Canon scanner imageFORMULA ScanFront 300P User Manual
Have a look at the manual Canon scanner imageFORMULA ScanFront 300P User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Please read this manual before using the scanner. After you finish reading this manual, keep it in a safe place for future reference. INSTRUCTIONS ScanFront 300/300P/330
International ENERGY STAR® Office Equipment Program As an ENERGY STAR ® Partner, Canon Electronics Inc. has determined that this machine meets the ENERGY STAR ® Program guidelines for energy efficiency. The International ENERGY STAR ® Office Equipment Program is an international program that promotes energy saving through the use of computers and other office equipment. The program backs the development and dissemination of products with functions that effectively reduce energy consumption. It is an open system in which business proprietors can participate voluntarily. The targeted products are office equipment, such as computers, monitors, printers, fax, machine, copiers, and scanners. The standards and logos are uniform among participating nations. This model doesn’t provide “setting options” for power management. Under factory default settings, the scanner will enter Low Power mode after 12 minutes of inactivity. Although you can change the period of time before the scanner enters Low Power mode to up to 230 minutes, we recommend using the default setting. FCC REGULATIONS (For 120 V model) Network Scanner, Model M11-1041/M11-1051/M11-1053 This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: – Reorient or relocate the receiving antenna. – Increase the separation between the equipment and receiver. – Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. – Consult the dealer or an experienced radio/TV technician for help. Use of shielded cable is required to comply with class B limits in Subpart B of Part 15 of FCC Rules. Do not make any changes or modifications to the equipment unless otherwise specified in the manual. If such changes or modifications should be made, you could be required to stop operation of the equipment. Canon U.S.A. Inc. One Canon Park, Melville, NY 11747, U.S.A. Tel. No. (800)652-2666 RADIO INTERFERENCE REGULATIONS (For 120 V models) This digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus as set out in the Interference-causing equipment standard entitled “Digital Apparatus”, ICES-003 of the Industry Canada. RÈGLEMENT SUR LE BROUILLAGE RADIOÉLECTRIQUE (For 120 V models) Cet appareil numérique respecte les limites de bruits radioélectriques applicables aux appareils numériques de Classe B prescrites dans la norme sur le matériel brouilleur: “Appareils Numériques”, NMB-003 édictée par l’Industrie Canada.
For CA, USA Only Included battery contains Perchlorate Material - special handling may apply. See http://www.dtsc.ca.gov/hazardouswaste/perchlorate/ for detail. European Union (and EEA) only This symbol indicates that this product is not to be disposed of with your household waste, according to the WEEE Directive (2002/96/EC) and your national law. This product should be handed over to a designated collection point, e.g., on an authorized one-for-one basis when you buy a new similar product or to an authorized collection site for recycling waste electrical and electronic equipment (EEE). Improper handling of this type of waste could have a possible negative impact on the environment and human health due to potentially hazardous substances that are generally associated with EEE. At the same time, your cooperation in the correct disposal of this product will contribute to the effective usage of natural resources. For more information about where you can drop off your waste equipment for recycling, please contact your local city office, waste authority, approved WEEE scheme or your household waste disposal service. For more information regarding return and recycling of WEEE products, please visit www.canon-europe.com/environment . (EEA: Norway, Iceland and Liechtenstein) Model Names The following names may be provided for the safety regulations in each sales region of the Network Scanner. ScanFront 300: Model M11-1041 ScanFront 300P: Model M11-1051 ScanFront 330: Model M11-1053 Trademarks Canon and the Canon logo are registered trademarks of Canon Inc. in the United States and may also be trademarks or registered trademarks in other countries. imageFORMULA is a trademark of Canon Electronics Inc. Microsoft, Windows, Internet Explorer, and Active Directory are registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. Adobe, Acrobat, and Adobe Reader are registered trademarks or trademarks of Adobe Systems Incorporated in the United States and other countries. Other product and company names herein may be the trademarks of their respective owners. Disclaimers The information in this document is subject to change without notice. CANON ELECTRONICS INC. MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, EITHER EXPRESS OR IMPLIED, EXPECT AS PROVIDED HEREIN, INCLUDING WITHOUT LIMITATION, THEREOF, WARRANTIES AS TO MARKETABILITY, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OF USE OR NON- INFRINGEMENT. CANON ELECTRONICS INC. SHALL NOT BE LIABLE FOR ANY DIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY NATURE, OR LOSSES OR EXPENSES RESULTING FROM THE USE OF THIS MATERIAL. CANON ELECTRONICS INC. IS NOT LIABLE FOR THE STORAGE AND HANDLING OF DOCUMENTS SCANNED WITH THIS PRODUCT, OR THE STORAGE AND HANDLING OF RESULTING SCANNED IMAGE DATA. IF YOU INTEND TO DISCARD THE ORIGINALS OF SCANNED DOCUMENTS, YOU THE CUSTOMER ARE RESPONSIBLE FOR INSPECTING THE SCANNED IMAGES AND VERIFYING THAT DATA IS INTACT. THE MAXIMUM LIABILITY OF CANON ELECTRONICS INC. UNDER THIS WARRANTY IS LIMITED TO THE PURCHASE PRICE OF THE PRODUCT COVERED BY THE WARRANTY.
