Oce cm6520 User manual

Océ
cm6520
Box Operations
User’s Guide
Printing for
Professionals

cm6520 x-1
Introduction
Introduction
Thank you for choosing this machine.
This User’s Guide contains details on the operations required to use the User Box functions of the cm6520,
precautions on their use, and basic troubleshooting procedures. In order to ensure that this machine is used
correctly and efficiently, carefully read this User’s Guide before using the machine.
If software (such as Job Spooler, HDDTWAIN or Box Operator) other than that described in this User’s Guide
has been installed, data saved in a user box can be used from a computer on the network. Since the operation
differs for each software, refer to the manual for the corresponding software for details.
In addition, for details on the operation of Web Connection, which can be used to operate this machine over
a network, refer to the User’s Guide [Web Connection Operations].
Views of the actual equipment may be slightly different from the illustrations used in this manual.
Energy Star®
As an ENERGY STAR®Partner, we have determined that this machine meets the ENERGY STAR®Guidelines
for energy efficiency.
What is an ENERGY STAR® product?
An ENERGY STAR®product has a special feature that allows it to automatically switch to a "low-power
mode" after a period of inactivity. An ENERGY STAR®product uses energy more efficiently, saves you money
on utility bills and helps protect the environment.

Introduction
x-2 cm6520
Trademarks and registered trademarks
Netscape is a registered trade mark of Netscape Communications Corporation in the United States and other
countries.
This machine and Box Operator are based in part on the work of the Independent JPEG Group.
Compact-VJE
Copyright 1986-2003 VACS Corp.
RC4®is a registered trademark or trademark of RSA Security Inc. in the United States and/or other countries.
RSA®is a registered trademark or trademark of RSA Security Inc. RSA BSAFE®is a registered trademark or
trademark of RSA Security Inc. in the United States and/or other countries.
License information
This product includes RSA BSAFE Cryptographic software from RSA Security Inc.
OpenSSL statement
OpenSSL license
Copyright © 1998-2000 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote
products derived from this software without prior written permission. For written permission, please
contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their
names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL
PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@crypt-Soft.com). This product

cm6520 x-3
Introduction
Original SSLeay license
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared
to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, Ihash, DES, etc.,
code; not just the SSL code.
The SSL documentation included with this distribution is covered by the same copyright terms except that
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this
package is used in a product, Eric Young should be given attribution as the author of the parts of the library
used. This can be in the form of a textual message at program startup or in documentation (online or textual)
provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement:
The word ‘cryptographic’ can be left out if the rouines from the library being used are not cryptographic
related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application
code) you must include an acknowledgement:
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be
changed. i.e. this code cannot simply be copied and put under another distribution licence [including the
GNU Public Licence.]
NetSNMP License
Part 1: CMU/UCD copyright notice: (BSD like)
Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work - 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California All Rights Reserved
Permission to use, copy, modify and distribute this software and its documentation for any purpose and
without fee is hereby granted, provided that the above copyright notice appears in all copies and that both
that copyright notice and this permission notice appear in supporting documentation, and that the name of
CMU and The Regents of the University of California not be used in advertising or publicity pertaining to
distribution of the software without specific written permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALLWARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIEDWARRANTIES OF MERCHANTABILITY AND
FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE
FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Part 2: Networks Associates Technology, Inc copyright notice (BSD)
Copyright © 2001-2003, Networks Associates Technology, Inc
All rights reserved.

Introduction
x-4 cm6520
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
-Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
-Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
-Neither the name of the Networks Associates Technology, Inc nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 3: Cambridge Broadband Ltd. copyright notice (BSD)
Portions of this code are copyright © 2001-2003, Cambridge Broadband Ltd.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
-Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
-Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
-The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 4: Sun Microsystems, Inc. copyright notice (BSD)
Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All
rights reserved.
Use is subject to license terms below.
This distribution may include materials developed by third parties.
Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of Sun
Microsystems, Inc. in the U.S. and other countries.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
-Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
-Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
-Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written permission.

