7330 Mono Laser Printer System Administrator Guide www.support.dell.
Copyright protection claimed includes all forms of matters of copyrightable materials and information now allowed by statutory or judicial law or hereinafter granted, including without limitation, material generated from the software programs which are displayed on the screen such as styles, templates, icons, screen displays, looks, etc.
Contents Contents 1 Overview Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Status Monitor Alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Online Diagnostics Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 How to Access Online Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . .
Contents Usage Profile Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 Setting Up Usage Profile Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 Sending Usage Profile Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 Protocol Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 HTTP. . .
Contents Configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring SNMP for Maximum Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring SNMP v1/v2c . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring SNMP v3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the SNMP Access Control List. . . . .
Contents LPR Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-5 AppSocket (Port 9100) Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6 IPP (Internet Printing Protocol) Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6 SNMP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1 Overview This chapter includes: Resources on page 1 Status Monitor Alerts on page 1-2 Online Diagnostics Technical Support on page 1-2 Embedded Web Server on page 1-4 You can obtain information regarding your printer and its capabilities from the following resources. Resources Information Source Installation Guide* Packaged with printer Quick Use Guide* Packaged with printer User Guide (PDF)* Packaged with printer (Software and Documentation CD) Video Tutorials www.support.dell.
Status Monitor Alerts Status Monitor Alerts Status Monitor is an automated tool that is installed with the Windows printer driver and the Macintosh printer driver. It automatically checks the printer status when a print job is sent. If the printer is unable to print a job, Status Monitor automatically displays an alert on the user’s computer screen to let them know that the printer needs attention. The user can click the alert to view instructions explaining how to fix the problem.
Online Diagnostics Technical Support Using a Printer Driver Note: Although this example explains how to access Online Diagnostic Technical Support from a Windows printer driver, you can also access the online support tool using a Macintosh printer driver. To access Online Diagnostics Technical Support from your Windows printer driver: 1. 2. 3. 4. 5. 6. On the desktop, click Start, select Settings and then click Printers. Right-click the printer icon and then select Properties.
Embedded Web Server Embedded Web Server The Embedded Web Server (EWS) provides a simple interface to the embedded web server in any networked Dell printer that enables you to manage, configure, and monitor networked printers from your desktop. The EWS gives administrators easy access to printer status, configuration, and diagnostic functions. It also provides users with access to printer status and special printing functions such as printing saved jobs.
2 Network Installation Features This chapter includes: Using a Startup Network Configuration File on page 2-2 Printer Driver Installation Features on page 2-3 Discovery Protocols on page 2-4 Dell 7330 Mono Laser Printer System Administrator Guide 2-1
Using a Startup Network Configuration File Using a Startup Network Configuration File This section includes: About the Configuration File on page 2-2 Configuration File Requirements on page 2-2 Specifying the Location of the Configuration File on page 2-2 About the Configuration File To configure printer settings or to perform other tasks, such as loading fonts, color tables, and job patches, you can create a startup network configuration file.
Printer Driver Installation Features Printer Driver Installation Features This section includes: Walk-Up Installation on page 2-3 Discovery Protocols on page 2-4 Walk-Up Installation The Dell Installer enables quick and easy installation of the printer driver. The installer is included on the Software and Documentation CD, supplied with the printer, and is available on the web.
Discovery Protocols Discovery Protocols This section includes: DDNS/WINS on page 2-4 DNS (Domain Name Services) on page 2-5 Service Location Protocol on page 2-5 UPnP (Universal Plug and Play) on page 2-6 DDNS/WINS DDNS/WINS settings can be obtained from the BOOTP or DHCP server, if enabled. These settings enable the printer to register its IP name and address so other devices on the network can refer to it by name. To change the DDNS/WINS settings: 1. 2. 3. 4. 5. 6. 7. 8.
