Oce cm5520 User manual

Océ
cm5520
Network Scanner
Operations
User’s Guide
Printing for
Professionals

Introduction
cm5520 x-1
Introduction
Thank you for choosing this machine.
This User’s Guide contains details on making network connections and on
the operations required to use the scanning functions of the cm5520, pre-
cautions on its use, and basic troubleshooting procedures. In order to ensure
that this machine is used correctly and efficiently, carefully read this User’s
Guide before using the machine.
In addition, for details on the operation of Web Connection, which can be
used to operate this machine over a network, refer to the User’s Guide [Web
Connection Operations].
Views of the actual equipment may be slightly different from the illustrations
used in this manual.
Energy Star®
As an ENERGY STAR®Partner, we have determined that this machine meets
the ENERGY STAR®Guidelines for energy efficiency.
What is an ENERGY STAR®product?
An ENERGY STAR®product has a special feature that allows it to automat-
ically switch to a “low-power mode” after a period of inactivity. An ENERGY
STAR®product uses energy more efficiently, saves you money on utility bills
and helps protect the environment.

Introduction
x-2 cm5520
Trademarks and registered trademarks
Netscape is a registered trademark of Netscape Communications Corpora-
tion in the United States and other countries.
This machine and Box Operator are based in part on the work of the Inde-
pendent JPEG Group.
Compact-VJE
Copyright 1986-2003 VACS Corp.
RC4®is a registered trademark or trademark of RSA Security Inc. in the Unit-
ed States and/or other countries.
RSA®is a registered trademark or trademark of RSA Security Inc. RSA
BSAFE®is a registered trademark or trademark of RSA Security Inc. in the
United States and/or other countries.
License information
This product includes RSA BSAFE Cryptographic software
from RSA Security Inc.
OpenSSL statement
OpenSSL license
Copyright ©1998-2000 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact openssl-

Introduction
cm5520 x-3
5. Products derived from this software may not be called “OpenSSL” nor
may “OpenSSL” appear in their names without prior written permission
of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following ac-
knowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit (http://www.openssl.org/)”
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND
ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIM-
ITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON-
SEQENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
son ([email protected]).
Original SSLeay license
Copyright ©1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@crypt-
soft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the fol-
lowing conditions are aheared to. The following conditions apply to all code
found in this distribution, be it the RC4, RSA, Ihash, DES, etc., code; not just
the SSL code.
The SSL documentation included with this distribution is covered by the
same copyright terms except that the holder is Tim Hudson (tjh@crypt-
soft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the
code are not to be removed. If this package is used in a product, Eric Young
should be given attribution as the author of the parts of the library used. This
can be in the form of a textual message at program startup or in documen-
tation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.

Introduction
x-4 cm5520
2. Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement:
“This product includes cryptographic software written by Eric Young
The word ‘cryptographic’ can be left out if the rouines from the library be-
ing used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledge-
ment:
“This product includes software written by Tin Hudson (tjh@crypt-
soft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AU-
THOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILI-
TY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or de-
rivative of this code cannot be changed. i.e. this code cannot simply be cop-
ied and put under another distribution licence [including the GNU Public
Licence.]

Introduction
cm5520 x-5
NetSNMP Licenses
Part 1: CMU/UCD copyright notice: (BSD like)
Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work -
1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California All
Rights Reserved
Permission to use, copy, modify and distribute this software and its docu-
mentation for any purpose and without fee is hereby granted, provided that
the above copyright notice appears in all copies and that both that copyright
notice and this permission notice appear in supporting documentation, and
that the name of CMU and The Regents of the University of California not be
used in advertising or publicity pertaining to distribution of the software with-
out specific written permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM
ALLWARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL
IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFOR-
NIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAM-
AGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS
OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Part 2: Networks Associates Technology, Inc copyright notice (BSD)
Copyright © 2001-2003, Networks Associates Technology, Inc
All rights reserved.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
-Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
-Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
-Neither the name of the Networks Associates Technology, Inc nor the
names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-
CLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,

Introduction
x-6 cm5520
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUP-
TION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETH-
ER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 3: Cambridge Broadband Ltd. copyright notice (BSD)
Portions of this code are copyright © 2001-2003, Cambridge Broadband Ltd.
All rights reserved.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
-Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
-Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
-The name of Cambridge Broadband Ltd. may not be used to endorse or
promote products derived from this software without specific prior writ-
ten permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.IN NO EVENT
SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDI-
RECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEO-
RY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
Part 4: Sun Microsystems, Inc. copyright notice (BSD)
Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
California 95054, U.S.A. All rights reserved.
Use is subject to license terms below.
This distribution may include materials developed by third parties.
Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or regis-
tered trademarks of Sun Microsystems, Inc. in the U.S. and other countries.

