Operating instructions
Table Of Contents
- General Settings Guide
- Introduction
- Important
- Notes:
- Manuals for This Machine
- TABLE OF CONTENTS
- How to Read This Manual
- Display Panel
- Accessing User Tools
- 1. Connecting the Machine
- Connecting to the Interfaces
- Network Settings
- Settings Required to Use the Printer/LAN-Fax
- Settings Required to Use Internet Fax
- Settings Required to Use E-mail Function
- Settings Required to Use Scan to Folder Function
- Settings Required to Use the Network Delivery Scanner
- Settings Required to Use Network TWAIN Scanner
- Settings Required to Use Document Server
- Using Utilities to Make Network Settings
- Connecting the Machine to a Telephone Line and Telephone
- 2. System Settings
- 3. Copier / Document Server Features
- 4. Facsimile Features
- General Features
- Scan Settings
- Send Settings
- Reception Settings
- Initial Settings
- Reception File Setting
- Program / Change / Delete Scan Size
- Registering Fax Information
- Forwarding
- Parameter Settings
- Special Senders to Treat Differently
- Authorized Reception
- Reception File Print Quantity
- Forwarding
- Print 2 Sided
- Memory Lock
- Paper Tray
- Programming/Changing Special Senders
- Authorized RX (Authorized Reception)
- Reception File Print Qty
- Forwarding
- Print 2 Sided
- Memory Lock
- Paper Tray per Sender
- Programming Initial Set Up of a Special Sender
- Deleting a Special Sender
- Box Settings
- 5. Printer Features
- 6. Scanner Features
- 7. Registering Addresses and Users for Facsimile/Scanner Functions
- Address Book
- Registering Names
- Authentication Information
- Fax Destination
- Fax Destination
- IP-Fax Destination
- Registering an IP-Fax Destination
- Changing a Registered IP-Fax Destination
- Using the IP–Fax Destination as the sender
- To change the IP-Fax Destination
- To select the protocol
- To program the SUB Code
- To program the SEP Code
- To set the International TX Mode
- To select the fax header
- Deleting a Registered IP-Fax Destination
- E-mail Destination
- Registering Folders
- Registering Names to a Group
- Registering a Protection Code
- Registering SMTP and LDAP Authentication
- 8. Other User Tools
- 9. Appendix
- INDEX

Appendix
300
9
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO
IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY
WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT-
TED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GEN-
ERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT
NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCU-
RATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE
OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGES.
2)
The 32-bit CRC compensation attack detector in deattack.c was contributed by
CORE SDI S.A. under a BSD-style license.
Cryptographic attack detector for ssh - source code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
All rights reserved. Redistribution and use in source and binary forms, with or
without modification, are permitted provided that this copyright notice is re-
tained.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLA-
RY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MIS-
USE OF THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com>
<http://www.core-sdi.com>
3)
One component of the ssh source code is under a 3-clause BSD license, held by
the University of California, since we pulled these parts from original Berkeley
code.
Copyright (c) 1983, 1990, 1992, 1993, 1995
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.