HomeSearch by PurposeConfiguring the Operating Environment for Scan Transmission

Search by Purpose

Configuring the Operating Environment for Scan Transmission

To configure the Scan to E-mail environment ([E-mail TX (SMTP)])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [E-mail Setting]
          • [E-mail TX (SMTP)]

Configure the settings to send an E-mail from this machine.

Setting

Description

[E-mail TX Setting]

When sending E-mails from this machine, set this option to ON (default: ON).

[E-Mail Send]

When using the Scan to E-mail function, set this option to ON (default: ON).

Using this function allows you to send the scanned original data as an E-mail attachment.

[E-mail Notification]

When using the E-mail notification function, set this option to ON (default: ON).

If a warning occurs on this machine that instructs the user to add paper, replace toner, or resolve a paper jam, it can be sent to a registered E-mail address.

[Total Counter Notification]

When using the total counter notification function, set this option to ON (default: ON).

Using this function allows you to send counter information managed by this machine to the registered E-mail address.

[SMTP Server Address]

Enter the address of the E-mail server (SMTP). Use one of the following formats.

  • Example to enter the host name: "host.example.com"

  • Example to enter the IP address (IPv4): "192.168.1.1"

  • Example to enter the IP address (IPv6): "fe80::220:6bff:fe10:2f16"

[SSL/TLS Settings]

Select the method to encrypt communications with the E-mail server (SMTP) (default: [OFF]). This option supports SMTP over SSL and Start TLS.

[Port No.]

If necessary, change the port number of the E-mail server (SMTP) (default: [25]).

[Port No.(SSL)]

If necessary, change the port number for SSL communication (default: [465]).

This option is available when [SMTP over SSL] is selected for [SSL/TLS Settings].

[Certificate Verification Level Settings]

To validate the certificate during SSL communication, select items to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period (default: ON).

  • [CN]: Confirm whether CN (Common Name) of the certificate matches the server address (default: OFF).

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer (default: OFF).

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path) (default: OFF). The chain is validated by referencing the external certificates managed on this machine.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired (default: OFF). The expiration date confirmation is performed in the order of OCSP (Online Certificate Status Protocol) service, and CRL (Certificate Revocation List).

[Connection Timeout]

If necessary, change the time-out time to limit a communication with the E-mail server (SMTP) (default: [60] sec.).

[Admin. E-mail Address]

Displays the E-mail address of the administrator of this machine.

[Device Mail Address]

Enter the E-mail address of this machine (using up to 320 characters, excluding spaces).

[Detail Settings]

Configure SMTP authentication or POP before SMTP authentication according to your environment.

[POP Before SMTP]

When using POP before SMTP, set this option to ON (default: OFF).

  • [POP Before SMTP Time]: If necessary, change the waiting time until starting E-mail transmission after the POP authentication is successful (default: [5] sec.).

[SMTP Authentication]

When using SMTP authentication, set this option to ON (default: OFF).

  • [SMTP Authentication Method]: Select the authentication method to be used for SMTP authentication.

  • [User ID]: Enter the user ID for SMTP authentication (using up to 64 characters).

  • [Password]: Enter the password for SMTP authentication (using up to 64 characters, excluding ").

  • [Domain Name]: When Digest-MD5 is specified as the authentication method for SMTP authentication, enter the domain name (realm) (using up to 253 characters).
    When there are two or more domains (realm), enter the domain name. When there is only one domain (realm), no entry is required. The domain name is notified from the E-mail server (SMTP) at the initial communication, and communication is automatically performed using that domain name.

  • [Authentication Setting]: Select whether to synchronize the SMTP authentication with the user authentication of this machine (default: [Set Value]). This item is necessary when the user authentication is installed on this machine.
    [User Authentication]: Uses the registered user's user authentication of this machine as authentication information for SMTP authentication.
    [Set Value]: Uses values entered at [User ID] and [Password]. If SMTP authentication fails because the user who sends an E-mail does not match the user specified in [User ID], set [Envelope-From Setting] to [Set], then enter the E-mail address to be applied to Envelope-From in [From Address]. When [Envelope-From Setting] is set to [Do Not Set], the E-mail address of the administrator of this machine is applied to Envelope-From.

[Server load reduction transmission method]

Select the sending method to reduce the load of the E-mail server (SMTP) (default: [OFF]).