cm6520 x-5
Introduction
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 5: Sparta, Inc copyright notice (BSD)
Copyright © 2003-2004, Sparta, Inc All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
-Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
-Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
-Neither the name of Sparta, Inc nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 6: Cisco/BUPTNIC copyright notice (BSD)
Copyright © 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and
Telecommunications. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
-Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
-Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
-Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor the names of
their contributors may be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
All other product names mentioned are trademarks or registered trademarks of their respective companies

Introduction
x-6 cm6520
Contents
Introduction
Energy Star® ..........................................................................................................................................................x-1
What is an ENERGY STAR® product? ................................................................................................... x-1
Trademarks and registered trademarks ..............................................................................................................x-2
OpenSSL statement ................................................................................................................................ x-2
NetSNMP License ................................................................................................................................... x-3
Contents..................................................................................................................................................................x-6
About this manual ................................................................................................................................................x-10
Structure of the manual ......................................................................................................................... x-10
Notation ................................................................................................................................................. x-10
Explanation of manual conventions ...................................................................................................................x-11
User’s Guides .......................................................................................................................................................x-13
Printed manuals .................................................................................................................................... x-13
User’s Guide CD manuals ..................................................................................................................... x-13
1 Overview of the User Box functions
1.1 User Box functions.................................................................................................................................1-2
User boxes that can be registered ...........................................................................................................1-2
System user boxes...................................................................................................................................1-2
1.2 Available User Box functions ................................................................................................................1-4
Saving documents....................................................................................................................................1-4
Using documents .....................................................................................................................................1-4
Organizing documents .............................................................................................................................1-4
1.3 Specifying settings for using the User Box functions.........................................................................1-5
Registering and specifying settings for user boxes .................................................................................1-5
2 Saving documents
2.1 Information on saving documents ........................................................................................................2-2
User authentication ..................................................................................................................................2-2
Registering user boxes.............................................................................................................................2-3
Naming documents ..................................................................................................................................2-3
2.2 Authentication and user boxes that can be accessed........................................................................2-5
When user authentication and account track settings are not specified .................................................2-5
When only user authentication settings are specified..............................................................................2-5
When only account track settings are specified ......................................................................................2-6
When user authentication and account track settings are specified, but not synchronized ...................2-6
When user authentication and account track settings are specified and synchronized..........................2-7
2.3 Saving copies in user boxes..................................................................................................................2-9
Settings that can be saved and changed.................................................................................................2-9
Saving copy documents...........................................................................................................................2-9
2.4 Saving scans in user boxes .................................................................................................................2-12
Using a user box destination..................................................................................................................2-12
Entering destinations directly .................................................................................................................2-13
Saving in User Box mode.......................................................................................................................2-15
2.5 Saving printouts in user boxes............................................................................................................2-18
Saving data in a user box.......................................................................................................................2-18
Saving data in the Secure Print User Box..............................................................................................2-20
Saving data in the Encrypted PDF User Box .........................................................................................2-21
2.6 Specifying scan settings......................................................................................................................2-23
Settings that can be specified................................................................................................................2-23
Original Type ..........................................................................................................................................2-24
Simplex/Duplex ......................................................................................................................................2-25
Resolution ..............................................................................................................................................2-26
File Type .................................................................................................................................................2-27
Density....................................................................................................................................................2-29
Separate Scan........................................................................................................................................2-30

