Receive Data/Time: Selects On or Off whether to print the reception
information such as the received date, the received time, the transmitting
party's information and the number of transmitted pages on the top of the
received documents.
4. Duplex Printing: Specifies whether or not to use the Duplex mode.
5. 2 in 1 Printing: Enables or disables 2 in1 reception.
6. Batch Print: Selects whether or not perform batch print of the received
documents.
Fax Settings
1. Click FAX under Function Settings on the navigation menu. The Function
Settings : FAX page opens.
2. You can configure settings for General. Make the following settings:
3. Speaker Volume: Sets the volume of the internal speaker that allows you to
listen to the other party or to verify the conditions on the telephone line when
the On-Hook key was pressed. Select the speaker volume from 0 (Mute) to 5
(Maximum).
4. Monitor Volume: Sets the volume of the internal speaker that allows you to
verify the FAX tones during FAX communication. Select the speaker volume
from 0 (Mute) to 5 (Maximum).
3. You can configure settings for Transmission. Make the following settings:
1. Dialing Mode: According to the type of telephone line you are contracted
with, select Tone (DTMF), Pulse (10PPS), or Pulse (20PPS).
2. TX Start Speed: Selects the speed rate at starting transmission from
33600bps, 14400bps, and 9600bps. Once communication is established, the
speed rate that is slower than the other is employed.
3. ECM TX: Turns error correction mode on which corrects errors that may
happen during communication. To let the ECM feature to take effect, error
correction mode must be enabled on both parties in prior.
4. You can configure settings for Reception. Make the following settings:
1. FAX Receive: Selects the FAX reception mode. The choices are Auto (Normal,
FAX/Tel, TAD or DRD) or Manual. (The selectable option is different
depending on the destination.)
2. Number of Rings (Normal): Specifies the number of rings when FAX Receive
is Auto (Normal). The range is 1 to 15.
3. Number of Rings (FAX/Tel): Specifies the number of rings when FAX Receive
is Auto (FAX/Tel). The range is 0 to 15.
4. Number of Rings (TAD): Specifies the number of rings when FAX Receive is
Auto (TAD). The range is 1 to 15.
5. Remote Switching Dial Number: Specifies the FAX remote switching dial
number. The range is 00 to 99. Remote switching allows you to initiate FAX
reception from a telephone connected to the FAX system.
6. Encryption Key No.: Sets the encryption key number used for encrypted
communication.
7. RX Start Speed: Selects the speed rate at starting reception from 33600 bps,
14400 bps, and 9600 bps. Once communication is established, the speed rate
that is slower than the other is employed.
8. ECM RX: Turns error correction mode on which corrects error that may
happen during communication. To let the ECM feature to take effect, error
correction mode must be enabled on both parties in prior.
9. FAX Memory RX: Select On when you use the FAX Memory RX function.
5. You can configure settings for Encryption Key. Make the following settings:
6. You can configure settings for Remote Settings. Make the following settings:
User Guide 51
Function Settings
7. You can configure settings for TX/RX Restriction. Make the following settings:
8. You can configure settings for FAX Server. Make the following settings:
1. FAX Server: Select On when you use the FAX Server and configure the
settings.
2. Click Submit button. The FAX Server Settings page appears.
3. Address Settings: Configure the address information of the fax server.
a) Prefix: Enter the prefix of fax server.
b) Suffix: Enter the suffix of fax server.
c) Domain Name: Enter the domain name of fax server.
d) File Format: Select the file format to which sends the fax server, from the
drop-down list.
4. SMTP: Configure these settings when you send the fax via SMTP server.
a) Use E-mail SMTP Settings: Select On when you use an email SMTP settings
to the fax server. When you select Off, configure the following settings.
b) SMTP Server Name: Enter the SMTP server name or its IP address. If
entering the name, rather than the IP address, a DNS server address must
also be configured. The DNS server address may be entered on the TCP/IP
Settings page.
c) SMTP Port Number: Enter the port number that SMTP will use (default is
25)
d) SMTP Server Timeout: Sets the timeout in seconds during which this
device tries to connect to the SMTP server.
e) Authentication Protocol: Enables or disables the SMTP authentication
protocol or sets POP before SMTP as the authentication type. When selecting
On or POP before SMTP, you can select user on the drop-down list. When
selecting Other from Authentication as, you can specify Login User Name
and Login Password.
f) SMTP Security: Displays SMTP Security. This item appears when TLS/TLS or
STARTTLS is selected on Network Settings : Protocol page.
g) POP before SMTP Timeout: Sets the timeout in seconds during which this
device tries to connect to the POP3 server. You can configure this item when
you selected POP before SMTP as Authentication Protocol.
h) Connection Test: Tests to confirm that the settings on this page are
correct. When Test button is clicked, this machine tries to connect to the
SMTP server.
Configure the function default as necessary. The default settings for fax function
can be changed in Function Settings : Common/Job Defaults page.
General
1. Click Send and Forward under Function Settings on the navigation menu. The
Function Settings : Send and Forward page opens.
User Guide 53
Function Settings
Rule
Destination
1. Click Send and Forward under Function Settings on the navigation menu. The
Function Settings : Send and Forward page opens.
Address Book
Click Address Book icon and select a type and a name of the address on the
address page.
Email forwards the E-mail to the E-mail address entered. Click E-mail icon to
specify an E-mail address. You can change the address by clicking Address
Book. Click Submit button to finalize settings.
Folder
Forwards and saves a job in a folder (SMB or FTP). Enter the Host Name, Port
Number, path to a folder, Login User Name, and the Login Password. You can
confirm the connection status by clicking Test button. You can also edit an
address by clicking Address Book. Click Submit button to finalize settings.
If you use the host name, you must first specify the DNS server information.
Delete
S/MIME
Forwarding
Forwarding is a function for automatically forwarding documents received by FAX
to other FAX machines, sending them as attachments to E-mail.
For example, you can forward faxes from particular customers received during
business hours to the E-mail addresses of the people responsible for those
customers, and forward faxes from outside of your business area to the business
office nearest to the sender's fax number.
For models that do not support Forward Requirements, the documents received
are forwarded to a forward destination or printed.
Enabling Forwarding
To use the Forwarding function, enable this setting.
1. Click Forwarding under Function Settings on the navigation menu. The Function
Settings : Forward Settings page opens.
When you select On, you can configure Schedule, File Name, Forward Settings
and Print Settings as rules. For details, refer to Add Rule shown below.
If Forward Settings page opens, configure the detailed information of the rules.
Forward Settings
Schedule
File Name
Forward Settings
Configure the forward destination.Select the destination on the list, and then
click the Delete icon.
1. Forwarding: Select On and click the desired address button to specify the
forwarding destination.
2. Address Book: Click Address Book button to open the Addresses page.
Select the desired Address Book and click Submit button.
3. E-mail: Click E-mail button to open the E-mail page. Enter E-mail Address and
E-mail Address (Confirmation), and then click Submit button.
4. Folder: Click Folder button to open the Folder page.
Protocol: Select SMB or FTP.
Host Name: Enter the host name. If you use the host name, you must first
specify the DNS server information.
Port Number: Enter the port number from 1 to 65535.
User Guide 55
Function Settings
Print Settings
Operation Panel
This section explains how to customize the operation panel.
Function Key 1
The copy function is assigned as a default setting. You can register the other
function on this key.
Function Key 2
The send function is assigned as a default setting. You can register the other
function on this key.
Function Key 3
The fax function (option) is assigned as a default setting. You can register the
other function on this key.
Note: Some machine products appears Copy Function, Send Function, and
FAX Function respectively as a default setting instead of Function Key 1 (to 3).
You can enable or disable the each key on the machine.
Copy Function
Sending Function
FAX Function
Home
1. Click Operation Panel under Function Settings on the navigation menu. The
Function Settings : Operation Panel page opens.
Customize Desktop
Click Add function, Add Program, then Add Application button, and add an
item. Click Submit button to finalize settings. Click Delete icon to delete the
items that are not needed. Up and Down button allow to interchange the
items in order.
User Guide 57
Function Settings
Customize Taskbar
Specifies the items to show in the task bar. Activate and deactivate each of Sta-
tus/Job Cancel, Device Information, Language, Paper Settings, Wi-Fi
Direct, Help, Incoming FAX Log, Outgoing FAX Log, System Menu, Counter,
Accessibility Screen, Numeric Keyboard, and Favorite.
Note: Incoming FAX Log and Outgoing FAX Log appear when an optional FAX
system is attached to the machine.
Background
Allows you to change the background image of the Home screen. Select an
image from the Picture 1 to Picture 8 on the drop-down list.
