Remote Ui Guide
Remote Ui Guide
• Copying Instructions
Copying Guide CD-ROM
To view the manual in PDF format, Adobe Reader/Adobe Acrobat Reader is required. If Adobe Reader/Adobe Acrobat Reader is not installed on your
system, please download it from the Adobe Systems Incorporated website.
How This Manual Is Organized
Chapter 1 Introduction to the Remote UI
Chapter 5 Appendix
Considerable effort has been made to ensure that this manual is free of inaccuracies and omissions. However, as we are constantly improving our
products, if you need an exact specification, please contact Canon.
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
How to Use This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Symbols Used in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Keys and Buttons Used in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Displays Used in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Abbreviations Used in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Legal Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Disclaimers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
iv
Managing Key Pairs and Digital Certificates from a Web Browser . . . . . . . . 2-24
Installing and Registering a Key and Certificate . . . . . . . . . . . . . . . . . . . . . . 2-25
Deleting a Key and Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
Installing and Registering a CA Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . 2-31
Deleting a CA Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-34
Chapter 5 Appendix
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
v
Preface
Thank you for purchasing the Canon imageRUNNER 2545i/2545/2535i/2535/2530/2525i/
2525/2520i/2520. Please read this manual thoroughly before operating the machine to
familiarize yourself with its capabilities, and to make the most of its many functions. After
reading this manual, store it in a safe place for future reference.
Keys Example
Control Panel Key icon + (Key Name) (Additional Functions)
[Key Name] [OK], [Cancel], etc.
Touch Panel Display
[Key Icon] [ ], [ ], etc.
vi
Displays Used in This Manual
Unless otherwise noted, the screen shots used in this manual are taken from the
imageRUNNER 2535i with the following options: Inner Finisher-B1, Inner Finisher
Additional Tray-B1, CST. Feeding Unit-AE1, Super G3 Fax Board-AG1, PCL Printer
Kit-AF1, and PS Printer Kit-AF1.
Functions that are unavailable due to a particular combination of accessories and
optional equipment are not displayed in the web browser. Therefore, the screen
shots of the Remote UI used in this manual may differ from the ones you actually
see on your web browser, depending on the model or options you have installed or
activated.
The IP addresses shown in the screen shots and text in this manual are for
illustrative purposes only.
The buttons and other objects that are related to operations during the procedure
are marked with a , as shown in the example below.
vii
Abbreviations Used in This Manual
In this manual, product names are abbreviated as follows:
Trademarks
Macintosh and Mac OS are trademarks of Apple Inc., registered in the U.S. and
other countries.
Microsoft, Windows, Windows Vista, and Internet Explorer are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or
other countries.
Other product and company names herein may be the trademarks of their
respective owners.
viii
Legal Notices
Copyright
Copyright 2013 by Canon Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying and recording, or by any
information storage or retrieval system without the prior written permission of
Canon Inc.
Disclaimers
The information in this document is subject to change without notice.
CANON INC. MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, EITHER EXPRESS OR IMPLIED, EXCEPT AS PROVIDED HEREIN,
INCLUDING WITHOUT LIMITATION, THEREOF, WARRANTIES AS TO
MARKETABILITY, MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE OR USE OR NON-INFRINGEMENT. CANON INC. SHALL NOT BE
LIABLE FOR ANY DIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF
ANY NATURE, OR LOSSES OR EXPENSES RESULTING FROM THE USE OF
THIS MATERIAL.
ix
x
Introduction to the Remote UI 1
CHAPTER
This chapter describes the functionality of the Remote UI and how to start it.
1-1
Overview of the Remote UI
The Remote UI (Remote User Interface) software comes preinstalled in the
1 machine and enables you to access the machine’s functions by using a web
browser. For example, the Remote UI enables you to check the job status, delete
Introduction to the Remote UI
jobs, and edit various settings. To use the Remote UI, all you need is a web browser
and a network connection between your computer and the machine.
First set the IP (Internet Protocol) address for the machine from the machine’s
control panel and set up the necessary network connection. Then start your web
browser and enter the IP address of the machine. The Remote UI top page is
displayed on your computer screen and is ready for you to log in.
Computer
You can operate the machine both with the control panel and from the Remote UI.
NOTE
For the End Users to delete their own jobs, the Permit End-user’s Job Operation
setting must be enabled. (See “To specify the System Manager ID and System
Password:,” on p. 4-9.)
[ENTER] key on your computer keyboard, the Remote UI top page is displayed.
NOTE
• The appearance of the Remote UI top page depends on the management mode
applied to the machine. For more information, see “Enabling Department ID
Management and User Management,” on p. 3-2.
• For instructions on how to log in to the Remote UI, see “Starting the Remote UI,” on
p. 1-9.
■ End-User Mode
You can access all Remote UI functions except those restricted to the System
Manager. Major functions open to End Users and the System Manager are:
• Checking the machine status such as paper or toner amount
• Checking the job status and deleting their own jobs
NOTE
For the End Users to delete their own jobs, the Permit End-user’s Job Operation
setting must be enabled. (See “To specify the System Manager ID and System
Password:,” on p. 4-9.)
NOTE
The Address Book can be protected by setting a password in the Restrict Send
Function page. (See “To specify the Restrict the Send Function settings:,” on p. 4-8.)
1
Introduction to the Remote UI
Click to display the status of the jobs and the logs of the jobs
processed by the machine.
Click to update or refresh the current page with the latest information.
■ Macintosh
• OS (Operating System)
- Mac OS X 10.3 or later, except Classic Environment
• Web Browser
- Safari 2.0.3 or later
- Safari 1.3.2 on Mac OS X 10.3.x is also supported.
NOTE
Other than the software listed above, no other software, such as a web server, is
necessary. (There is already a web server inside the machine.)
• Specify or check the Network Settings to obtain or find out the IP address of the
machine.
• Confirm that the Use HTTP setting is set to ‘On’.
NOTE
• You can find the Network Settings including the Use HTTP setting by pressing
(Additional Functions) ➞ [System Settings].