Introduction
cm5520 x-7
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
-Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
-Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
-Neither the name of the Sun Microsystems, Inc. nor the names of its con-
tributors may be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-
CLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUP-
TION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETH-
ER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 5: Sparta, Inc copyright notice (BSD)
Copyright © 2003-2004, Sparta, Inc All rights reserved.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
-Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
-Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
-Neither the name of Sparta, Inc nor the names of its contributors may be
used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-
CLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR

Introduction
x-8 cm5520
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUP-
TION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETH-
ER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 6: Cisco/BUPTNIC copyright notice (BSD)
Copyright © 2004, Cisco, Inc and Information Network Center of Beijing Uni-
versity of Posts and Telecommunications. All rights reserved.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
-Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
-Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
-Neither the name of Cisco, Inc, Beijing University of Posts and Telecom-
munications, nor the names of their contributors may be used to endorse
or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-
CLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUP-
TION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETH-
ER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
All other product names mentioned are trademarks or registered trademarks
of their respective companies

Introduction
cm5520 x-9
Contents
Introduction
Energy Star® ..................................................................................... x-1
What is an ENERGY STAR® product? ...........................................x-1
Trademarks and registered trademarks ......................................... x-2
Contents ............................................................................................ x-9
About this manual ........................................................................... x-15
Structure of the manual ................................................................x-15
Notation .........................................................................................x-15
Explanation of manual conventions .............................................. x-16
User’s guides .................................................................................. x-18
Printed manuals ............................................................................x-18
User’s Guide CD manuals .............................................................x-18
1 Before using scanning functions
1.1 Environment required for using scanning functions ..................... 1-2
1.2 Available scanning functions ........................................................... 1-3
Sending scan data in an e-mail message ...................................... 1-3
Sending scan data as files (FTP) .................................................... 1-4
Sending scan data to a computer on the network (SMB) .............. 1-5
Saving scan data in user boxes ..................................................... 1-6
Using the machine as a scanner .................................................... 1-7
1.3 Settings to be specified in advance ................................................ 1-8
Network Setting ............................................................................. 1-8
Registering and specifying destinations ........................................ 1-8
Specifying the e-mail address of the machine ............................... 1-9
Specifying scan and transmission settings .................................. 1-10
Fax/scan programs ...................................................................... 1-10
Specifying screen settings ........................................................... 1-10
1.4 Connecting to the network ............................................................ 1-11
Connecting the network ............................................................... 1-11
1.5 Setup and scanning operations .................................................... 1-12
2 Scanning
2.1 Control panel ..................................................................................... 2-2
2.2 Displaying the Fax/Scan mode screen ........................................... 2-5
2.3 Using Scan/Fax programs ............................................................... 2-7
Recalling a Scan/Fax program ....................................................... 2-7