2. This section includes the following items for configuration. By default, each
function is assigned with its standard items.
Copy
Each of Key 1 to Key 6 is assigned with one of the copying functions. Select an
item from the drop-down list.
Send
Each of Key 1 to Key 6 is assigned with one of the sending functions. Select an
item from the drop-down list.
Fax
Each of Key 1 to Key 6 is assigned with one of the fax functions. Select an item
from the drop-down list.
Each of Key 1 to Key 6 is assigned with one of the Store Document in Box func-
tions. Select an item from the drop-down list.
Each of Key 1 to Key 6 is assigned with one of the Print Document in Box func-
tions.
Each of Key 1 to Key 6 is assigned with one of the Send Document in Box func-
tions. Select an item from the drop-down list.
8 Network Settings
This page is accessible when you have logged in the embedded server with
administrator privilege, while network authentication or local authentication is
enabled.
If needed, make the following settings: See below for detailed information.
• General
• TCP/IP
• Protocols
General
This section includes basic settings for networking.
1. Click General under Network Settings on the navigation menu. The Network
Settings : General page opens.
2. Select Wired Network, Optional Network or Wi-Fi from the Primary Network
(Client) drop-down list
3. The current communication status is shown in Host Name. Configure the host
name on the System Settings page of Device Settings.
4. The host name is shown in NetBIOS Name. You can modify the name as necessary.
6. The current status is shown in Client Certificate. To make advanced settings, click
Settings button. Select the appropriate certificate on the Certificate Settings
page that will open. When you click Certificates, its content is displayed.
TCP/IP
This section includes advanced settings for the TCP/IP protocol.
* If the settings for the item marked with an asterisk (*) has been changed, you
must restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
User Guide 59
Network Settings
2. When an IP address that was mapped by the DNS server has been changed,
Dynamic DNS automatically remaps the host name to the IP address. To activate
the Dynamic DNS Settings, set Dynamic DNS to On. In addition, specifies the
timeout in seconds after which a search on the DNS server expires.
Proxy settings
1. Click TCP/IP under Network Settings on the navigation menu. The Network
Settings : TCP/IP page opens.
2. To configure the proxy, set Proxy to On, and specify the following items as
necessary.
Automatically Detect
Select On and enter the address when you use the automatic configuration
script.
Enter the host name or IP address for the proxy server (HTTP). If you use the
host name, you must first specify the DNS server information.
Port Number
Select On when you use the same proxy server for all protocols.
Enter the host name or IP address for the proxy server (HTTPS). If you use the
host name, you must first specify the DNS server information.
Port Number
Enter the domain address which do not use the proxy. Use a semicolon (;)
between multiple addresses.
DHCP/BOOTP
Auto-IP
When the Auto-IP is set to On, the IP address from 169.254.0.1 through
169.254.255.254 will usually be generated by itself. But if the IP address using
DHCP server or Manual settings has been decided and becomes a candidate as
the result of configuration, the Auto-IP address isn’t generated and decided
even when the Auto-IP is set to On.
If the IP address has already been entered in IP Address using Manual set-
tings, delete the address.
To enable the settings, restart network. Automatically-generated IP address
appears on Configuration page under Device Information on navigation
menu.
IP Address
If DHCP/BOOTP is set to Off, then a static IPv4 address can be entered in this
field as part of the system network settings. When DHCP/BOOTP is set to On, a
dynamic IPv4 address is assigned to the device, and the field is grayed out. The
format of the IPv4 address is a sequence of numbers separated by dots.
For example: 192.168.110.171
Subnet Mask
Specifies the subnet mask. When DHCP/BOOTP is turned On, a dynamic IPv4
address is assigned to the device, and the field is grayed out.
Domain Name
Specifies the domain name of the domain to which the machine belongs. It
should not contain the host printer name, for example, "abcde.com".
abcde.com. When DHCP/BOOTP is turned On, a dynamic IPv4 address is
assigned to the device, and the field is grayed out.
User Guide 61
Network Settings
Specifies the IP addresses of the primary and secondary DNS (Domain Name
System) servers. When DHCP/BOOTP is turned On and Use DNS Server from
DHCP is selected, you can select to use the DNS server obtained via DHCP.
When DHCP/BOOTP is turned On and Use following DNS Server is selected,
you can enter static DNS server information in the Primary and Secondary
fields provided.
Specifies the primary and secondary DNS (Domain Name System) search suffix.
When DHCP/BOOTP is turned On, you can select DNS Search Suffix (Primary)
or Use following DNS Search Suffix. When DHCP/BOOTP is turned On and
Use following DNS Search Suffix is selected, you can enter static DNS search
suffix in the Primary and Secondary fields provided.
DNS over TLS is a protocol developed for DNS name resolution using the
Transport Layer Security (TLS) protocol. Select Auto from the drop-down list to
automatically configure DNS over TLS. Select On to communicate using DNS
over TLS. Select Off to communicate without using DNS over TLS.
Hash
Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use more
than one algorithm at a time.
Specifies the IP addresses of the primary and secondary WINS (Windows Inter-
net Name Service) servers. When DHCP/BOOTP is turned On and Use WINS
Server from DHCP is selected, you can select to use the WINS server obtained
via DHCP. When DHCP/BOOTP is turned On and Use following WINS Server is
selected, you can enter static WINS server information in the Primary and Sec-
ondary fields provided.
DHCP/BOOTP
Auto-IP
When the Auto-IP is set to On, the IP address from 169.254.0.1 through
169.254.255.254 will usually be generated by itself. But if the IP address using
DHCP server or Manual settings has been decided and becomes a candidate as
the result of configuration, the Auto-IP address isn’t generated and decided
even when the Auto-IP is set to On.
If the IP address has already been entered in IP Address using Manual set-
tings, delete the address.
To enable the settings, restart network. Automatically-generated IP address
appears on Configuration page under Device Information on navigation
menu.
IP Address
If DHCP/BOOTP is set to Off, then a static IPv4 address can be entered in this
field as part of the system network settings. When DHCP/BOOTP is set to On, a
dynamic IPv4 address is assigned to the device, and the field is grayed out. The
format of the IPv4 address is a sequence of numbers separated by dots.
For example: 192.168.110.171
Subnet Mask
Specifies the subnet mask. When DHCP/BOOTP is turned On, a dynamic IPv4
address is assigned to the device, and the field is grayed out.
Domain Name
Specifies the domain name of the domain to which the machine belongs. It
should not contain the host printer name, for example, "abcde.com".
abcde.com. When DHCP/BOOTP is turned On, a dynamic IPv4 address is
assigned to the device, and the field is grayed out.
Specifies the IP addresses of the primary and secondary DNS (Domain Name
System) servers. When DHCP/BOOTP is turned On and Use DNS Server from
DHCP is selected, you can select to use the DNS server obtained via DHCP.
When DHCP/BOOTP is turned On and Use following DNS Server is selected,
you can enter static DNS server information in the Primary and Secondary
fields provided.
Specifies the primary and secondary DNS (Domain Name System) search suffix.
When DHCP/BOOTP is turned On, you can select DNS Search Suffix (Primary)
or Use following DNS Search Suffix. When DHCP/BOOTP is turned On and
Use following DNS Search Suffix is selected, you can enter static DNS search
suffix in the Primary and Secondary fields provided.
Select Auto from the drop-down list to automatically configure DNS over TLS.
Select On to communicate using DNS over TLS. Select Off to communicate
without using DNS over TLS.
User Guide 63
Network Settings
Hash
Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use more
than one algorithm at a time.
Specifies the IP addresses of the primary and secondary WINS (Windows Inter-
net Name Service) servers. When DHCP/BOOTP is turned On and Use WINS
Server from DHCP is selected, you can select to use the WINS server obtained
via DHCP. When DHCP/BOOTP is turned On and Use following WINS Server is
selected, you can enter static WINS server information in the Primary and Sec-
ondary fields provided.
Default Gateway
Host Name
Specifies how to get a host name. When you want to get a host name from the
DHCP server, select Use Host Name from DHCP. When you want to get a host
name using device setting, select Use Host Name from Device Setting.
IPv6
Specifies whether or not to enable the IPv6 protocol. Select On to use the IPv6
protocol.
IP Address
TA static IPv6 address can be entered in this field for the device as part of the
system network settings. Assigns an IPv6 address to the machine network
component. The format of the IPv6 address is a sequence of numbers (128 bit
in total) separated by colons, e.g. 2001:db8:3c4d:15::1a2c:1a1f.
Prefix Length
Specifies the IPv6 prefix length. It can be a decimal value between 0 and 128.
