Operating instructions
Table Of Contents
- General Settings Guide
- Introduction
- Important
- Notes:
- Manuals for This Machine
- TABLE OF CONTENTS
- How to Read This Manual
- Display Panel
- Accessing User Tools
- 1. Connecting the Machine
- Connecting to the Interfaces
- Network Settings
- Settings Required to Use the Printer/LAN-Fax
- Settings Required to Use Internet Fax
- Settings Required to Use E-mail Function
- Settings Required to Use Scan to Folder Function
- Settings Required to Use the Network Delivery Scanner
- Settings Required to Use Network TWAIN Scanner
- Settings Required to Use Document Server
- Using Utilities to Make Network Settings
- Connecting the Machine to a Telephone Line and Telephone
- 2. System Settings
- 3. Copier / Document Server Features
- 4. Facsimile Features
- General Features
- Scan Settings
- Send Settings
- Reception Settings
- Initial Settings
- Reception File Setting
- Program / Change / Delete Scan Size
- Registering Fax Information
- Forwarding
- Parameter Settings
- Special Senders to Treat Differently
- Authorized Reception
- Reception File Print Quantity
- Forwarding
- Print 2 Sided
- Memory Lock
- Paper Tray
- Programming/Changing Special Senders
- Authorized RX (Authorized Reception)
- Reception File Print Qty
- Forwarding
- Print 2 Sided
- Memory Lock
- Paper Tray per Sender
- Programming Initial Set Up of a Special Sender
- Deleting a Special Sender
- Box Settings
- 5. Printer Features
- 6. Scanner Features
- 7. Registering Addresses and Users for Facsimile/Scanner Functions
- Address Book
- Registering Names
- Authentication Information
- Fax Destination
- Fax Destination
- IP-Fax Destination
- Registering an IP-Fax Destination
- Changing a Registered IP-Fax Destination
- Using the IP–Fax Destination as the sender
- To change the IP-Fax Destination
- To select the protocol
- To program the SUB Code
- To program the SEP Code
- To set the International TX Mode
- To select the fax header
- Deleting a Registered IP-Fax Destination
- E-mail Destination
- Registering Folders
- Registering Names to a Group
- Registering a Protection Code
- Registering SMTP and LDAP Authentication
- 8. Other User Tools
- 9. Appendix
- INDEX

Appendix
296
9
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE
MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CON-
SEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
MD4
Copyright (C) 1990-2, RSA Data Security, Inc. All rights reserved.
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD4 Message-
Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the mer-
chantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
MD5
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD5 Message-
Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the mer-
chantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.