cm6520 x-7
Introduction
Color (Quality Adjustment) ..................................................................................................................... 2-30
Background Adjustment (Quality Adjustment)....................................................................................... 2-31
Sharpness (Quality Adjustment)............................................................................................................. 2-33
Quality Adjustment (Erase)..................................................................................................................... 2-34
Book Copy (Book Scan)......................................................................................................................... 2-35
Scan Size (Application) .......................................................................................................................... 2-37
Original Settings..................................................................................................................................... 2-39
2.7 Checking user box logs....................................................................................................................... 2-42
Displaying the current jobs list............................................................................................................... 2-42
Displaying the Job History list ............................................................................................................... 2-43
Contents of job lists ............................................................................................................................... 2-44
3 Organizing user box documents
3.1 Overview of document organizing ....................................................................................................... 3-2
Available operations in the File Document screen................................................................................... 3-2
Checking documents saved in user boxes.............................................................................................. 3-2
Description of File Document screen....................................................................................................... 3-4
Searching for a user box name................................................................................................................ 3-5
3.2 Deleting a document.............................................................................................................................. 3-7
3.3 Changing the document name ............................................................................................................. 3-8
3.4 Moving a document ............................................................................................................................. 3-10
3.5 Duplicating a document ...................................................................................................................... 3-12
3.6 Checking document details ................................................................................................................ 3-14
Check the details ................................................................................................................................... 3-14
Preview screen operations..................................................................................................................... 3-15
4 Printing a user box document
4.1 Overview of document printing ............................................................................................................ 4-2
Available operations in the Use Document screen .................................................................................. 4-2
Checking documents saved in user boxes.............................................................................................. 4-2
Description of Use Document screen...................................................................................................... 4-4
Searching for a user box name................................................................................................................ 4-4
4.2 Printing.................................................................................................................................................... 4-5
Available print settings............................................................................................................................. 4-5
To print a document................................................................................................................................. 4-5
Changing the number of copies............................................................................................................... 4-6
Specifying single-sided/double-sided printing ........................................................................................ 4-6
Specifying Finishing settings ................................................................................................................... 4-7
Adding a binding margin........................................................................................................................ 4-10
Adding cover pages (Cover Sheet) ........................................................................................................ 4-12
Adding insertions (Insert Sheet) ............................................................................................................. 4-14
Inserting chapter title pages (Chapters)................................................................................................. 4-17
Printing the date/time (Date/Time) ......................................................................................................... 4-19
Printing page numbers (Page Number).................................................................................................. 4-21
Adding preset text or images (Stamp) ................................................................................................... 4-25
Adding text and images to prevent copying (Copy Protect).................................................................. 4-27
Adding repeated preset text or images (Stamp Repeat) ....................................................................... 4-36
Inserting a header/footer (Header/Footer) ............................................................................................. 4-42
4.3 Combined printing ............................................................................................................................... 4-47
Available combined printing parameters ............................................................................................... 4-47
To print a document............................................................................................................................... 4-47
5 Sending a user box document
5.1 Overview of document transmissions ................................................................................................. 5-2
Available document transmission operations .......................................................................................... 5-2
Transmission methods............................................................................................................................. 5-2
Checking documents saved in user boxes.............................................................................................. 5-2
Description of Use Document screen...................................................................................................... 5-4
Searching for a user box name................................................................................................................ 5-4