RA(Stateless)
DHCPv6 (Stateful)
Domain name
Specifies the domain name of the domain to which the machine belongs. Can
be entered when DHCPv6 (Stateful) is set to Off.
Specifies the IP addresses of the primary and secondary DNS (Domain Name
System) servers. When DHCP/BOOTP is turned On and Use DNS Server from
DHCP is selected, you can select to use the DNS server obtained via DHCP.
When DHCP/BOOTP is turned On and Use following DNS Server is selected,
you can enter static DNS server information in the Primary and Secondary
fields provided.
Specifies the primary and secondary DNS (Domain Name System) search suffix.
When DHCP/BOOTP is turned On, you can select DNS Search Suffix (Primary)
or Use following DNS Search Suffix. When DHCP/BOOTP is turned On and
Use following DNS Search Suffix is selected, you can enter static DNS search
suffix in the Primary and Secondary fields provided.
Select Auto from the drop-down list to automatically configure DNS over TLS.
Select On to communicate using DNS over TLS. Select Off to communicate
without using DNS over TLS.
Hash
Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use more
than one algorithm at a time.
User Guide 65
Network Settings
IPv6
Specifies whether or not to enable the IPv6 protocol. Select On to use the IPv6
protocol.
IP Address
TA static IPv6 address can be entered in this field for the device as part of the
system network settings. Assigns an IPv6 address to the machine network
component. The format of the IPv6 address is a sequence of numbers (128 bit
in total) separated by colons, e.g. 2001:db8:3c4d:15::1a2c:1a1f.
Prefix Length
Specifies the IPv6 prefix length. It can be a decimal value between 0 and 128.
RA(Stateless)
DHCPv6 (Stateful)
Domain Name
Specifies the domain name of the domain to which the machine belongs. You
can enter the domain name when DHCPv6 (Stateful) is turned Off.
Specifies the IP addresses of the primary and secondary DNS (Domain Name
System) servers. When DHCPv6 (Stateful) is turned On and Use DNS Server
from DHCP is selected, you can select to use the DNS server obtained via
DHCP. When DHCPv6 (Stateful) is turned On and Use following DNS Server is
selected, you can enter static DNS server information in the Primary and Sec-
ondary fields provided.
Specifies the primary and secondary DNS (Domain Name System) search suffix.
When DHCPv6 (Stateful) is turned On, you can select DNS Search Suffix (Pri-
mary) or Use following DNS Search Suffix. When DHCP/BOOTP is turned On
and Use following DNS Search Suffix is selected, you can enter static DNS
search suffix in the Primary and Secondary fields provided.
Select Auto from the drop-down list to automatically configure DNS over TLS.
Select On to communicate using DNS over TLS. Select Off to communicate
without using DNS over TLS.
Hash
Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use more
than one algorithm at a time.
Default Gateway
Bonjour Settings
1. Click TCP/IP under Network Settings on the navigation menu. The Network
Settings : TCP/IP page opens.
Bonjour
Select On or Off, and then select Wired Network, Wi-Fi or Wi-Fi Direct as
Available Network.
Bonjour Name
When Bonjour is turned On, Bonjour Name is shown. You can modify the
name as necessary.
IP Filter (IPv4)
This page allows you to configure IP filters. IP filters restrict access to the machine
based on the IP addresses and protocols.
1. Click TCP/IP under Network Settings on the navigation menu. The Network
Settings : TCP/IP page opens.
5. Click Settings button. The IP Filters (IPv4) page opens.This section includes the
following items for configuration.
User Guide 67
Network Settings
Network Interface
Select Wired Network, Wi-Fi and Wi-Fi Direct as the available network for IP
Filter (IPv4).
IP Address (IPv4)
Subnet Mask
Specifies the subnet mask to be permitted. When there are no entries, access
is allowed to all.
To allow access to a network, enter the network IPv4 address, and the subnet
mask. An example of the data format for the .CSV file is: To permit access from
all hosts on network 192, enter "192.0.0.0" for the IP address and "255.0.0.0"
for the subnet mask. Subnet mask can be left blank.
To allow access to a single IP address, enter the IPv4 address, and
"255.255.255.255" for the subnet mask.
Protocols
IP Filter (IPv6)
This page allows you to configure IP filters. IP filters restrict access to the machine
based on the IP addresses and protocols.
1. Click TCP/IP under Network Settings on the navigation menu. The Network
Settings : TCP/IP page opens.
5. Click Settings button. The IP Filters (IPv6) page opens.This section includes the
following items for configuration.
Network Interface
Select Wired Network, Wi-Fi and Wi-Fi Direct as the available network for IP
Filter (IPv6).
IP Address(IPv6)
Prefix Length
Specifies the IPv6 prefix length. It can be a decimal value between 0 and 128.
Protocols
Logical printers
This page allows you to configure the Logical Printers. This machine can be used
as a virtual printer for converting ASCII print data to PostScript data or for adding
and/or replacing a character strings (commands) at the beginning or end of job
data. Up to four logical printers can be set.
Logical Printer is used with one of the following print protocols: FTP, LPR, IPP, IPPS,
SMB (NetBEUI) and RAW. If no port is specified for printing, the default port used
will be Logical Printer 1 (LP1), port 9100.
1. Click TCP/IP under Network Settings on the navigation menu. The Network
Settings : TCP/IP page opens.
2. Click Settings button. The Logical Printers page opens.This section includes the
following items for configuration
Specifies the port number for the logical printer as well as the TCP raw port
number (9100, etc.). Conversion is applied to data that is input to the specified
raw port in accordance with the selected logical printer. This port is invalid if it
is given a port number that is the same as that of an already specified port (For
example, FTP or LPD).
Bi-directional Printing
Bi-directional Printing can be set to On or Off when printing to the TCP/IP RAW
port. When Bi-directional Printing is Off, all Send data is discarded.
In order to have the data that is received from the printer returned to the client
when printing with PostScript, PJL and other such commands, it is necessary to
set Bi-directional Printing is On.
Specifies the character string sent to the printer after output, directly to the
output port (lp port). This character string is used when it is necessary to trans-
mit a control code before the print data is sent.
Specifies the character string sent to the printer after output, directly to the
output port (lp port). This character string is used when it is necessary to trans-
mit a control code after the print data is sent.
User Guide 69
Network Settings
IPSec Settings
1. Click TCP/IP under Network Settings on the navigation menu. The Network
Settings : TCP/IP page opens.
This section allows you to set access restrictions for IPSec protocol-based
communication.
Specifies whether or not to enable the IPSec protocol. Select On to use the IPv6
protocol. Select Off when encryption is not used.
Expiration Verification
When this option is enabled, the expiration of the server certificate is verified
at communicating. If found expired, communication will fail. When it is dis-
abled, the expiration will not be verified.
Restriction
Specifies the default policy for non-IPSec packets. Select Allow to allow commu-
nication with all hosts and networks including those not permitted by the rules.
Select Deny to allow communication only with the hosts and networks permit-
ted by the rules. Allowed means normal traffic (not defined by the IPSec rules)
will be allowed to reach the device. Denied means only IPSec traffic (as defined
by the IPSec rules) will be allowed to reach the device and all other traffic (not
defined by the IPSec rules) will be denied to reach the device.
Root Certificate
IPSec Rules
Allows to validate the rule used for communication using the IPSec protocol.
Rule 1 through Rule 10 are displayed. To activate this item, click Settings but-
ton and configure the following on the IPSec Rule Settings page.
1. Policy
Rule: Select whether the rules for IPSec communication are used or not.
Key Management Type: Select a type of the key used for the rule from IKEv1,
IKEv2, and Manual.
Encapsulation Mode: Transport encapsulates an encrypted data and trans-
mits along with an IP header. This is the simplest method when both the
transmitting host and receiving host have the IPSec protocol supported. Tun-
nel uses a gateway provided in the network. The gateway receives the IP
packets sent by the transmitting host, encrypt the entire IP packet which is
then encapsulated by IPSec, then transmits along with a new IP header.
Select whether the rules for IPSec communication are used or not.
2. IP address
IP Version: Specifies the IP version of the other end. Select IPv4 or IPv6.
IP Address (IPv4): Specifies the IPv4 addresses of the hosts or network with
which the machine is connecting via IPSec. When you are restricting the
scope of IPSec, be sure to specify the IP addresses. If this field is blank, all
IPv4 addresses will be allowed to connect the machine.
Subnet Mask: When IPv4 is selected for IP Version, this specifies the subnet
mask of the hosts or network with which the machine is connecting via IPSec.
If this field is blank, the specified addresses are considered to be host
addresses.