Discovery Protocols DNS (Domain Name Services) DNS settings reference servers by name and allow you to enter and view host names rather than IP addresses. Note: Turning Multicast DNS ON allows the printer to be automatically discovered on a TCP/IP network by Apple Macintosh OS X Bonjour technology. To change the DNS settings: 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser. Type your printer’s IP address in the browser Address field. Click the Properties tab.
Discovery Protocols UPnP (Universal Plug and Play) UPnP provides a simplified method to obtain an IP Address for a printer, locate devices on the network, and display those devices on desktop computers. 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser. Type your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Protocols folder. Select TCP/IP. If prompted, type in your Admin or Key User name and password. On the left navigation panel, select UPnP.
3 Network Administration Features This chapter includes: Printer Neighborhood on page 3-2 Job Accounting on page 3-3 Usage Profile Reports on page 3-5 Protocol Control on page 3-6 Cloning on page 3-14 Dell 7330 Mono Laser Printer System Administrator Guide 3-1
Printer Neighborhood Printer Neighborhood Printer Neighborhood is a tool in the Embedded Web Server (EWS) that enables you to search for printers on your network, check their status, and manage them remotely. You can also install, manage, and view printer usage information. Access to the embedded server in each printer enables you to perform other management tasks. The default printer search mode is Quick Search, which quickly finds the Dell printers on your local subnet.
Job Accounting Job Accounting This section includes: Using the Embedded Web Server to Access Job Accounting on page 3-3 Job accounting is available through the EWS. The printer stores information about print jobs. The log file is stored either in the printer’s RAM memory or on the hard drive if one is installed in the printer. Each job record contains fields such as user name, job name, pages printed, job times, and toner or ink used. Not all fields are supported by all printers.
Job Accounting To Enable or Disable Job Accounting 1. 2. 3. 4. 5. 6. Launch your web browser. Type the printer’s IP address in the browser Address field. Click the Properties tab. On the left navigation panel, select Security. On the left navigation panel under Security, select Printing Security Settings. In the Job Accounting Record field, enabled is checked by default. To disable all job accounting, uncheck the enabled check box. 7. Click the Save Changes button.
Usage Profile Reports Usage Profile Reports This section includes: Setting Up Usage Profile Reporting on page 3-5 Sending Usage Profile Reports on page 3-5 Usage Profile reports provide information on many aspects of printer usage gathered during the life of the printer. Usage Profile reports track multiple items, including: Printer information, such as printer name, date installed, total pages printed, options installed, and network ID. Supplies usage data, such as toner or ink.
Usage Profile Reports Note: To send usage profile reports using email, MaiLinX must be properly set up. See MaiLinX Remote Printing on page 3-11.
Usage Profile Reports TCP/IP To change TCP/IP settings: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Type your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, expand the Protocols folder. Select TCP/IP. If prompted, type in your Admin or Key User name and password. Ensure you are on the TCP/IP (v4) Settings page (if necessary, click the TCP/IP (v4) link at the top of the page). 8.
Usage Profile Reports LPR LPR is an application-level printing protocol that uses TCP/IP to establish connections between printers and workstations on a network. To change LPR settings: 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser. Type your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Protocols folder. Select LPR. If prompted, type in your Admin or Key User name and password. In the LPR field, select On or Off.
Usage Profile Reports SNMP (Simple Network Management Protocol) SNMP is a set of protocols designed to help manage complex networks. SNMP-compliant devices store data about themselves in MIBs and return this data to the SNMP requesters. The SNMP Configuration pages provide control over SNMP security, including methods to configure: Administrative and Key User accounts with privacy and authentication protocols and keys associated with each account. SNMP user account read or read/write access.
Usage Profile Reports Email Server or SMTP (Simple Mail Transfer Protocol) The Email Server settings page enables you to configure email server settings and to specify a return email address for undeliverable email. You can configure email server settings in the EWS by either: Automatically identifying the SMTP email server (recommended). Manually specifying the SMTP email server.