Copyright libtiff Copyright (c) 1988-1996 Sam Leffler Copyright (c) 1991-1996 Silicon Graphics, Inc. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics. THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. libjpeg Portions of this software are based in part on the work of the Independent JPEG Group.MD5 derived from the RSA Data Security, Inc. MD5 Message- Digest Algorithm Copyright (c) 1998 - 2002, Paul Johnston & Contributors All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc. MD5 Message- Digest Algorithm” in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as “derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm” in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. Windows CE 6.0 Depending upon which components you are running, your product may contain the following third party technologies: Portions of this software are based on NCSA Mosaic. NCSA Mosaic was developed by the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign.Distributed under a licensing agreement with Spyglass, Inc. Contains security software licensed from RSA Data Security, Inc. Portions of IPSec and related services jointly developed by Microsoft Corporation and Cisco Systems, Inc. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.Opera® or Opera Software™ are registered trademarks of Opera Software ASA in Norway or other countries. OPERA SOFTWARE ASAS AND THIRD PARTY SUPPLIERS COPYRIGHT NOTICE AND ACKNOWLEDGEMENTS I. Opera Software ASAs browser/browser engine Opera®Browser from Opera Software ASA. Copyright 1995- 2008 Opera Software ASA. All rights reserved. This software is being provided on an « as is »‚ basis. Opera and its suppliers disclaim all warranties regarding the software, either express or implied, statutory or otherwise, including without limitation warranties of functionality, fitness for a particular purpose or non-infringement. II. The required acknowledgements for third party components included in the OperaRBrowser engine are as follows: 1. David Gays binary/decimal conversion code (dtoa and strtod) The author of this software is David M. Gay. Copyright (c) 1991, 2000, 2001 by Lucent Technologies. Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software. THIS SOFTWARE IS BEING PROVIDED AS IS, WITHOUT ANY EXPRESS OR IMPLIED WARRANTY.IN PARTICULAR, NEITHER THE AUTHOR NOR LUCENT MAKES ANY Hg LAMP(S) INSIDE THIS PRODUCT CONTAIN MERCURY AND MUST BE RECYCLED OR DISPOSED OF ACCORDING TO LOCAL, STATE OR FEDERAL LAWS.
REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. 2. OpenSSL 0.9.8e (formerly SSLeay) The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact [email protected]. OpenSSL License Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/) 4. The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl- [email protected]. 5. Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/) THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young ([email protected]). This product includes software written by Tim Hudson ([email protected]). Original SSLeay License
Copyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved. This package is an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]). Copyright remains Eric Youngs, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young ([email protected]) The word cryptographic can be left out if the rouines [SIC] from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson ([email protected]) THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
Copyright 2013 by CANON ELECTRONICS INC. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system without the prior written permission of CANON ELECTRONICS INC.
i Introduction Thank you for purchasing the Canon imageFORMULA ScanFront 300/300P/330 network scanner. Please read this manual thoroughly before using the scanner to familiarize yourself with its capabilities, and to make the most of its many functions. After reading this manual, store it in a safe place for future reference. About ScanFront 300/300P/330 The ScanFront 300/300P/330 is a network scanner that you can use without connecting to a computer. You can transfer the data of an image scanned with the ScanFront 300/300P/330 to a shared folder on a server PC or client PC on the network or to an FTP server*, send it to a printer for printing**, or deliver it to a remote location via e-mail or Internet fax service. When using the scanner without a network environment, you can also save the image files to USB memory. * To send image files to a shared folder on a computer on a different segment of the network, the supplied ScanFront Service software must be installed on a computer on the network. ** To send image files to a printer, the supplied ScanFront Service software must be installed on a computer on the network. Mail Server Internet Fax Service Network Conceptual Diagram of the ScanFront Shared Folder (Server PC, Client PC) FTP ServerSave File Save File Send E-mail USB Memory ScanFrontPrinter
ii About ScanFront 330 Web Application Mode The ScanFront 330 is equipped with not only an operation mode called Standard Mode that allows you to scan without connecting to a computer just like with the ScanFront 300P but also an operation mode called Web Application Mode, and you can use the scanner in either of these modes.* With Web Application Mode, the Web application for operating the ScanFront is installed on the server**, and you can access the Web application on the server and operate the ScanFront from the browser installed on the ScanFront. By revising the Web application, the developer can customize ScanFront operation to match your operating conditions. If you intend to use Web Application Mode, contact your dealer. * The ScanFront 330 is set to Standard Mode in the initial state at the time of purchase. ** To use Web Application Mode, you need to provide a separate server on which to run the Web application. Mail Server Internet Fax Service: Data route. Conceptual Diagram of Web Application Mode ScanFront FTP ServerUSB Memory Printer Shared Folder (Server PC, Client PC) Web Application (Server)