Introduction
x-10 cm5520
Registering Scan/Fax programs ...................................................2-12
Editing and deleting Scan/Fax programs .....................................2-17
2.4 Sending data in an e-mail message (Scan to E-Mail) ..................2-20
Scan to E-Mail ..............................................................................2-20
Selecting a destination from the address book ............................2-20
Selecting a group destination .......................................................2-22
Entering addresses directly ..........................................................2-25
Selecting a destination that was searched for ..............................2-27
Selecting a destination with an Address Search ..........................2-30
2.5 Sending data to a computer on the network (Scan to SMB) .......2-33
Scan to SMB .................................................................................2-33
Scan to SMB operations with Windows File Sharing
(Mac OS X)/Samba (Linux/Unix) ...................................................2-33
Scan to SMB operations with Windows 98 SE and
Windows Me .................................................................................2-34
Selecting a destination from the address book ............................2-34
Entering addresses directly ..........................................................2-36
2.6 Sending data to a server (Scan to FTP) .........................................2-39
Scan to FTP ..................................................................................2-39
Selecting a destination from the address book ............................2-40
Entering addresses directly ..........................................................2-42
2.7 Specifying scan and transmission settings
(Scan Settings/Original Settings/Communication Settings) .......2-45
Settings that can be specified ......................................................2-45
Original Type .................................................................................2-47
Simplex/Duplex .............................................................................2-49
Resolution .....................................................................................2-50
File Type ........................................................................................2-51
Density ..........................................................................................2-54
Separate Scan ..............................................................................2-55
Color (Quality Adjustment) ............................................................2-56
Background Removal (Quality Adjustment) ..................................2-58
Sharpness (Quality Adjustment) ....................................................2-59
Frame Erase (Erase) ......................................................................2-61
Book Copy (Book Scan) ...............................................................2-63
Scan Size (Application) .................................................................2-65
Annotation (Application) ................................................................2-68
Date/Time (Application) .................................................................2-68
Page Number (Application) ...........................................................2-72
Stamp (Application) .......................................................................2-76
Header/Footer (Application) ..........................................................2-80
Send & Print (Application) .............................................................2-84
Document Name ...........................................................................2-87
Original Settings ............................................................................2-88

Introduction
cm5520 x-11
E-Mail Setting ............................................................................... 2-91
URL Notification Setting .............................................................. 2-93
E-Mail Encryption ......................................................................... 2-94
Digital Signature ........................................................................... 2-95
2.8 Checking the settings .................................................................... 2-96
Checking settings ........................................................................ 2-96
Deleting unnecessary destinations .............................................. 2-98
2.9 Checking the scan transmission log .......................................... 2-100
Displaying the current jobs ........................................................ 2-100
Displaying the Job History list .................................................... 2-101
Contents of job lists ................................................................... 2-103
3 Specifying Utility mode parameters
3.1 Settings that can be specified from Utility mode .......................... 3-2
Utility mode parameters ................................................................. 3-2
Other related parameters ............................................................... 3-3
Web Connection ............................................................................ 3-3
3.2 Displaying settings screens ............................................................. 3-4
Displaying the Create One-Touch Destination screen ................... 3-4
Displaying the User Settings screen .............................................. 3-6
Displaying the Administrator Settings screen ................................ 3-7
3.3 Registering an address book destination .................................... 3-10
E-Mail destination ........................................................................ 3-10
User Box ...................................................................................... 3-12
PC (SMB) ...................................................................................... 3-16
FTP ............................................................................................... 3-19
3.4 Registering a group destination .................................................... 3-24
3.5 Specifying e-mail settings ............................................................. 3-27
Subject ......................................................................................... 3-27
E-Mail Text ................................................................................... 3-28
3.6 Limiting Access to Destinations .................................................... 3-31
Limiting Access to Destinations ................................................... 3-31
Specifying limited access settings ............................................... 3-31
3.7 Customizing the Fax/Scan mode screen ..................................... 3-35
Default Tab ................................................................................... 3-35
Program Default ........................................................................... 3-36
Address Book Index Default ........................................................ 3-37
Shortcut Key ................................................................................ 3-38
Default Address Book .................................................................. 3-39
3.8 Scan/Fax Settings ........................................................................... 3-40
JPEG Compression Level ............................................................ 3-40

