Ricoh Mp C5503 User Guide
Have a look at the manual Ricoh Mp C5503 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 127 Ricoh manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
• For details about the machine's settings, see "Network Settings Requirements", Connecting theMachine/ System Settings . Sending and Receiving Faxes via the Internet 21
Sending and Receiving Faxes by Using the Machine without Fax Unit Installed You can send and receive faxes through a different machine's fax functions via a network (Remote Fax). • To use the remote fax function, install the fax connection unit on the main-machine and sub- machine. • The procedure for sending faxes is as same as that of for the machine with the fax unit. When a job has finished, confirm results displayed on sending history or printed on reports. • You can forward documents received by the main machine with the facsimile function to sub- machines. • For details, see "Sending/Receiving Documents Using a Remote Machine (Remote Fax)", Fax. 1. What You Can Do with This Machine 22CJQ612
Using the Facsimile and the Scanner in a Network Environment • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See "Overview of E-mail Transmission Function", Fax. See "Basic Procedure for Sending Scan Files by E-mail", Scan. • You can send scan files directly to folders (Sending scan files by Scan to Folder). See "Overview of Folder Transmission Function", Fax. See "Basic Procedure When Using Scan to Folder", Scan. • You can use this machine as a delivery scanner for the ScanRouter delivery software *1 (Network delivery scanner). You can save scan files in the delivery server or send them to a folder in a computer on the same network. See "Basic Procedure for Delivering Files", Scan. • You can use Web Services on Devices (WSD) to send scan files to a client computer. See "Basic Operating Procedure of WSD Scanner (Push Type)", Scan. *1 The ScanRouter delivery software is no longer available for sale. Using the Facsimile and the Scanner in a Network Environment 23CJQ607
Embedding Text Information in Scanned Files You can extract text information from a scanned document and embed it in the file without using a computer. If you scan a document using this function, embedded text can be searched by using the text search function or copied to another document. • To use this function, the optional OCR unit is required. • You can select a file type from [PDF], [High Compression PDF], or [PDF/A]. • This function can optically recognize characters in various languages and up to approximately 40,000 characters a page. • See "Embedding Text Information in Scanned Data", Scan. 1. What You Can Do with This Machine 24CUL003
Preventing Information Leakage (Security Functions) • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization. • By setting passwords, you can prevent unauthorized access via the network. • You can erase or encrypt the data on the hard disk to minimize the risk of information leakage. • You can limit the usage of functions for each user. • See Security Guide. Preventing Information Leakage (Security Functions) 25CJQ608
Centrally Controlling Scan Conditions and Distribution You can use the distributed scan management (DSM) system in Windows Server 2008 R2 to manage the destinations and scan settings for each individual user in a group and to use the information when distributing scanned data. You can also use this system to centrally manage information about people using the network and the machine's scanner functions. Both delivered files and user information can be controlled. • You must set up and configure a Windows server to use the distributed scan management system. This system is supported under Windows Server 2008 R2. • For details about how to deliver files using the distributed scan management system, see "Managing Scan Conditions and Other Settings in the Block using Distributed Scan Management", Scan . 1. What You Can Do with This Machine 26A A CUL004 [email protected] dpi [email protected] 600 dpi
Monitoring and Setting the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings. • See "Using Web Image Monitor", Connecting the Machine/ System Settings. • See Web Image Monitor Help. Monitoring and Setting the Machine Using a Computer 27CJQ609
Preventing Unauthorized CopyingYou can print embedded patterns on printouts to prevent unauthorized copying. • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages aregrayed out in the copy. This can minimize the risk of confidential information being copied. Protected fax messages are grayed out before being transmitted or stored. If a document protected by unauthorized copy guard is copied on a machine that is equipped with the Copy Data Security unit, the machine beeps to notify users that unauthorized copying is being attempted. If the document is copied on a machine without the Copy Data Security Unit, the hidden text becomes conspicuous in the copy, showing that the copy is unauthorized. • Using the copier function or the printer driver, you can embed text in the printed document for unauthorized copy prevention. If the document is copied, scanned, or stored in a Document Server by a copier or multifunction printer, the embedded text appears conspicuous in the copy, discouraging such unauthorized copying. • For details, see the printer driver Help and Security Guide. • For details about this function in the copier mode, see "Preventing Unauthorized Copies", Copier/ Document Server . • For details about this function in the printer mode, see "Printing Documents that Are Not Authorized for Duplication", Print . 1. What You Can Do with This Machine 28CUM003
2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components. Front and left view 1. ARDF or one-pass duplex scanning ADF (The illustration shows the one-pass duplex scanning ADF.) Lower the ADF over originals placed on the exposure glass. If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. The ARDF scans both sides of an original one side at a time. The one-pass duplex scanning ADF scans both sides of an original simultaneously. 2. Exposure glass Place originals face down here. 29 1 24 6 7 8 9 CUV001 5 3
3. VentsPrevent overheating. 4. Control panel See "Guide to the Names and Functions of the Machine's Control Panel". 5. Main power switch To operate the machine, the main power switch must be on. If it is off, open the main power switch's cover andturn the switch on. 6. Internal tray 1 Copied/printed paper and fax messages are delivered here. 7. Front cover Open to access the inside of the machine. 8. Paper trays (Trays 1–2) Load paper here. 9. Lower paper trays Load paper here.2. Getting Started 30