Xerox 4510 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Xerox 4510 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Xerox 4510, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Xerox 4510 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Xerox 4510. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Xerox 4510 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Xerox 4510
- Den Namen des Produzenten und das Produktionsjahr des Geräts Xerox 4510
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Xerox 4510
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Xerox 4510 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Xerox 4510 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Xerox finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Xerox 4510 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Xerox 4510, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Xerox 4510 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    www .xerox.com/support Office Printers System Guide Administrator Phaser ® 6360 color laser printer Phaser ® 8560 color printer Phaser ® 4510 laser printer Phaser ® 8860 printer[...]

  • Seite 2

    Copyright © 200 7 Xerox Corpor ation. All Rights Reserved. Unpublished rights reser ved under the copyright laws of the Un ited States. Contents of this publication may not be repr oduce d in any form without permi ssion of Xerox Corporation. Copyright protectio n claimed includes all forms of m atters of copyrightable materials and in formation n[...]

  • Seite 3

    System Administrator Guide i Contents 1O v e r v i e w Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 PrintingScout Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 PhaserSMART Technica[...]

  • Seite 4

    Contents System Administrator Guide ii Protocol Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 TCP/IP . . . . . . . . . . . . . . . . . [...]

  • Seite 5

    Contents System Administrator Guide iii 5 Printing Features Personal, Secure, Proof, Shared Saved, Personal Sa ved, and Print With Jobs . . . . . . . . . . . 5-2 Smart Trays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 Jam Recovery . . . . . . . . . . . . . . . . . .[...]

  • Seite 6

    System Administrator Guide 1-1 This section includes: ■ Resources on page 1-1 ■ PrintingScout Alerts on page 1-2 ■ PhaserSMAR T T echnical Support on page 1-2 ■ Xerox Support Centre on pa ge 1-4 ■ CentreW are Internet Services (IS) on page 1-5 Y ou can obtain information re garding your printer and its capabilities from the follo w ing so[...]

  • Seite 7

    PrintingScout Alerts System Administrator Guide 1-2 PrintingScout Alerts PrintingScout is an automated tool that is inst alled with the Xerox prin ter dri ver . It checks the printer status when a print job is sent. If the printer is unable to print a job, PrintingScout displays an alert on the user’ s computer scre en to let them know that the p[...]

  • Seite 8

    PhaserSMART Technical Support System Administrator Guide 1-3 Using CentreWare IS T o access PhaserSMAR T T echnical Support from CentreW are IS: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click the Support tab . 4. Select the PhaserSMAR T Diagnostic T ool link. 5. Follo w the instruc[...]

  • Seite 9

    Xerox Support Centre System Administrator Guide 1-4 Xerox Support Centre The Xer ox Support Centre is a utility that is installed when running the dri ver installer . It is a vailab le for systems with W indo ws 2000 and la ter or Mac OS X, version 10.2 and higher . The Xer ox Support Centre appears on the desktop for W indow s systems or is placed[...]

  • Seite 10

    CentreWare Internet Services (IS) System Administrator Guide 1-5 CentreW are Internet Services (IS) CentreW are IS pro vides a simple interface to the embedded web server in an y networked Xerox printer that enables you to manage, co nf igure, and monitor netwo rked printers from your desktop. CentreW are IS gi ves administrators easy access to pri[...]

  • Seite 11

    System Administrator Guide 2-1 This chapter includes: ■ Using a Startup Network Conf iguration File on page 2 -2 ■ Printer Driv er Installation Features on page 2-3 ■ Discov ery Protocols on page 2-5 See also: Advanced F eatures Guide at www .xerox.com/su pport Network Installation Features[...]

  • Seite 12

    Using a Startup Network Configuration File System Administrator Guide 2-2 Using a Startup Network Configuration File This section includes: ■ About the Confi guration File on page 2-2 ■ Configuration File Requirements on page 2-2 ■ Specifying the Locati on of the Configuration File on page 2-2 About the Configuration File T o configure printe[...]

  • Seite 13

    Printer Driver Installation Features System Administrator Guide 2-3 Printer Driver Installation Features This section includes: ■ W alk-Up Printing Dri ver on page 2-3 ■ W alk-Up Installation on page 2-3 ■ Installation from the Printer’ s Hard Driv e or the W eb on page 2-4 ■ Discov ery Protocols on page 2-5 W alk-Up Printing Driver The X[...]

  • Seite 14

    Printer Driver Installation Features System Administrator Guide 2-4 Installation from the Printer’ s Hard Drive or the Web Y ou can install the printer dri ver from the printer’ s ha rd driv e. This is especially useful if yo u do not have the Softwar e and Documentatio n CD-R OM . Note: If the printer doesn’t ha ve a hard dri v e but is conn[...]

  • Seite 15

    Discovery Protocols System Administrator Guide 2-5 Discover y Protocols This section includes: ■ DDNS/WINS on page 2-5 ■ DNS (Domain Name Services) on page 2-6 ■ Service Location Protocol on page 2-6 ■ UPnP (Uni versal Plug and Play) on page 2- 7 DDNS/WINS DDNS/WINS settings can be obtained from the BO O TP or DHCP server , if enabled. Thes[...]