IP Address (IPv6): Specifies the IPv6 addresses of the hosts or network with
which the machine is connecting via IPSec. When you are restricting the
scope of IPSec, be sure to specify the IP addresses. If this field is blank, all
IPv6 addresses will be allowed to connect the machine.
Prefix Length: When IPv6 is selected for IP Version, this specifies the prefix
length of the hosts or network with which the machine is connecting via
IPSec. If this field is blank, the specified addresses are considered to be host
addresses.
Remote Peer Address: If Tunnel is selected in Encapsulation Mode, assign
an IP address that is remotely controlled.
3. Authentication: Configures the local side authentication when IKEv1 is
selected as Key Management Type. To set a character string as the shared
key and use it for communication, select Pre-shared Key and enter the string
of the pre-shared key in the text box. To use the CA-issued Device
Certification or Root Certificate, select the Certificates. When Certificates is
selected, the availability of the device certificate is shown. To make advanced
settings, click Settings button and select a certificate. Configure the device
certificate on the Certificates page of Security Settings.
Configures the local side and remote side authentication when IKEv2 is
selected as Key Management Type. Configure Authentication Type, Local
ID Type, Local ID, Device Certificate and Pre-shared Key on Local Side, and
Authentication Type, Remote ID Type, Remote ID and Pre-shared Key on
Remote Side.
4. Key Exchange (IKE phase1): When using IKE phase1, a secure connection
with the other end is established by generating ISAKMP SAs. Configure the
following items so that they meet the requirement of the other end.
Mode: Configures this item when IKEv1 is selected as Key Management
Type. Main Mode protects identifications but requires more messages to be
exchanged with the other end. Aggressive Mode requires fewer messages to
be exchanged with the other end than Main Mode but restricts identification
protection and narrows the extent of the parameter negotiations. When
Aggressive Mode is selected and Pre-shared Key is selected for Authentica-
tion Type, only host addresses can be specified for IP addresses of the rule.
Hash: Selects the hash algorithm.
Encryption: Selects the encryption algorithm.
Diffie-Hellman Group: The Diffie-Hellman key-sharing algorithm allows two
hosts on an unsecured network to share a private key securely. Select the Dif-
fie-Hellman group to use for key sharing.
Lifetime (Time): Specifies the lifetime of an ISAKMP SA in seconds.
5. Data Protection (IKE phase2)
In IKE phase2, IPSec SAs such as ESP or AH are established by using SAs
established in IKE phase1. Configure the following items so that they meet
the requirement of the other end.
Protocol: Select ESP or AH for the protocol. ESP protects the privacy and
integrity of the packet contents. Select the hash algorithm and encryption
algorithm below. AH protects the integrity of the packet contents using
encryption checksum. When you select AH as Protocols, you cannot use the
AES-GCM-128, 192, or 256. Select the hash algorithm below.
Hash: Selects the hash algorithm. When you select AES-GCM-128, 192, or 256
on Encryption, you have to select the AES-GCM-128, 192, or 256 or the AES-
GMAC-128, 192, or 256 corresponding to the same bit.
Encryption: Selects the encryption algorithm. (When ESP is selected under
Protocol.) When you select the AES-GCM-128, 192, or 256 on Hash, you have
to select the AES-GCM-128, 192, or 256 corresponding to the same bit. When
you select the AES-GMAC-128, 192, or 256 on Hash, you have to select the
AES-GCM-128, 192, or 256 corresponding to the same bit. If you do not select
any algorithm, the machine authenticates without encryption.
User Guide 71
Network Settings
Protocol
This section includes advanced settings for various protocols used as the
communication procedures and communication protocols.
*: If the settings for the item marked with an asterisk (*) has been changed, you
must restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
1. Click Protocol under Network Settings on the navigation menu. The Network
Settings : Protocol page opens.
Print Protocols
Configure the protocols used for printing. This section includes the following
items for configuration:
1. NetBEUI: The NetBEUI protocol allows Peer-to-peer printing (SMB Print). With
this protocol enabled, the machine is created in Windows Network
Neighborhood. NetBEUI is an enhanced version of the NetBIOS protocol,
which is used for transport of SMB protocol.
Enables or disables the NetBEUI protocol. If NetBEUI is turned On, the name
resolution by NetBIOS (NMB) becomes available.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for NetBEUI protocol.
Workgroup: Workgroup represents the workgroup which will appear in
Entire Network in “Windows Network Neighborhood.”
Comment: You can enter comments here. (This can be left blank.)
2. LPD: To enables the LDAP protocol, turn this item On.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for LPD protocol.
3. FTP Server (Reception): FTP is a communications protocol for transmitting
files over a Network. To enables the FTP protocol, turn this item On.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for FTP protocol.
User Guide 73
Network Settings
Send Protocols
Configure the protocols used for sending E-mail. This section includes the
following items for configuration:
eSCL over TLS Certificate: The status of eSCL over TLS Certificate is shown.
To make advanced settings, click Settings button and select a certificate. Click
Submit button to finalize settings.
Configure the device certificate on the Security Settings : Certificates page.
This Certificate can be used in common with ThinPrint, HTTPS/IPP over TLS,
Enhanced WSD over TLS, eSCL over TLS, and so on.
Other Protocols
This section allows to configure other network protocols. This section includes
the following items for configuration:
1. SNMPv1/v2c: The SNMP protocol provides and transfers management
information within the network environment. Should an error occur such as
Add Paper, the machine automatically generates a trap, an error message
sent to up to two predetermined trap recipients. To enable the SNMPv1/v2
protocol, turn this item On. To configure the SNMPv1/v2 protocol, go to the
Management Settings : SNMP Settings page .
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for SNMP protocol.
2. SNMPv3: The SNMP protocol provides and transfers management
information within the network environment. To enable the SNMPv3
protocol, turn this item On. To configure the SNMPv3 protocol, go to the
Management Settings : SNMP Settings page.
3. HTTP: HTTP is the protocol to exchange or transfer hypertext between the
World Wide Web and web browsers. To enable the HTTP protocol, turn this
item On.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for HTTP protocol.
4. HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is a widely-used
communications protocol for secure communication over the Internet. It
provides bidirectional encryption of communications between a client web
browser and a web server. To enable the HTTPS protocol, turn this item On.
To enable this item, activate TLS on the Security Settings: Network Security
page. The current status of the certificate is shown in HTTPS Certificate. To
make advanced settings, click Settings button and select a device certificate.
Click Submit button to finalize settings.
Configure the device certificate on the Security Settings: Certificates page.
This Certificate can be used in common with IPP over TLS and HTTPS.
Configure the HTTP (Client) as follows.
Certificate Auto Verification: Select Validity Period, Server Identity, Chain
or Revocation as the method to confirm the validity of certificate obtained
from the server. You can use more than one option at a time.
Revocation Check Type: Select OSCP, CRL, or CRL & OSCP as the method to
confirm the revocation of digital certificate.
Hash: Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use
more than one algorithm at a time.
Remote Services: Set Use Default Settings to On to use remote services
with machine’s default settings.
Universal Print: When Use Default Settings is set to On, you can use
Universal Print using the default settings of this machine.
SOAP: Set Use Default Settings to On to communicate using SOAP protocol
with machine’s default settings.
5. Enhanced WSD: Enhanced WSD is an API to simplify connections to web
service enabled devices, such as Printers, Scanners and File Shares. To enable
Enhanced WSD, turn this item On.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for Enhanced WSD protocol.
User Guide 75
Network Settings
IEEE802.1X
Effective Encryption: Select a method of encryption from EAP-TLS, EAP-
TTLS, EAP-FAST and PEAP(EAP-MS-CHAPv2) on the drop-down list.
Tunneled Authentication Protocol: This protocol is activated when EAP-
TTLS has been selected for encryption. Select a method of authentication
from MSCHAPV2, MSCHAP, CHAP, and PAP on the drop-down list.
Login User Name: Enter the name of the user to access the machine. The
IEEE802.1X client certificate of this user must be valid.
Password: This protocol is activated when EAP-TTLS, EAP-FAST, or PEAP(EAP-
MS-CHAPv2) has been selected for encryption. Enter the password.
Common Name: This protocol is activated when EAP-TTLS, EAP-FAST, or
PEAP(EAP-MS-CHAPv2) has been selected for encryption. Specifies the com-
mon name of the server certificate if the server is required to be authenti-
cated.
Match Rule of Common Name: This protocol is activated when EAP-TTLS,
EAP-FAST, or PEAP(EAP-MS-CHAPv2) has been selected for encryption. When
the server certificate is verified, the common name specified under Common
Name is compared with the common name on the server certificate. This
item allows you to specify whether the common names are considered to be
matched if they exactly or partially match.