• If you cannot find out the IP address of the machine, consult your network
administrator or see the System Settings Guide.
IMPORTANT
• Connection via a proxy server is not possible. If your system environment has a proxy
server, specify the IP address of the machine as an proxy exception on your web
browser. (Set your web browser not to access the IP address of the machine through a
proxy server.) Setting procedures vary depending on the system environment. Consult
your network administrator.
• Enable all cookies and use Java Script on your web browser. Otherwise, you will not
be able to change the machine’s settings using the Remote UI.
• If multiple Remote UIs are running simultaneously, the latest setting is enabled.
NOTE
You can find the Remote UI On/Off setting and Device Info Settings by pressing
(Additional Functions) ➞ [System Settings]. For more information on the Remote
UI On/Off setting, see Chapter 6, “Protecting the Machine from Unauthorized Access,”
in the System Settings Guide. For more information on the Device Info Settings, see
Chapter 7, “Other System Settings,” in the System Settings Guide.
IMPORTANT
If the machine’s SSL communication is enabled, a security alert may be displayed
regarding the security certificate. In this case, check that the correct URL is entered,
and then proceed to display the Remote UI top page. For more information on the SSL
communication, see Chapter 3, “Setting up the Machine for Your Network
Environment,” in the System Settings Guide.
NOTE
You can change the language displayed on the Remote UI top page by clicking the
[Language] drop-down list box and selecting the desired language, regardless of the
language used on the touch panel display of the machine.
user name.
• To log in to the Remote UI in the System Manager Mode, select the option button
for [System Manager Mode] ➞ enter the System Manager ID and System
Password.
IMPORTANT
The System Manager ID and System Password are both set to ‘7654321’ at
purchase. Change them before using the machine. (See “To specify the System
Manager ID and System Password:,” on p. 4-9.)
• To log in to the Remote UI in the End-User Mode, select the option button for
[End-User Mode] ➞ enter the user name or leave the [User Name] text box blank.
(See the note below.)
NOTE
If you are logging in to the Remote UI in the End-User Mode and want to delete
your own print job, enter your user name with which you sent the print job (it is
usually the user name for your computer). Otherwise, click [OK] to log in to the
Remote UI with the [User Name] text box left blank. (See the note on p. 1-5.)
1
Introduction to the Remote UI
NOTE
The same Remote UI top page as shown in “When User Management is
enabled:,” on p. 1-13 appears.
❑ Enter the User ID and password.
You can log in as the System Manager by entering the User ID registered as the
System Manager in the [User ID] text box and its password in the [Password] text
box.
4 Click [OK].
The Device Status page appears. (See “Viewing the Machine Status and Information,” on
p. 1-14.)
This chapter describes how to manage jobs, import/export data, and install key pairs and
digital certificates by using the Remote UI.
2-1
Managing Jobs
You can manage the print jobs and view the logs of the jobs processed by the
machine. The [Job Status] menu has the following sections:
• Print Job
2 - Status
Managing Jobs and Machine Data
- Log
• Send/Receive Fax Job
- Log
• Send/Store/Receive Job
- Log
NOTE
End Users can delete their own print jobs, when the Permit End-user’s Job Operation
setting is enabled. (See “To specify the System Manager ID and System Password:,”
on p. 4-9.)
2 To delete a print job, click [ ] (Select) next to the job you want to
delete ➞ [ ] (Delete).
2 IMPORTANT
The Job Logs are displayed only when the Job Log Display setting in the Edit System
Settings page is enabled. (See “Customizing the System Settings,” on p. 4-2.)
Managing Jobs and Machine Data
1 Click [Job Status] ➞ [Log] you want to view in the [Job Status]
menu.
The screen shot above shows the screen displayed when you select the [Log] of the
<Print Job>.
The Print Job page shows a list of the jobs that have already been processed by the
machine.
■ E-mail Address 2
You can manage e-mail addresses.
■ Fax Number
You can manage fax numbers.
■ Group Address
You can manage group addresses, which enable you to include multiple
addresses in a single group.
NOTE
For instructions on how to manage the Address Book on the machine’s control panel,
see Chapter 4, “Specifying Destinations Easily and Quickly,” in the Sending and
Facsimile Guide.
NOTE
The screen shots and procedures in this section are for the Address Book. The
Address Book and One-touch Speed Dial use a similar procedure for editing
destinations.
2
1 Click [Address] ➞ [One-touch Speed Dial] or [Address Book] from
Managing Jobs and Machine Data
If the address book is protected by a password, the Enter password page appears.
Enter the password ➞ click [OK].
The Address Book page is displayed.
NOTE
You can select the address numbers to display from the [Select Range] drop-down list
box.
The new address is registered in the machine, and the page returns to the Address
Book page.
NOTE
For more information on the address types, see Chapter 4, “Specifying
Destinations Easily and Quickly,” in the Sending and Facsimile Guide.
❑ Make sure that the addresses you want to add to the group are displayed in the
Members List field ➞ click [OK].
The new group address is registered and the page returns to the Address Book
page.
the machine’s main power OFF until the operation is complete. Otherwise, the
machine may malfunction.
• During an exporting operation, the page does not change until the operation is
complete. Do not click [Start Export] while the computer indicates that the operation is
still being processed.
• The Import/Export function is available only when the Remote UI is in the System
Manager Mode.
• The importing/exporting operation is performed based on the language displayed on
the touch panel display of the machine. For example, if the language displayed on the
touch panel display and the language of the Address Book data to import do not
match, the importing operation cannot be properly performed.
2
Managing Jobs and Machine Data
IMPORTANT
• When you load (import) the Address Book data, the addresses registered in the
machine are overwritten by the new data.
• The machine imports/exports the Address Book data based on the index numbers
displayed on the address list on the Address Book page on the Remote UI. An
address entry is overwritten if the imported Address Book data contains an address
entry with the same index number.
• Do not load the Address Book when the machine has Delayed Send jobs.