  • [Binary Division]: Divides an E-mail with the specified size. [Binary division Size]: Enter the size to divide an E-mail.

  • [Stop Scan TX when maximum limit is exceeded]: Stops sending an E-mail when its size exceeds the specified maximum value. When specifying the maximum value, select [Limit] in [Max Mail Size], then enter the maximum E-mail size allowable for the E-mail server (SMTP) in [Server Capacity limit].

  • [Scan TX by Download URL method only when maximum limit is exceeded]: Notifies the E-mail address specified as the destination of the download URL without attaching files when the E-mail size exceeds the specified maximum value. When specifying the maximum value, select [Limit] in [Max Mail Size], then enter the maximum E-mail size allowable for the E-mail server (SMTP) in [Server Capacity limit].

  • [Always Scan TX by Download URL method]: Notifies the E-mail address specified as the destination of the download URL without attaching files.

To configure the FTP transmission environment ([FTP TX Setting])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [FTP Setting]
          • [FTP TX Setting]

Configure the settings for using the FTP Send function.

Setting

Description

[FTP TX]

When using the FTP Send function, set this option to ON (default: ON).

[Proxy Server Address]

Enter the proxy server address. Use one of the following formats.

  • Example to enter the host name: "host.example.com"

  • Example to enter the IP address (IPv4): "192.168.1.1"

  • Example to enter the IP address (IPv6): "fe80::220:6bff:fe10:2f16"

[Proxy Server Port Number]

If necessary, change the proxy server port number (default: [21]).

[Connection Timeout]

If necessary, change the time-out time to limit a communication with the FTP server (default: [60] sec.).

[Port No.]

If necessary, change the FTP server port number (default: [21]).

To configure the SMB transmission environment ([Client Setting])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [SMB Setting]
          • [Client Setting]

Configure settings to use the SMB client function.

Setting

Description

[SMB TX Setting]

When using the SMB TX function, set this option to ON (default: ON).

[SMB Authentication Setting]

Select an authentication method for SMB transmission according to your environment (default: [NTLM v1/v2]).

  • [NTLM v1]: Performs the NTLM v1 authentication. This option is available in the NT domain environment.

  • [NTLM v2]: Performs NTLM v2 authentication. This option is available in the NT domain environment.

  • [NTLM v1/v2]: Performs NTLM v1 authentication when NTLM v2 authentication fails. This option is available in the NT domain environment or Mac OS environment.

  • [Kerberos]: Performs Kerberos authentication. This option is available in the Active Directory domain environment.

[Authentication Setting if Kerberos Fails]

If [Kerberos] is selected in [SMB Authentication Setting], select whether to perform NTLM authentication when Kerberos authentication has failed (default: [Disable NTLM]).

  • [Enable NTLM v1/v2]: NTLM v2 authentication is performed when Kerberos authentication fails, and NTLM v1 authentication is performed when NTLM v2 authentication fails. This option is available when both the Active Directory and NT domains are specified.

  • [Disable NTLM]: Assumes that authentication fails when Kerberos authentication has failed.

[Single Sign-On Setting]

Configure the single sign-on function for SMB transmission.

By using the user authentication information (login name and password) of this machine as SMB destination authentication information (user ID and password), you can reduce the number of steps required to specify SMB destination authentication information, enabling you to configure a single sign-on environment for SMB transmission.

  • [Default Domain Name]: When a server other than Active Directory is used for external server authentication or external server authentication is not used, specify the name of the domain to which the destination host belongs at SMB transmission (using up to 64 characters).
    When Active Directory is used for external server authentication, the value specified in this step is ignored, and the domain name of the login destination for external server authentication is used instead.
    If [Kerberos] is selected in [SMB Authentication Setting], entry is required.

  • [SMB User Credential Setting]: When using the user authentication information (login name and password) of this machine as SMB destination authentication information (user ID and password), set this option to ON (default: OFF).

  • [Edit SMB User Credentials]: This option is available when [SMB User Credential Setting] is set to ON (default: OFF).
    Setting to OFF (Restrict) registers SMB destinations, excluding the user ID and password specified at login. However, using Web Connection, an SMB destination is registered, including the user ID and password.
    Setting to ON (Allow) enables you to select whether to register SMB destinations, including the user ID and password. Selecting [Reg. excl. ID and Password] automatically adds the user ID and password at SMB transmission.

