Office Printers Phaser® 6360 color laser printer Phaser® 8560 color printer Phaser® 4510 laser printer Phaser® 8860 printer System Administrator Guide www.xerox.
Copyright © 2007 Xerox Corporation. All Rights Reserved. Unpublished rights reserved under the copyright laws of the United States. Contents of this publication may not be reproduced in any form without permission of Xerox Corporation.
Contents 1 Overview Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 PrintingScout Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 PhaserSMART Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 How to Access PhaserSMART . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Protocol Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 HTTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 TCP/IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 Port 9100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 5 Printing Features Personal, Secure, Proof, Shared Saved, Personal Saved, and Print With Jobs . . . . . . . . . . . 5-2 Smart Trays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 Jam Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3 6 Glossary Terms and Abbreviations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Overview This section includes: ■ ■ ■ ■ ■ Resources on page 1-1 PrintingScout Alerts on page 1-2 PhaserSMART Technical Support on page 1-2 Xerox Support Centre on page 1-4 CentreWare Internet Services (IS) on page 1-5 You can obtain information regarding your printer and its capabilities from the following sources.
PrintingScout Alerts PrintingScout Alerts PrintingScout is an automated tool that is installed with the Xerox printer driver. It checks the printer status when a print job is sent. If the printer is unable to print a job, PrintingScout displays an alert on the user’s computer screen to let them know that the printer needs attention. The user can click the alert to view instructions explaining how to fix the problem.
PhaserSMART Technical Support Using CentreWare IS To access PhaserSMART Technical Support from CentreWare IS: 1. 2. 3. 4. 5. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click the Support tab. Select the PhaserSMART Diagnostic Tool link. Follow the instructions on the screen. Using a Windows Printer Driver To access PhaserSMART Technical Support from your printer driver: 1. 2. 3. 4. Select Start, and then select Printer and Faxes.
Xerox Support Centre Xerox Support Centre The Xerox Support Centre is a utility that is installed when running the driver installer. It is available for systems with Windows 2000 and later or Mac OS X, version 10.2 and higher. The Xerox Support Centre appears on the desktop for Windows systems or is placed in the Mac OS X dock.
CentreWare Internet Services (IS) CentreWare Internet Services (IS) CentreWare IS provides a simple interface to the embedded web server in any networked Xerox printer that enables you to manage, configure, and monitor networked printers from your desktop. CentreWare IS gives administrators easy access to printer status, configuration, and diagnostic functions. It also provides users with access to printer status and special printing functions such as printing saved jobs.
Network Installation Features This chapter includes: ■ ■ ■ Using a Startup Network Configuration File on page 2-2 Printer Driver Installation Features on page 2-3 Discovery Protocols on page 2-5 See also: Advanced Features Guide at www.xerox.
Using a Startup Network Configuration File Using a Startup Network Configuration File This section includes: ■ ■ ■ About the Configuration File on page 2-2 Configuration File Requirements on page 2-2 Specifying the Location of the Configuration File on page 2-2 About the Configuration File To configure printer settings or to perform other tasks, such as loading fonts, color tables, and job patches, you can create a startup network configuration file.
Printer Driver Installation Features Printer Driver Installation Features This section includes: ■ ■ ■ ■ Walk-Up Printing Driver on page 2-3 Walk-Up Installation on page 2-3 Installation from the Printer’s Hard Drive or the Web on page 2-4 Discovery Protocols on page 2-5 Walk-Up Printing Driver The Xerox Walk-Up Printing Driver enables printing from a PC to any Xerox PostScript-enabled printer.
Printer Driver Installation Features Installation from the Printer’s Hard Drive or the Web You can install the printer driver from the printer’s hard drive. This is especially useful if you do not have the Software and Documentation CD-ROM. Note: If the printer doesn’t have a hard drive but is connected to the internet, you can use this procedure to automatically connect to the web to install the driver. To install the printer driver either from the hard drive or the web: 1. 2. 3. 4. 5. 6.
Discovery Protocols Discovery Protocols This section includes: ■ ■ ■ ■ DDNS/WINS on page 2-5 DNS (Domain Name Services) on page 2-6 Service Location Protocol on page 2-6 UPnP (Universal Plug and Play) on page 2-7 DDNS/WINS DDNS/WINS settings can be obtained from the BOOTP or DHCP server, if enabled. These settings enable the printer to register its IP name and address so other devices on the network can refer to it by name. To change the DDNS/WINS settings: 1. 2. 3. 4. 5. 6. 7. Launch your web browser.