Usage Profile Reports MaiLinX Remote Printing MaiLinX Remote Printing provides the following key features: The ability to send print jobs to a group of printers. Print services across firewalls and proxies. Status reporting using email messages. MaiLinX Remote Printing consists of two parts: Client software installed on each user’s workstation or PC enables users to send print jobs from Windows applications to Dell printers over the Internet.
Usage Profile Reports MaiLinX Alerts MaiLinX alerts enable the printer to automatically send email to you or specified users under the following conditions: When the printer requires attention or when service is needed. When the printer displays an error, warning, or alert. When a reply to an EWS Remote Internet Printing message is desired. For more information about EWS Remote Internet printing, click the Help button in the EWS to go to the EWS Online Help.
Usage Profile Reports EtherTalk To change EtherTalk settings: 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser. Type the printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Protocols folder. Select EtherTalk. If prompted, type in your Admin or Key User name and password. In the EtherTalk field, select On or Off . If you selected On, follow the instructions on the page to select EtherTalk options.
Cloning Cloning Cloning enables you to configure one printer and then copy that configuration to another printer on the same network. You can access cloning using the EWS to select the settings you want to clone from one printer to another printer. To clone settings from one printer to another printer using the EWS: 1. 2. 3. 4. 5. 6. Launch your web browser. Type your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select Clone Printer.
4 Security Features This chapter includes: Basic Concepts on page 4-2 Securing the Printer in a High-security Environment on page 4-5 Managing Certificates on page 4-6 Configuring SSL on page 4-7 Configuring Administrator and Key User Settings on page 4-8 Configuring the Print Host Access List on page 4-9 Securing the Hard Drive on page 4-10 Configuring 802.
Basic Concepts Basic Concepts This section includes: About Admin and Key User Accounts on page 4-2 About HTTP, HTTPS, and SSL/TLS on page 4-3 About Certificates on page 4-3 About Access Control Lists on page 4-4 About Admin and Key User Accounts Admin and Key User accounts in the Embedded Web Server (EWS) enable you to limit access to specific printer functions by specifying passwords for user classes.
Basic Concepts About HTTP, HTTPS, and SSL/TLS HTTP (Hyper Text Transfer Protocol) is the protocol used to communicate across the Internet between the printer web server and the web browser (clients). Because the data is transmitted in plain text and passwords are only slightly encrypted, it is not secure; the data can be read or intercepted by other people. HTTPS (Secure Hyper Text Transfer Protocol) is a secure version of HTTP.
Basic Concepts If you want to use HTTPS, each printer must have a unique certificate that is accepted by each browser used to access the printer. This allows the printer web server to use HTTPS and encrypt data between the web browser and the printer. In addition, because each printer’s certificate is unique, you must load a different certificate into the browser for each printer the browser will access.
Securing the Printer in a High-security Environment Securing the Printer in a High-security Environment If you are concerned about the security of your printer in a high-security environment, such as a college or printing kiosk, you can configure settings in the EWS to “lockdown” or fully secure the printer. If you are not concerned about the security of your printer, you may only need to set up a certificate and then configure SSL to encrypt data including passwords. To fully secure a printer: 1.
Managing Certificates Managing Certificates To modify a self-signed certificate so it is specific to your printer or to install a downloaded root-signed certificate on the printer: 1. 2. 3. 4. 5. 6. Launch your web browser. Enter your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, expand the Security folder and then select Certificates. If prompted, enter your Admin or Key User name and password.
Configuring SSL Configuring SSL Once a certificate is set up, you can select when to use SSL to secure the connection between the printer and the server. Note: You can restrict user access to SSL pages in the EWS. For more information, see Configuring Administrator and Key User Settings on page 4-8. To configure SSL: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Security folder.
Configuring Administrator and Key User Settings Configuring Administrator and Key User Settings To prevent unauthorized changes to printer settings: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Security folder. Select Administrative Security Settings. If prompted, enter your Admin or Key User name and password.