  • Seite 16

    Discovery Protocols System Administrator Guide 2-6 DNS (Domain Name Ser vices) DNS settings reference servers b y name and allo w you to enter and view host names rather than IP addre sses. Note: T urning Multicast DNS ON allows the printe r to be automatically disco vered on a TCP/IP network b y Apple Macintosh OS X Bonjour technology . T o change[...]

  • Seite 17

    Discovery Protocols System Administrator Guide 2-7 UPnP (Universal Plug and Play) UPnP provides a simplif ied method to obtain an IP Address for a printer , locate devices on the network, an d display those de vices on desktop computers. 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Cli[...]

  • Seite 18

    System Administrator Guide 3-1 This chapter includes: ■ Printer Neighborhood on page 3-2 ■ Job Accounting on page 3-3 ■ Usage Prof ile Reports on page 3-4 ■ Xerox Usage Analysis T ool on page 3-5 ■ Protocol Control on page 3-6 ■ Cloning on page 3-14 Network Administration Features[...]

  • Seite 19

    Printer Neighborhood System Administrator Guide 3-2 Printer Neighborhood Printer Neighborhood is a t ool in CentreW are IS that enables you to sear ch for printers on your network, check their status, and manage them re motely . Y ou can also install, manage, and vie w printer usage information. Ac cess to the embedded server in each printer enable[...]

  • Seite 20

    Job Accounting System Administrator Guide 3-3 Job Accounting The printer stores informa tion about print jobs. This information is stored in a log f ile that lists job records. Each job record c ontains fields such as user name, job name, pages printed, job times, and toner or ink used. Not all f ields are supported by all printers . F or more info[...]

  • Seite 21

    Usage Profile Reports System Administrator Guide 3-4 Usage Profile Reports Usage Profile reports pro vide information on man y aspects of printer usage, such as ink or toner used, number of pages printed, and pape r types used, gathered during the life of the printer . From this page you can view or print a report, and also send it to an email addr[...]

  • Seite 22

    Xerox Usage Analysis Tool System Administrator Guide 3-5 Xerox Usage Analysis T ool The Xerox Usage Analysis T ool (U A T) enables you to collect and an alyze enterprise-wide Xerox network printer usage d ata with customizable features: ■ Cost Analysis : T rack printing costs b y groups of user s or by gr oups of printers. ■ Print Job Analysis [...]

  • Seite 23

    Protocol Cont rol System Administrator Guide 3-6 Protocol Control This section includes: ■ HTTP on page 3-6 ■ TCP/IP on page 3-7 ■ Port 9100 on page 3-7 ■ LPR on page 3-8 ■ IPP (Internet Printing Protocol) on pag e 3-8 ■ SNMP (Simple Network Managem ent Protocol) on pag e 3-9 ■ FTP (File T ransfer Protocol) on pag e 3-9 ■ Email Serv[...]

  • Seite 24

    Protocol Cont rol System Administrator Guide 3-7 TCP/IP T o change TCP/IP set tings: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click Pr operties . 4. Select the Pro tocols folder on the left na vigation panel. 5. Select TCP/IP . 6. If prompted, enter your Admin or K e y User name an[...]

  • Seite 25

    Protocol Cont rol System Administrator Guide 3-8 LPR LPR is an application-le vel printing protocol that uses TCP/IP to establish connections between printers and work stations on a netw ork. T o change LPR settings: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click Pr operties . 4. S[...]

  • Seite 26

    Protocol Cont rol System Administrator Guide 3-9 SNMP (Simple Network Management Protocol) SNMP is a set of protocols designed to he lp manage complex networks. SNMP-compliant de vices store data about themselves in MIBs and return this data to th e SNMP requesters. The SNMP Configuration pages provide control ov er SNMP security , including method[...]

  • Seite 27

    Protocol Cont rol System Administrator Guide 3-10 Email Ser ver or SMTP (Simp le Mail T ransfer Protocol) The Email server settings page enables you to configure email serv er settings and to specify a return email address for undeli verable email. Y ou can conf igure email server settin gs in CentreW are IS by either: ■ Automatically identifying[...]

  • Seite 28

    Protocol Cont rol System Administrator Guide 3-11 MaiLinX Remote Printing MaiLinX Remote Printing provides the follo wing ke y features: ■ The ability to send print jobs t o a group of printers. ■ Print services across f irew alls and proxies. ■ Status reporting using email mes sages. MaiLinX Remote Printing consists of two parts: ■ Client [...]

  • Seite 29

    Protocol Cont rol System Administrator Guide 3-12 MaiLinX Alerts About MaiLinX Alerts MaiLinX alerts enable the printe r to automatically send email to you and/o r specified users when the follo wing conditions occur: ■ The printer requires attention or when service is needed. ■ The printer displays an error , warning, or alert. ■ A reply to [...]

  • Seite 30

    Protocol Cont rol System Administrator Guide 3-13 EtherT alk T o change EtherT alk settings: 1. Launch your web browser . 2. Enter the printer’ s IP address in the bro wser’ s Addre ss fi e l d . 3. Click Pr operties . 4. Select the Pro tocols folder on the left na vigation panel. 5. Select EtherT alk . 6. If prompted, enter your Admin or K e y[...]