Discovery Protocols DNS (Domain Name Services) DNS settings reference servers by name and allow you to enter and view host names rather than IP addresses. Note: Turning Multicast DNS ON allows the printer to be automatically discovered on a TCP/IP network by Apple Macintosh OS X Bonjour technology. To change the DNS settings: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click the Properties tab.
Discovery Protocols UPnP (Universal Plug and Play) UPnP provides a simplified method to obtain an IP Address for a printer, locate devices on the network, and display those devices on desktop computers. 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Click the Protocols folder on the left navigation panel. Select TCP/IP. If prompted, enter your Admin or Key User name and password.
Network Administration Features This chapter includes: ■ ■ ■ ■ ■ ■ Printer Neighborhood on page 3-2 Job Accounting on page 3-3 Usage Profile Reports on page 3-4 Xerox Usage Analysis Tool on page 3-5 Protocol Control on page 3-6 Cloning on page 3-14 System Administrator Guide 3-1
Printer Neighborhood Printer Neighborhood Printer Neighborhood is a tool in CentreWare IS that enables you to search for printers on your network, check their status, and manage them remotely. You can also install, manage, and view printer usage information. Access to the embedded server in each printer enables you to perform other management tasks. The default printer search mode is Quick Phaser Search, which quickly finds the Phaser printers on your local subnet.
Job Accounting Job Accounting The printer stores information about print jobs. This information is stored in a log file that lists job records. Each job record contains fields such as user name, job name, pages printed, job times, and toner or ink used. Not all fields are supported by all printers. For more information about the fields supported, go to the CentreWare IS Online Help or CentreWare Web Online Help.
Usage Profile Reports Usage Profile Reports Usage Profile reports provide information on many aspects of printer usage, such as ink or toner used, number of pages printed, and paper types used, gathered during the life of the printer. From this page you can view or print a report, and also send it to an email address you enter below, or to users who are specified in the Usage Profile Properties page. Setting Up Usage Profile Reporting To set up usage profile reporting: 1. 2. 3. 4. 5. 6.
Xerox Usage Analysis Tool Xerox Usage Analysis Tool The Xerox Usage Analysis Tool (UAT) enables you to collect and analyze enterprise-wide Xerox network printer usage data with customizable features: ■ ■ ■ ■ Cost Analysis: Track printing costs by groups of users or by groups of printers. Print Job Analysis: Analyze print jobs to review media type, color coverage, paper source, and other job specifics. Plan your next consumable order based on prior usage.
Protocol Control Protocol Control This section includes: ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ HTTP on page 3-6 TCP/IP on page 3-7 Port 9100 on page 3-7 LPR on page 3-8 IPP (Internet Printing Protocol) on page 3-8 SNMP (Simple Network Management Protocol) on page 3-9 FTP (File Transfer Protocol) on page 3-9 Email Server or SMTP (Simple Mail Transfer Protocol) on page 3-10 MaiLinX Remote Printing on page 3-11 MaiLinX Alerts on page 3-12 See also: Discovery Protocols on page 2-5 All network protocols, including network prin
Protocol Control TCP/IP To change TCP/IP settings: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Select the Protocols folder on the left navigation panel. Select TCP/IP. If prompted, enter your Admin or Key User name and password. In the BOOTP/DHCP box, select one of the following: ■ On: The printer issues BOOTP and DHCP requests on startup. ■ Off: The printer does not issue BOOTP or DHCP requests on startup. 8.
Protocol Control LPR LPR is an application-level printing protocol that uses TCP/IP to establish connections between printers and workstations on a network. To change LPR settings: 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Select the Protocols folder on the left navigation panel. Select LPR. If prompted, enter your Admin or Key User name and password. Select On or Off in the LPR box.
Protocol Control SNMP (Simple Network Management Protocol) SNMP is a set of protocols designed to help manage complex networks. SNMP-compliant devices store data about themselves in MIBs and return this data to the SNMP requesters. The SNMP Configuration pages provide control over SNMP security, including methods to configure: ■ ■ ■ Administrative and Key User accounts with privacy and authentication protocols and keys associated with each account. SNMP user account read or read/write access.
Protocol Control Email Server or SMTP (Simple Mail Transfer Protocol) The Email server settings page enables you to configure email server settings and to specify a return email address for undeliverable email. You can configure email server settings in CentreWare IS by either: ■ ■ Automatically identifying the SMTP email server (recommended). Manually specifying the SMTP email server.