• If the machine is in the Sleep mode, press the machine’s control panel power switch to
clear the Sleep mode before performing an Import operation.
3 Click [Import].
For help, see the screen shot in step 3 in “Exporting Address Book Data,” on p. 2-11.
The Import Address Book page is displayed.
2
The Remote UI starts importing the data and when it is complete, the page returns to
the Import/Export Address Book page.
IMPORTANT
Do not import any files while the machine is processing other jobs.
IMPORTANT
All the User IDs are exported as ‘User’ (End User).
2
Managing Jobs and Machine Data
IMPORTANT
• Be sure to disable the Department ID Management and User Management before
importing the User Management data. (See “Enabling Department ID Management
and User Management,” on p. 3-2.)
• All the User IDs are registered or overwritten as ‘User’ (End User) when the machine
imports the User ID data and their passwords are cleared. You must reset the
passwords for the User IDs and for Department IDs each User ID belongs to after
importing. (See “Resetting Imported User Management Data,” on p. 2-16.)
• If the machine is in the Sleep mode, press the machine’s control panel power switch to
clear the Sleep mode before importing the data.
The Remote UI starts importing the data and when it is complete, the page returns to
the Import/Export User Management Data page.
IMPORTANT
Do not import any files while the machine is processing jobs.
IMPORTANT
• Before you enable Department ID Management and User Management, be sure to
reset the passwords for User IDs as directed in the procedure below.
2 • To reset the passwords, log in to the Remote UI in the System Manger mode. (See
“When Department ID Management and User Management are disabled:,” on
Managing Jobs and Machine Data
p. 1-10.)
2
Managing Jobs and Machine Data
NOTE
You can enter the new password for the User ID instead of entering the old
(before importing) password.
Change Password: Select this check box and enter the password for the
(for the Department Department ID the User ID belongs to in the [Password] and
ID) [Confirm] text box.
User Type: Specify the User Type by selecting the [User] (End User) or
[System Manager] option button.
IMPORTANT
All the User IDs are registered or overwritten as ‘User’ (End User) when the
machine imports User Management data, so you may need to reset the User
Types. If the User Types of all the User IDs are set to ‘User’ (End User), every
user is regarded as the System Manager and will be able to log in to the machine
and the Remote UI in the System Manager Mode.
NOTE
2 To switch from the User ID list to the Department ID list, click [Department ID
Management Settings] on the [Department ID/User Management Settings] page
Managing Jobs and Machine Data
shown in step 3, and click [Cancel] on the [Register New Department] page. To display
the list of the User IDs again, follow steps 1 to 4.
NOTE
The Additional Functions settings you can export are displayed on the page shown in
step 3.
IMPORTANT
If the machine is in the Sleep mode, press the machine’s control panel power switch to
clear the Sleep mode before performing an Import operation.
NOTE
2 The Additional Functions settings you can import are displayed on the page shown in
step 3 in “Exporting Additional Functions Setting Data,” on p. 2-20.
Managing Jobs and Machine Data
3 Click [Import].
For help, see the screen shot in step 3 in “Exporting Additional Functions Setting Data,”
on p. 2-20.
The Import Additional Functions page is displayed.
IMPORTANT
Do not import any files while the machine is processing other jobs.
IMPORTANT
• When Additional Functions settings data is imported, the System Manager ID,
Department IDs, Address Book password, and network settings are automatically
overwritten.
• The Remote UI cannot be used to perform other operations until the machine is
restarted.
• Do not import any files while the machine is processing other jobs.
■ CA Certificate
CA certificates are used for verifying the digital certificates sent from other
devices, such as servers, client computers, etc. Up to 10 CA certificates
(including the pre-installed CA certificates) can be registered.
This section focuses on how to install and register key pairs and digital certificates
from a computer on the network. For instructions on how to generate a key pair for
SSL communications, see Chapter 3, “Setting up the Machine for Your Network
Environment,” in the System Settings Guide.
IMPORTANT
• Certificates must meet the following requirements:
- Format: X.509 version 1 or version 3 (DER encoded binary)
- Signature algorithm: SHA1-RSA, SHA256-RSA, SHA384-RSA*, SHA512-RSA*,
MD5-RSA, or MD2-RSA (For CA certificates, SHA1-DSA is also allowed.)
- Key length: 512, 1024, 2048, or 4096 bits (RSA)/2048 or 3072 bits (DSA)
- File extension: ‘.p12’ or ‘.pfx’ (for key pair files)/‘.cer’ or ‘.der’ (for CA certificate files)
* SHA384-RSA and SHA512-RSA are supported only when the key length is 1024 bits or more.
• The machine does not use certificate revocation list (CRL) for verifying digital
certificates.
• The Certificate Settings are available only when the Remote UI is in the System
Manager Mode.
2-24 Managing Key Pairs and Digital Certificates from a Web Browser
Installing and Registering a Key and Certificate
Install a key pair (or a private key and certificate) in the machine as described
below. You can also register the key pair or delete unnecessary key pair files.
Managing Key Pairs and Digital Certificates from a Web Browser 2-25
3 Scroll the page until [Certificate Settings] appears ➞ click [Key
and Certificate Settings].
2
Managing Jobs and Machine Data
2-26 Managing Key Pairs and Digital Certificates from a Web Browser
NOTE
If you want to generate an SSL key pair with the machine, click [Generate Key] ➞
enter the required information on the page that appears ➞ click [OK]. For more
information, see Chapter 3, “Setting up the Machine for Your Network Environment,” in
the System Settings Guide.
The Remote UI starts installing the key and certificate and when it is complete, the
page returns to the Register Key and Certificate page.
IMPORTANT
The maximum number of characters that you can enter for the file name is 24
(including the file extension ‘.p12’ or ‘.pfx’).
Managing Key Pairs and Digital Certificates from a Web Browser 2-27
● To register the key and certificate:
❑ Click [ ] (Select) next to the key pair file you want to register ➞ [Register].
