hit counter script
Table of Contents

Advertisement

Quick Links

SERVICE
MANUAL
Color Universal
Send Kit-Q1
JANUARY 21, 2009

Advertisement

Table of Contents
loading

Summary of Contents for Canon Color Universal Send Kit-Q1

  • Page 1 Color Universal Send Kit-Q1 SERVICE MANUAL JANUARY 21, 2009...
  • Page 3 Canon will release technical information as the need arises. In the event of major changes in the contents of this manual over a long or short period, Canon will issue a new edition of this manual.
  • Page 4 Introduction Symbols Used This documentation uses the following symbols to indicate special information: Symbol Description Indicates an item of a non-specific nature, possibly classified as Note, Caution, or Warning. Indicates an item requiring care to avoid electric shocks. Indicates an item requiring care to avoid combustion (fire). Indicates an item prohibiting disassembly to avoid electric shocks or problems.
  • Page 5 Introduction The following rules apply throughout this Service Manual: 1. Each chapter contains sections explaining the purpose of specific functions and the relationship between electrical and mechanical systems with refer- ence to the timing of operation. In the diagrams, represents the path of mechanical drive; where a signal name accompanies the symbol , the arrow indicates the direction of the electric signal.
  • Page 7: Table Of Contents

    Contents Contents Chapter 1 Specifications 1.1 Specifications .............................1- 1 1.1.1 Memory Size and Functional Constraints iPR1135/1125/1110(USA) ..............1- 1 1.1.2 SEND Options (USA/EUR/AU)..........................1- 2 1.1.3 Specifications ................................1- 3 Chapter 2 Functions 2.1 Basic Function ............................2- 1 2.1.1 Authentication at TX ..............................2- 1 2.1.2 Authentication at RX..............................
  • Page 8 Contents Chapter 4 Maintenance 4.1 Notes when service ............................ 4- 1 4.1.1 Other Points to Note ..............................4- 1 4.1.2 Recommended setting of system management information..................4- 1 4.2 Reference matter in market service......................4- 1 4.2.1 Invalidating the License for Transfer to a Different Device data recovery method ..........4- 1 4.2.2 Conditions for Using the RUI ...........................4- 1 4.2.3 Creating SSL Key-Pair and Server Certification ......................4- 1 4.2.4 User data Erase of the HDD ............................4- 4...
  • Page 9: Specifications

    Chapter 1 Specifications...
  • Page 11 Contents Contents 1.1 Specifications .................................1-1 1.1.1 Memory Size and Functional Constraints iPR1135/1125/1110(USA) ..................1-1 1.1.2 SEND Options (USA/EUR/AU)..............................1-2 1.1.3 Specifications ....................................1-3...
  • Page 13: Memory Size And Functional Constraints Ipr1135/1125/1110(Usa)

    It is necessary to install imagePRESS Printer Kit-A1 after having installed System memory (512MB) in the main body. T-1-1 Soft Option Universal Send Security Feature Set-C1 Universal Send Advanced Feature Set-C1 Color Universal Send Kit-Q1 Remote Operator's Software Kit-A3 Digital User Signature PDF Kit-B1 Encrypted Secure Print Software-C1 HDD Data Erase Kit-C1...
  • Page 14: Send Options (Usa/Eur/Au)

    Chapter 1 1.1.2 SEND Options (USA/EUR/AU) 0020-8026 A SEND function may be used to add to the existing transmission functions or to Adobe Acrobat PDF/XML paper specification-related functions. Individual options are enabled after enabling the SEND transmission function and then obtaining an appropriate license. There is no specific order as to which license option to enable first.
  • Page 15: Specifications

    Chapter 1 Device Signature PDF/XPS The machine name and information of an MFP machine may be encrypted and attached to the PDF for display in Acrobat through a signature tab. Signatures may be used in conjunction with a machine certificate and secret key.
  • Page 16 Chapter 1 Domino R4.6 or later SMTP AUTH-enabled SMTP server Sendmail 8.12.5 or later + Cyrus SASL API 1.5.28 combination Exchange Server 5.5+SP1 or later Exchange 2000 POP server Qpopper 2.53 or later Exchange Server 5.5+SP1 or later Domino R4.6 or later Exchange 2000 Qpop v4.0.5 POP before SMTP...
  • Page 17: Chapter 2 Functions