Protocol Control MaiLinX Remote Printing MaiLinX Remote Printing provides the following key features: ■ ■ ■ The ability to send print jobs to a group of printers. Print services across firewalls and proxies. Status reporting using email messages. MaiLinX Remote Printing consists of two parts: ■ ■ Client software installed on each user’s workstation or PC enables users to send print jobs from Windows applications to Xerox printers over the Internet.
Protocol Control MaiLinX Alerts About MaiLinX Alerts MaiLinX alerts enable the printer to automatically send email to you and/or specified users when the following conditions occur: ■ ■ ■ The printer requires attention or when service is needed. The printer displays an error, warning, or alert. A reply to a MaiLinX Remote Printing message is desired. For more information, click the Help button in CentreWare IS to view the online help. Setting Up MaiLinX Alerts To enable MaiLinX alerts: 1. 2. 3. 4. 5. 6.
Protocol Control EtherTalk To change EtherTalk settings: 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser. Enter the printer’s IP address in the browser’s Address field. Click Properties. Select the Protocols folder on the left navigation panel. Select EtherTalk. If prompted, enter your Admin or Key User name and password. Select On or Off in the EtherTalk box. If you selected On, follow the instructions on the page to select EtherTalk options.
Cloning Cloning Cloning enables you to configure one printer and then copy that configuration to another printer on the same network. You can access cloning using CentreWare IS or CentreWare Web. Using CentreWare IS, you can select the settings you want to clone from one printer to another printer. Using CentreWare Web, you can select the settings you want to clone from one printer to one or more printers. To clone settings from one printer to another printer using CentreWare IS: 1. 2. 3. 4. 5. 6.
Security Features This chapter includes: ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ Basic Concepts on page 4-2 Securing the Printer in a High Security Environment on page 4-5 Managing Certificates on page 4-6 Configuring SSL on page 4-7 Configuring Administrator and Key User Settings on page 4-8 Configuring the Print Host Access List on page 4-9 Controlling Access to Color Printing on page 4-10 Securing the Hard Drive on page 4-11 802.
Basic Concepts Basic Concepts This section includes: ■ ■ ■ ■ About Admin and Key User Accounts on page 4-2 About HTTP, HTTPS, and SSL/TLS on page 4-3 About Certificates on page 4-3 About Access Control Lists on page 4-4 About Admin and Key User Accounts Admin and Key User accounts in CentreWare IS enable you to limit access to specific printer functions by specifying passwords for user classes. CentreWare IS requires a name and password before access to the controlled printer functions are allowed.
Basic Concepts About HTTP, HTTPS, and SSL/TLS HTTP (Hyper Text Transfer Protocol) is the protocol used to communicate across the internet between the printer web server and the web browser (clients). Because the data is transmitted in plain text and passwords are only slightly encrypted, it is not secure; the data can be read or intercepted by other people. HTTPS (Secure Hyper Text Transfer Protocol) is a secure version of HTTP.
Basic Concepts If you want to use HTTPS, each printer must have a unique certificate that is accepted by each browser used to access the printer. This allows the printer web server to use HTTPS and encrypt data between the web browser and the printer. In addition, because each printer’s certificate is unique, you must load a different certificate into the browser for each printer the browser will access.
Securing the Printer in a High Security Environment Securing the Printer in a High Security Environment If you are concerned about the security of your printer in a high security environment, such as a college or printing kiosk, you can configure settings in CentreWare IS to “lockdown” or fully secure the printer. If you are not concerned about the security of your printer, you may only need to set up a certificate and then configure SSL to encrypt data including passwords. To fully secure a printer: 1.
Managing Certificates Managing Certificates To modify a self-signed certificate so it is specific to your printer or to install a downloaded root-signed certificate on the printer: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Expand the Security folder on the left navigation panel. Select Certificates. If prompted, enter your Admin or Key User name and password.
Configuring SSL Configuring SSL Once a certificate is set up, you can select when to use SSL to secure the connection between the printer and the server. Note: You can restrict user access to SSL pages in CentreWare IS. For more information, see Configuring Administrator and Key User Settings on page 4-8. To configure SSL: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Select the Security folder on the left navigation panel.
Configuring Administrator and Key User Settings Configuring Administrator and Key User Settings To prevent unauthorized changes to printer settings: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Select the Security folder on the left navigation panel. Select Administrative Security Settings. If prompted, enter your Admin or Key User name and password.