  • Seite 31

    Cloning System Administrator Guide 3-14 Cloning Cloning enables you to conf igure one printer an d then copy that conf iguration to another printer on the same network. Y o u can access cloning using CentreW are IS or CentreW a re W eb . Using CentreW are IS, you can select the settings you want to clone from one printer to another printer . Using [...]

  • Seite 32

    System Administrator Guide 4-1 This chapter includes: ■ Basic Concepts on page 4 -2 ■ Securing the Printer in a High Security En vironment on page 4-5 ■ Managing Certificates on page 4-6 ■ Configuring SSL on page 4-7 ■ Configuring Administrato r and K ey User Settings on page 4-8 ■ Configuring the Print Host Access List on page 4-9 ■ [...]

  • Seite 33

    Basic Concepts System Administrator Guide 4-2 Basic Concepts This section includes: ■ About Admin and Key User Accounts on page 4-2 ■ About HTTP , HTTPS, and SSL/TLS on page 4-3 ■ About Certificates on page 4-3 ■ About Access Control Lists on page 4-4 About Admin and Key User Accounts Admin and K ey User accounts in CentreW are IS enable yo[...]

  • Seite 34

    Basic Concepts System Administrator Guide 4-3 About HTTP , HTTPS, and SSL/TLS HTTP (Hyper T ext T ransfer Protocol) is the pr otocol used to communicate across the internet between the printer web server and the web brow ser (clients). Because the data is transmitted in plain text and passwords are only slightly encr ypted, it is not secure; th e d[...]

  • Seite 35

    Basic Concepts System Administrator Guide 4-4 If you want to use HTTPS, each printer must hav e a unique certificate that is accepted by each bro wser used to access the printer . This allows the printer web server to use HTTPS and encrypt data between the web br o wser and the printer . In ad dition, because each printer’ s certificate is unique[...]

  • Seite 36

    Securing the Print er in a High Security Environment System Administrator Guide 4-5 Securing the Printer in a High Security Environment If you are concerned about the security of your pr inter in a high security en vironment, such as a college or printing kiosk, you can conf igure settings in CentreW a re IS to “lockdo wn” or fully secure the p[...]

  • Seite 37

    Managing Certificates System Administrator Guide 4-6 Managing Certificates T o modify a self-signed certificate so it is specifi c to your printer or to install a do wnloaded root-signed certificate on the printer: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click Pr operties . 4. Exp[...]

  • Seite 38

    Configuring SSL System Administrator Guide 4-7 Configuring SSL Once a certificate is set up, you can select when to use SSL to secure the connection between the printer and the server . Note: Y ou can restrict user access to SSL pages in CentreW are IS. For more information, see Configuring Administrato r and K ey User Settings on page 4-8. T o con[...]

  • Seite 39

    Configuring Administrato r and Key User Settings System Administrator Guide 4-8 Configuring Administrator and Key User Settings T o prev ent unauthorized changes to printer settings: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click Pr operties . 4. Select the Security folder on the l[...]

  • Seite 40

    Configuring the Prin t Host Access List System Administrator Guide 4-9 Configuring the Print Host Access List T o prev ent unauthorized printing to your printer: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click Pr operties . 4. Select the Security folder on the left navigation panel.[...]

  • Seite 41

    Controlling Access to Color Printing System Administrator Guide 4-10 Controlling Access to Color Printing Note: Color access controls are av aila ble on color printers only . T o control the user’ s access to color printing, you can require the use of a 4-digit numeric password to print in color . T o require a pa ssword: 1. Launch your web brows[...]

  • Seite 42

    Securing the Hard Drive System Administrator Guide 4-11 Securing the Hard Drive This section includes: ■ Selecting the Hard Dri ve Overwrite Security Option on page 4-11 ■ Selecting the Automatic Remov al of Se cure, Personal, and Proof Jobs Option on page 4-12 Selecting the Hard Drive Overwrite Security Option When a file is deleted from the p[...]

  • Seite 43

    Securing the Hard Drive System Administrator Guide 4-12 Using CentreWare IS T o select the Hard Dri ve Overwrite Security option: 1. Launch your web browser . 2. Enter the printer’ s IP address in the bro wser’ s Addre ss fi e l d . 3. Click Pr operties . 4. Select the Security folder on the left na vigation panel. 5. Select Printing Security S[...]

  • Seite 44

    Securing the Hard Drive System Administrator Guide 4-13 a. Select Overwrite Remo vals , and then press the OK button to select On or Off . Note: Remov e Job Files does not remov e sav ed or protected print job f iles. 4. T o remov e all secure, personal, and pr oof print files e very day at a set time: a. Select Daily Remo v al , and then pres s th[...]

  • Seite 45

    802.1X Configuration System Administrator Guide 4-14 802.1X Configuration Introduction to 802.1X and EAP The 802.1X IEEE standard def ines port-based , authenticated networ k access control for Ethernet local area networks (LANs). With 802.1X, the user or device must pass network access control by successfully authenticating with credentials, such [...]

  • Seite 46

    802.1X Configuration System Administrator Guide 4-15 7. Install root certif icate – If you select EAP method(s) that require a root certificat e, you can: ■ Install a ne w root certificate. ■ Use the already e xistin g root certif icate. ■ Choose not to v alidate server . 8. Install device certif icate – If you select EAP method(s) th at [...]