Configuring the Print Host Access List Configuring the Print Host Access List To prevent unauthorized printing to your printer: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Security folder. Select Printing Security Settings. If prompted, enter your Admin or Key User name and password.
Securing the Hard Drive Securing the Hard Drive This section includes: Selecting the Hard Drive Overwrite Security Option on page 4-10 Selecting the Automatic Removal of Secure, Personal, and Proof Jobs Option on page 4-11 Selecting the Hard Drive Overwrite Security Option When a file is deleted from the printer’s hard drive, only the file name is deleted; the data in the file remains on the hard drive, regardless of the operating system.
Securing the Hard Drive Using the Embedded Web Server To select the Hard Drive Overwrite Security option: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter the printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Security folder. Select Printing Security Settings. If prompted, enter your Admin or Key User name and password.
Securing the Hard Drive 4. To remove all secure, personal, and proof print files every day at a set time: a. Select Daily Removal and then press the OK button to select On or Off. b. Select Remove At HH:MM and then press the OK button. c. Enter the hour and then press the OK button. d. Enter the minute and then press the OK button. 5. To remove all secure, personal, and proof print files after the files are a certain age or older: a. Select Age-based Removal and then press the OK button to select On or Off.
Configuring 802.1X Configuring 802.1X This section includes: Introduction to 802.1X and EAP on page 4-13 802.1X Configuration in the Embedded Web Server on page 4-13 Introduction to 802.1X and EAP The 802.1X IEEE standard defines port-based, authenticated network access control for Ethernet local area networks (LANs). With 802.1X, the user or device must pass network access control by successfully authenticating with credentials, such as a name and password, or else network access is denied. 802.
Configuring 802.1X If you selected a method that uses X.509 security certificates (TLS or PEAP), you can use use a root certificate to validate the authenticating server’s certificate. If you have selected TLS authentication, you must either install a signed device certificate that is trusted by the authenticating server, or add the device’s self-signed certificate to the authenticating server’s trusted certificate store. 7.
Locking the Control Panel Menus Locking the Control Panel Menus To prevent others from changing settings in the printer setup menus, you can lock some of the control panel menus. This is useful when printers are located in public places, such as schools, libraries, and office/print centers. Use the EWS to lock or unlock the control panel menus: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser Address field. Click Properties.
Configuring SNMP Configuring SNMP This section includes: Configuring SNMP for Maximum Security on page 4-16 Configuring SNMP v1/v2c on page 4-17 Configuring SNMP v3 on page 4-19 Configuring the SNMP Access Control List on page 4-21 Disabling SNMP on page 4-21 If you are using SNMP, you must configure it using the EWS. If you are not using SNMP, disable it to prevent unauthorized access through applications that use SNMP. For information on disabling SNMP, see Disabling SNMP on page 4-21.
Configuring SNMP d. On the Administrative Security Settings page under Feature Authorization, clear the View Configuration Web Pages and Modify Configuration Web Pages check boxes for users who should not have access to these pages. 6. Configure SNMP v3 by setting up the SNMP Administrative and Key User accounts: a. Select the Protocols folder on the left navigation panel and then select SNMP. b. If prompted, enter your Admin or Key User name and password. c.
Configuring SNMP Adding or Editing Traps for SNMP v1/v2c To add or edit traps for SNMP v1v2c: 1. On the SNMP Configuration page: Click the Configure SNMP v1v2c button and then click the Configure Traps button. The Configure Traps page lists the current Trap Destination Addresses for the SNMP protocol. The Address column lists the Trap Destination IP address or DNS Name. The Version/Type column lists the SNMP Trap version or Inform Request for sending to the specified trap address.