Configuring the Print Host Access List Configuring the Print Host Access List To prevent unauthorized printing to your printer: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Select the Security folder on the left navigation panel. Select Printing Security Settings. If prompted, enter your Admin or Key User name and password.
Controlling Access to Color Printing Controlling Access to Color Printing Note: Color access controls are available on color printers only. To control the user’s access to color printing, you can require the use of a 4-digit numeric password to print in color. To require a password: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Select the Security folder on the left navigation panel. Select Printing Security Settings.
Securing the Hard Drive Securing the Hard Drive This section includes: ■ ■ Selecting the Hard Drive Overwrite Security Option on page 4-11 Selecting the Automatic Removal of Secure, Personal, and Proof Jobs Option on page 4-12 Selecting the Hard Drive Overwrite Security Option When a file is deleted from the printer’s hard drive, only the file name is deleted; the data in the file remains on the hard drive, regardless of the operating system.
Securing the Hard Drive Using CentreWare IS To select the Hard Drive Overwrite Security option: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter the printer’s IP address in the browser’s Address field. Click Properties. Select the Security folder on the left navigation panel. Select Printing Security Settings. If prompted, enter your Admin or Key User name and password.
Securing the Hard Drive a. Select Overwrite Removals, and then press the OK button to select On or Off. Note: Remove Job Files does not remove saved or protected print job files. 4. To remove all secure, personal, and proof print files every day at a set time: a. Select Daily Removal, and then press the OK button to select On or Off. b. Select Remove At HH:MM, and then press the OK button. c. Enter the hour, and then press the OK button. d. Enter the minute, and then press the OK button. 5.
802.1X Configuration 802.1X Configuration Introduction to 802.1X and EAP The 802.1X IEEE standard defines port-based, authenticated network access control for Ethernet local area networks (LANs). With 802.1X, the user or device must pass network access control by successfully authenticating with credentials, such as a name and password, or network access is denied. 802.
802.1X Configuration 7. Install root certificate – If you select EAP method(s) that require a root certificate, you can: ■ Install a new root certificate. ■ Use the already existing root certificate. ■ Choose not to validate server. 8. Install device certificate – If you select EAP method(s) that require a device certificate, you can: ■ Install a new device certificate. ■ Use the default self-signed certificate. ■ Use a custom self-signed certificate.
Locking the Control Panel Menus Locking the Control Panel Menus To prevent others from changing settings in the printer setup menus, you can lock some of the control panel menus. This is useful when printers are located in public places, such as schools, libraries, and office/print centers. Use CentreWare IS to lock or unlock the control panel menus: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties.
Configuring SNMP Configuring SNMP This section includes: ■ ■ ■ ■ ■ Configuring SNMP for Maximum Security on page 4-17 Configuring SNMP v1/v2c on page 4-18 Configuring SNMP v3 on page 4-20 Configuring the SNMP Access Control List on page 4-22 Disabling SNMP on page 4-23 If you are using SNMP, you must configure it using CentreWare IS. If you are not using SNMP, disable it to prevent unauthorized access through applications that use SNMP. For information on disabling SNMP, see Disabling SNMP on page 4-23.
Configuring SNMP d. On the Administrative Security Settings page, clear the View Configuration Web Pages and Modify Configuration Web Pages check boxes for users who should not have access to these pages. 6. Set up the SNMP Administrative and Key User accounts to configure SNMP v3: a. Select the Protocols folder on the left navigation panel, and then select SNMP. b. If prompted, enter your Admin or Key User name and password. c.
Configuring SNMP Adding or Editing Traps for SNMP v1/v2c To add or edit traps for SNMP v1v2c: 1. On the SNMP Configuration page: Click the Configure SNMP v1v2c button, and then click the Configure Traps button. The Configure Traps page lists the current Trap Destination Addresses for the SNMP protocol. The Address column lists the Trap Destination IP address or DNS Name. The Version/Type column lists the SNMP Trap version or Inform Request for sending to the specified trap address.
Configuring SNMP Configuring SNMP v3 When configuring SNMP v3, you can set up: ■ ■ ■ Administrative, Key, Any User, and Driver accounts with Privacy and Authentication Keys associated with each account. SNMP user read and write access. An access control list that limits SNMP printer access to the specific hosts. See Configuring the SNMP Access Control List on page 4-22. To configure and enable SNMP v3: 1. 2. 3. 4. 5. 6. 7. 8. Launch your web browser.