  • Seite 47

    Locking the Cont rol Panel Menus System Administrator Guide 4-16 Locking the Control Panel Menus T o prev ent others from changing settings in the printer setup menus, you can lock some of the control panel menus. This is useful when printers are located in public pl aces, such as schools, libraries, and of fice/print centers. Use CentreW are IS to[...]

  • Seite 48

    Configuring SNMP System Administrator Guide 4-17 Configuring SNMP This section includes: ■ Configuring SNMP for Maximum Security on pa ge 4-17 ■ Configuring SNMP v1/v2c on page 4-18 ■ Configuring SNMP v3 on page 4-20 ■ Configuring the SNMP Access Control List on page 4-22 ■ Disabling SNMP on page 4-23 If you are using SNMP , you must conf[...]

  • Seite 49

    Configuring SNMP System Administrator Guide 4-18 d. On the Administrative Security Settings page, clear the V iew Configuration W eb Page s and Modify Conf iguration W eb Pages check boxes fo r users who should not hav e access to these pages . 6. Set up the SNMP Administrativ e and Ke y User accounts to con figure SNMP v3: a. Select the Pro tocols[...]

  • Seite 50

    Configuring SNMP System Administrator Guide 4-19 Adding or Editing T raps for SNMP v1/v2c T o add or edit traps for SNMP v1v2c: 1. On the SNMP Configurati on page: Click the Configur e SNMP v1v2c b utton, and then click the Conf igure T raps button. The Conf igure T raps page lists the current T rap Destination Addresses for the SNMP protocol. ■ [...]

  • Seite 51

    Configuring SNMP System Administrator Guide 4-20 Configuring SNMP v3 When configuring SNMP v3, you can set up: ■ Administrativ e, K ey , Any User , and Dri ver a ccounts with Pri v acy an d Authentication Ke ys associated with each account. ■ SNMP user read and write access. ■ An access control list that li mits SNMP printer access to the spe[...]

  • Seite 52

    Configuring SNMP System Administrator Guide 4-21 The Key User Account Settings ■ User Name : The Ke y User account name defined on the Configur e SNMP v3: K ey User Account page. ■ A uthentication Protocol : The protocol associated with the Authentication K ey selected on the Conf igure SNMP v3 K ey User Account page. ■ A uthentication Key : [...]

  • Seite 53

    Configuring SNMP System Administrator Guide 4-22 Configuring the SNMP Access Control List T o set up a li st of hosts that are a ut horized to access the printer using SNMP: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click Pr operties . 4. Select the Pro tocol folder on the left navi[...]

  • Seite 54

    Configuring SNMP System Administrator Guide 4-23 Disabling SNMP If you are not using SNMP , disable it to prev ent unauthorized access through applications that use these protoc ols. If you disable SNMP , the fo llowing dri ver features are also disabled: ■ PrintingScout alerts ■ W alk-Up Printing Installer ■ Smart T rays ■ PhaserSMAR T ■[...]

  • Seite 55

    System Administrator Guide 5-1 . This chapter includes: ■ Personal, Secure, Proof, Shared Sa ved, Personal Sav ed, and Print W ith Jobs on page 5-2 ■ Smart T rays on page 5-2 ■ Ja m R ec over y on page 5-3 Printing Features[...]

  • Seite 56

    Personal, Secure, Proo f, Shared Saved, Personal Sa ved, and Print With Jobs System Administrator Guide 5-2 Personal, Secure, Proof, Shared Saved, Personal Saved, and Print With Jobs These features are av ailable if your printer has an internal hard driv e. These jobs are stored on the hard dri ve and remai n in the pr inter e ven when it is turned[...]

  • Seite 57

    Jam Recovery System Administrator Guide 5-3 Jam Recover y Note: Jam recov ery is not av ailable on all printers , see the documentation that came with your printer for more information. The jam recov ery settings enable you to select ho w the printer handles jobs that are in the process of printing when a media jam occurs. Jam recov ery settings ar[...]

  • Seite 58

    System Administrator Guide 6-1 T erms and Abbreviations Glossar y T erms and Abbreviations D efinitions access control list A CentreW are IS f eature that enables you to limit access to devices . Admin account A CentreW are IS f eature that enables you to limit access to specific printer functions by specifying a name and passw ord. The Admin accou[...]

  • Seite 59

    Terms and Abbreviations System Administrator Guide 6-2 EAP EAP(Extensible A uthentication Protoc ol) is the standard auth entication mechanism carried over 802. 1X. The EAP method is an inner authentication protocol that provides the secure mechanism for the authentication exchange . EtherT alk A type of network connection (provided by EtherT a lk [...]

  • Seite 60

    Terms and Abbreviations System Administrator Guide 6-3 mDNS mDNS (multicast DNS) is a multicast-based discov er y protocol that enables you to find your printer on an Apple networ k or another device that uses multicast-based discov er y . MIB MIB (Management Information Ba se) provides specific information about the state of hardware components an[...]

  • Seite 61

    Terms and Abbreviations System Administrator Guide 6-4 RADIUS Radius (Remote Authentication Dial In User Ser vice) is a ser ver used f or remote use r authentication a nd a ccounting. It can be used on any network that needs a centralized authentication and/or accou nting ser vice for its w orkstations. SLP SLP (Ser vice Location Pro tocol) is a pr[...]