Expiration Verification: When this option is enabled, the expiration of the
server certificate is verified at communicating. If the certificate is expired,
communication will fail. When it is disabled, the expiration will not be verified.
Certificate Status
Root Certificate 1 (to 5), IEEE802.1X Client Certificate: The content of the
certificate is shown. Make settings for the Root Certificate on the Security
Settings: Certificates page.
9. LLTD: LLTD is a protocol that provides network topology discovery and quality
of service diagnostics. To enable the LLTD protocol, turn this item On.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for LLTD protocol.
10.VNC (RFB): VNC (RFB) is set when starting up a VNC Viewer (E.g. RealVNC),
and using the Remote Operation. To enables the VNC (RFB) protocol, turn this
item On.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for VNC (RFB) protocol.
Port Number: Enter the port number. Typically, this should be 9062.
11.VNC (RFB) over TLS: VNC (RFB) over TLS is set when starting up a VNC Viewer
(E.g. RealVNC), and using the Remote Operation protected by TLS. To enable
the VNC (RFB) over TLS, turn this item On. To enable this protocol, select On
on TLS of the Security Settings : Network Security page.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for REST over TLS.
Port Number: Enter the port number. Typically, this should be 9063.
VNC (RFB) over TLS Certificate: The status of VNC (RFB) over TLS Certifi-
cate is shown. To make advanced settings, click Settings button and select a
certificate. Click Submit button to finalize settings.
Configure the device certificate on the Security Settings : Certificates page.
This Certificate can be used in common with ThinPrint, HTTPS/IPP over TLS,
Enhanced WSD over TLS, eSCL over TLS, and so on.
12.Enhanced VNC (RFB) over TLS: Enhanced VNC (RFB) over TLS is a
communication security protocol that provides encryption, authentication,
and anti-tampering integrity over the Internet. This protocol is set when
starting up Command Center RX, and using the Remote Operation protected
by TLS. To enable the Enhanced VNC (RFB) over TLS, turn this item On. To
enable this protocol, select On on TLS of the Security Settings : Network
Security page. The default setting is On.
Available Network: Select Wired Network, Wi-Fi and Wi-Fi Direct as the
available network for REST over TLS.
Port Number: Enter the port number. Typically, this should be 9061.
Enhanced VNC (RFB) over TLS Certificate: The status of VNC (RFB) over TLS
Certificate is shown. To make advanced settings, click Settings button and
select a certificate. Click Submit button to finalize settings.
Configure the device certificate on the Security Settings : Certificates page.
This Certificate can be used in common with ThinPrint, HTTPS/IPP over TLS,
Enhanced WSD over TLS, eSCL over TLS, and so on.
13.OSCP/CRL: You can configure the validity of certificates and specify the
available CRL server address. Click Settings button to open the OCSP/CRL
Settings screen.
a. General
Revocation Information Cache Period: Enter the revocation information
cache period.
b. OCSP
Set Auto Server Selection with AIA Information to On to select the server
automatically using AIA.
User Guide 77
Network Settings
Wireless LAN
This section includes advanced settings for the Wi-Fi and Wi-Fi Direct.
* If the settings for the item marked with an asterisk (*) has been changed, you
must restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
Wi-Fi Settings
1. Click Wireless LAN under Network Settings on the navigation menu. The
Network Settings: Wireless LAN page opens.
Wi-Fi
Select On when you use the wireless LAN communication using Wi-Fi.
Enter the SSID (Service Set Identifier) of wireless LAN connects to the device.
Network Authentication
Encryption
Enter the WEP key index when you select Open in Network Authentication,
and WEP in Encryption.
WEP Key
Enter the WEP key index when you select Open in Network Authentication,
and WEP in Encryption.
Pre-shared Key
Enter the pre-shared key index when you select WPA2/WPA-PSK or WPA2-PSK
in Network Authentication.
IEEE802.1X
This setting appears when WPA2/WPA-EAP or WPA2-EAP is selected in Network
Authentication.
1. Click Wireless LAN under Network Settings on the navigation menu. The
Network Settings: Wireless LAN page opens.
User Guide 79
Network Settings
Effective Encryption
This protocol is activated when EAP-TTLS has been selected for encryption.
Select a method of authentication from MSCHAPV2, MSCHAP, CHAP, and PAP
on the drop-down list.
Enter the name of the user to access the machine. The IEEE802.1X client certifi-
cate of this user must be valid.
Password
Common Name
Expiration Verification
When this option is enabled, the expiration of the server certificate is verified
at communicating. If the certificate is expired, communication will fail. When it
is disabled, the expiration will not be verified.
Certificate Status
1. Click Wireless LAN under Network Settings on the navigation menu. The
Network Settings: Wireless LAN page opens.
The content of the certificate is shown. Make settings for the Root Certificate
on the Certificates page under Security Settings.
Wi-Fi Direct
Select On when you use the wireless LAN communication using Wi-Fi Direct.
Device Name
IP Address
Persistent Group
Password
Auto Disconnect
Select On when you want to automatically disconnect the handheld device con-
nected using Wi-Fi Direct. Select the desired Day, Hour and Minute from the
drop-down list.
Frequency Band
User Guide 81
Security Settings
9 Security Settings
This page is accessible when you have logged in the embedded server with
administrator privilege, while network authentication or local authentication is
enabled.
If needed, make the following settings: See below for detailed information.
• Device Security
• Send Security
• Network Security
• Certificates
Device Security
This section includes settings for device security.
Quick Setup
This page allows you to restrict access from each interface.
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
Click Settings button to display the Quick Setup screen. Select Level 1 to
Level 3 from the drop-down list.
Level 1
Level 2
Level 3
All functions that protect the machine are enabled, and functions that are not
protected are disabled.
Note: For the details of security level, refer to the machine's Operation Guide.
Allowlisting
When this function is Set to On, you can prevent unauthorized software execu-
tion and software tampering, and maintain the reliability of the system.
Note: Be sure to restart the machine after setting this function to On.
Once this function is activated, the start up of this product will be slowered.
Interface Block
This page allows you to restrict access from each interface.
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
Network
USB Device
To block accesses from the devices connected to the USB port, select Block.
USB Host
USB Drive
To block accesses from the storages connected to the USB port, select Block.
Parallel I/F
Option Interface
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
2. Select the drop-down list, click On or Lock, Partial lock 1, Partial lock 2, Partial lock
3 or Partial Lock, Off or Unlock in the operation remain.
User Guide 83
Security Settings
Lock
Settings related to execution of input and output, jobs and paper are prohib-
ited. To limit partial-use the following Partial lock 1 (-3).
Partial lock 1
Partial lock 2
Settings related to the run job panel settings, printer settings, in addition to
Partial lock 1 limit will be banned. (e.g. stop key use the job cancel)
Partial lock 3
Unlock
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings: Device Security page opens.
This enables to restrict the progress of job processing in detail. You can select
Hide All to allow only the administrators who logged in using administrator
privilege to see the jobs status. Show All allows all administrators and users to
see the jobs status. Selecting My Jobs Only only allows the user to see the jobs
log of his/her own.
This enables to restrict the progress of job processing in detail. You can select
Hide All to allow only the administrators who logged in using administrator
privilege to see the jobs log. Show All allows all administrators and users to
see the jobs log. Selecting My Jobs Only only allows the user to see the jobs
log of his/her own.
This enables to restrict the history of fax communications. You can select Hide
All to allow only the administrators who logged in using administrator privi-
lege to see the history of fax communications. Show All allows all administra-
tors and users to see the logs of fax communications.
Select Permit to pauses or resumes all print jobs including a currently printing
job.
Edit Restriction
The addition, deletion and edition of address book and one touch key are
restricted.
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
Address Book
This enables to restrict the editorial control of address book. When you select
Off, all user can edit the address book regardless of user privileges. When you
select Administrator Only, only the user with an administrator privileges can
edit the address book.
This enables to restrict the editorial control of one touch key. When you select
Off, all user can edit the one touch key regardless of user privileges. When you
select Administrator Only, only the user with an administrator privileges can
edit the one touch key.
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
1. Password Policy: To set the password policy, set this to On and configure the
following.
2. Maximum password age: Turn to On and select the valid period in the
number of days from the drop-down list. 1 – 180 days
3. Maximum password length: Turn to On and select the length in the number
of characters from the drop-down list. 1 – 64 characters.
4. Password complexity: Select the password complexity from No more than
two consecutive identical char, At least one uppercase letter (A-Z), At
least one lowercase letter (a-z), At least one number (0-9), or At least one
symbol.