Configuring SNMP The Key User Account Settings ■ ■ ■ ■ ■ ■ User Name: The Key User account name defined on the Configure SNMP v3: Key User Account page. Authentication Protocol: The protocol associated with the Authentication Key selected on the Configure SNMP v3 Key User Account page. Authentication Key: The Authentication Key defined on the Configure SNMP v3: Key User Account page is displayed as a row of asterisks (*) here.
Configuring SNMP Configuring the SNMP Access Control List To set up a list of hosts that are authorized to access the printer using SNMP: 1. 2. 3. 4. 5. 6. 7. Launch your web browser. Enter your printer’s IP address in the browser’s Address field. Click Properties. Select the Protocol folder on the left navigation panel. Select SNMP. If prompted, enter your Admin or Key User name and password. Enter up to ten host IP addresses in the SNMP Access Control List field.
Configuring SNMP Disabling SNMP If you are not using SNMP, disable it to prevent unauthorized access through applications that use these protocols. If you disable SNMP, the following driver features are also disabled: ■ ■ ■ ■ ■ ■ ■ ■ PrintingScout alerts Walk-Up Printing Installer Smart Trays PhaserSMART Auto supplies ordering Consumable levels Warning and error status Synchronization with installed options, such as hard drive, memory, and extra trays To disable SNMP: 1. 2. 3. 4. 5. 6. 7. 8.
. Printing Features This chapter includes: ■ ■ ■ Personal, Secure, Proof, Shared Saved, Personal Saved, and Print With Jobs on page 5-2 Smart Trays on page 5-2 Jam Recovery on page 5-3 System Administrator Guide 5-1
Personal, Secure, Proof, Shared Saved, Personal Saved, and Print With Jobs Personal, Secure, Proof, Shared Saved, Personal Saved, and Print With Jobs These features are available if your printer has an internal hard drive. These jobs are stored on the hard drive and remain in the printer even when it is turned off. Note: For information about special job types, see Printing Special Job Types in the Advanced Features Guide for your printer at www.xerox.com/support.
Jam Recovery Jam Recovery Note: Jam recovery is not available on all printers, see the documentation that came with your printer for more information. The jam recovery settings enable you to select how the printer handles jobs that are in the process of printing when a media jam occurs. Jam recovery settings are especially important to consider when printing checks. Normally when a media jam occurs, you can remove the jammed media and the printer reprints that page and the rest of the job.
Glossary Terms and Abbreviations Terms and Abbreviations Definitions access control list A CentreWare IS feature that enables you to limit access to devices. Admin account A CentreWare IS feature that enables you to limit access to specific printer functions by specifying a name and password. The Admin account has the most permissions. The administrator must know the Admin name and password to access the printer functions in CentreWare IS.
Terms and Abbreviations Terms and Abbreviations Definitions EAP EAP(Extensible Authentication Protocol) is the standard authentication mechanism carried over 802.1X. The EAP method is an inner authentication protocol that provides the secure mechanism for the authentication exchange. EtherTalk A type of network connection (provided by EtherTalk software installed in a Macintosh computer) that enables use of AppleTalk network services on an Ethernet network.
Terms and Abbreviations Terms and Abbreviations Definitions mDNS mDNS (multicast DNS) is a multicast-based discovery protocol that enables you to find your printer on an Apple network or another device that uses multicast-based discovery. MIB MIB (Management Information Base) provides specific information about the state of hardware components and software processes. MIB is used as part of network management tools and functions.
Terms and Abbreviations Terms and Abbreviations Definitions RADIUS Radius (Remote Authentication Dial In User Service) is a server used for remote user authentication and accounting. It can be used on any network that needs a centralized authentication and/or accounting service for its workstations.
Configuration Card Parameters The printer has a configuration card that stores network parameters and configuration (N, DN, DX, etc.) data. The configuration card is hot swappable, enabling you to share or replace it, providing an alternative to on-site service. Network settings are saved on the configuration card. If the configuration card is removed from an old printer and inserted into a new printer, the saved settings on the configuration card are copied to the new printer when it is powered on.
General Information Parameters ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ Printer Name Startup Page Enabled Printer ID Sys/Start Job Job Timeout Load Paper Timeout Menu Timeout Power Saver Timeout Intelligent Ready Paper Source Tray 1 or Tray 1 (MPT) Tray 2 Tray 3 Tray 4 Tray 5 Note: The Tray 3, Tray 4, and Tray 5 parameters are only stored on the printer configuration card if the optional trays are available for your printer and installed.