  • Seite 62

    System Administrator Guide A-1 The printer has a configuration card that stores network parameters and conf iguration (N, DN, DX, etc.) data. The configuration card is hot swappable, enabling you to share or replace it, providing an alternati ve to on-si te service. Network settings are sa ved on the conf iguratio n card. If the conf iguration card[...]

  • Seite 63

    System Administrator Guide A-2 General Information Parameters ■ Printer Name ■ Startup Page En abled ■ Printer ID ■ Sys/Start Job ■ Job T imeout ■ Load P aper T imeout ■ Menu T imeout ■ Po wer Sav er T imeout ■ Intelligent Ready ■ Paper Source ■ T ray 1 or T ray 1 (MPT) ■ Tr a y 2 ■ Tr a y 3 ■ Tr a y 4 ■ Tr a y 5 Note:[...]

  • Seite 64

    System Administrator Guide A-3 PCL Parameters ■ Fon t N u mb e r ■ Pitch ■ Point Size ■ Symbol Set ■ Orientation ■ For m L e ng t h ■ Line T ermination ■ Color Mode (on color printers) ■ Wi d e A 4 USB 2.0 Parameters ■ Language ■ W ait T imeout Hard Drive Parameters The hard dri ve parameters are only stored on the conf igurat[...]

  • Seite 65

    System Administrator Guide A-4 EtherT alk Parameters ■ Enabled ■ Disabled ■ Language ■ Filtering ■ Name ■ Printer T ype ■ Zone ■ Network Node TCP/IP Parameters ■ Enabled ■ Disabled ■ Host Name ■ Host Name Requested ■ IP Address ■ Network Mask ■ Router/Gatew ay ■ DHCP/BOO TP ■ IP Address Source ■ DDNS ■ SMTP Ser[...]

  • Seite 66

    System Administrator Guide A-5 SSDP Parameter ■ Enabled ■ Disabled ■ SSDP TTL NBNS (WINS) Parameters ■ Node T ype ■ WINS Servers Access Control Parameter ■ Host Access List LPR Parameters ■ Enabled ■ Disabled ■ Filtering ■ Enable Banners AppSocket (Port 9100) Parameters ■ Enabled ■ Disabled ■ Language ■ Filtering IPP (In[...]

  • Seite 67

    System Administrator Guide A-6 CentreWare IS (HTTP) Parameters ■ Enabled ■ Disabled ■ Custom Link ■ Refresh Delay ■ Administrator Pa ssword ■ Key U se r P a s s wo r d ■ Use SSL FTP Parameters ■ Enabled ■ Disabled ■ Language ■ Filtering ■ Login Passw ord Status Notification Parameter ■ Disabled ■ Enabled ■ SysAdmin Ema[...]

  • Seite 68

    System Administrator Guide B-1 Printer Control Language (PCL) and Printer Job Language (PJL) commands can be used to control print job settings and printer def aults . In addition to the standard PCL and PJL commands, the Phaser prin ters support Xerox-un ique PCL and PJL commands. This appe ndix lists the most common ly used standard and Xerox-uni[...]

  • Seite 69

    System Administrator Guide B-2 SRA3 (320 x 450 mm) <Esc>&l 202A Statement (5.5 x 8.5 in.) <Esc>&l1 5A T abloid (11 x 17 in.) <Esc>&l6A T abloid Extra (12 x 18 in.) <Esc>&l201A Ex ecutive (7.25 x 10.5 in.) <Esc>&l1A Letter (8.5 x 11 in.) <Esc>&l2A US F olio (8.5 x 13 in.) <Esc>&l1[...]

  • Seite 70

    System Administrator Guide B-3 Media T ype The follo wing table lists the most common PCL comm ands fo r supported media types. For information on which media sizes are supported in your printer , and the trays that support them, print the Pa per T ips page fro m your printer’ s control panel. Media T ype PCL 5 Command Plain P aper <Esc>&am[...]

  • Seite 71

    System Administrator Guide B-4 Input T rays The follo wing table lists the mo st common PCL commands for the input trays supported b y your printer . The table also lists the alternate tray used if the optional input tray is not installed. Note: When more than one co mmand is listed, you can use either command. Input T rays Phaser 6360 Phaser 8560 [...]

  • Seite 72

    System Administrator Guide B-5 Output T rays The follo wing table lists the PCL commands and PJL v alues for the output trays supported by your printer , if applicable. Output T ray PCL 5 Command * **PJL V alue T op output tray <Esc>&l1G F ACEDO WN, UPPER, or ST ANDARD Stack er <Esc>&l2G LO WER, OFFSET and OPTIONALOUTPUTBIN1 * T[...]

  • Seite 73

    System Administrator Guide B-6 Phaser PJL Commands The follo wing table lists the most commonly used HP PJL and Xerox-unique PJL co mmands. See also: HP Printer J ob Language T echnical Refer ence for the standard set of PJL commands. PJL Command/Parameter V alues Description @PJL FSAPPEND FORMA T:BINAR Y SIZE= size NAME=“ pathname ” * Appends [...]

