Home > Ricoh > All in One Printer > Ricoh Mp C6502 User Guide

Ricoh Mp C6502 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Ricoh Mp C6502 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 127 Ricoh manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Sending and Receiving Faxes via the Internet
    E-mail Transmission and ReceptionThis machine converts scanned document images to e-mail format, and transmits and receives the
    e-mail data over the Internet.
    • To send a document, specify an e-mail address instead of dialing the destination telephone number (Internet Fax and e-mail transmission).
     See "Specifying an Internet Fax Destination by Entering It Manually", Fax.
    • This machine can receive e-mail messages via Internet Fax or from computers (Internet Fax Reception and Mail to Print).
     See "Receiving E-mail by Internet Fax/Mail to Print", Fax.
    • Internet Fax compatible machines and computers that have e-mail addresses can receive e- mail messages via Internet Fax.
    IP-Fax
    The IP-Fax function sends or receives documents between two facsimiles directly via a TCP/IPnetwork.
    • To send a document, specify an IP address or host name instead of a fax number (IP-Fax Transmission).
     See "Specifying an IP-Fax Destination by Entering It Manually", Fax.
    • This machine can receive documents sent via Internet Fax (IP-Fax Reception).
     See "Types of Reception", Fax.
    • Using a VoIP gateway, this machine can send to G3 facsimiles connected to the public switched telephone network (PSTN).
    Sending and Receiving Faxes via the Internet
    [email protected]@xxx.com
    xxx.xxx.xxx.xxx
    [email protected]@xxx.com
    xxx.xxx.xxx.xxx
    CJQ606           
    						
    							• For details about the machine's settings, see "Network Settings Requirements", Connecting theMachine/ System Settings
    .
    1. What You Can Do with This Machine
    22    
    						
    							Sending and Receiving Faxes by Using the
    Machine without Fax Unit Installed
    You can send and receive faxes through a different machine's fax functions via a network (Remote Fax).
    • To use the remote fax function, install the fax connection unit on the main-machine and sub- machine.
    • The procedure for sending faxes is as same as that of for the machine with the fax unit. When a job has finished, confirm results displayed on sending history or printed on reports.
    • You can forward documents received by the main machine with the facsimile function to sub- machines.
    • For details, see "Sending/Receiving Documents Using a Remote Machine (Remote Fax)", Fax.
    Sending and Receiving Faxes by Using the Machine without Fax Unit Installed
    23CJQ612     
    						
    							Using the Facsimile and the Scanner in a
    Network Environment
    • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail).
     See "Overview of E-mail Transmission Function", Fax.
     See "Basic Procedure for Sending Scan Files by E-mail", Scan.
    • You can send scan files directly to folders (Sending scan files by Scan to Folder).
     See "Overview of Folder Transmission Function", Fax.
     See "Basic Procedure When Using Scan to Folder", Scan.
    • You can use this machine as a delivery scanner for the ScanRouter delivery software *1
     (Network
    delivery scanner). You can save scan files in the delivery server or send them to a folder in a computer on the same network.
     See "Basic Procedure for Delivering Files", Scan.
    • You can use Web Services on Devices (WSD) to send scan files to a client computer.
     See "Basic Operating Procedure of WSD Scanner (Push Type)", Scan.
    *1 The ScanRouter delivery software is no longer available for sale.
    1. What You Can Do with This Machine
    24CJQ607               
    						
    							Embedding Text Information in Scanned Files
    You can extract text information from a scanned document and embed it in the file without using a
    computer.
    If you scan a document using this function, embedded text can be searched by using the text search
    function or copied to another document.
    • To use this function, the optional OCR unit is required.
    • You can select a file type from [PDF], [High Compression PDF], or [PDF/A].
    • This function can optically recognize characters in various languages and up to approximately 40,000 characters a page.
    • See "Embedding Text Information in Scanned Data", Scan.
    Embedding Text Information in Scanned Files
    25CUL003     
    						
    							Preventing Information Leakage (Security
    Functions)
    • You can protect documents from unauthorized access and stop them from being copied without permission.
    • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
    • By setting passwords, you can prevent unauthorized access via the network.
    • You can erase or encrypt the data on the hard disk to minimize the risk of information leakage.
    • You can limit the usage of functions for each user.
    • See Security Guide.
    1. What You Can Do with This Machine
    26CJQ608     
    						
    							Centrally Controlling Scan Conditions and
    Distribution
    You can use the distributed scan management (DSM) system in Windows Server 2008 R2 to manage
    the destinations and scan settings for each individual user in a group and to use the information when
    distributing scanned data.
    You can also use this system to centrally manage information about people using the network and the
    machine's scanner functions. Both delivered files and user information can be controlled.
    • You must set up and configure a Windows server to use the distributed scan management system. This system is supported under Windows Server 2008 R2.
    • For details about how to deliver files using the distributed scan management system, see "Managing Scan Conditions and Other Settings in the Block using Distributed Scan Management",
    Scan
    .
    Centrally Controlling Scan Conditions and Distribution
    27A
    A
    CUL004
    [email protected] dpi       [email protected]
    600 dpi     
    						
    							Monitoring and Setting the Machine Using a
    Computer
    Using Web Image Monitor, you can check the machine's status and change the settings.
    You can check which tray is running out of paper, register information in the Address Book, specify the
    network settings, configure and change the system settings, manage jobs, print the job history, and
    configure the authentication settings.
    • See "Using Web Image Monitor", Connecting the Machine/ System Settings.
    • See Web Image Monitor Help.
    1. What You Can Do with This Machine
    28CJQ609     
    						
    							Preventing Unauthorized CopyingYou can print embedded patterns on printouts to prevent unauthorized copying.
    • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages aregrayed out in the copy. This can minimize the risk of confidential information being copied.
    Protected fax messages are grayed out before being transmitted or stored. If a document protected
    by unauthorized copy guard is copied on a machine that is equipped with the Copy Data Security
    unit, the machine beeps to notify users that unauthorized copying is being attempted.
    If the document is copied on a machine without the Copy Data Security Unit, the hidden text
    becomes conspicuous in the copy, showing that the copy is unauthorized.
    • Using the copier function or the printer driver, you can embed text in the printed document for unauthorized copy prevention. If the document is copied, scanned, or stored in a Document Server
    by a copier or multifunction printer, the embedded text appears conspicuous in the copy,
    discouraging such unauthorized copying.
    • For details, see the printer driver Help and Security Guide.
    • For details about this function in the copier mode, see "Preventing Unauthorized Copies", Copier/ Document Server
    .
    • For details about this function in the printer mode, see "Printing Documents that Are Not Authorized for Duplication", Print
    .
    Preventing Unauthorized Copying
    29CUM003       
    						
    							1. What You Can Do with This Machine
    30  
    						
    All Ricoh manuals Comments (0)

    Related Manuals for Ricoh Mp C6502 User Guide