Configuring SNMP Configuring SNMP v3 When configuring SNMP v3, you can set up: Administrative, Key, Any User, and Driver accounts with Privacy and Authentication Keys associated with each account. SNMP user read and write access. An access control list that limits SNMP printer access to the specific hosts. See Configuring the SNMP Access Control List on page 4-21. To configure and enable SNMP v3: 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser.
Configuring SNMP The Key User Account Settings User Name: The Key User account name defined on the Configure SNMP v3: Key User Account page. Authentication Protocol: The protocol associated with the Authentication Key; selected on the Configure SNMP v3 Key User Account page. Authentication Key: The Authentication Key defined on the Configure SNMP v3: Key User Account page is displayed as a row of asterisks (*) here.
Configuring SNMP Configuring the SNMP Access Control List To set up a list of hosts that are authorized to access the printer using SNMP: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser Address field. Click Properties. On the left navigation panel, select the Protocol folder. Select SNMP. If prompted, enter your Admin or Key User name and password. Enter up to 10 host IP addresses in the Host Access List field of the SNMP Access Control List box.
. 5 Printing Features This chapter includes: Secure, Personal, Personal Saved, Proof, Print With, and Saved Print Jobs on page 5-2 Smart Trays on page 5-2 Jam Recovery on page 5-2 Dell 7330 Mono Laser Printer System Administrator Guide 5-1
Secure, Personal, Personal Saved, Proof, Print With, and Saved Print Jobs Secure, Personal, Personal Saved, Proof, Print With, and Saved Print Jobs These features are available if your printer has an internal hard drive. These jobs are stored on the hard drive and remain in the printer even when it is turned off. Select one of the following special job types: Normal: Prints the job without requiring a password.
Jam Recovery reprinted. To prevent the printer from printing two copies of the same check, you can set the printer to begin printing the job from the point where the media jammed through the end of the job, or cancel the job completely. To configure the jam recovery setting, use one of the following methods: The printer’s control panel Embedded Web Server Jam Recovery Using Embedded Web Server To configure jam recovery settings: 1. 2. 3. 4. 5. 6. 7. Launch your web browser.
6 Glossary Terms and Abbreviations Terms and Abbreviations Definitions access control list An Embedded Web Server feature that enables you to limit access to devices, as well as device configuration and management features. Admin account An Embedded Web Server feature that enables you to limit access to specific printer functions by specifying a name and password. The Admin account has the most permissions.
Terms and Abbreviations Terms and Abbreviations Definitions Embedded Web Server Embedded Web Server (EWS) is a printer administration and support tool. With EWS software, you can access printer status and manage your printer over a TCP/IP network using a web browser. EtherTalk A type of network connection (provided by EtherTalk software installed on a Macintosh computer) that enables use of AppleTalk network services on an Ethernet network.
Terms and Abbreviations Terms and Abbreviations Definitions network A collection of connected devices such as computers and printers. A network is a tool for communication that allows users to store and retrieve information, share printers, and exchange information. network address The network portion of an IP address. For a class A network, the network address is the first byte of the IP address. For a class B network, the network address is the first two bytes of the IP address.
Terms and Abbreviations Terms and Abbreviations Definitions SSL SSL (Secure Socket Layer) is a protocol that has become the universal standard on the Web for authenticating sites and for encrypting communications between users and Web servers. Because SSL is built into all major browsers and Web servers, simply installing a digital certificate or Server ID enables SSL capabilities.
A Configuration Card Parameters The printer has a configuration card that stores network parameters and configuration (dn) data. The configuration card is hot swappable, enabling you to share or replace it, providing an alternative to on-site service. Network settings are saved on the configuration card. If the configuration card is removed from an old printer and inserted into a new printer, the saved settings on the configuration card are copied to the new printer when it is powered on.
General Information Parameters General Information Parameters Printer Name Startup Page Enabled Printer ID Sys/Start Job Job Timeout Load Paper Timeout Menu Timeout Power Saver Timeout Intelligent Ready Paper Source Tray 1 or Tray 1 (MPT) Tray 2 Tray 3 Tray 4 Tray 5 Note: The Tray 3, Tray 4, and Tray 5 parameters are only stored on the printer configuration card if the optional trays are available for your printer and installed.