5. Password Policy Violated User List: Clicking the User List button will display
a list of users that are in violation of the password policy.
User Guide 85
Security Settings
You can assign a specific user account that you want to exclude.
1. Lockout Policy: To set the password policy, set this to On and configure the
following.
2. Number of Retries until Locked: Select the number of password retries until
the account is locked, from the drop-down list (1 – 10 times).
3. Lockout Duration: Select the time period in minutes until the account is
excluded, from the drop-down list (1 – 60 minutes).
4. Lockout Target: Select the users that you want to exclude, either All or
Remote Login Only.
5. Locked out Users List: Clicking the User List button will display a list of users
that are excluded.
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
Unusable Time
Set On to use it. When this is On, the machine is unusable during the time
period from Start Time to End Time. To use the machine during this period,
an unlock code must be entered.
Start Time
Select the time of beginning of unusable time, from the drop-down list.
End Time
Select the time of ending of unusable time, from the drop-down list.
Unlock Code
Define an unlock code that you can use to temporarily deactivate the unusable
time. Enter a digit from 0000 to 9999.
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
2. Click Settings button to open the Password page. Enter the password and click OK
button to display Data Security Settings screen.
Note: The default settings is 000000.
Security Password
Confirm Password
Data Sanitization
Return the following information registered in the machine to the factory defaults.
The information differs according to the type of machine.
1. Click Device Security under Security Settings on the navigation menu. The
Security Settings : Device Security page opens.
Erase all the address information and image data stored in the machine on the
specified schedule. When selecting On, specify the schedule to execute data
sanitization.
Restrict use of this machine after data sanitization. Select Prohibit or Permit.
When selecting Prohibit, you cannot use the machine after data sanitization.
Send Security
This section includes settings for security for Sending.
1. Click Send Security under Security Settings on the navigation menu. The
Security Settings : Send Security page opens.
This enables the front panel message which prompts you to confirm the desti-
nation to forward the scan data. To enable, select On. The message is dis-
played when the machine's Start key is pressed to start scanning.
User Guide 87
Security Settings
This entry becomes active when New Destination Entry has been set to Permit.
Permit activates the entry of a new fax destination. Prohibit deactivates the
entry of a new fax destination.
Recall Destination
Broadcast
Network Security
This section includes settings for network security.
*: If the settings for the item marked with an asterisk (*) has been changed, you
must restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
TLS
Serverside Settings
Configures security settings on the server side. This section includes the fol-
lowing items for configuration:
1. TLS Version: TLS, as well as TLS, is a cryptographic protocol that provides
communication security between a PC and the machine. Select the version of
TLS that you want to use from TLS1.0, TLS1.1, TLS1.2 and TLS1.3. You can use
more than one algorithm at a time.
2. Effective Encryption: Select an algorithm that you want to use from
ARCFOUR, DES, 3DES, AES, AES-GCM and CHACHA20/POLY1305. You can use
more than one algorithm at a time.
3. Hash: Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use
more than one algorithm at a time.
Clientside Settings
Configures security settings on the client (PC) side. This section includes the
following items for configuration:
1. TLS Version: TLS, as well as TLS, is a cryptographic protocol that provides
communication security between a PC and the machine. Select the version of
TLS that you want to use from TLS1.0, TLS1.1, TLS1.2, and TLS1.3. You can use
more than one algorithm at a time.
2. Effective Encryption: Select an algorithm that you want to use from
ARCFOUR, DES, 3DES, AES, AES-GCM and CHACHA20/POLY1305. You can use
more than one algorithm at a time.
3. Hash: Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use
more than one algorithm at a time.
When more than one algorithm are selected, the machine selects one algo-
rithm to automatically connect to the server.
Note: When the TLS is set to On and HTTP Security is set to Secure Only
(HTTPS), the document boxes cannot be accessed by the TWAIN driver.
User Guide 89
Security Settings
Filtering/ Firewall
Filtering and firewall settings can restrict the network access to the device so
that only the specific network addresses are allowed. For details, see the IP Fil-
ter(IPv4) Settings and IP Filter(IPv6) Settings pages on the Network Set-
tings : TCP/IP page.
SNMPv1/v2c
The SNMP Read and Write Community settings function as passwords to con-
trol read and write access to the device via SNMP. For more information, see
the Management Settings : SNMP page.
SNMPv3
TLS
To enable TLS, settings for Secure Protocols must be made. For more informa-
tion, see TLS of the Security Settings: Network Security page.
IEEE802.1X
To enable IEEE802.1X, you must first make the IEEE802.1X settings. For more
information, see the IEEE802.1X Settings page of the Network Settings : Pro-
tocol page.
IPSec
To enable IPSec, you must first make the IPSec settings. For more information,
see the Network Settings : TCP/IP page.
Certificates
This page allows you to create, update, or check details on a certificate. After you
have changed this setting, you must restart the network or this machine.
When you browse the Embedded Web Server by entering "https", a screen which
confirms whether or not to authenticate the security certificate of the web site
appears. You can select the following to solve the problem by configuring
certificate.
• Temporary solution: Permit every time the attention message displayed with
first access to the Embedded Web Server.
• Permanent solution: Import the device certificate or root certificate as the
trusted certificate into the client PC. The Web Browser will authenticate the
Embedded Web Server's certificate automatically in advance.
*: If the settings for the item marked with an asterisk (*) has been changed, you
must restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
Device Certificate
1. Click Certificates under Security Settings on the navigation menu. The Security
Settings: Certificates page opens.
2. A list of the device certificates will be shown, allowing you to check the following:
Device Certificate 1 is automatically issued by default. The automatically issued
certificate has the country code, common name, and a validity period of about 5
years already configured.
Status
Subject
Expiration
Protocol
Displays the protocols available (ThinPrint, HTTPS/IPP over TLS, Enhanced WSD
(TLS) over TLS, Other Protocols, eSCL over TLS, VNC (RFB) over TLS, Enhanced
VNC (RFB) over TLS, and S/MIME).
This sections allows you to modify the initial settings, add a new one, and
delete the existing settings.
Click Settings button of Device Certificate 1 (to 5). The Device Certificate 1
(to 5) page opens to show the current status. This page allows the following
settings:
Status: Displays whether the certificate is active.
Expiration: Displays the validity period of the certificate.
View Certificate: Click View button to view the details of the certificate.
Create Self Certificate: Click Create button to open the Certificate Settings
page. Enter or select the information for settings. Country Code, State/Prov-
ince, Locality Name, Organization Name, Organization Unit Name, Com-
mon Name, subjectAltName, Current Universal Time (UTC/GMT), Validity
Period, and Key Length are displayed automatically. Key Length is the infor-
mation needed to generate encryption. Select RSA or ECDSA on Key Encryp-
tion. When selecting RSA, select 1024 bit, 2048 bit or 4096 bit from the drop-
down list as Key Length. When selecting ECDSA, select 256 bit, 384 bit or 512
bit from the drop-down list as Key Length. Click Submit button to finalize set-
tings.
Import Certificate: When you click Import button, the Import Certificate
screen is displayed. Click Select File button to select the desired device certifi-
cate, and click Open button. Enter the password for device certificate 2 (to 5) in
Password.
Edit Certificate: Click Edit button to open the Expiration Settings page. Enter
the validity period. Current Universal Time (UTC/GMT) is displayed automati-
cally. Click Submit button to finalize settings.
Delete Certificate: When you click Delete button, the certificate is displayed.
Delete the content.
User Guide 91
Security Settings
Export Certificate: When you click Export button, the dialog screen is dis-
played. Save the certificate.
Create Certificate Signing Request: Click Create button to open the Certifi-
cate page. Enter or select the information for settings. Country Code and
Common Name are displayed automatically. Key Length is the information
needed to generate encryption. Select RSA or ECDSA on Key Encryption.
When selecting RSA, select 1024 bit, 2048 bit or 4096 bit from the drop-down
list as Key Length. When selecting ECDSA, select 256 bit, 384 bit or 512 bit
from the drop-down list as Key Length. Click Submit button to finalize set-
tings.
Retrieve Certificate via SCEP: Click Retrieve button to retrieve the certificates
via SCEP server.
1. Click Settings button of Root Certificate 1 (to 5). The Root Certificate 1 (to 5)
Settings page opens to show the current status. This page allows the
following settings:
Status: Displays whether the certificate is active.
Expiration: Displays the validity period of the certificate.
Import Certificate: Click Import button to open the File Import page. Click
Browse button and select a file to import in Import Root Certificate 1 (to 5)
file. Click Submit button to finalize settings.