Introduction
x-8 cm6520
To send a document ................................................................................................................................5-5
5.2 Specifying the destination .....................................................................................................................5-7
Selecting from the address book .............................................................................................................5-7
Selecting from a group destination ..........................................................................................................5-8
Searching for a destination ......................................................................................................................5-9
Directly specifying an e-mail destination ...............................................................................................5-11
Directly specifying an SMB destination .................................................................................................5-12
Directly specifying an FTP destination...................................................................................................5-13
Selecting a destination with an Address search ....................................................................................5-15
5.3 Specifying the transmission settings .................................................................................................5-17
Settings that can be specified................................................................................................................5-17
File Type .................................................................................................................................................5-17
E-Mail Settings (Communication Settings).............................................................................................5-20
URL Notification Setting (Communication Settings) ..............................................................................5-21
E-Mail Encryption ...................................................................................................................................5-21
Digital Signature .....................................................................................................................................5-22
Date/Time (Application) ..........................................................................................................................5-23
Page Number (Application) ....................................................................................................................5-26
Stamp (Application) ................................................................................................................................5-29
Inserting a header/footer (Header/Footer)..............................................................................................5-32
Send & Print (Application) ......................................................................................................................5-35
5.4 Bind TX ..................................................................................................................................................5-38
Available combined sending parameters ............................................................................................... 5-38
To perform a combined transmission ....................................................................................................5-38
5.5 Checking settings before sending......................................................................................................5-41
Deleting unnecessary destinations ........................................................................................................5-42
6 Printing/sending a system user box document
6.1 Overview of system user boxes ............................................................................................................6-2
6.2 Secure Print User Box............................................................................................................................6-3
Available printing parameters...................................................................................................................6-3
To print a document (Mode 1)..................................................................................................................6-3
To print a document (Mode 2)..................................................................................................................6-5
6.3 Annotation User Box ..............................................................................................................................6-8
Available printing parameters...................................................................................................................6-8
To print a document.................................................................................................................................6-8
Available transmission parameters ........................................................................................................6-10
To send a document ..............................................................................................................................6-12
Changing the text...................................................................................................................................6-13
6.4 Encrypted PDF User Box .....................................................................................................................6-16
Printing ...................................................................................................................................................6-16
Deleting ..................................................................................................................................................6-18
7 Specifying Utility mode parameters
7.1 Settings that can be specified from Utility mode................................................................................7-2
Utility mode parameters ...........................................................................................................................7-2
Web Connection.......................................................................................................................................7-2
7.2 User box permissions ............................................................................................................................7-3
Types of users..........................................................................................................................................7-3
Public user boxes and personal/group user boxes.................................................................................. 7-3
7.3 Displaying settings screens ..................................................................................................................7-4
Displaying the Administrator Settings screen ..........................................................................................7-4
7.4 Registering user boxes..........................................................................................................................7-6
Registering user boxes.............................................................................................................................7-6
Registering annotation user boxes...........................................................................................................7-9
7.5 Maximum Number of User Boxes.......................................................................................................7-15
7.6 User Box Settings.................................................................................................................................7-17
Displaying the User Box Settings screen...............................................................................................7-17
Delete Unused User Box........................................................................................................................7-18
Delete Secure Print Documents .............................................................................................................7-19

cm6520 x-9
Introduction
Auto Delete Secure Document .............................................................................................................. 7-20
Encrypted PDF Delete Time................................................................................................................... 7-21
Document Hold Setting.......................................................................................................................... 7-22
7.7 User Box Administrator Setting.......................................................................................................... 7-23
7.8 HDD Setting .......................................................................................................................................... 7-26
Check HDD Capacity............................................................................................................................. 7-26
Overwrite Temporary Data..................................................................................................................... 7-27
Overwrite All Data .................................................................................................................................. 7-29
HDD Lock Password.............................................................................................................................. 7-31
HDD Encryption Setting......................................................................................................................... 7-32
Format HDD ........................................................................................................................................... 7-34
8 Appendix
8.1 Error message list.................................................................................................................................. 8-2
8.2 Entering text ........................................................................................................................................... 8-3
Enlarging the keyboard ............................................................................................................................ 8-4
To type text.............................................................................................................................................. 8-4
List of Available Characters ..................................................................................................................... 8-5
8.3 Glossary .................................................................................................................................................. 8-6
9Index
9.1 Index........................................................................................................................................................ 9-2

Introduction
x-10 cm6520
About this manual
This User’s Guide covers the cm6520 box functions.
This section introduces the structure of the manual and notations used for product names, etc.
This manual is intended for users who understand the basic operations of computers and the machine. For
the operating procedures of Windows or Macintosh operating system and application programs, refer to the
respective manuals.
In addition, software, such as HDDTWAIN and Box Operator, which are used with the Box functions of this
machine, are also available. Users of these software should refer to the corresponding manuals on the CD-
ROM.
Structure of the manual
This manual consists of the following chapters.
Chapter 1 Overview of the User Box functions
Chapter 2 Saving documents
Chapter 3 Organizing user box documents
Chapter 4 Printing a user box document
Chapter 5 Sending a user box document
Chapter 6 Printing/sending a system user box document
Chapter 7 Specifying Utility mode parameters
Chapter 8 Appendix
Chapter 9 Index
Notation
Product name Notation in the manual
cm6520 This machine, cm6520
Microsoft Windows NT 4.0 Windows NT 4.0
Microsoft Windows 2000 Windows 2000
Microsoft Windows XP Windows XP
When the operating systems above are written together Windows NT 4.0/2000/XP