PCL Parameters ■ ■ ■ ■ ■ ■ ■ ■ ■ Font Number Pitch Point Size Symbol Set Orientation Form Length Line Termination Color Mode (on color printers) Wide A4 USB 2.0 Parameters ■ ■ Language Wait Timeout Hard Drive Parameters The hard drive parameters are only stored on the configuration card if the printer has an internal hard drive.
EtherTalk Parameters ■ ■ ■ ■ ■ ■ ■ ■ Enabled Disabled Language Filtering Name Printer Type Zone Network Node TCP/IP Parameters ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ Enabled Disabled Host Name Host Name Requested IP Address Network Mask Router/Gateway DHCP/BOOTP IP Address Source DDNS SMTP Server SMTP Reverse Path DNS Parameters ■ ■ ■ Primary Server Secondary Server Multicast DNS (Bonjour) Enable SLP Parameters ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ Enabled Disabled Directory Agent Discovery Enable Directory Agent Scope 1 Scope 2 Sco
SSDP Parameter ■ ■ ■ Enabled Disabled SSDP TTL NBNS (WINS) Parameters ■ ■ Node Type WINS Servers Access Control Parameter ■ Host Access List LPR Parameters ■ ■ ■ ■ Enabled Disabled Filtering Enable Banners AppSocket (Port 9100) Parameters ■ ■ ■ ■ Enabled Disabled Language Filtering IPP (Internet Printing Protocol) Parameters ■ ■ ■ ■ ■ Enabled Disabled Language Filtering Network Path SNMP Parameters ■ ■ ■ SNMP v1/v2c SNMP v3 Host Access List System Administrator Guide A-5
CentreWare IS (HTTP) Parameters ■ ■ ■ ■ ■ ■ ■ Enabled Disabled Custom Link Refresh Delay Administrator Password Key User Password Use SSL FTP Parameters ■ ■ ■ ■ ■ Enabled Disabled Language Filtering Login Password Status Notification Parameter ■ ■ ■ ■ ■ Disabled Enabled SysAdmin Email Address Service Email Address Key User email Address MaiLinX Remote Printing Parameters ■ ■ ■ ■ ■ ■ ■ ■ Language Filtering POP3 Server POP3 User Name POP3 Password POP3 Polling Interval Printing Password Authorized User
Printer Commands Printer Control Language (PCL) and Printer Job Language (PJL) commands can be used to control print job settings and printer defaults. In addition to the standard PCL and PJL commands, the Phaser printers support Xerox-unique PCL and PJL commands. This appendix lists the most commonly used standard and Xerox-unique PCL and PJL commands.
Media Size PCL 5 Command* SRA3 (320 x 450 mm) &l202A Statement (5.5 x 8.5 in.) &l15A Tabloid (11 x 17 in.) &l6A Tabloid Extra (12 x 18 in.) &l201A Executive (7.25 x 10.5 in.) &l1A Letter (8.5 x 11 in.) &l2A US Folio (8.5 x 13 in.) &l10A Legal (8.5 x 14 in.) &l3A A7 Envelope (5.25 x 7.25 in.) &l84A #10 Commercial Envelope (4.1 x 9.5 in.) &l81A Monarch Envelope (3.8 x 7.5 in.
Media Type The following table lists the most common PCL commands for supported media types. For information on which media sizes are supported in your printer, and the trays that support them, print the Paper Tips page from your printer’s control panel.
Input Trays The following table lists the most common PCL commands for the input trays supported by your printer. The table also lists the alternate tray used if the optional input tray is not installed. Note: When more than one command is listed, you can use either command.
Output Trays The following table lists the PCL commands and PJL values for the output trays supported by your printer, if applicable. Output Tray PCL 5 Command* **PJL Value Top output tray &l1G FACEDOWN, UPPER, or STANDARD Stacker &l2G LOWER, OFFSET and OPTIONALOUTPUTBIN1 * The character that follows the “&” in the command is the lowercase letter “L”. ** The PJL Value is used with the PJL “OUTBIN” variable.
Phaser PJL Commands The following table lists the most commonly used HP PJL and Xerox-unique PJL commands. See also: HP Printer Job Language Technical Reference for the standard set of PJL commands. PJL Command/Parameter Values Description @PJL FSAPPEND FORMAT:BINARY SIZE=size NAME=“pathname” * Appends data to an existing file, or if the file doesn’t exist, creates the file and loads it with the given data. @PJL FSDELETE NAME=“pathname” * Deletes a file from the internal hard drive.