2. To delete a device certificate of Device Certificate 2 (to 5), highlight the
certificate and click Delete button.
Note: A certificate can be assigned to a protocol or a configuration.
The procedure for importing the certificate via the SCEP server is explained below.
• Auto Renewal: If set to On, the certificate is acquired automatically from the
CA server when the renewal period elapses.
• Renewal Period: Enter the renewal period of the certificate.
8. If necessary, specify the setting items of the CSR (CSR: Certificate Signing
Request) settings.
The certificate generated automatically in this machine does not have the
signature of the CA. Therefore, depending on the communications partner, a
communication error may occur. The data of the certificate signing request is
required for the issue of a certificate signed by the CA. The CSR can be
generated by the administrator from the Command Center RX.
• Country Code: Enter the country code. By default, the country code of the
country in which the certificate is to be used is specified.
• State/Province: Enter the State/Province where you reside.
• Locality Name: Enter the Locality Name where you reside.
• Organization Name: Enter your organization name.
• Organization Unit Name: Enter your department name.
• Common Name: Specify the general name of this machine. By default, the
host name of this machine is specified.
• E-mail Address: Enter the email address.
• subjectAltName: Specify the Subject Alternative Name (SANs) of the CA server
certificate. You can specify up to five identifiers, such as the domain name and
IP address of the CA server for which the server certificate is to be set. From
the drop-down list, select None, E-mail Address, DNS, IPv4, IPv6. If you select
other than None, you can enter an identifier.
• Current Universal Time (UTC/GMT): The standard time of the operating
environment where Command Center RX is being used is displayed.
• Key Length: Select the length of the key from the dropdown list.
9. Click Submit button.
User Guide 93
Management Settings
10 Management Settings
This page is accessible when you have logged in the embedded server with
administrator privilege, while network authentication or local authentication is
enabled.
If needed, make the following settings: See below for detailed information.
• Job Accounting
• Authentication
• ID Card
• Notification/Report
• History Settings
• SNMP
• System Stamp
• Message Board
• Restart/Reset
• Remote Operation
Job Accounting
This section includes advanced settings for Job Accounting.
Settings
To enable Job Accounting, you must first make the Job Accounting settings.
1. Click Job Accounting under Management Settings on the navigation menu. The
Management Settings: Job Accounting page opens.
2. Click Settings button. The Job Accounting Settings page opens. This section
includes the following items for configuration.
Job Accounting
Action Settings
3. If you have set Job Accounting to On in step 2 above, Default Counter Limit is
displayed.
4. You can configure settings for Default Counter Limit. Enter the initial value for the
counter limit, from 1 to 9999999.
Add Account
1. Click Add Account icon. The New Account - Property page opens.
2. You can configure settings for Account Property. This section includes the
following items for configuration:
Account Name
Account ID
1. Select how the functionalities are restricted for use, from Off, Counter Limit,
and Reject Usage.
2. Enter the initial value for restricting functionalities, from 1 to 9999999.
Delete
1. Click the checkbox to the left of the Account ID. To select all items at once, click
Check All.
Counter
2. Click Counter icon once. The total number of copies accounted for the account is
displayed.
User Guide 95
Management Settings
Printed Pages
From the drop-down list, select Printed Pages by Function, or Printed Pages
by Layout as needed for assign a limit.
Shows the total scanned pages of Copy, FAX, and Other Scan.
FAX Counter
Counter Reset
4. Click Counter button of Other Account or Total Account to view the result
accounting.
Other Account
Total Account
Authentication
This section includes advanced settings for authentication.
Settings
To enable authentication, you must first make the authentication settings.
2. Click Settings button. The Authentication Settings page opens. This section
includes the following items for configuration.
General
Local Authorization
Select On or Off.
Guest Authorization
Guest Settings
Simple Login
Click Simple Login Key List button to open the Simple Login Key List page.
Click Settings button of Key 1 (to 20). Configure the following settings as nec-
essary.
1. Display Name: Enter the user name displayed on the Simple Login Key List.
2. Icon: Select the user icon displayed on the Simple Login Key List from the
drop-down list.
3. Password: Select On or Off.
4. Authentication: For Authentication, select one of Local Authentication and
Network Authentication from the drop-down list.
5. User: When selecting Local Authentication from Authentication drop-
down list, click User List button to open the User List page. Select the user
from the list and click Submit button.
6. Login User Name: When selecting Network Authentication from
Authentication drop-down list, enter the login user name to access the
authentication server.
7. Login Password: When selecting Network Authentication from
Authentication drop-down list, enter the login password to access the
authentication server.
8. Domain: When selecting Network Authentication from Authentication
drop-down list, select the domain from the drop-down list.
9. Click Submit button, and then Back button.
Default Host Name: Enter the host name or IP address of the network authen-
tication server. If you use the host name, you must first specify the DNS server
information.
Port Number: Enter the port number of the network authentication server.
Server Type: Select the server type from the drop-down list. When you use ID
Card, select Ext..
User Guide 97
Management Settings
Default Domain: If two or more domains are registered, select the default
domain from the drop-down list. Click Domain List button to open Network
Authentication Domain List page.
When you set Use Multiple Authentication Server to Off, you can use only
the authentication server of the default domain. When you select On, you can
register a primary server and a secondary server for each domain. Each
domain is referred to in the order of the primary server and secondary server.
If you set Default Host Name, each domain is referred to in the order of the
Default Host Name, primary server and secondary server.
Configure the PIN Login Settings. You can configure this setting if you select
Ext. as a server type.
PIN Login: Select On or Off.
Group Authorization
Group List
Click Group List button to open the Group List page. Click a group name to
authorize from the Group List. The Property page opens.
1. Group ID: Change the group ID as desired.
2. Group Name: Change the group name as desired.
3. Access Level: Select Administrator or User as an access level.
4. Account Name: From the drop-down list that is displayed by clicking
Account List button, select an account name followed by Submit button
5. Authorization: Configure whether to restrict the use of each function.
6. Click Submit button, and then Back button.
Display List on Login: Displays the list of print jobs saved to the job-holding
box at login.
Logout after Printing: Sets whether to automatically logout after quick job
printing.
Skip PIN and Copies Confirmation: Sets whether or not to skip PIN code entry
and verify the number of copies when printing.
For Guest Authorization, Unknown User Settings, and Simple Login, refer to the
settings and procedure in step 3, respectively.
Add User
1. Click Add User icon. The New User - Property page opens.
2. You can configure settings for User Property. This section includes the following
items for configuration:
User Name
Enter the user ID to log in (up to 64 characters). You cannot duplicate a login
user name to register.
Password
Confirm Password
To confirm the password, enter the same password that was entered in Pass-
word.
Access Level
Account Name
From the drop-down list that is displayed by clicking Account List button,
select an account name followed by Submit button.
E-mail Address
Add a user's e-mail address. To enable sending e-mail, add your e-mail
address. The e-mail address will be automatically selected whenever an e-mail
notice is required by functionality.
User Guide 99
Management Settings
Language
Default Screen
Select an item for the default screen from the drop-down list.
Delete
1. Click the checkbox to the left of the user name. To select all items at once, click
Check All icon.
ID Card
This section includes advanced settings for ID Card authentication.
ID Card Settings
To use the ID Card authentication, you must first make the ID Card settings.
Keyboard Login
Additional Authentication
3. Configure the ID Card Settings. Select IDM, FeliCa or MIFARE as the ID Card Read Type.
System Code 1
Service Code 1
System Code 2
Service Code 2
Sector Number
Secret Key
Specifies the secret key in hexadecimal. The length of the secret key is 12 dig-
its. Enter the encryption key including the numbers 0-9 and the letters A-F.
Notification/Report
This section includes advanced settings for attentions and reports.
Notification/Report Settings
1. Click Notification/Report under Management Settings on the navigation menu.
The Management Settings : Notification/Report page opens.
2. You can configure settings for Management Report. This item is shown only when
an optional Fax kit is installed.
E-mail/Folder
From the drop-down list, select Off, On, or Error Only. If an error occurs
during transmission, Error Only allows a transmission result reported by e-
mail and stored in the folder.
FAX
From the drop-down list, select Off, On, Error Only, or Specify Each Job. If an
error occurs during transmission, Error Only allows printing a transmission
result.
Attach Image
Select either Cover Page or Body as the attached image when sending docu-
ments using Network FAX.
Recipient Format
FAX
From the drop-down list, select Off, On, or Error/Storing in Box. If an error
occurs during reception or received draft is forwarded to Sub Address Box,
Error/Storing in Box allows a receive result reported by e-mail or report.