2
Managing Jobs and Machine Data
❑ Enter the key name and password (up to 24 characters respectively) ➞ click [OK].
The Remote UI starts registering the key and certificate and when it is complete, the
page returns to the Register Key and Certificate page.
2-28 Managing Key Pairs and Digital Certificates from a Web Browser
● To delete the installed (but not registered) key and certificate:
❑ Click [ ] (Select) next to the file you want to delete ➞ [Delete].
Managing Key Pairs and Digital Certificates from a Web Browser 2-29
3 Scroll the page until [Certificate Settings] appears ➞ click [Key
and Certificate Settings].
For help, see the screen shot in step 3 in “Installing and Registering a Key and
Certificate,” on p. 2-25.
The Key and Certificate Settings page is displayed.
NOTE
• If you want to display the details of a certificate, click [ ] (Certificate).
• You may not be able to delete a key pair. In this case, check what the key pair is being
used for (indicated under <Key Usage>) and perform the following:
- If the key pair is used for SSL, disable the SSL settings for e-mails/I-faxes and the
Remote UI. (See Chapter 3, “Setting up the Machine for Your Network Environment,”
and Chapter 6, “Protecting the Machine from Unauthorized Access,” in the System
Settings Guide.)
- If the key pair is used for IEEE802.1X authentication, register a new key pair and set
it as the default key. (See Chapter 2, “Connecting the Machine to a TCP/IP Network,”
in the System Settings Guide.) The key pair reset to ‘Off’ can be deleted.
2-30 Managing Key Pairs and Digital Certificates from a Web Browser
Installing and Registering a CA Certificate
Install a CA certificate in the machine as described below. You can also register the
CA certificate or delete unnecessary certificate files.
Managing Key Pairs and Digital Certificates from a Web Browser 2-31
5 Select the function.
2
Managing Jobs and Machine Data
The Remote UI starts installing the CA certificate and when it is complete, the page
returns to the Register CA Certificate page.
IMPORTANT
The maximum number of characters that you can enter for the file name is 24
(including the file extension ‘.cer’ or ‘.der’).
2-32 Managing Key Pairs and Digital Certificates from a Web Browser
● To register the CA certificate:
❑ Click [ ] (Select) next to the CA certificate file you want to register ➞ [Register].
Managing Key Pairs and Digital Certificates from a Web Browser 2-33
Deleting a CA Certificate
CA certificates become invalid when the certificate expires or when the file
becomes corrupted. If this happens, delete unnecessary files as described below.
2-34 Managing Key Pairs and Digital Certificates from a Web Browser
4 Click [ ] (Select) next to the CA certificate you want to delete ➞
[Delete].
NOTE
If you want to display the details of a certificate, click [ ] (Certificate).
Managing Key Pairs and Digital Certificates from a Web Browser 2-35
2
Managing Jobs and Machine Data
2-36 Managing Key Pairs and Digital Certificates from a Web Browser
Specifying Department ID and
User Management 3
CHAPTER
This chapter describes how to specify the Department ID Management and User Management
settings by using the Remote UI.
3-1
Managing the Department IDs and User IDs
You can specify the Department ID Management and User Management settings
on the Remote UI.
IMPORTANT
• Be sure to disable User Management when the optional Copy Card Reader-F1 is
attached to the machine.
3 • Specifying the Department ID Management and User Management settings are
available only when the Remote UI is in the System Manager Mode.
Specifying Department ID and User Management
IMPORTANT
• Be sure to confirm the System Manager ID and System Password are properly set to
log in to the Remote UI in the System Manager Mode before enabling Department ID
Management. (See “To specify the System Manager ID and System Password:,” on
p. 4-9.)
• Before enabling Department ID/User Management, register at least one Department
ID/User ID beforehand. (See “Managing the Department IDs,” on p. 3-6 and
“Managing the User IDs,” on p. 3-10.)
• First register a User ID as the System Manager, and then register other User IDs as
the End Users before enabling User Management. (See “To register a new User ID:,”
on p. 3-10.)
NOTE
The list of the Department IDs switches to the list of the User IDs by clicking [Change
List View]. The [Change List View] button appears when both Department ID
Management and User Management are enabled and at least one ID is registered for
each mode.
3
Specifying Department ID and User Management
IMPORTANT
Before selecting this check box, make sure that at least one Department ID is
registered.
Department ID Click this button to register a Department ID. (See “Managing the
Management Department IDs,” on p. 3-6.)
Settings:
Enable User Select this check box to enable User Management. When it is
Management: enabled, the users must enter their User ID and password (when
it is set) to log in to the machine and the Remote UI.
NOTE
The list of the Department IDs switches to the list of the User IDs by clicking [Change
List View]. The [Change List View] button appears when both the Department ID
3 Management and the User Management are enabled and at least one ID is registered
for each mode.
Specifying Department ID and User Management
NOTE
You can register up to 1,000 Department IDs.
❑ Click [Settings] on the page shown in step 1.
The Department ID/User Management Settings page is displayed.
❑ Click [Department ID Management Settings].
3
Specifying Department ID and User Management
IMPORTANT
When the optional Copy Card Reader-F1 is attached to the machine, do not
register a new Department ID.
NOTE
• For instructions on how to specify the settings above on the machine’s control
panel, see Chapter 6, “Protecting the Machine from Unauthorized Access,” in the
System Settings Guide.
• The maximum number of digits you can register for the Department ID is seven.
If you enter fewer than seven digits, the machine automatically adds zeros to the
beginning.
Example: If <321> is entered, the Department ID will be displayed as
<0000321>.
• <Print Total> is the sum of <Copy> and <Print>.
IMPORTANT
When the optional Copy Card Reader-F1 is attached to the machine, do not
delete a Department ID.
IMPORTANT
• First register a User ID as the System Manager, and then register other User IDs as
the End Users before enabling User Management.
• If the User Types of all the User IDs are set to ‘User’ (End User), every user is
regarded as the System Manager and will be able to log in to the machine and the
Remote UI in the System Manager Mode.