PJL Command/Parameter Values Description @PJL XJAHOSTNAME=“hostname” Roman-8 characters Sets the host name for Job Accounting. 1-255 @PJL XJAUSERNAME=“username” Roman-8 characters Sets the user name for Job Accounting. 1-255 @PJL XJOBPASSWORD=value 4-digit string (1-9) Assigns the job password used by Secure Print and Personal Saved Print jobs. @PJL XPERSONALJOB n/a Starts a Personal Print job. @PJL XPERSONALSAVEDJOB Starts a Personal Saved job. @PJL XPRINTWITHJOB Starts a Print With job.
PJL Command/Parameter Values Description @PJL XPCLPAPERSRCx = y x is 0, 1, 2, 3, 4, 5, 6, 7, 8, 20, 21, 22, 23, which is the number in the &l#H tray selection commands. Overrides the tray selected in the &l#H PCL tray selection commands. y is -1 for AutoSelect, 0 for the current tray (eject page), 1 for Tray 1, 2 for Tray 2, etc., and 99 for the factory defaults. * See the HP Printer Job Language Technical Reference for the values.
Acknowledgements Original SSLeay License Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Part 2: Networks Associates Technology, Inc. copyright notice (BSD) ----- Copyright © 2001-2003, Networks Associates Technology, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ■ ■ ■ Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Part 3: Cambridge Broadband Ltd. copyright notice (BSD) ----- Copyright © 2001-2003, Cambridge Broadband Ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ■ ■ ■ Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
VxWorks This product may include software licensed to Wind River by third parties. The following notices are provided to comply with the terms of such licenses. Wind River VxWorks This product may include software developed by WIDE Project and its contributors. Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided only with the following conditions are satisfied: 1.
This product may include software copyright David A. Hinds. Use, redistribution, and modification of this code is permitted subject to the following conditions: 1. Redistribution of this code must preserve this copyright notice. 2. Binary distributions must include this notice and disclaimer. 3. Advertising materials that refer to specific features of this product must acknowledge the author. 4.
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
not be used in advertising or publicity pertaining to distribution of the software or the documentation without specific, written prior permission. Intel Corporation does not warrant, guarantee or make any representations regarding the use of, or the results of the use of, the software and documentation in terms of correctness, accuracy, reliability, currentness, or otherwise; and you rely on the software, documentation and results solely at your own risk.
distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product may include software copyright © 2003 Ericsson Research Canada. All rights reserved. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product contains software developed by the Apache Software Foundation (www.apache.org/). This product contains ANTLR software. www.antlr.org/ This product contains software copyright © 1992–1996 Paul Falstad. All rights reserved.
SNiFF+/SNiFF+ PRO Copyright © 1992–1997 Compuware Corporation Copyright © 1984–1997 FairCom Corporation Copyright © 1996–2000 Greg Stein and Mark Hammond Copyright © 1999 The Apache Software Foundation Copyright © 2001 Xperts Software Wind River USB Host Stack This product may include software developed by Wipro Limited. WIND MEDIA LIBRARY This product may include software copyright © Adobe Systems Incorporated and Digital Equipment Corporation.
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. This product may contain software that is based in part on the work of the Independent JPEG Group. Wind River PPP This product may include software copyright © Carnegie Mellon University.
Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. WIND MANAGE XML/SOAP This product may include software developed by the gSOAP project. gSOAP is copyrighted and owned by Robert A. van Engelen (www.cs.fsu.edu/~engelen/soap.html).
Other Components of this product, including without limitation Wind River Workbench, Tornado, VxWorks, and Wind River PPP, include software derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm, and copyright © RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc. MD5 Message-Digest Algorithm” in all material mentioning or referencing this software or this function.
redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a self-extracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled. 3. Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, and dynamic, shared, or static library versions--must be plainly marked as such and must not be misrepresented as being the original source.
GOVERNMENT USE: If you are acquiring this software on behalf of the U.S. government, the Government shall have only "Restricted Rights" in the software and related documentation as defined in the Federal Acquisition Regulations (FARs) in Clause 52.227.19 (c) (2). If you are acquiring the software on behalf of the Department of Defense, the software shall be classified as "Commercial Computer Software" and the Government shall have only "Restricted Rights" as defined in Clause 252.227-7013 (c) (1) of DFARs.