    Chapter 2 Functions...
  • Page 19 Contents Contents 2.1 Basic Function................................2-1 2.1.1 Authentication at TX..................................2-1 2.1.2 Authentication at RX ................................... 2-3 2.1.3 Encrypted transmission ................................2-4 2.1.4 Encrypted reception ..................................2-5 2.1.5 MAC Address Block Function..............................2-5 2.1.6 URL Send..................................... 2-6 2.1.7 Setting for communicate SSL ..............................2-6 2.1.8 i-Fax Divided Data Transmission ..............................
  • Page 21: Basic Function

    Windows NT authentication method User name must be set in the form 'username@NTdomainname' E.g.: Windows2000 or earlier: username\\CANON (domain name may be omitted, depending on the environment) Windows2000: username@canon.co.jp (domain name may be omitted, depending on the environment) GSSAPI Authentication system using Kerberos Version 5 (RFC1510) User name must be set in the form 'username@realmname'.
  • Page 22 1) From the Outlook Express tools menu, select Accounts. In the example, pop3.canon.com is selected. 2) From Internet Accounts, select the desired account and click on Properties. In the example, the pop3.canon.com server tab has been selected from the Properties window.
  • Page 23: Authentication At Rx

    User name has to be set in the form of "User name@ NT domain name". Example: Windows2000 or former: User name\\CANON (Domain name can be omitted according to the environment.) Windows 2000: User name@canon.co.jp (Domain name can be omitted according to the environment.)
  • Page 24: Encrypted Transmission

    If it is not suitable to be used for the security, it can be prohibited by the settings on the server side. (Security policy can be determined by the server.) Server: +OK POP3 v2001.78 server ready <4a61.3e55cd70@test.canon.co.jp>...
  • Page 25: Encrypted Reception

    An extended SMTP command, defined in RFC 2487. RFC 2449 -- POP3 Extension Mechanism -- specifies that STLS must support CAPA command. If a server supports STLS, it states the support in response to CAPA command. The following lines exemplify communications when STLS is enabled. S: +OK POP3 v2001.78 server ready <4a61.3e55cd70@test.canon.co.jp> C: CAPA S: +OK Capability list follows:...
  • Page 26: Url Send

    Chapter 2 On for Receiving MAC Address Settings. Up to 100 MAC addresses can be registered to allow communicating with the iR C/Color imageRUNNER. If a conflict occurs between Receiving MAC Address Settings and IP Address Settings, Receiving MAC Address Settings overrides IP Address Settings. This function filters packets in the network layer and the reception logs for applications are not recorded.
  • Page 27: I-Fax Divided Data Transmission

    -'division ID' is a character string made up of the following: date of transmission, time of transmission, 0000 (fixed character string), transmission file number, host name. -all units of the same mail will have the same ID'. Content-Type: message/partial; number=1; total=3; id="20041110104508.0000.CanonTxNo.0105@e320g-43-1.ccm.canon.co.jp" F-2-6 2.1.9 E-Mail Divided Data Transmission 0020-7904 If a value other than '0' is set as the 'transmission data size upper limit' in service mode, the size of data sent for a single mail will be no more than the specified limit.
  • Page 28: E-Mail Divided Data Reception

    -all units of the same mail will have the same ID'. Content-Type: message/partial; number=1; total=3; id="20041110104508.0000.CanonTxNo.0105@e320g-43-1.ccm.canon.co.jp" (2)Page-Based Division Transmission The attached image data is divided with reference to page breaks within the 'transmission data size upper limit' specified in user mode, transmitting it by dividing it into multiple mails.
  • Page 29: Searchable Pdf

    Chapter 2 System Settings > Network Settings > USB Settings Use USB device Use USB host These parameters cannot be accessed from remote user interfaces. Operation when updating firmware using USB memory The USB host is always enabled when update firmware is selected in Service Mode. After the update is completed and the device restarted, the state of the USB host is again dependent on the value of the System Settings parameter.
  • Page 30: Increased Support Of File In A Box