• If you enable both Department ID Management and User Management, be sure to
assign a Department ID (and the password for the Department ID) to each User ID.
Users can log in to the machine and the Remote UI by entering the User ID that
3 belongs to a Department ID.
• User IDs can be registered, edited, or deleted only on the Remote UI, while User
Specifying Department ID and User Management
Management can be enabled and disabled both on the machine’s control panel and on
the Remote UI.
NOTE
You can register up to 1,000 User IDs.
❑ Click [Settings] on the page shown in step 1 in “Managing the Department IDs,” on
p. 3-6.
The Department ID/User Management Settings page is displayed.
3 IMPORTANT
If you enable both Department ID Management and User Management, be sure
Specifying Department ID and User Management
to assign a Department ID (and the password for the Department ID) to each
User ID. Users can log in to the machine and the Remote UI by entering their
User ID that belongs to a Department ID.
User Type: Specify the User Type by selecting the [User] (End User) or
[System Manager] option button.
Display Name: Enter the user name to display (32 characters maximum).
E-mail Address: Enter the e-mail address of the user (120 characters
maximum).
IMPORTANT
• When the optional Copy Card Reader-F1 is attached to the machine, do not
register a new User ID.
• The settings above can be specified only on the Remote UI.
IMPORTANT
When the optional Copy Card Reader-F1 is attached to the machine, do not
delete a User ID.
This chapter describes how to customize the machine settings by using the Remote UI.
4-1
Customizing the System Settings
In the System Settings page in the [Add.Func.] (Additional Functions) menu, you
can specify the System Settings of the machine. Although many of the settings can
be specified both on the Remote UI and on the machine’s control panel, some
settings can be specified only on the machine.
You can find the System Settings on the machine’s control panel by pressing
(Additional Functions). For more information, see the System Settings Guide.
IMPORTANT
4 You can edit the System Settings on the Remote UI only when it is in the System
Manager Mode.
Customizing Settings
Customizing Settings
1 Click [Add.Func.] ➞ [System Settings] in the [Add.Func.] menu.
4
Customizing Settings
Customizing Settings
IMPORTANT
<Phone>, <E-mail Address>, and <System Manager Comment> can be
specified only on the Remote UI.
4 NOTE
For instructions on how to specify the System Manager ID and System
Customizing Settings
Password, see “To specify the System Manager ID and System Password:,” on
p. 4-9.
<Support>
URL: Enter the URL for supporting the users as necessary.
IMPORTANT
<Support> can be specified only on the Remote UI.
Customizing Settings
Fax Settings: Chapter 4, “Setting the Send Function”
Store/Print When Chapter 4, “Setting the Send Function”
Forwarding:
Remote UI Settings: Chapter 6, “Protecting the Machine from Unauthorized
Access”
PDL Selection (PnP): Chapter 7, “Other System Settings”
Memory Media Chapter 4, “Setting the Send Function” and
Settings: Chapter 7, “Other System Settings”
Secured Print Chapter 7, “Other System Settings”
Settings:
Memory Used When Chapter 7, “Other System Settings”
Warning Message is
Displayed:
4
Customizing Settings
NOTE
For information on the settings, see Chapter 4, “Setting the Send Function,” in
the System Settings Guide.
Customizing Settings
The settings are as follows:
Set ID and Select this check box to set the System Manager ID and
Password: System Password.
System Manager ID: Enter the System Manager ID (seven digits maximum).
Set/Change Select this check box to set or change the System Password.
Password:
System Manager Enter the System Password (seven digits maximum).
Password:
Confirm: Enter again the password to confirm it.
IMPORTANT
The System Manager ID and System Password are both set to ‘7654321’ at
purchase. Change them before using the machine.
Permit End-user’s When this check box is selected, print jobs can be deleted in
Job Operation: the End-User Mode under the user name entered when
logging in.
IMPORTANT
<Permit End-user’s Job Operation> can be specified only on the Remote UI.
IMPORTANT
Specifying the LDAP server settings is available only when the Remote UI is in the
System Manager Mode.
NOTE
For instructions on how to edit the LDAP server settings on the machine’s control
panel, see Chapter 3, “Setting up the Machine for Your Network Environment,” in the
4 System Settings Guide.
Customizing Settings
Customizing Settings
NOTE
• For information on the settings, see Chapter 3, “Setting up the Machine for Your
Network Environment,” in the System Settings Guide.
• If Authorized Send is activated, <Authentication Method> appears on this page.
Specify whether to carry over the login information (user name and password) from
Authorized Send to the authentication information used when users search for e-mail
addresses and fax numbers via the LDAP server. To use the same user name and
password for LDAP search authentication, select [Assume the same authentication
information as when operation to send was started]. If not, select [Use device-specific
authentication information].
4
Customizing Settings
Customizing Settings
NOTE
For information on the settings, see Chapter 3, “Setting up the Machine for Your
Network Environment,” in the System Settings Guide.
IMPORTANT
Specifying the Forwarding Settings is available only when the Remote UI is in the
System Manager Mode.
NOTE
For instructions on how to edit the forwarding settings on the machine’s control panel,
see Chapter 4, “Setting the Send Function,” in the System Settings Guide.
4
Customizing Settings
Customizing Settings
For information on the settings, see Chapter 4, “Setting the Send Function,” in
the System Settings Guide.
NOTE
For information on the settings, see Chapter 4, “Setting the Send Function,” in
the System Settings Guide.
4
Customizing Settings
IMPORTANT
Specifying the Authorized Send settings is available only when the Remote UI is in the
System Manager Mode.
Customizing Settings
The Send Function Authentication Settings page is displayed.
4
Customizing Settings
IMPORTANT
The confirmation screen appears only if the machine is locked with security
features such as Department ID Management. If the machine is locked with
4
security features and [Display confirm screen when logged out] is not selected, the
Customizing Settings
machine works as if [Device] is pressed when the user logs out of Authorized Send.