3. You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in each changed file stating how and when you changed that file, and provided that you do at least ONE of the following: a. place your modifications in the Public Domain or otherwise make them Freely Available, such as by posting said modifications to Usenet or an equivalent medium, or placing the modifications on a major archive site such as uunet.uu.
8. Aggregation of this Package with a commercial distribution is always permitted provided that the use of this Package is embedded; that is, when no overt attempt is made to make this Package's interfaces visible to the end user of the commercial distribution. Such use shall not be construed as a distribution of this Package. 9. The name of the Copyright Holder may not be used to endorse or promote products derived from this software without specific prior written permission. 10.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 1. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole.
When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.
For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
2.
OpenSSL License OpenSSL License Copyright © 1998–2003 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
gSOAP Public License Version 1.3a The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified). 1. DEFINITIONS 1.0.1. 1.1. “Contributor” means each entity that creates or contributes to the creation of Modifications. 1.2.
1.11. “Source Code” means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor’s choice.
3. DISTRIBUTION OBLIGATIONS 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute.
3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A.
6. VERSIONS OF THE LICENSE 6.1. New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License. 6.3. Derivative Works.
THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ONLINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU.
10. U.S. GOVERNMENT END USERS 11. MISCELLANEOUS 12. RESPONSIBILITY FOR CLAIMS As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. EXHIBIT A.
EXHIBIT B. “Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (c) 2001–2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Index A C about the configuration file, 2-2 access control lists, 4-4 definition, 6-1 specifying access to printer settings, 4-8 specifying printer access using SNMP, 4-22 specifying printing access, 4-9 access to color printing, 4-10 accessing online manuals using CentreWare IS, 1-5 Admin Access List, 4-4 account, 4-2 configuring settings, 4-8 definition, 6-1 analyzing printer usage data, 3-5 authentication definition, 6-1 auto-configuring driver, 2-4 CentreWare IS accessing online manuals, 1-5 checking
Index certificates, 4-3 definition, 6-1 root-signed, 4-4 self-signed, 4-3 setting up, 4-6 changing email server settings, 3-10 EtherTalk settings, 3-13 FTP settings, 3-9 hard drive overwrite security setting, 4-11 IPP settings, 3-8 LPR settings, 3-8 mDNS settings, 2-5 Port 9100 settings, 3-7 SLP settings, 2-6 TCP/IP settings, 3-7 checking printer status, 3-2 cloning, 3-14 color printing access, 4-10 color tables loading, 2-2 commands, B-1 concepts, 4-2 configuration card, A-1 configuration card parameters,
Index G getting help Online Support Assistant, 1-1 PhaserSMART Technical Support, 1-1, 1-2 PrintingScout alerts, 1-2 Technical Support, 1-1 glossary, 6-1 GNU Toolkit, C-12 H hard drive automatic removal of jobs option, 4-12 installing the printer driver, 2-4 overwrite security option, 4-11 securing, 4-11 host definition, 6-2 HTTP, 3-6, 4-3 definition, 6-2 HTTPS, 4-3 definition, 6-2 I information sources, 1-1 installing the printer driver from the CD-ROM, 2-3 from the hard drive, 2-4 from the web, 2-3 Int
Index O Online Support Assistant, 1-1 OpenSSL License, C-28 options automatic removal of secure, personal, and proof jobs, 4-12 hard drive overwrite security, 4-11 Original SSLeay License, C-1 P parameters on the configuration card, A-1 PCL commands, A-1, B-1 definition, 6-3 personal print jobs, 5-2 personal saved print jobs, 5-2 PhaserSMART Technical Support, 1-1, 1-2 PJL commands, A-1, B-1 definition, 6-3 Port 9100, 3-7 definition, 6-3 PostScript definition, 6-3 Print Host Access List, 4-4 configuring,
Index setting up certificate, 4-6 MaiLinX alerts, 3-12 MaiLinX remote printing, 3-11 usage profile reporting, 3-4 SLP, 2-6 definition, 6-4 Smart Trays, 5-2 definition, 6-4 SMTP definition, 6-4 SNMP, 3-9 Access List, 4-4 configuring for maximum security, 4-17 configuring the access control list, 4-22 definition, 6-4 disabling, 4-23 specifying the location of the configuration file, 2-2 SSL, 4-3 configuring, 4-7 definition, 6-4 startup network configuration file, 2-2 Support Centre, 1-4 system requirements Ma