PCL Parameters PCL Parameters Font Number Pitch Point Size Symbol Set Orientation Form Length Line Termination Color Mode (on color printers) PCL Edge to Edge Wide A4 USB 2.0 Parameters Language Wait Timeout Hard Drive Parameters The hard drive parameters are only stored on the configuration card if the printer has an internal hard drive.
Certificates Certificates Device Certificate Friendly Name Root Certificate 802.
DNS Parameters DNS Parameters Primary Server Secondary Server Multicast DNS (Bonjour) Enable SLP Parameters Enabled Disabled Directory Agent Discovery Enable Directory Agent Scope 1 Scope 2 Scope 3 SLP Multicast Enable SLP Multicast TTL SLP MTU SSDP Parameters Enabled Disabled SSDP TTL NBNS (WINS) Parameters Node Type WINS Servers Access Control Parameter Host Access List LPR Parameters Enabled Disabled Filtering Enable Banners Dell 7330 Mono Laser
AppSocket (Port 9100) Parameters AppSocket (Port 9100) Parameters Enabled Disabled Language Filtering IPP (Internet Printing Protocol) Parameters Enabled Disabled Language Filtering Network Path SNMP Parameters SNMP v1/v2c SNMP v3 Host Access List Embedded Web Server (HTTP) Parameters Enabled Disabled Custom Link Refresh Delay Administrator Password Key User Password Use SSL FTP Parameters Enabled Disabled Language Filtering Login Password Dell 7330
Status Notification Parameter Status Notification Parameter Disabled Enabled Sys Admin Email Address Service Email Address Key User email Address MaiLinX Remote Printing Parameters Language Filtering POP3 Server POP3 User Name POP3 Password POP3 Polling Interval Printing Password Authorized Users Dell 7330 Mono Laser Printer System Administrator Guide A-7
B Printer Commands Printer Control Language (PCL) and Printer Job Language (PJL) commands can be used to control print job settings and printer defaults. In addition to the standard PCL and PJL commands, the Dell printers support additional PCL and PJL commands. This appendix lists the most commonly used standard and additional PCL and PJL commands.
Additional PCL Commands Additional PCL Commands This section includes: Media Size on page B-2 Media Type on page B-3 Input Trays on page B-4 Output Trays on page B-4 Media Size The following table lists the most common PCL commands for supported media sizes. For information on which media sizes are supported in your printer, and the trays that support them, print the Paper Tips page from your printer control panel.
Additional PCL Commands Media Size PCL 5 Command* DL Envelope (110 x 220 mm) &l90A C6 Envelope (114 x 162 mm) &l92A Choukei 3 Gou &l87A Choukei 4 Gou &l86A Custom &l101A * The character that follows the “&” in the command is the lowercase letter “L.” Media Type The following table lists the most common PCL commands for supported media types.
Additional PCL Commands Input Trays The following table lists the most common PCL commands for the input trays supported by your printer. The table also lists the alternate tray used if the optional input tray is not installed. Note: When more than one command is listed, you can use either command.
Additional PJL Commands Additional PJL Commands The following table lists the most commonly used HP PJL and additional PJL commands. See also: HP Printer Job Language Technical Reference for the standard set of PJL commands. PJL Command Values Description @PJL FSDELETE NAME=“pathname” * Deletes a file from the internal hard drive. @PJL FSDIRLIST NAME=“pathname” * Lists PJL system files and directories.
Additional PJL Commands PJL Command Values Description @PJL XPERSONALJOB n/a Starts a Personal Print job. @PJL XPROOFJOB n/a Starts a Proof Print job. @PJL XSAVEDJOB n/a Starts a Saved Print job. @PJL XSECUREJOB n/a Starts a Secure Print job. @PJL XIGNOREFF ON, OFF Ignores FormFeed commands when printing PCL blank pages. @PJL XLINETERMINATION=value ON, OFF Terminates a line.