cm6520 x-11
Introduction
Explanation of manual conventions

Introduction
x-12 cm6520

cm6520 x-13
Introduction
User’s Guides
The User’s Guides for this machine include the Safety Information and Getting Started booklet and the User’s
Guide CD.
Introduction to the User’s Guide CD
The User’s Guide CD is included with this machine. In the initial screen, select the User’s Guide to be viewed,
and then check the details for the various functions.
Quick Guide [Copy/Print/Fax/Scan/Box Operations]
This manual contains operating procedures and descriptions of the most frequently used functions, allowing
the machine to immediately be used.
In addition, this manual contains notes and precautions that should be followed for safe use of the machine.
Be sure to read this manual before using the machine.
User’s Guide [Enlarge Display Operations]
This manual contains details on operating procedures in Enlarge Display mode.
Refer to this manual for details on using copy, network scanner and fax functions in Enlarge Display mode.
User’s Guide [Copy Operations]
This manual contains descriptions of the Copy mode operations and machine maintenance. Refer to this
manual for details on the paper and documents, copy procedures using convenient Application functions,
replacing consumables, and troubleshooting operations such as clearing paper misfeeds.
User’s Guide [Print Operations]
This manual contains details of the printing functions that can be specified with the standard built-in printer
controller. Refer to this manual for operating procedures on using the printing functions.
User’s Guide [Box Operations] (this manual)
This manual contains operating procedures for using the user boxes on the hard disk. Refer to this manual
for details on saving data in user boxes, retrieving data from user boxes and transferring data.
User’s Guide [Network Scanner Operations]
This manual contains descriptions on specifying network settings for standard equipment and operating
procedures for scanning functions. Refer to this User’s Guide for details on using network functions and the
Scan to E-Mail, Scan to FTP and Scan to SMB operations.
User’s Guide [Web Connection Operations]
This manual contains descriptions on the machine settings that can be specified remotely with Web
Connection from a Web browser on a computer. Refer to this manual for details on operating procedures for
using Web Connection.
User’s Guide [Fax Operations]
This manual contains descriptions of the G3 fax operations. Refer to this manual for details on using the G3
fax operations when the optional fax kit is installed.
In order to use the fax functions, the optional fax kit must be purchased separately.
User’s Guide [Network Fax Operations]
This manual contains details on the network fax functions. Refer to this manual for operating procedures on
Internet faxing and IP address faxing.
User's Guide [FAX Driver Operations]
This manual contains details of the fax driver functions that can be used to send a fax directly from a
computer. Refer to this manual for operating procedures on using the PC-FAX functions.
In order to use the fax functions, the optional fax kit must be purchased separately.

Introduction
x-14 cm6520

1
Overview of the User Box functions Chapter 1
Overview of the User Box
functions

1Overview of the User Box functions
1-2 cm6520
1 Overview of the User Box functions
1.1 User Box functions
The User Box functions allow document data to be saved on the machine’s internal hard disk and later
printed. Documents that can be saved are data scanned for copying and saved scan data. To save data to a
box, create the box, and then save the data to the specified box.
The saved data can be printed, sent by e-mail, forwarded to an FTP site, or sent to a computer. By using the
User Box functions, documents can easily be scanned repeatedly and the separate data can be saved on a
computer.
User boxes that can be registered
Users can create and delete user boxes. There are three types of user boxes, depending on the
authentication settings.
!
Detail
For details on the user boxes that can be accessed when authentication settings have been specified,
refer to "Authentication and user boxes that can be accessed" on page 2-5.
System user boxes
These are boxes that were already set up when the machine was purchased. There are six types of system
user boxes. For details on using the system user boxes, refer to the corresponding User’s Guide.
Type Description
Public user boxes This box can be used by all users. Access to the box can be managed by specifying a
password for the box.
Personal user boxes This box can be used by certain individuals. If user authentication settings have been
applied, the box can only be accessed by users that have logged on.
Group user boxes This box can be used by certain account members when account track settings have
been applied. The box can be accessed by users who belong to the account and have
logged on.
User box name Description
Bulletin Board User Box This user box appears when optional fax kit CM3500210 is installed. Documents can
be saved in this box, which can be used like a bulletin board. Up to 10 additional boxes
can be created within the bulletin board user box. For details, refer to the User’s Guide
[Fax Operations].
Polling TX User Box This user box appears when optional fax kit CM3500210 is installed. Data can be reg-
istered in this box for polling transmissions. For details, refer to the User’s Guide [Fax
Operations].
Secure Print User Box Confidential documents are saved in this user box. A password must be entered in or-
der to access the document. Up to 200 documents can be saved. For details, refer to
the User’s Guide [Print Operations].
Memory RX User Box This user box appears when optional fax kit CM3500210 is installed. If "Memory RX
Setting" is set to "ON", received fax documents can be saved in this box. When a fax
that you do not wish to print out is received, it can be saved and printed when desired.
For details, refer to the User’s Guide [Fax Operations].
Annotation User Box Document data saved in Scan mode can be printed or transmitted with an image of
the date/time or an annotation number.
Fax Retransmit User Box This user box appears when optional fax kit CM3500210 is installed. A document that,
even after redialing, could not be sent because the recipient’s line is busy is temporar-
ily saved in this box. The saved document can later be sent to the same recipient.
For details, refer to the User’s Guide [Fax Operations].
Encrypted PDF User Box PDF files saved with a password specified in Web Connection or Direct Print are saved
in this user box. The password must be entered on this machine in order to print the
file.