    Chapter 2 F-2-8 2.1.15 Increased Support of File in a Box 0020-7912 Compact Transmission If the reading resolution of the file to transmit is 300 dpi or higher, it may be converted to 300 dpi for compact transmission. Such conversion or compact transmission will not take place if the resolution is less than 300 dpi (i.e., the transmission will be in non-compression PDF).
  • Page 31: Hdd Data Erase Kit

    Chapter 2 2.1.18 HDD Data Erase Kit 0020-7937 The earlier iR Security Kit was a function that enabled the complete erasure of all user data, as well as user data encryption and decryption. As the data encryption is performed by software, when using functions that temporarily store data on the main unit HDD, such as copy, scan, print and box, performance falls by more than 20% in comparison with when such functions are not being used.
  • Page 32: Ip Address Range Settings

    Chapter 2 T-2-2 COPIER>OPTION>USER Specification selection related to user mode Sub item Description level. HDCR-DSP Used to turn off display of user mode hard disk clear mode and switch clear operations. 0: Don't display and don't clear 1: Clear once with zeroes 2: Clear once with random data 3: Clear 3 times with random data (mode displayed for settings 1 to 3) MEMO: function for HDD initialization...
  • Page 33: Protocol-Related Setup

    Chapter 2 F-2-11 Where reception/printing is concerned, the following protocols and applications apply: LPD, RAW, SMB, FTP, HTTP (IPP), PDF, SMTP Where setup/reference is concerned, the following protocols apply: SNMP, HTTP (RUI) 2.1.20 Protocol-Related Setup 0020-7941 Protocols and applications make use of specific ports. If left "open," an unused protocol can prove to be a security risk. In this regard, it is made possible to enable/ disable (on/off) the ports individually.
  • Page 34: Send To Myself

    Chapter 2 F-2-12 2.1.23 Send to Myself 0020-7945 For 'New Address' under 'Send', a press on 'Send to Myself' will enable the use of an address collected from user information (log-in by SSOH). F-2-13 2.1.24 WebDAV Support 0020-7946 So that a folder may be accessed through SMB or an FTP server may be accessed by an FTP client, a file may be placed where access is possible over the Internet, thanks to the WebDAV function (WWW distributed authoring and versioning).
  • Page 35: Ipv6 Setting Display List

    Chapter 2 2.1.25 IPv6 setting display list 0020-7948 Each function display for IPv6 is shown below. T-2-4 Application Set display Additional Functions > System Settings > Network Settings > TCP/IP Settings > DNS Server Domain Name System Settings Additional Functions > System Settings > Network Settings > TCP/IP Settings > DNS Settings > DDNS Dynamic DNS DNS Dynamic Update Settings...
  • Page 36: Digital Signature Pdf

    Chapter 2 F-2-14 2.1.27 Digital Signature PDF 0020-7951 Digital signature PDF may be any of the following 2 types: T-2-5 Device Signature PDF The name of the MFP machine and machine information are encoded and imbedded to the scanned image so that, when opened in Acrobat, the information will appear on the signature tab.
  • Page 37: Searchable Pdf/Xps

    Chapter 2 F-2-16 F-2-17 After setup, Send > open File Format and select the [Add Digital Signatures] button. F-2-18 2.1.28 Searchable PDF/XPS 0020-7952 A searchable PDF file consists of pages of scanned images that have been put through OCR processing. The test data is extracted, and is laid over the original images in the form of invisible text so that a search may be run for a particular segment of the data.
  • Page 38: Display Host Name(Device Information Delivery Settings)

    Chapter 2 T-2-6 Language Recognised fonts Japanese Mincho, Gothic Alphabetic Helvetica, Courier New, Times New Roman Chinese simplified SimSun, NSimSun, SimHei, MS UI Gothic Chinese traditional MingLiU, PMingLiU, MS UI Gothic Korean Batang, Dotum, Gulim, MS UI Gothic Fonts which have different character shapes from the above may have lower recognition rates. Searchable PDF can only be transmitted when email or file servers only are specified as the destinations.
  • Page 39: Transmission File Format