  • Seite 74

    System Administrator Guide B-7 @PJL XJAHOSTNAM E=“ hostname ” Roman-8 characters 1-255 Sets the host name for Job Accounting. @PJL XJA USERNAME=“ username ” Roman-8 characters 1-255 Sets the user name for Job Accounting. @PJL XJOBP ASSWORD= val u e 4-digit strin g (1-9) Assigns the job password used by Secure Print and P ersonal Sav ed Prin[...]

  • Seite 75

    System Administrator Guide B-8 @PJL XPCLP APERSRC x = yx is 0, 1, 2, 3, 4, 5, 6, 7, 8, 20, 21, 22, 23, which is the number in the <Esc>&l#H tra y selection commands. y is -1 for A utoSelect, 0 for the current tra y (eject page), 1 for T r ay 1 , 2 fo r T r ay 2 , etc., and 99 f or the f actor y defaults. Overrides the tra y selected in th[...]

  • Seite 76

    System Administrator Guide C-1 Original SSLeay License Copyright © 1995-1998 Eric Y oung (eay@cryptsoft.com). All rights r eserv ed. This package is an SSL implementation writte n b y Eric Y oung (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’ s SSL. This library is free for commercial and non- commercial use [...]

  • Seite 77

    System Administrator Guide C-2 THIS SOFTW ARE IS PR O V IDED BY ERIC Y OUNG “ AS IS” AND ANY EXPRESS OR IMPLIED W ARRANTIES, INCLUDING, BUT NO T LIMITED T O, THE IMPLIED W ARRANTIES OF MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE A UTHOR OR CONTRIBUT ORS BE LIABLE FOR ANY DIRECT , INDIRECT , INCI[...]

  • Seite 78

    System Administrator Guide C-3 Part 2: Networks Associates T echnolo gy , Inc. copyright notice (BS D) ----- Copyright © 2001-2003, Networks Associates T echnology , Inc. All rights reserved. Redistribu tion and use in source and binary forms, with or without modification, are permitted provided that the follo wing conditions are met: ■ Redistri[...]

  • Seite 79

    System Administrator Guide C-4 Part 3: Cambridg e Broadband L td. copyri ght notice (BSD) ----- Copyright © 2001-2003, Cambridge Br oadband Ltd. All rights reserved. Redistribu tion and use in source and binary forms, with or without modification, are permitted provided that the follo wing conditions are met: ■ Redistribu tions of source code mu[...]

  • Seite 80

    System Administrator Guide C-5 MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUT ORS BE LIABLE FOR ANY DIRECT , INDIRECT , INCIDENT AL, SPECIAL, EXEMPLAR Y , OR CONSEQUENTIAL D AMA GES (INCLUDING, BUT NO T LIMITED TO, PR OCUREMENT OF SUBSTITUTE GOODS OR SER VICES; LOSS OF US[...]

  • Seite 81

    System Administrator Guide C-6 VxWorks This product may include software licensed to W ind Riv er by third pa rties. The following notices are provided to comply with the terms of such licenses. Wind River VxW orks This product may include software dev elope d by WIDE Project and its contrib utors. Permission to use, copy , modify an d distribute t[...]

  • Seite 82

    System Administrator Guide C-7 This product may include software copyright David A. Hinds. Use, redistrib ution, and modification of this code is permitted subject to the follo wing conditions: 1. Redistribution of this code must preserve this co pyright notice. 2. Binary distribu tions must include this notice and disclaimer . 3. Advertising mater[...]

  • Seite 83

    System Administrator Guide C-8 THE IMPLIED W ARRANTIES OF MER C HANT AB ILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE A UTHOR OR CONTRIBUT ORS BE LIABLE FOR ANY DIRECT , INDIRECT , INCIDENT AL, SPECIAL, EXEMPLAR Y , OR CONSEQUENTIAL D AMA GES (INCLUDING, BUT NO T LIMITED TO, PR OCUREMENT OF SUBSTITUTE GOODS OR S[...]

  • Seite 84

    System Administrator Guide C-9 not be used in advertising or publicity pertai ning to distribution of the softw are or the documentation without specif ic, written prior pe rmission. Intel Corporation does not w arrant, guarantee or make an y representations reg arding the use of, or the results of the use of, the software and documentation in term[...]

  • Seite 85

    System Administrator Guide C-10 distribute, sublicense, and/or sell copies of th e Software, and to permit persons to whom the Software is furnished to do so, subject to th e following condi tions: The abov e copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTW ARE IS PR O VI[...]

  • Seite 86

    System Administrator Guide C-11 THEOR Y OF LIABILITY , WHETHER IN CONTRA CT , STRICT LIABILITY , OR TOR T (INCLUDING NEGLIGENCE OR O THER WISE) ARISING IN ANY W A Y OUT OF TH E USE OF THIS SOFTW ARE, EVEN IF AD VISED OF THE POSSIBILITY OF SUCH DA M AG E . This product may include software copyright © 2003 Ericsson Research Canada. All rights reser[...]

  • Seite 87

    System Administrator Guide C-12 (INCLUDING NEGLIGENCE OR O THER WISE) ARISING IN ANY W A Y OUT OF TH E USE OF THIS SOFTW ARE, EVEN IF AD VISED OF THE POSSIBILITY OF SUCH DA M AG E . This product contains software developed by the Apache Software F oundation ( www .apache.or g/ ). This product c ontains ANTLR software. www .antlr .org/ This product [...]