[User Authentication(NTLM)]

When performing user authentication via the NTLM server, set this option to ON (default: ON).

[DFS Setting]

When using DFS, set this option to ON (default: ON).

[SMB security Signature Setting]

Select whether to enable the SMB signature of this machine to suit your environment (default: [When requested]).

  • [Disable]: Disables the SMB signature of this machine.

  • [When requested]: Enables the SMB signature of this machine (client) only when the SMB signature is requested from the server side. If the SMB signature is not requested from the server side, operations are performed while the SMB signature of this machine (client) remains disabled, and a connection is possible even when the SMB signature on the server side is disabled.

  • [Required]: Enables the SMB signature of this machine. To establish a connection, the SMB signature is also required in the server side. If the SMB signature in the server side is disabled, it will not be possible to make a connection.

To register the WINS server for this machine ([WINS/NetBIOS Settings])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [SMB Setting]
          • [WINS/NetBIOS Settings]

When WINS is installed in your environment, register the WINS server.

Setting

Description

[WINS/NetBIOS]

When using the WINS server, set this option to ON (default: ON).

[Auto Obtain Setting]

When automatically specifying the WINS server address using DHCP, set this option to ON (default: ON).

[WINS Server Address1]/[WINS Server Address2]

Enter the WINS server address when manually specifying it. Use the following entry formats.

  • Example of entry: "192.168.1.1"

[Node Type Setting]

Select the name resolution method (default: [H Node]).

  • [B Node]: Makes inquires by broadcast.

  • [P Node]: Makes inquires to the WINS server.

  • [M Node]: Makes inquiries to the broadcast and WINS server in sequence.

  • [H Node]: Makes inquiries to the WINS server and broadcast in sequence.

To specify whether to check if there are sub folders when searching for an SMB sharing folder ([SMB Browsing setting])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [SMB Setting]
          • [SMB Browsing setting]

Select whether to check if there are sub folders when searching for an SMB sharing folder on the network (default: [Disable Sub search]).

  • [Enable Sub search]: Checks whether there are sub folders. If there are sub folders, "+" is displayed on the parent folder icon.

  • [Disable Sub search]: Does not check whether there are sub folders. Select this option to shorten the time required to display the result when searching for a folder.

To configure the WebDAV transmission environment ([WebDAV Client Settings])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [WebDAV Settings]
          • [WebDAV Client Settings]

Configure settings to use the WebDAV client function.

Setting

Description

[WebDAV TX Setting]

When using the WebDAV TX function, set this option to ON (default: ON).

[Proxy Settings]

When a proxy server is installed in your environment, register the proxy server.

  • [Proxy Server Address]: Enter the proxy server address. Use one of the following formats.
    Example to enter the host name: "host.example.com"
    Example to enter the IP address (IPv4): "192.168.1.1"
    Example to enter the IP address (IPv6): "fe80::220:6bff:fe10:2f16"

  • [Proxy Server Port Number]: If necessary, change the proxy server port number (default: [8080]).

  • [User Name]: Enter the user name used for proxy authentication (using up to 63 characters).

  • [Password]: Enter the password for proxy authentication (using up to 63 characters).

[Chunk Transmission]

When sending data by dividing it into some chunks, set this option to ON (default: OFF).

Configure the setting if your WebDAV server supports chunk transmission.

[Connection Timeout]

If necessary, change the time-out time to limit a communication with the WebDAV server (default: [60] sec.).

[Server Authentication Character Code]

Select a character code to perform the authentication under the WebDAV server (default: [UTF-8]).

You can use this setting when [Japanese] is specified for the language to be displayed on the screen of this machine.

[Certificate Verification Level Settings]

To validate the certificate during SSL communication, select items to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period (default: ON).

  • [CN]: Confirm whether CN (Common Name) of the certificate matches the server address (default: OFF).

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer (default: OFF).

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path) (default: OFF). The chain is validated by referencing the external certificates managed on this machine.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired (default: OFF). The expiration date confirmation is performed in the order of OCSP (Online Certificate Status Protocol) service, and CRL (Certificate Revocation List).