Additional PJL Commands PJL Command * See the HP Values Description Printer Job Language Technical Reference for the values.
C Acknowledgements Original SSLeay License Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Part 2: Networks Associates Technology, Inc. copyright notice (BSD) ----- Copyright © 2001-2003, Networks Associates Technology, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Part 3: Cambridge Broadband Ltd. copyright notice (BSD) ----- Copyright © 2001-2003, Cambridge Broadband Ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
VxWorks This product may include software licensed to Wind River by third parties. The following notices are provided to comply with the terms of such licenses. Wind River VxWorks This product may include software developed by WIDE Project and its contributors. Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided only with the following conditions are satisfied: 1.
This product may include software copyright David A. Hinds. Use, redistribution, and modification of this code is permitted subject to the following conditions: 1. Redistribution of this code must preserve this copyright notice. 2. Binary distributions must include this notice and disclaimer. 3. Advertising materials that refer to specific features of this product must acknowledge the author. 4.
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
not be used in advertising or publicity pertaining to distribution of the software or the documentation without specific, written prior permission. Intel Corporation does not warrant, guarantee or make any representations regarding the use of, or the results of the use of, the software and documentation in terms of correctness, accuracy, reliability, currentness, or otherwise; and you rely on the software, documentation and results solely at your own risk.
distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product may include software copyright © 2003 Ericsson Research Canada. All rights reserved. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product contains software developed by the Apache Software Foundation (www.apache.org/). This product contains ANTLR software. www.antlr.org/ This product contains software copyright © 1992–1996 Paul Falstad. All rights reserved.
SNiFF+/SNiFF+ PRO Copyright © 1992–1997 Compuware Corporation Copyright © 1984–1997 FairCom Corporation Copyright © 1996–2000 Greg Stein and Mark Hammond Copyright © 1999 The Apache Software Foundation Copyright © 2001 Xperts Software Wind River USB Host Stack This product may include software developed by Wipro Limited. WIND MEDIA LIBRARY This product may include software copyright © Adobe Systems Incorporated and Digital Equipment Corporation.
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. This product may contain software that is based in part on the work of the Independent JPEG Group. Wind River PPP This product may include software copyright © Carnegie Mellon University.
Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. WIND MANAGE XML/SOAP This product may include software developed by the gSOAP project. gSOAP is copyrighted and owned by Robert A. van Engelen (www.cs.fsu.edu/~engelen/soap.html).
Other Components of this product, including without limitation Wind River Workbench, Tornado, VxWorks, and Wind River PPP, include software derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm, and copyright © RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc. MD5 Message-Digest Algorithm” in all material mentioning or referencing this software or this function.
redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a selfextracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled. 3. Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, and dynamic, shared, or static library versions--must be plainly marked as such and must not be misrepresented as being the original source.
GOVERNMENT USE: If you are acquiring this software on behalf of the U.S. government, the Government shall have only "Restricted Rights" in the software and related documentation as defined in the Federal Acquisition Regulations (FARs) in Clause 52.227.19 (c) (2). If you are acquiring the software on behalf of the Department of Defense, the software shall be classified as "Commercial Computer Software" and the Government shall have only "Restricted Rights" as defined in Clause 252.227-7013 (c) (1) of DFARs.
3. You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in each changed file stating how and when you changed that file, and provided that you do at least ONE of the following: a. place your modifications in the Public Domain or otherwise make them Freely Available, such as by posting said modifications to Usenet or an equivalent medium, or placing the modifications on a major archive site such as uunet.uu.