  • Seite 88

    System Administrator Guide C-13 SNiFF+/SNiFF+ PRO Copyright © 1992– 1997 Compuware Corporation Copyright © 198 4–1997 Fai rCom Corporation Copyright © 1996–2000 Gre g Stein and Mark Hammond Copyright © 1999 The Apache Software Foundation Copyright © 2001 Xperts Softw are Wind River USB Host Stack This product may include software dev elo[...]

  • Seite 89

    System Administrator Guide C-14 WHETHER IN AN A CTION OF CONTRA CT , TOR T OR O THER WISE, ARISING FR OM, OUT OF OR IN CONNECTION WITH THE SOFTW ARE OR THE USE OR O THER DEALINGS IN THE SOFTW ARE. This product may contain software that is based in part on the work of the Independent JPEG Group. Wind River PPP This product may include software copyr[...]

  • Seite 90

    System Administrator Guide C-15 Data Security , Inc. makes no representations co ncerning either the merchantability of this software or the suitability of this software for any particular purpose. It is pro vided “as is” without e xpress or implied warranty of any kind . These notices must be retained in any copies of any part of this document[...]

  • Seite 91

    System Administrator Guide C-16 Other Components of this product, including without limitation Wind Ri ver W orkbench, T ornado, VxW orks, and W ind Ri ver PPP , include softwa re deri ved from the RSA Data Security , Inc. MD5 Message-Digest Algorithm, and copyrigh t © RSA Data Security , Inc. All rights reserv ed. License to cop y and use this s [...]

  • Seite 92

    System Administrator Guide C-17 redistrib ution of a standard UnZipSFX binary (in cluding SFXW iz) as part of a self-extracting archi ve; that is permitted without inclusion of this license, as long as the normal SFX banner has not be en removed from the binary or disabled. 3. Altered versions--including, b ut not limited to , ports to new operat i[...]

  • Seite 93

    System Administrator Guide C-18 GO VERNMENT USE: If you are acquiring this softw are on behalf of the U.S. g ove rnment, the Gov ernment shall ha ve only "Restricted Righ ts" in the software an d related docu mentation as defined in the Federal Acqu isition Regulations (F ARs) in Cl ause 52.227.19 (c) (2). If you are acquiring the softwar[...]

  • Seite 94

    System Administrator Guide C-19 3. Y ou may otherwise modify your cop y of this P ackage in an y way , provided that you insert a prominent notice in each changed file sta ting ho w and when you ch anged that file, and provided that you do at least ONE of the follo wing: a. place your modifications in the Public Domain or otherwis e make them Freel[...]

  • Seite 95

    System Administrator Guide C-20 8. Aggregati on of this Package with a commerci al distrib ution is alw ays permitted provided that the use of this P ackage is embedded; that is, when no overt attempt is made to make this Package's interf aces visible to the end us er of the commercial distrib ution. Such use shall not be construed as a distri[...]

  • Seite 96

    System Administrator Guide C-21 W e protect your rights with a two-step method: (1) we copyright the library , and (2) we offer you this license, which giv es you legal permission to cop y , distribute and/ or modify the library . T o protect each distributor , we want to make it very clear that there is no warranty for the free library . Also, if [...]

  • Seite 97

    System Administrator Guide C-22 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICA TION 1. This License Ag reement applies to an y softwa re library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be dis tributed under the terms of this Lesser General Public License (also call[...]

  • Seite 98

    System Administrator Guide C-23 (For e xample, a function in a library to comput e square roots has a purpose that is entirely well-defined independent of the application. Therefore, Su bsection 2d requires that an y application-supplied function or table used by this function must be optional: if the application does not supply it, the square root[...]

  • Seite 99

    System Administrator Guide C-24 When a “work that uses the Library” uses mate rial from a header file that is part of the Library , the object code for the work may be a deriv ativ e work of the Library e ven though the source code is not. Whether this is t rue is especially significant if the w ork can be linked without the Library , or if the[...]

  • Seite 100

    System Administrator Guide C-25 For an e xecutable, the required form of the “w ork tha t uses the Library” must include any data and utility programs need ed for reproducing the e xecutable from it. Ho we ver , as a special exception, the material s to be dist rib uted need not include anything that is normally distrib uted (in either source o[...]

  • Seite 101

    System Administrator Guide C-26 If any portion of this section is held in va lid or unenforceable under an y particular circumstan ce, the balance o f the section is intended to apply , and the section as a whole is intended to apply in other circumstances. It is not the purpose of t his section to induce you to infrin ge any patents or other prope[...]

  • Seite 102

    System Administrator Guide C-27 2. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LA W OR AGREED T O IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY O THER P AR T Y WHO MA Y MODIFY AND/OR REDISTRIBUTE THE LIBRAR Y AS PERMITTED ABO VE, BE LIABLE TO Y OU FOR D AMA GES, INCLUDING ANY GENERAL, SPECIAL, INCIDENT AL OR CO NSEQUENTIAL D AMA GES ARISING OUT OF THE[...]

  • Seite 103

    System Administrator Guide C-28 OpenSSL License OpenSSL License Copyright © 1998–2003 The OpenSSL Pr oject. All rights reserved. Redistribu tion and use in source and binary forms, with or without modification, are permitted provided that the follo wing conditions are met: 1. Redistribu tions of source code must retain the abo ve cop yright noti[...]