<LDAP Authentication Server Settings>
Press [Register] and specify the authentication server settings in the machine,
according to the server used. Up to five authentication servers can be registered.
To change or delete the registered server settings, select the desired server name and
press [Edit] or [Delete].
Facsimile Guide.)
Login Information: Specify the authentication method used when the machine
communicates with the authentication server. Select [Use] to use
the Simple authentication method, or [Use (Security
Authentication)] to use the Kerberos authentication method. The
Kerberos authentication method is available for Active Directory.
Domain Name: If you select [Use (Security Authentication)] for <Login
Information>, enter the directory tree name of the Active
Directory, such as <team1.salesdept.canon.co.jp>.
Use System This setting is available only when [Use] is selected from [Login
Manager ID: Information] as the authentication method. Select this check box
to use the administrator’s ID and password for the authentication
server when performing the first bind of the simple binding
process. If you use anonymous binding, deselect this check box.
User Name: This text box is available only when [Use System Manager ID] is
selected. Enter the administrator’s user name.
Password: This text box is available only when [Use System Manager ID] is
selected. Enter the administrator’s login password.
Use SSL: This setting is available only when [Use] is selected from [Login
Information] as the authentication method. Select this check box
to use the Secure Sockets Layer (SSL) protocol when the
machine communicates with the authentication server. If you
select this check box, the value for <Port Number> automatically
changes to ‘636’.
Customizing Settings
For information on the settings other than the one below, see Chapter 3, “Setting up
the Machine for Your Network Environment,” in the System Settings Guide.
IMPORTANT
For your network server settings, consult your network administrator.
<Timeout Settings>
Authentication/ Specify the time that the machine takes to authenticate a user
Attribute Retrieval against the authentication server and to retrieve attributes about
4 Timeout: the user from the server.
Customizing Settings
IMPORTANT
Depending on the conditions such as authentication methods you are using, the
timeout time may be shorter than designated.
<SMTP Authentication Settings>
When Sending File This setting is used when users specify the destination by pressing
to New Address: [File] on the top screen (Send) and specifying the file server
address manually. Select the desired option from the following:
• [Assume the same authentication information as when
operation to send was started and display authentication
screen]: Displays the authentication screen with the user name
and password for Authorized Send automatically inserted in the
[User] text box and the [Password] text box of the screen.
• [Display authentication screen with the authentication
information empty]: Displays the authentication screen with no
entries in the [User] text box and the [Password] text box of the
screen. Users need to enter the user name and password each
time they send documents to a file server.
4
Customizing Settings
When Sending File This setting is used when users specify the destination by
to Address selecting the file server address from the Address Book list.
Registered in Select the desired option from the following:
Address Book: • [Assume the same authentication information as when
operation to send was started and display authentication
screen]: Displays the authentication screen with the user name
and password for Authorized Send automatically inserted in the
[User] text box and the [Password] text box of the screen.
• [Display authentication screen with the authentication
information empty]: Displays the authentication screen with no
entries in the [User] text box and the [Password] text box of the
screen. Users need to enter the user name and password each
time they send documents to a file server.
• [Use authentication information of address book and do not
display authentication screen]: Does not display the
authentication screen. The user name and password of each
address in the Address Book are used as the login information.
E-mail Send: • [Do not allow]: Disables user from sending e-mails and I-faxes
from the machine.
• [Allow]: Enables user to send e-mails and I-faxes from the
machine.
• [Only allow sending to own address]: Restricts the destination
of sending documents to the e-mail address of a logged on
user. With this setting, users also cannot send I-faxes from the
machine. For instructions on how to send documents to the
e-mail address of a logged on user, see Chapter 2, “Sending
Documents,” in the Sending and Facsimile Guide.
Fax Send: • [Do not allow]: Disables user from sending faxes from the
machine.
• [Allow]: Enables user to send faxes from the machine.
Customizing Settings
<Sender E-mail Address Settings>
Specify LDAP Select this check box to use the e-mail address of a logged on
authentication user user as the sender information when sending e-mails or I-faxes.
address as the The e-mail address is displayed or printed as the sender
sender name: information at the recipient’s machine, instead of the unit name.
(See Chapter 1, “Introduction to Send and Fax Functions,” in the
Sending and Facsimile Guide.)
NOTE
4 • You can access the Additional Functions settings from the machine’s control panel by
pressing (Additional Functions).
Customizing Settings
• For information on the Volume Settings, see Chapter 2, “Basic Operations,” in the
Reference Guide.
Additional Functions
Menus on the Remote UI References
menu on the Machine
Common Settings [Add.Func.] ➞ [Settings] Chapter 3,
➞ [Common Settings] “Configuring the Machine’s Basic
Settings,”
in the Reference Guide
Copy Settings [Add.Func.] ➞ [Settings] Chapter 4,
➞ [Copy Settings] “Customizing Settings,”
in the Copying Guide
Timer Settings [Add.Func.] ➞ [Settings] Chapter 3,
➞ [Timer Settings] “Configuring the Machine’s Basic
Settings,”
in the Reference Guide
Communications Settings [Add.Func.] ➞ [Settings] Chapter 7,
➞ [Send/Receive Settings] “Customizing the Machine’s
Settings,” in the Sending and
Facsimile Guide
Adjustment/Cleaning Available only on the Chapter 5,
machine’s control panel. “Routine Maintenance,” and
Chapter 6,
“Troubleshooting,” in the
Reference Guide
Printer Settings [Add.Func.] ➞ [Settings] Chapter 4,
➞ [Printer Settings] “Customizing Settings,”
in the Printer Guide
Customizing Settings
NOTE
The available settings menu varies depending on the models or options you have
installed or activated.
4
Customizing Settings
NOTE
• For information on the settings, see the other references listed on the table in
“Customizing the Machine Settings,” on p. 4-26.
• For information on the settings of [Send Function Authentication Settings], see
“Specifying the Authorized Send Settings,” on p. 4-17.
IMPORTANT
• Specifying the settings for SNMPv3 is available only when the Remote UI is in the
System Manager Mode.