[HTTP Version Setting]

Select the version of the protocol for HTTP communication (default: [HTTP/1.1]).

  • [HTTP/1.1]: Uses HTTP/1.1 only.

  • [HTTP/2, HTTP/1.1]: Uses HTTP/2 when connected to HTTP/2. In other cases, HTTP/1.1 is used.

To register the name of this machine to be searched using the WS discovery function ([DPWS Common Settings])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [DPWS Settings]
          • [DPWS Common Settings]

Configure settings to detect this machine using WSD (Web Service for Device).

Setting

Description

[Friendly Name]

Enter the name of this machine to be displayed when being searched using the Web service from the computer (using up to 62 characters).

[SSL Setting]

When using SSL communications, set this option to ON (default: OFF).

[Publication Service]

When using this machine in either one of the following environments, set this option to ON (default: ON).

  • Environment where NetBIOS is disabled on Windows computer

  • Environment constructed so that only communications using IPv6 are allowed

Up to 512 destinations can be detected in Publication Service (including detection counts by NetBIOS).

[Certificate Verification Level Settings]

To validate the certificate during SSL communication, select items to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period (default: ON).

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer (default: OFF).

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path) (default: OFF). The chain is validated by referencing the external certificates managed on this machine.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired (default: OFF). The expiration date confirmation is performed in the order of OCSP (Online Certificate Status Protocol) service, and CRL (Certificate Revocation List).

To configure the WSD printing environment ([Printer Settings])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [DPWS Settings]
          • [Printer Settings]

Configure the settings to use the WSD print function.

Setting

Description

[Print Function]

When using the WSD print function, set this option to ON (default: OFF).

[WSD Print V2.0 Setting]

When using the functions of WSD print version 2.0, set this option to ON (default: ON).

When you connect this machine from the computer compatible with version 2.0, you can issue a printing prenotification to this machine, send account information, specify parameters for the advanced device functions, or obtain the device capability and localization information.

[Printer Name]

Enter the name of this machine when using it as the WSD printer (using up to 63 characters).

[Printer Location]

Enter a printer location if necessary (using up to 63 characters).

[Printer Information]

Enter printer information if necessary (using up to 63 characters).

To configure the WSD scanning environment ([Scanner Settings])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [DPWS Settings]
          • [Scanner Settings]

Configure the settings to use the WSD Scan function.

Setting

Description

[Scan Function]

When using the WSD scan function, set this option to ON (default: OFF).

[Scanner Name]

Enter the name of this machine when using it as the WSD scanner (using up to 63 characters).

[Scanner Location]

Enter a scanner location if necessary (using up to 63 characters).

[Scanner Information]

Enter scanner information if necessary (using up to 63 characters).

[Connection Timeout]

If necessary, change the time-out time to limit a communication with the computer (default: [120] sec.).

To register the discovery proxy server for WSD scanning or WSD printing ([DPWS Extension Settings])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [DPWS Settings]
          • [DPWS Extension Settings]

Configure settings to perform Web service printing or scanning using the discovery proxy defined by WS-Discovery in the environment where the multicast communication is restricted.

Setting

Description

[Enable Proxy]

When using discovery proxy, set this option to ON (default: OFF).

[Proxy1] to [Proxy3]

Register the discovery proxy server.

  • [Proxy Server Address]: Enter the discovery proxy server address. Use one of the following formats.
    Example to enter the host name: "host.example.com"
    Example to enter the IP address (IPv4): "192.168.1.1"
    Example to enter the IP address (IPv6): "fe80::220:6bff:fe10:2f16"

  • [File Path]: Enter the service name at the path of the URL where the WS-Discovery service is published in the discovery proxy server (using up to 255 characters).

  • [Enable SSL]: When using SSL communications, set this option to ON (default: OFF).

  • [Proxy Server Port Number]: If necessary, change the port number of the discovery proxy server (default: [80]/[443] (in use of SSL)).

To specify whether to associate with the scan server ([Distributed Scan Function Settings])

To display:
  • [Utility]
    • [Administrator]
      • [Network]
        • [Distributed Scan Function Settings]

When associating this machine with the Distributed Scan Management system of Windows Server to use the scan function, set this option to ON (default: OFF).

  • Enable WS scan, and configure the SSL communication settings in advance.

  • This machine must join the Active Directory domain in advance.