Introduction
x-12 cm5520
Black Compression Level .............................................................3-41
TWAIN Lock Time .........................................................................3-42
Default Scan/Fax Settings ............................................................3-44
Compact PDF Compression Level ...............................................3-45
3.9 Header/Footer Settings ..................................................................3-47
Registering headers/footers .........................................................3-47
Deleting headers/footers ..............................................................3-52
3.10 Printing registered destination lists ...............................................3-54
Address Book List .........................................................................3-54
Group List .....................................................................................3-56
Program List .................................................................................3-57
E-Mail Subject/Text List ................................................................3-59
3.11 Open API Settings ...........................................................................3-61
Access Setting ..............................................................................3-61
Port Number .................................................................................3-62
SSL ...............................................................................................3-65
Authentication ...............................................................................3-66
4 Network Settings
4.1 Available Network Settings parameters ..........................................4-2
4.2 Network settings with external server authentication ...................4-4
When SSL is installed .....................................................................4-5
Using Active Directory ....................................................................4-5
Using NTLM v1 and NTLM v2 .......................................................4-10
Using Novell NDS .........................................................................4-12
Using LDAP ...................................................................................4-14
4.3 TCP/IP Settings ...............................................................................4-17
Displaying the TCP/IP Settings screen .........................................4-18
IP Settings .....................................................................................4-19
DNS Host ......................................................................................4-20
DNS Domain .................................................................................4-22
DNS Server Settings .....................................................................4-23
RAW Port Number ........................................................................4-25
IP Filtering (Permit Access) ...........................................................4-27
IP Filtering (Deny Access) .............................................................4-28
IPv6 Settings .................................................................................4-30
IKE Settings (IPsec Settings) ........................................................4-32
IPsec SA Settings (IPsec Settings) ...............................................4-34
Peer (IPsec Settings) .....................................................................4-36
4.4 NetWare Settings .............................................................................4-39
IPX Settings ..................................................................................4-39
NetWare Print Settings .................................................................4-40

Introduction
cm5520 x-13
User Authentication Setting (NDS) ............................................... 4-44
4.5 http Server Settings ........................................................................ 4-46
Support Information ..................................................................... 4-49
Printer Information ....................................................................... 4-50
4.6 FTP Settings .................................................................................... 4-53
FTP TX Settings ........................................................................... 4-53
FTP Server Settings ..................................................................... 4-55
4.7 SMB Settings ................................................................................... 4-57
Client Settings .............................................................................. 4-57
Print Setting ................................................................................. 4-58
WINS Settings .............................................................................. 4-60
4.8 LDAP Settings ................................................................................. 4-62
Enabling LDAP ............................................................................. 4-62
Setting Up LDAP .......................................................................... 4-63
Default Search Settings ............................................................... 4-70
4.9 E-Mail TX (SMTP) ............................................................................ 4-72
SMTP Server Address .................................................................. 4-77
SMTP Authentication ................................................................... 4-78
4.10 E-Mail RX (POP) .............................................................................. 4-81
POP Server Address .................................................................... 4-85
4.11 S/MIME Communication Settings ................................................. 4-87
Before specifying settings to use S/MIME ................................... 4-87
Specifying S/MIME communication settings ............................... 4-88
4.12 SNMP Settings ................................................................................ 4-92
SNMP v1/v2c Settings ................................................................. 4-94
SNMP v3 Settings ........................................................................ 4-96
4.13 AppleTalk Settings ........................................................................ 4-102
4.14 Bonjour Settings ........................................................................... 4-103
4.15 TCP Socket Settings .................................................................... 4-104
TCP Socket ................................................................................ 4-104
TCP Socket (ASCII Mode) .......................................................... 4-106
4.16 Device Setting ............................................................................... 4-108
4.17 Time Adjustment Setting ............................................................. 4-110
NTP server address ................................................................... 4-111
4.18 Status Notification Setting ........................................................... 4-113
Specifying an IP address ........................................................... 4-113
Specifying an IPX address ......................................................... 4-116
Specifying an e-mail address ..................................................... 4-118
Notification Item ......................................................................... 4-120

Introduction
x-14 cm5520
4.19 Total Counter Notification Settings .............................................4-121
Notification Schedule Setting .....................................................4-122
Address Setting ..........................................................................4-124
4.20 PING Confirmation ........................................................................4-126
4.21 SLP Setting .....................................................................................4-128
4.22 LPD Setting ....................................................................................4-129
4.23 Prefix/Suffix Setting ......................................................................4-130
ON/OFF Setting ..........................................................................4-130
Prefix/Suffix Setting ....................................................................4-131
4.24 Action for Invalid Certificate .........................................................4-134
5 Scan function troubleshooting
5.1 Troubleshooting ................................................................................5-2
If an error message appears when connecting to the machine
from a computer .............................................................................5-2
If “MTP cannot be used.” or “FTP cannot be used.” appears ........5-2
If the HDD Ready indicator indicates an HDD malfunction ............5-2
5.2 Network error message list ..............................................................5-3
6 Appendix
6.1 Product specifications ......................................................................6-2
Scanning functions .........................................................................6-2
Network Functions ..........................................................................6-3
6.2 Entering text .......................................................................................6-4
Enlarging the keyboard ...................................................................6-6
To type text .....................................................................................6-7
List of Available Characters ............................................................6-7
6.3 Glossary ..............................................................................................6-8
7Index