    Chapter 2 T-2-7 COPIER > OPTION > NETWORK Level DNSTRANS If both IPv4 and IPv6 settings exist in Device Information Delivery Settings, Register Destinations, Auto Search/ Register, only one of either IPv4 or IPv6 will be displayed. Values 0: ipv4 1: ipv6 F-2-21 2.1.30 Transmission File Format...
  • Page 40: Ssoh(Single Sign-On Hybrid)

    Chapter 2 F-2-22 When you do SEND in fax, ifax (TIFF), a BOX, it is transmitted in the file format that accepted each address. It is not done SEND in the file format that you set with a File Format screen. 2.1.31 SSOH(Single Sign-On Hybrid) 0020-7957 The login application configuration has changed from the iR3245 series.
  • Page 41: Xps(Xml Paper Specification)

    Chapter 2 Authentication mode Description Local device authentication Authenticates users registered with device internal DB.Same as the 'Local device authentication' found in SDL and the original SSO. Domain authentication + local device This mode enables both domain authentication and local device authentication to be used.Local device authentication authentication is performed by selecting 'This device'.
  • Page 42: Usb Keyboard Support

    Chapter 2 F-2-24 2.1.33 USB Keyboard support 0020-7959 When the following conditions are fulfilled, input from a USB keyboard is possible while the software keyboard is being displayed on the unit's touch panel. - Service Mode Level 2 > Option > USER > USBI-DSP to "1" - Additional Functions >...
  • Page 43: Chapter 3 Installation

    Chapter 3 Installation...
  • Page 45 Contents Contents 3.1 Installation procedure..............................3-1 3.1.1 Overview of the Installation Procedure ............................3-1 3.1.2 Device Signature PDF.................................. 3-1 3.1.3 Making SSOH Settings ................................3-3 3.1.4 User Signature PDF ..................................3-6 3.1.5 User Signature creation................................3-9...
  • Page 47: Installation Procedure

    1. Using the following URL, access the LMS, and obtain the license key by following the instructions shown on the screen: http://www.canon.com/lms/license/ Memo: A license key is issued in exchange for the 16-digit number indicated on the License Access Number Certificate and the serial number of the device (e.g., ABC01234) to which the license will be registered.
  • Page 48 Chapter 3 F-3-2 Generating the CA Certificate and Key for the Machine Signature Function System Settings>Network Settings>TCP/IP Settings>Certificate Settings>Generate Key>Generate/update Device Signature Key F-3-3 System Settings>Network Settings>TCP/IP Settings>Certificate Settings>Key and Certificate list Make the following selections to see that the appropriate machine signature key has been generated: Device Signature Key 1024bit F-3-4...
  • Page 49: Making Ssoh Settings

    Chapter 3 F-3-5 Select 'Machine Signature', and press the OK button. Digital Signatures F-3-6 Using Acrobat Reader, open the PDF file that has been transmitted after scanning an image. Check to be sure that the signature tab shows a machine signature. Signature Tab as Viewed in Acrobat Reader F-3-7 3.1.3 Making SSOH Settings...
  • Page 50 Chapter 3 F-3-8 3. Select 'System Management'. 4. Select 'Enhanced Sys.App'. 5. Select 'Single Sign-On H'. 6. Press the Select button. F-3-9 7.Turn off and then back on the iR machine. Hold down the ON/OFF button on the control panel for 3 sec or more, and follow the instructions in the display to turn off the main power. Registering SSOH Users 1.
  • Page 51 Chapter 3 F-3-10 4. When a connection has been established (logged in), click [User Management]. F-3-11 5. Click [Register]. However, there may be no more than 100 users per iR machine. F-3-12 6. Fill in the relevant fields, and click [OK].
  • Page 52: User Signature Pdf