cm6520 1-3
Overview of the User Box functions 1
Overview of the User Box functions Chapter 1
2
Note
With this machine, 1,000 boxes can be created. The boxes can be given any number between 1 and
999,999,999.
Touch & Print User Box This user box appears when optional authentication unit (biometric type) AU-101 or
authentication unit (IC card type) AU-201 is installed. A document can be printed after
the user has logged on using authentication unit. For details, refer to the manual pro-
vided with the authentication unit.
User box name Description

1Overview of the User Box functions
1-4 cm6520
1.2 Available User Box functions
Saving documents
Document data (copies, scans and printouts) created using this machine can all be saved in boxes. For
details on each function, refer to the pages and User’s Guides indicated below.
Using documents
Documents saved in user boxes can be printed, sent by e-mail or sent as a fax. Single documents can be
printed or transmitted separately, or multiple documents can be selected and bound together.
!
Detail
Finishing, binding margins or cover sheet settings can be specified when printing a document.
Stamp and simultaneous printing settings can be specified when transmitting a document.
Organizing documents
Documents can be organized by renaming the saved document name, changing the box where they are
saved, or duplicating or deleting them.
Saving method Page reference
Saving data in a user box while copying at the same time "Saving copies in user boxes" on page 2-9
Saving data in a user box while scanning at the same time "Saving scans in user boxes" on page 2-12
Saving in User Box mode "Saving in User Box mode" on page 2-15
Saving data in a user box while printing it "Saving printouts in user boxes" on page 2-18
Operation Page reference
Printing a document from a user box "Printing a user box document" on page 4-2
Printing a system user box document "Printing/sending a system user box document" on
page 6-2
Sending a user box document "Sending a user box document" on page 5-2
Sending a system user box document "Printing/sending a system user box document" on
page 6-2
Operation Page reference
Deleting an unnecessary document "Deleting a document" on page 3-7
Renaming a saved document "Changing the document name" on page 3-8
Changing the box of a saved document "Moving a document" on page 3-10
Copying a saved document to a different user box "Duplicating a document" on page 3-12

cm6520 1-5
Overview of the User Box functions 1
Overview of the User Box functions Chapter 1
1.3 Specifying settings for using the User Box functions
Before using the User Box functions, the following settings should be specified.
Registering and specifying settings for user boxes
Register the user boxes where data will be saved.
Boxes can be set up by using the machine’s touch panel or by using Web Connection from a Web browser
on a computer on the network.
!
Detail
For details on registering and specifying settings for destinations, refer to the sections listed below.
"Registering user boxes" on page 7-6
For details on using Web Connection, refer to the User’s Guide [Web Connection Operations].
Other manuals for cm6520
5
Table of contents
Other Oce All In One Printer manuals