  • Seite 104

    System Administrator Guide C-29 gSOAP Public License V ersion 1.3a The gSO AP public license is deriv ed from the Mo zilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 te xt are 1.0.1, 2.1.(c),(d), 2. 2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was adde d. The modified sectio ns are 2.1.(b), 2.2.(b), 3.2 ( simpli[...]

  • Seite 105

    System Administrator Guide C-30 1.11. “Source Code” means the preferred form of the Covered Code for making modif ications to it, including all modules it contains, plus any associated interface def inition files, scripts used to control compilation and installation of an Executable , or source code dif ferential comparisons against either the [...]

  • Seite 106

    System Administrator Guide C-31 3. DISTRIBUTION OBLIGA TIONS 3.1. Application o f License. The Modif ications which Y ou create or to which Y ou contribute are governed by the terms of this License, including without limitation Section 2.2. The So urce Code version of Cov ered Code may be distributed only under the terms of this License or a fu tur[...]

  • Seite 107

    System Administrator Guide C-32 3.5. Required Notices. Y ou must duplicate the notice in Exhibit A in each file of the Source Code. If i t is not possible to put such notice in a particular Source Code f ile due to its structure, then Y ou must include such notice in a location (such as a rele va nt directory) where a user w ould be likely t o look[...]

  • Seite 108

    System Administrator Guide C-33 6. VERSIONS OF THE LICENSE 6.1. Ne w V ersions. Grantor may publish revised and/or new v ersions of the License from time to time . Each version will be gi ven a distinguishing ve rsion number . 6.2. Effect of Ne w V ersio ns. Once Cov ered Code has been published under a particular v e rsion of the License, Y ou may[...]

  • Seite 109

    System Administrator Guide C-34 THE A UTHORS EXPRESSL Y DISCLAIM ANY LIABILITY RESUL TING FR OM USE OF THE SOFTW AR E IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIR ONMENTS AND A CCEPTS NO LIABILITY IN RESPECT OF ANY A CTIONS OR CLAIMS B ASED ON THE USE OF THE SOFTW ARE IN ANY SUCH ONLINE EQUIPMENT IN HAZARDOUS ENVIR ONMENTS BY Y OU. FOR PURPOSES[...]

  • Seite 110

    System Administrator Guide C-35 10. U .S. GO VERNMENT END USERS 11. MISCELLANEOUS 12. RESPONSIBILITY FOR CLAIMS As between Initial De veloper and the Contrib uto rs, each party is responsible for claims and damages arising, directly or indirectly , out of its utilization of rights under this License and Y ou agree to work with Initial De veloper an[...]

  • Seite 111

    System Administrator Guide C-36 EXHIBIT B. “Part of the softw are embedded in this product is gSO AP software. Portions created b y gSO AP are Copyright (c) 2001–2004 Robert A. v an Engelen, Geni via inc. All Rights Reserved. THE SOFTW AR E IN THIS PR O DUCT W AS IN P AR T PR O VIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED W AR RANTIES, INCLU[...]

  • Seite 112

    System Administrator Guide Index-1 Index A about the configuration file, 2-2 access control lists, 4-4 definition, 6-1 specifying access to pr inter settings, 4-8 specifying printer access using SNMP, 4-22 specifying printing access, 4-9 access to color printing, 4-10 accessing online manuals using CentreWare IS, 1-5 Admin Access List, 4-4 account,[...]

  • Seite 113

    Index System Administrator Guide Index-2 certificates, 4-3 definition, 6-1 root-signed, 4-4 self-signed, 4-3 setting up, 4-6 changing email server settings, 3-10 EtherTalk settings, 3-13 FTP settings, 3-9 hard drive overwrite security setting, 4-11 IPP settings, 3-8 LPR settings, 3-8 mDNS settings, 2-5 Port 9100 settings, 3-7 SLP settings, 2-6 TCP/[...]

  • Seite 114

    Index System Administrator Guide Index-3 G getting help Online Support Assistan t, 1-1 PhaserSMART Technical Support, 1-1, 1-2 PrintingScout alerts, 1-2 Technical Support, 1-1 glossary, 6-1 GNU Toolkit, C-12 H hard drive automatic removal of jobs option, 4-12 installing the printer driver, 2-4 overwrite security option, 4-11 securing, 4-11 host def[...]

  • Seite 115

    Index System Administrator Guide Index-4 O Online Support Assistan t, 1-1 OpenSSL License, C-28 options automatic removal of secure, personal, and proof jobs, 4 -12 hard drive overwrite security, 4-11 Original SSLeay License, C -1 P parameters on the co nfiguratio n card, A-1 PCL commands, A-1, B-1 definition, 6-3 personal print jobs, 5-2 personal [...]

  • Seite 116

    Index System Administrator Guide Index-5 setting up certificate, 4-6 MaiLinX alerts, 3-12 MaiLinX remote printing, 3-11 usage profile reporting, 3- 4 SLP, 2-6 definition, 6-4 Smart Trays, 5-2 definition, 6-4 SMTP definition, 6-4 SNMP, 3-9 Access List, 4-4 configuring for maximum sec urity, 4-17 configuring the access control list, 4-22 definition, [...]