    Chapter 3 F-3-13 3.1.4 User Signature PDF 0020-7965 Overview The user signature function serves to enable the identification of users and, thus, the prevention of data manipulation. When a PDF file is created using this function and displayed in Acrobat, its signature tab will provide information on the user who has singed it, making it possible to assess the propriety of the file data.
  • Page 53 Chapter 3 F-3-15 If the log-in has been made as administrator, there will be a list of all users (as many as 100 per iR machine). If the log-in has been as a general user, on the other hand, the RUI will show that user alone. Obtaining a User Certificate There must be a User certificate to use a user signature PDF license option.
  • Page 54 Chapter 3 TESTONE 1024bit F-3-18 Transmitting a PDF File with a User Signature If SSOH is in use, the control panel of the iR machine shows the following log-in screen; type in the ID and password to bring up the SEND screen. In the case of SSOH, there is no domain selection field, as the log-in is on the machine itself.
  • Page 55: User Signature Creation

    Chapter 3 PDF with Digital Signature Select the Signature types Device Signature User Signature F-3-21 3. As in the case of using ordinary SEND functions, place an original on the copyboard or in the feeder, and make the following selections: New Address>E- Mail>File>Store In User Inbox.
  • Page 56 Chapter 3 F-3-23 3. Press the Add ID button. F-3-24 4. Select Create a Self-Signed Digital ID to create a digital ID. F-3-25 5. Press Next. 3-10...
  • Page 57 Chapter 3 F-3-26 6. Select New PKCS#12 Digital ID File. F-3-27 7. Select Enable Unicode Support and fill in the Name and Organizational Unit. F-3-28 8. Enter the password and press Finish. 3-11...
  • Page 58 Chapter 3 F-3-29 9. From Start, go to Search for Files and Folders. Enter the folder name and '*.pfx', and begin the search. F-3-30 10. From the Search Results, find out the storage location of the certification file and then copy the certification file to the desired location. F-3-31 3-12...
  • Page 59: Chapter 4 Maintenance

    Chapter 4 Maintenance...
  • Page 61 Contents Contents 4.1 Notes when service ................................4-1 4.1.1 Other Points to Note..................................4-1 4.1.2 Recommended setting of system management information ......................4-1 4.2 Reference matter in market service..........................4-1 4.2.1 Invalidating the License for Transfer to a Different Device data recovery method ..............4-1 4.2.2 Conditions for Using the RUI ..............................
  • Page 63: Notes When Service

    Chapter 4 4.1 Notes when service 4.1.1 Other Points to Note 0020-7969 At times, it is a good idea to print out the user data list (network) and the address table list in user mode before initializing the memory (MMI CLEAR) to keep a backup of the data.
  • Page 64 Chapter 4 F-4-1 Generating key-pair and server certification Up to 2 key-pairs can be registered. When generating keys inside MFP machine, make the following selections: Additional Functions>System Settings>Network Settings>TCP/IP>Settings>Certificate Settings>Generate Key F-4-2 Select 'Generate SSL Key' button, then input key name. F-4-3...
  • Page 65 Chapter 4 F-4-4 Input the items for 'Generate Key: Certificate Settings', and select 'Start Key Generate' button. F-4-5 Make the following selections: Additional Functions>System Settings>Network Settings>TCP/IP Settings>Certificate Settings>Generate Key Open 'Key and Certificate List'. Encryption setting is done if there is a key mark and 'Certificate Details' shown in the display. F-4-6 In the case of IPPS print from Windows Vista, the Common Name should be the IP address of the host machine when generating SSL key.
  • Page 66: User Data Erase Of The Hdd