Introduction
cm5520 x-15
About this manual
This User’s Guide covers the cm5520 network and scanning functions.
This section introduces the structure of the manual and notations used for
product names, etc.
This manual is intended for users who understand the basic operations of
computers and the machine. For operating procedures of the Windows or
Macintosh operating system and application programs, refer to the respec-
tive manuals.
Structure of the manual
This manual consists of the following chapters.
Chapter 1 Before using scanning functions
Chapter 2 Scanning
Chapter 3 Specifying Utility mode parameters
Chapter 4 Network Settings
Chapter 5 Scan function troubleshooting
Chapter 6 Appendix
Chapter 7 Index
Lists the product specifications and the characters that can be entered from
the control panel.
Notation
Product name Notation in the manual
cm5520 This machine, cm5520
Microsoft Windows NT 4.0 Windows NT 4.0
Microsoft Windows 2000 Windows 2000
Microsoft Windows XP Windows XP
When the operating systems above are written
together
Windows NT 4.0/2000/XP

Introduction
x-16 cm5520
Explanation of manual conventions

Introduction
cm5520 x-17

Introduction
x-18 cm5520
User’s guides
This machine is provided with printed manuals and PDF manuals on the Us-
er’s Guide CD.
Printed manuals
Quick Guide [Copy/Fax/Scan/Box Operations]
This manual contains operating procedures and descriptions of the most fre-
quently used functions, allowing the machine to immediately be used.
In addition, this manual contains notes and precautions that should be fol-
lowed for safe use of the machine.
Be sure to read this manual before using the machine.
User’s Guide [Enlarge Display Operations]
This manual contains details on operating procedures in Enlarge Display
mode.
Refer to this manual for details on using copy, network scanner and fax func-
tions in Enlarge Display mode.
Quick Guide [Print Operations]
This manual contains details of the printing functions that can be specified
with the standard built-in printer controller. Refer to this manual for basic op-
erating procedures for the printing functions.
User’s Guide CD manuals
User’s Guide [Copy Operations]
This manual contains descriptions of the Copy mode operations and ma-
chine maintenance. Refer to this manual for details on the paper and docu-
ments, copy procedures using convenient Application functions, replacing
consumables, and troubleshooting operations such as clearing paper mis-
feeds.
User’s Guide [Print Operations]
This manual contains details of the printing functions that can be specified
with the standard built-in printer controller. Refer to this manual for operating
procedures on using the printing functions.
User’s Guide [Box Operations]
This manual contains operating procedures for using the user boxes on the
hard disk. Refer to this manual for details on saving data in user boxes, re-
trieving data from user boxes and transferring data.

Introduction
cm5520 x-19
User’s Guide [Network Scanner Operations] (this manual)
This manual contains descriptions on specifying network settings for stand-
ard equipment and operating procedures for scanning functions. Refer to
this User’s Guide for details on using network functions and the Scan to E-
Mail, Scan to FTP and Scan to SMB operations.
User’s Guide [Web Connection Operations]
This manual contains descriptions on the machine settings that can be spec-
ified remotely with Web Connection from a Web browser on a computer. Re-
fer to this manual for details on operating procedures for using Web
Connection.
User’s Guide [Fax Operations]
This manual contains descriptions of the G3 fax operations. Refer to this
manual for details on using the G3 fax operations when the optional fax kit is
installed.
In order to use the fax functions, the optional fax kit must be purchased sep-
arately.
User’s Guide [Network Fax Operations]
This manual contains details on the network fax functions. Refer to this man-
ual for operating procedures on Internet faxing and IP address faxing.
Other manuals for cm5520
7
Table of contents
Other Oce All In One Printer manuals