8. Aggregation of this Package with a commercial distribution is always permitted provided that the use of this Package is embedded; that is, when no overt attempt is made to make this Package's interfaces visible to the end user of the commercial distribution. Such use shall not be construed as a distribution of this Package. 9. The name of the Copyright Holder may not be used to endorse or promote products derived from this software without specific prior written permission. 10.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 1. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
(For example, a function in a library to compute square roots has a purpose that is entirely well defined independent of the application. Therefore, Subsection 2d requires that any application supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole.
When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.
For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
2.
OpenSSL License OpenSSL License Copyright © 1998–2003 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
gSOAP Public License Version 1.3a The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified). 1. DEFINITIONS 1.0.1. 1.1. “Contributor” means each entity that creates or contributes to the creation of Modifications. 1.2.
1.11. “Source Code” means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor’s choice.
3. DISTRIBUTION OBLIGATIONS 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute.
3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A.
6. VERSIONS OF THE LICENSE 6.1. New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License. 6.3. Derivative Works.
ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR CONTROL, OR LIFE-CRITICAL APPLICATIONS. THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ONLINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU.
SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
10. U.S. GOVERNMENT END USERS 11. MISCELLANEOUS 12. RESPONSIBILITY FOR CLAIMS As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. EXHIBIT A.
EXHIBIT B. “Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (c) 2001–2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Index A about the configuration file, 2-2 access control lists, 4-4 definition, 6-1 specifying access to printer settings, 4-8 specifying printer access using SNMP, 4-21 specifying printing access, 4-9 accessing online manuals using the Embedded Web Server, 1-4 Admin Access List, 4-4 account, 4-2 configuring settings, 4-8 definition, 6-1 authentication definition, 6-1 auto-configuring driver, 2-3 B basic concepts, 4-2 bi-directional definition, 6-1 BOOTP definition, 6-1 C certificates, 4-3 definition, 6-1
Index definition, 6-2 auto-configuring, 2-3 definition, 6-1 F E email configuring server settings, 3-10 MaiLinX alerts, 3-12 Embedded Web Server, 1-4 accessing online manuals, 1-4 checking printer status, 3-2 checking supplies status, 1-4 configuring Admin and Key User settings, 4-8 configuring the Print Host Access List, 4-9 copying settings from one printer to another, 1-4 defining a network printer, 1-4 definition, 6-2 job accounting, 3-3 locking the control panel, 4-15 printer management software, 1-4
Index J N jam recovery, 5-2 job accounting, 3-3 definition, 6-2 log file, 3-3 records, 3-3 job patches loading, 2-2 jobs secure, personal, proof, personal saved, print with, and saved print jobs, 5-2 usage profile reports, 3-5 Net-SNMP License, C-2 network definition, 6-3 network address definition, 6-3 network configuration file, 2-2 network connection definition, 6-3 K Key User Access List, 4-4 account, 4-2 configuring settings, 4-8 definition, 6-2 O Online Dell support, 1-1 Online Diagnostics Techn
Index securing in a high-security environment, 4-5 settings copy from one printer to another, 1-4 viewing usage information, 3-2 Printer Neighborhood, 3-2 definition, 6-3 printer settings copy from one printer to another, 1-4 proof print jobs, 5-2 protocols controlling, 3-6 definition, 6-3 discovery, 2-4 email server, 3-10 EtherTalk, 3-13 FTP, 3-9 HTTP, 3-6 IPP, 3-8 LPR, 3-8 MaiLinX alerts, 3-12 MaiLinX remote printing, 3-11 mDNS, 2-4 Port 9100, 3-7 securing, 3-6 SLP, 2-5 SNMP, 3-9 TCP/IP, 3-7 R records jo
Index Status Monitor alerts, 1-2 Technical Support, 1-1 U UDP definition, 6-4 usage profile reports, 3-5 sending, 3-5 setting up, 3-5 V viewing printer usage information, 3-2 VxWorks, C-6 W Walk-Up installation, 2-3 Dell 7330 Mono Laser Printer System Administrator Guide Index-5