Report Type
E-mail Address
Attach Image
Equipment ID
Enter the E-mail address to receive the maintenance reports. Use a semicolon
(;) between multiple addresses.
Subject
From the drop-down list, select one of None, Monthly, Weekly, Daily, Hourly
as desired.
For Monthly, check the month and select a date and a time from the Day and
Time drop-down lists, respectively.
For Weekly, select a day of the week and a time from the Day and Time drop-
down lists, respectively.
For Daily, select a time from the Time drop-down list.
For Hourly, select a time from the every Hour drop-down list.
Subject
Event Report
Select an item for the event report in Event Report Items and select an inter-
val of sending a report in Event Report Interval. When selecting Notify when
Data Sanitization Starts to On, the mail which notify that data sanitization
starts is sent to the recipient specified in Reports 1 (to 3) E-mail Address. Set
Syslog Records Kept Alert to On to alert the Syslog records kept from each
server. If you set Notify when Malicious Program is Detected to On, an email
notifying that a malicious program is detected is sent.
Scheduled Report
From the drop-down list, select one of None, Monthly, Weekly, Daily, Hourly
as desired.
For Monthly, check the month and select a date and a time from the Day and
Time drop-down lists, respectively.
For Weekly, select a day of the week and a time from the Day and Time drop-
down lists, respectively.
For Daily, select a time from the Time drop-down list.
For Hourly, select a time from the every Hour drop-down list.
History Settings
This section includes advanced settings for histories.
History Settings
1. Click History Settings under Management Settings on the navigation menu. The
Management Settings : History Settings page opens.
The E-mail address of the recipient of reports. If there are more than one recip-
ient, then the addresses should be separated by a semicolon (;).
Subject
SSFC Subject
Enter the subject for the Job Log History using the ID Card authentication.
Auto Sending
Determines whether the job log report is sent or not. Select either On or Off.
Number of Records
Personal Information
A job log will be sent to a recipient once automatically when clicking Send but-
ton.
Syslog
Destination Server
Enter the address for destination server. When you specify the server name as
domain name, configure the DNS server in Network Settings: TCP/IP page.
Port Number
Enter the port number for Syslog. Typically, this should be 514.
Facility
Select the number of facility which obtain the log from the drop-down list.
Severity
Select the severity of obtained log from the drop-down list. The higher the
number, the greater the severity.
SNMP
This section includes advanced settings for SNMP.
If the settings for the item marked with an asterisk (*) has been changed, you must
restart the machine or the network. To restart the machine, proceed to the
Management Settings : Restart/Reset page.
SNMP Settings
1. Click SNMP under Management Settings on the navigation menu. The
Management Settings : SNMP page opens.
SNMPv1/v2c
Read Community
Enter the community name for SNMP requests to read a value. The default
name is 'public'. After you have changed the setting, you must restart the
machine.
Write Community
Enter the community name for SNMP requests to write (change) a value. The
default name is 'public'. After you have changed the setting, you must restart
the machine.
sysContact
The MIB-II sysContact object. Usually this is the E-mail address of the network
administrator.
sysName
The MIB-II sysName object. Usually this is the host or domain name of the
machine.
sysLocation
The MIB-II sysLocation object. Usually this is the location information of the
machine which is described under Location of System Settings page. Go to
the System Settings page under Device Settings to modify the settings.
Turns HP Web Jetadmin Compatibility On or Off. After you have changed the
setting, you must restart the machine.
Authentication Traps
Trap Recipient
3. Configure SNMPv3 as follows. After you have changed the setting, you must
restart the machine.
SNMPv3
Sets whether to use the SNMPv3 protocol. Select either On or Off in the Net-
work Settings : Protocol page. To configure SNMP v3, proceed as follows.
Authentication
Hash
Select either MD5 or SHA1 for Hash algorithm. This item becomes active when
the Authentication is set to On.
Privacy
Encryption
Select either DES or AES for encryption algorithm. This item becomes active
when the Authentication is set to On.
Read/Write User
Restart/Reset
This section includes advanced settings for resetting.
Restart
1. Click Restart/Reset under Management Settings on the navigation menu. The
Management Settings : Restart/Reset page opens.
Restart Device
Restart Network
Clicking Restart Network button restarts only the related network service of
the machine.
2. Click Initialize button as needed. The machine is reset to the factory default.
Remote Operation
This section includes advanced settings for remote operation.This function
enables the system administrator to explain how to operate the panel and
troubleshoot to user, by accessing operation panel of the machine at remote using
browser and VNC software.
Note: To execute Remote Operation, Enhanced VNC (RFB) over TLS is set to On in
network protocol (The default setting is On). For details, refer to Protocol on page
72.
Remote Operation
1. Click Protocol under Network Settings on the navigation menu. The Network
Settings : Protocol page opens.
Note: The default setting is On. For other settings, refer to Protocol on page 72.
Restart Operation
Use Restriction
Select Off, Administrator Only, or Use Password from the drop-down list.
When selecting Off, users without administrator privileges can also execute
remote operation.
When selecting Administrator Only, only administrator can execute remote
operation.
Note: When selecting Administrator Only, the remote operation using VNC
software is unavailable.
When selecting Use Password, enter the password in Password and Confirm
Password.
When selecting VNC (RFB) or VNC (RFB) over TLS as a network protocol,
"Available" appears.
2. Enter "https://" and host name of the machine to start up the Command Center RX.
Note: If the user is logged in to the device, the permission confirmation screen will
be displayed on the operation panel. Select Yes.
If pop-up blocking of the browser occurs during connection of the Remote
Operation, select Always allow pop-ups from https:// [host name], and click Done.
Perform Remote Operation after waiting one minute or more.
When the Remote Operation is started up, the operation panel screen will be
displayed on the system administrator's or user's PC screen.
2. Enter "https://" and host name of the machine to start up the Command Center RX.
4. Click Certificates under Security Settings on the navigation menu. The Security
Settings : Certificates page opens.
5. Click Settings button of the device certificate which has been assigned to
Enhanced VNC (RFB) over TLS.
8. Click on Privacy, search, and services from the menu on the left-hand side.
10. Click Import button to import the certificate saved in step 6 to "Trusted Root
Certification Authorities".
12. Enter "https://" and host name of the machine to start up the Command Center RX,
and login.
Note: If the user is logged in to the device, the permission confirmation screen will
be displayed on the operation panel. Select Yes.
If pop-up blocking of the browser occurs during connection of the Remote
Operation, select "Always allow". Perform Remote Operation after waiting one
minute or more.
If you failed to start up using steps above, start Internet Properties from your
PC's Control Panel, and select the Security tab. Select Local intranet and then click
Sites button. Untick the checkboxes of "Automatically detect intranet network"
and "Include all local (intranet) sites not listed in other zones". Perform Remote
Operation after waiting one minute or more.
When the Remote Operation is started up, the operation panel screen will be
displayed on the system administrator's or user's PC screen.
2. Enter "https://" and host name of the machine to start up the Command Center RX.
3. Click Advanced button, Add Exception... button and then click Confirm Security
Exception button.
Note: If the user is logged in to the device, the permission confirmation screen will
be displayed on the operation panel. Select Yes.
When the Remote Operation is started up, the operation panel screen will be
displayed on the system administrator's or user's PC screen.
1. In Firefox, go to Open menu > Options. Click Contents in side menu, and then
click Exceptions... button in Pop-ups.
2. Enter "https://" and host name of the machine into Address of website, and
the click Allow button.
3. Confirm that the entered address is registered to Allowed sites list and then
click Save Changes button.
4. Wait for one minute and click Start button again.
5. Confirm that the "Failed to connect to server" error is displayed. Perform the
next steps 6 to 11 within one minute.
6. In Firefox, go to Open menu > Options. Click Advanced in side menu, and
then select the Certificates tab.
7. Click View Certificates button and select the Servers tab.
8. Click Add Exception... button.
9. Enter "https://", host name of the machine, and Enhanced VNC over TLS port
number into the URL, and then the click Get Certificate button.
10.Click Confirm Security Exception button.
11.Wait for one minute and click Start button again.
2. Enter "https://" and host name of the machine, and then click Show Details button.
6. Right-click on the applicable certificate, and select "Get Info" from the menu.
When the Remote Operation is started up, the operation panel screen will be
displayed on the system administrator's or user's PC screen.
10. When the device certificates used for HTTPS is different from that used for
Enhanced VNC (RFB) over TLS, follow the next steps.
11 Troubleshooting
Consult the table below to find basic solutions for problems you may encounter
with the embedded server.
I can’t access Is User set for the Change the access Local User
the other access level? level to List on
pages. Administrator. page 99