• Specifying the settings for SNMPv3 is available only when SSL communication is
enabled. See the following information on the settings for SSL communication.
- Chapter 3, “Setting up the Machine for Your Network Environment,” in the System
Settings Guide
- “Managing Key Pairs and Digital Certificates from a Web Browser,” on p. 2-24 4
Customizing Settings
NOTE
The settings for SNMPv3 can be specified only on the Remote UI, while the settings
for SNMPv1 can be specified both on the machine’s control panel and the Remote UI.
For more information on the settings for SNMPv1, see Chapter 2, “Connecting the
Machine to a TCP/IP Network,” in the System Settings Guide.
4
Customizing Settings
4
NOTE
Customizing Settings
You can enable both SNMPv1 and SNMPv3 at the same time, depending on your
needs. For more information on settings for SNMPv1, see Chapter 2, “Connecting the
Machine to a TCP/IP Network,” in the System Settings Guide.
IMPORTANT
The setting for [Use SNMP v.3] becomes effective after the machine is restarted, while
restarting the machine is not necessary to enable the settings for [User Settings]
(p. 4-31) and [Context Settings] (p. 4-34).
4
Customizing Settings
NOTE
• A default user “initial” is registered. Edit it as necessary.
- User Name: initial
- MIB Access Permission: ON
- Security Settings: Auth. Yes/Encry. Yes
- Authent. Algorithm: MD5
- Authentication Password: initial
- Encryption Algorithm: DES
- Encryption Password: initial
• You can register up to five users (including the default user “initial”).
Customizing Settings
User Name: Enter the user name (32 alphanumeric characters
maximum).
MIB Access Permission: Select this check box to give read/write permission to the
user.
Security Settings: Select the security setting ([Auth. Yes/Encry. Yes], [Auth.
Yes/Encry. No], or [Auth. No/Encrypt. No]).
If you select [Auth. Yes/Encry. Yes], for example, both
authentication and encryption are enabled.
Authent. Algorithm: Select the algorithm to be used for authentication ([MD5]
or [SHA1]).
Authentication Password: Enter the password for authentication (6 to 16
alphanumeric characters).
Confirm: Enter the password again to confirm it.
● To enable/disable a user:
❑ Select the button for the user you want to enable/disable under <Select> in the user
list ➞ click [User On/Off].
4
Customizing Settings
● To edit a user:
❑ Click the user name you want to edit in the user list in the User Settings page.
The Edit User page is displayed.
❑ Edit the information as necessary ➞ click [OK].
● To delete a user:
❑ Select the button for the user you want to delete under <Select> in the user list in the
User Settings page ➞ click [Delete].
The selected user is deleted.
Customizing Settings
NOTE
• You can register up to five contexts.
• A default context “NULL” is registered. It is not shown in the context list and cannot
be deleted.
❑ Click [Register].
● To delete a context:
❑ Select the button for the context you want to delete under <Select> in the context list
in the Context Settings page ➞ click [Delete].
The selected context is deleted.
4
Customizing Settings
IMPORTANT
The settings for the SSL server certificate verification are available only on the Remote
UI (System Manager Mode).
4
1 Click [Add.Func.] ➞ [Settings] in the [Add.Func.] menu.
Customizing Settings
● To set the machine to verify the SSL server certificate when receiving
data with POP:
❑ Select the check box for [Confirm SSL Certificate for POP RX].
To include the CN (Common Name) for the verification, select the check box for [Add
CN to Verification Items].
● To set the machine to verify the SSL server certificate when sending data
with SMTP:
❑ Select the check box for [Confirm SSL Certificate for SMTP TX].
To include the CN (Common Name) for the verification, select the check box for [Add
CN to Verification Items].
4
Customizing Settings
IMPORTANT
If you do not enable the SSL server certificate verification settings described
above, SSL communication may be performed even with an invalid certificate.
Customizing Settings
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
5-1
Glossary
B
BOOTP
BOOTstrap Protocol. A protocol that enables a client machine to automatically obtain
network setup information from a server over a TCP/IP network. BOOTP enables a
client to automatically locate such information as the host name, domain name, and
IP address, so that it is not necessary to enter these items manually.
bps
Stands for bits per second. The measure of transmission speed used in relationship
to networks and communication lines.
5
C
Appendix
Cookie
A file left on a user’s computer when the user visits a Web site. A cookie allows the
Web site to recognize the user on subsequent visits. Cookies are generally used to
enable a user to automatically sign on to certain Web sites and to customize the
features offered by such sites.
D
DHCP
Dynamic Host Configuration Protocol. A protocol which automatically specifies the
network settings of a client on a TCP/IP network. Many of the settings required to set
up TCP/IP, which is the standard protocol of the Internet, can be made automatically
using DHCP.
F
FTP
File Transfer Protocol. A client-server protocol enabling a user to transfer files on one
computer to and from another computer over a TCP/IP network. The File Transfer
Protocol also governs the client program with which the user transfers files.
5-2 Glossary
H
HTTP
Hypertext Transfer Protocol. The client-server TCP/IP protocol used on the World
Wide Web for the transfer of HTML (Hyper Text Mark-up Language) documents
across the Internet.
I
IEEE802.1X authentication
An authentication method that permits only supplicants (devices) authenticated by a
RADIUS (Remote Authentication Dial-In User Service) server to connect to the
network via an authenticator.
Appendix
IP address
Internet Protocol address. A network address used by IP (Internet Protocol) to specify
a computer or device on the Internet. Currently, two versions of IP are in use: IPv4
and IPv6.
IPv4
Internet Protocol version 4. An IPv4 address is a 32-bit numeric address, usually
written as four numbers delimited by periods. For example, ‘128.121.4.5’.
IPv6
Internet Protocol version 6. An IPv6 address is 128-bit long and consists of eight
groups of four hexadecimal digits delimited by colons. For example,
‘2002:0db6:58b1:02c3:3308:7a2e:6309:2665’. In an IPv6 network, a computer or
device can use multiple addresses, as represented by link local address, stateless
address, etc.