    Chapter 4 F-4-7 4.2.4 User data Erase of the HDD 0020-7977 If the host machine is used by a user for such cases as demonstration, clear the address book for FAX and the user data on HDD completely and remove the machine from the user's site.
  • Page 67 Chapter 4 F-4-8 Select 'Internet Information Service (IIS)' and press 'OK'. F-4-9 Select 'FrontPage 2002 Server Extensions' and press 'OK'. F-4-10 F-4-11 Press 'Complete' on the completion screen of Windows component wizard.
  • Page 68 Chapter 4 F-4-12 Create new folder to be used in WebDAV under the IIS Web public folder. Do not make under the C\Intepub\wwwroot\ It is named 01 on the screen. Usually, [wwwroot] folder should be put outside of [C\] in order to improve security. F-4-13 Select created new folder(ex.
  • Page 69 Chapter 4 F-4-15 Action>New>Virtual Directory F-4-16 Select Read and Wite on the Viertual Directory Creation Wizard. F-4-17 Select Web Service Extensions. Select WebDAV on the Web Service Extention list. Put Allow Button.
  • Page 70 Chapter 4 F-4-18 Select Web Site of WebDAV(ex. 01). Open Properties by mouse right button. F-4-19 Open Virtual Directory Tab and Select Dierctory browsing. F-4-20 Select Directory Security Tab Put Edit button on the Authentication and access control.
  • Page 71 Chapter 4 F-4-21 The check is removed at the Enable anonymous access. Select Basic suthentication for Windows domain servers on the Authenticated access. F-4-22 Setup by Client Open the My Network Places on the Desktop. Select Add a network place.
  • Page 72 Chapter 4 F-4-23 Input Web Server Address on Add Network Place Wizard. F-4-24 If you have not ID for Web Server, you need make on the Web Server. This is Web Server Operation. Open Computer Management under Start > Setup > Control panel > Administration tool. Select Local Users and Groups>User.
  • Page 73: Ipv6 Settings

    Chapter 4 Host name: https://Server address Path to Folder: Directory path after the Inetpub User name: (Basic authentication of WebDAV server, Necessary user name for digest authentication) Password: (Basic authentication of WebDAV server, Necessary password for digest authentication) WebDAV http://172.16.1.54/ \01/ 1234 ****...
  • Page 74 Chapter 4 Address type Touch panel location Settable Address Usage conditions addresses characteristics Manual address Manual settings The following addresses cannot be registered. - Multi-cast addresses [1111 1111]- Addresses comprising all 0 [0000 0000] - IPv4-compatible IPv6 addressesAddresses in which the upper 96 bits are 0 and the lower 32 bits are in IPv4 address hexadecimal notation.
  • Page 75 Chapter 4 Local area connection confirmation from a Windows Vista PC From START, go to Control Panel, then Network and Common Centre > Network Connections and Management > Local Area Connections > Properties. Open the Properties for Internet Protocol Version 6 (TCP/ IP). Select 'Obtain IPv6 Address Automatically' then press OK. From START, go to All Programmes >...
  • Page 76: Related Error Code

    Chapter 4 Response from the host. F-4-32 Reference: Addresses that begin with "fe80" are called link local addresses. These are used prior to making trunk LAN and Internet connections. These addresses are used for single links or connection to single local networks only. They cannot be relayed via a router.
  • Page 77: E-Mail Transmission Errors

    Chapter 4 F-4-34 F-4-35 F-4-36 4.3.2 E-mail Transmission errors 0020-8143 <E-mail transmission error message and error codes> T-4-4 Message Erro Cause Remedy code No message #022 Address deleted or invalidated during - Retransmit deleted address. transmission reservation. - Check that a group address is specified as the transfer destination and that it contains a valid address.
  • Page 78 Chapter 4 Message Erro Cause Remedy code The number of #702 HD full (work area) - Wait a while then retry. transmission standby - Stop broadcast transmission with other protocols. This sometimes helps to documents must be avoid this problem. reduced.
  • Page 79: I-Fax Transmission Errors

    Chapter 4 Message Erro Cause Remedy code POP AUTH #845 In an email or I-Fax transmission using POP - Check POP Address and POP Password settings of Additional Functions. authentication error Before SMTP, the device attempted POP - Check the POP authentication settings in the POP server. Auth but an error occurred in the POP server - Cancel the selection of POP AUTH for POP AUTH Method.
  • Page 80 Chapter 4 Message Error code Cause Remedy The address is not #704 Address book search error. - Check the address book settings. in the address list. Data size too big. #705 Transmission data size too big. - Reduce number of pages for transmission or lower resolution.
  • Page 81 Chapter 4 Message Error code Cause Remedy No display #834 MDN error notification - Programme the transmission other party received. The MDN error conditions so that they can be processed by notification is sent to the the receiver. transmission source as a - Check that the receiver memory is not full.
  • Page 82: I-Fax Reception Errors