L
LDAP
Lightweight Directory Access Protocol. A network protocol that enables you to locate
organizations, individuals, and other resources, such as files and printers on a
network, whether on the public Internet or on a corporate intranet.
Glossary 5-3
P
PDF
Portable Document Format. The page description language used in Adobe Systems’
Acrobat document exchange system, which is restricted neither by device nor
resolution. PDF displays documents in a way that is independent of the original
application software, hardware, and operating system used to create those
documents. A PDF document can contain any combination of text, graphics, and
images.
Protocol
A set of rules that govern the transmission of data across a network. Examples of
protocols are DHCP, BOOTP, RARP, and TCP/IP.
Proxy server
A server that provides a cache of files available on remote servers that are slow or
expensive to access. The term “proxy server” normally refers to a World Wide Web
server that, upon receiving a URL, tries to supply the requested file from its cache. If
5 the proxy server cannot locate the file in its cache, it obtains the file from the remote
server, and saves a copy in its cache so that the next request can be obtained locally.
Appendix
R
RARP
Reverse Address Resolution Protocol. A protocol which associates a network adapter
address (MAC address) with an IP (Internet Protocol) address.
Remote UI
Remote User Interface. The Remote UI is software that enables you to perform
operations, which are usually performed on the machine’s control panel, using a Web
browser (such as Microsoft Internet Explorer or Safari) over a network.
S
SSL
Secure Sockets Layer. A protocol that ensures security and privacy when transmitting
private documents over the Internet.
SSL encryption
SSL uses two keys to encrypt data: a public key, which is known to “everyone,” and a
private or secret key, which is known only to the recipient of the message.
5-4 Glossary
T
TCP/IP
Transmission Control Protocol/Internet Protocol. The protocol used to connect to the
Internet or wide area networks.
U
URL
Uniform Resource Locator. A standard way of specifying the location of an object,
usually a Web page on the Internet. The URL for a Web page would look something
like this: “http://www.w3.org/default.htm”. Here, “http:” indicates that a Web page is
being accessed, “www.w3.org” is the address of the server containing the Web page,
and “default.htm” is the file name under which the Web page is stored on the server.
Appendix
Glossary 5-5
Index
A E
Add.Func. menu End-User Mode, 1-10
(Additional Functions menu), 4-2, 4-26
Additional Functions setting data
Exporting, 2-20
Importing, 2-22
F
Address Book, 2-5 Forwarding Settings, 4-14
Deleting the destination, 2-9 Deleting the Forwarding Condition, 4-16
Editing the destination, 2-9 Editing the Forwarding Condition, 4-16
Exporting, 2-11 Forwarding Documents without specific
5 Importing, 2-12 conditions, 4-15
Registering a new destination, 2-7 Registering a Forwarding Condition, 4-14
Appendix
H
B
HTTP, 5-3
BOOTP, 5-2
bps, 5-2
Buttons on the Remote UI, 1-6
I
IEEE802.1X authentication, 2-24, 5-3
C Internet Protocol (IP), 5-3
IP address, 1-4, 1-9, 5-3
CA certificate, 2-24 IPv4, 5-3
Cookie, 5-2 IPv6, 5-3
D J
Department ID Job Logs, 2-4
Deleting, 3-9
Editing, 3-9
Registering, 3-7
Department ID Management, 3-2
K
Enabling, 3-2 Key and certificate, 2-24
DHCP, 5-2
5-6 Index
L System requirements, 1-7
OS (Macintosh), 1-7
LDAP search attributes, 4-13 OS (Windows), 1-7
LDAP server, 4-10 Web browser (Macintosh), 1-7
Deleting, 4-12 Web browser (Windows), 1-7
Editing, 4-12 System Settings, specifying, 4-5
Registering, 4-11
Logon mode, 1-5, 1-10
End-User Mode, 1-5 T
System Manager Mode, 1-5
TCP/IP, 5-5
Top page of the Remote UI, 1-4
M
Machine settings, customizing, 4-26 U
URL, 1-9, 5-5
P User ID
Deleting, 3-13 5
PDF, 5-4 Editing, 3-13
Appendix
Print Job, managing, 2-2 Registering, 3-10
Protocol, 5-4 User Management, 3-2
Proxy server, 5-4 Enabling, 3-2
User Management data
Exporting, 2-13
Importing, 2-14
R Resetting, 2-16
RARP, 5-4
Remote UI, 5-4
Restrict the Send function, specifying, 4-8 W
Web browser, 1-4, 1-7, 1-9
S
SNMPv3, 4-29
SSL, 5-4
SSL encryption, 5-4
SSL server certificate, 4-37
System Manager ID, specifying, 4-9
System Manager Mode, 1-10
System Password, specifying, 4-9
Index 5-7
5
Appendix
5-8 Index
CANON INC.
30-2, Shimomaruko 3-chome, Ohta-ku, Tokyo 146-8501, Japan
CANON U.S.A., INC.
One Canon Park, Melville, NY 11747, U.S.A.
CANON CANADA INC.
6390 Dixie Road Mississauga, Ontario L5T 1P7, Canada
CANON EUROPA N.V.
Bovenkerkerweg 59, 1185 XB Amstelveen, The Netherlands
(See http://www.canon-europe.com/ for details on your regional dealer)
CANON LATIN AMERICA, INC.
One Canon Park, Melville, NY 11747, U.S.A.
CANON AUSTRALIA PTY LTD
1 Thomas Holt Drive, North Ryde, Sydney NSW 2113, Australia
CANON CHINA CO. LTD.
15F Jinbao Building No.89, Jinbao Street, Dongcheng District, Beijing 100005, PRC
CANON SINGAPORE PTE LTD
1 HarbourFront Avenue, #04-01 Keppel Bay Tower, Singapore 098632
CANON HONGKONG CO., LTD.
19/F., The Metropolis Tower, 10 Metropolis Drive, Hunghom, Kowloon, Hong Kong