    Chapter 4 Message Error code Cause Remedy Cancelled. #995 Transmission cancelled - Retransmit as necessary. 4.3.4 I-Fax Reception errors 0020-7987 <I-Fax reception error message and error code list> T-4-6 Message Error Cause Remedy code POP server UIDL error POP server UIDL commands not - Change POP server.
  • Page 83: Smb Transmission Errors

    Chapter 4 Message Error Cause Remedy code POP server connection #810 Timeout (1KByte/ 10 sec.) - Check user mode POP server settings. error during POP data reception. - Check POP server operation. - Check network traffic conditions. No message. Error reason #818 File attachment is in unprintable - Contact sender and arrange for them not to transmit image data that is not supported by...
  • Page 84 Chapter 4 T-4-7 Message Error code Cause Remedy No message #022 Address deleted or invalidated during transmission - Retransmit deleted address. reservation. - Check that a group address is specified as the transfer destination and that it contains a valid address. - Check that a group address is specified as the transfer destination and whether it contains local print or fax box only.
  • Page 85: Ftp Transmission Errors

    Chapter 4 Message Error code Cause Remedy Check address #804 - No match for specified directory name. - Check that the destination directory name is correct. - In SMB, a user exists but no write privileges. - Set directory access privileges in the server. Disk full on the #805 -Document deletion of server...
  • Page 86: Ncp Transmission Errors

    Chapter 4 Message Error Cause Remedy code e-Signature #761 The encryption code used at time of PDF transmission (bearing Install the appropriate user certificate or machine certificate Certificate Access a user signature prepared by MEAP authentication) prevents properly. Error transmission. Check to see if the #762 e-mail is sent to an address for which transmission is not...
  • Page 87: Box Transmission Errors

    Chapter 4 Message Error code Cause Remedy Address does not #704 - An error occurred when address information - Check address list settings. Or, turn unit OFF/ON. appear in address was being obtained from the address list. list. (Address deleted from list after scanning, etc.) HD full #702 Operation stopped because HD full (work area).
  • Page 88: Webdav Transmission Errors

    Chapter 4 T-4-10 Message Error code Cause Remedy No message #022 Address deleted or invalidated during - Retransmit deleted address. transmission reservation. - Check that a group address is specified as the transfer destination and that it contains a valid address. - Check that a group address is specified as the transfer destination and whether it contains local print or fax box only.
  • Page 89: Related Service Mode

    Chapter 4 Check the server. #872 The HTTP response is 405 (Method Not Allowed). The resource indicated in the URI does not permit the use of the method. Check the server settings. #873 The HTTP response is 407 (Proxy Authentication Required). In user mode, check the proxy The attempt for authentication with the proxy server has failed.
  • Page 90 Chapter 4 target of transfer, reason of transfer. In response, the Sales Company may issue a license key for new installation on a different device. The user must take note of the new license key in writing, and keep it as a record after registering it to the target device. Installation Procedure 1.
  • Page 91: Related Service Modes List

    Chapter 4 4. When the target device is ready, check its serial number. 5. Contact the Sales Company, and provide the following: invalidation certificate for transfer, serial number of the source device, serial number of the target device. The Sales Company, in response, may issue a new license key that may be registered on the target device. 6.
  • Page 92: Service Mode Comparative Table

    Chapter 4 T-4-16 Item Setting name Description I-Fax reception raw data print RAW-DATA 0: Ordinary reception mode(default) 1: Received I-Fax content printed out as is (in order to judge whether data are correct). PDF Reception/Transmission PDF-RDCT 0: compute PDF file CropBox to 2 decimal places 1: do not compute PDF file CropBox beyond decimal point COPIER>OPTION>USER T-4-17...
  • Page 93 Chapter 4 T-4-19 Item Setting name Setting name Description MODEL-SZ FNC-SW > MDEL-SZ MODEL-SZ 0: AB, 1: Inch, 2: A, 3: AB/Inch Destination(Country+Language+Destinatio FNC-SW > CONFIG CONFIG JIS X 0304(Two characters)+ISO 639(Two characters) n+Size) I-Fax reception raw data print FNC-SW > RAW-DATA RAW- 0: Ordinary reception mode(default) DATA...
  • Page 95 Jan 21 2009...

Table of Contents