Instruction/ maintenance manual of the product 1235/DX Xerox
Go to page of 116
www .xerox.com/support Office Printers System Guide Administrator Phaser ® 6360 color laser printer Phaser ® 8560 color printer Phaser ® 4510 laser printer Phaser ® 8860 printer.
Copyright © 200 7 Xerox Corpor ation. All Rights Reserved. Unpublished rights reser ved under the copyright laws of the Un ited States. Contents of this publication may not be repr oduce d in any form without permi ssion of Xerox Corporation.
System Administrator Guide i Contents 1O v e r v i e w Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 PrintingScout Alerts . . . . . . . . . . . . . . . . . .
Contents System Administrator Guide ii Protocol Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents System Administrator Guide iii 5 Printing Features Personal, Secure, Proof, Shared Saved, Personal Sa ved, and Print With Jobs . . . . . . . . . . . 5-2 Smart Trays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Administrator Guide 1-1 This section includes: ■ Resources on page 1-1 ■ PrintingScout Alerts on page 1-2 ■ PhaserSMAR T T echnical Support on page 1-2 ■ Xerox Support Centre on pa ge 1.
PrintingScout Alerts System Administrator Guide 1-2 PrintingScout Alerts PrintingScout is an automated tool that is inst alled with the Xerox prin ter dri ver .
PhaserSMART Technical Support System Administrator Guide 1-3 Using CentreWare IS T o access PhaserSMAR T T echnical Support from CentreW are IS: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3.
Xerox Support Centre System Administrator Guide 1-4 Xerox Support Centre The Xer ox Support Centre is a utility that is installed when running the dri ver installer . It is a vailab le for systems with W indo ws 2000 and la ter or Mac OS X, version 10.
CentreWare Internet Services (IS) System Administrator Guide 1-5 CentreW are Internet Services (IS) CentreW are IS pro vides a simple interface to the embedded web server in an y networked Xerox printer that enables you to manage, co nf igure, and monitor netwo rked printers from your desktop.
System Administrator Guide 2-1 This chapter includes: ■ Using a Startup Network Conf iguration File on page 2 -2 ■ Printer Driv er Installation Features on page 2-3 ■ Discov ery Protocols on page 2-5 See also: Advanced F eatures Guide at www .xerox.
Using a Startup Network Configuration File System Administrator Guide 2-2 Using a Startup Network Configuration File This section includes: ■ About the Confi guration File on page 2-2 ■ Configurat.
Printer Driver Installation Features System Administrator Guide 2-3 Printer Driver Installation Features This section includes: ■ W alk-Up Printing Dri ver on page 2-3 ■ W alk-Up Installation on p.
Printer Driver Installation Features System Administrator Guide 2-4 Installation from the Printer’ s Hard Drive or the Web Y ou can install the printer dri ver from the printer’ s ha rd driv e. This is especially useful if yo u do not have the Softwar e and Documentatio n CD-R OM .
Discovery Protocols System Administrator Guide 2-5 Discover y Protocols This section includes: ■ DDNS/WINS on page 2-5 ■ DNS (Domain Name Services) on page 2-6 ■ Service Location Protocol on page 2-6 ■ UPnP (Uni versal Plug and Play) on page 2- 7 DDNS/WINS DDNS/WINS settings can be obtained from the BO O TP or DHCP server , if enabled.
Discovery Protocols System Administrator Guide 2-6 DNS (Domain Name Ser vices) DNS settings reference servers b y name and allo w you to enter and view host names rather than IP addre sses. Note: T urning Multicast DNS ON allows the printe r to be automatically disco vered on a TCP/IP network b y Apple Macintosh OS X Bonjour technology .
Discovery Protocols System Administrator Guide 2-7 UPnP (Universal Plug and Play) UPnP provides a simplif ied method to obtain an IP Address for a printer , locate devices on the network, an d display those de vices on desktop computers. 1. Launch your web browser .
System Administrator Guide 3-1 This chapter includes: ■ Printer Neighborhood on page 3-2 ■ Job Accounting on page 3-3 ■ Usage Prof ile Reports on page 3-4 ■ Xerox Usage Analysis T ool on page .
Printer Neighborhood System Administrator Guide 3-2 Printer Neighborhood Printer Neighborhood is a t ool in CentreW are IS that enables you to sear ch for printers on your network, check their status, and manage them re motely . Y ou can also install, manage, and vie w printer usage information.
Job Accounting System Administrator Guide 3-3 Job Accounting The printer stores informa tion about print jobs. This information is stored in a log f ile that lists job records. Each job record c ontains fields such as user name, job name, pages printed, job times, and toner or ink used.
Usage Profile Reports System Administrator Guide 3-4 Usage Profile Reports Usage Profile reports pro vide information on man y aspects of printer usage, such as ink or toner used, number of pages printed, and pape r types used, gathered during the life of the printer .
Xerox Usage Analysis Tool System Administrator Guide 3-5 Xerox Usage Analysis T ool The Xerox Usage Analysis T ool (U A T) enables you to collect and an alyze enterprise-wide Xerox network printer usage d ata with customizable features: ■ Cost Analysis : T rack printing costs b y groups of user s or by gr oups of printers.
Protocol Cont rol System Administrator Guide 3-6 Protocol Control This section includes: ■ HTTP on page 3-6 ■ TCP/IP on page 3-7 ■ Port 9100 on page 3-7 ■ LPR on page 3-8 ■ IPP (Internet Pri.
Protocol Cont rol System Administrator Guide 3-7 TCP/IP T o change TCP/IP set tings: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d . 3. Click Pr operties . 4. Select the Pro tocols folder on the left na vigation panel.
Protocol Cont rol System Administrator Guide 3-8 LPR LPR is an application-le vel printing protocol that uses TCP/IP to establish connections between printers and work stations on a netw ork. T o change LPR settings: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d .
Protocol Cont rol System Administrator Guide 3-9 SNMP (Simple Network Management Protocol) SNMP is a set of protocols designed to he lp manage complex networks. SNMP-compliant de vices store data about themselves in MIBs and return this data to th e SNMP requesters.
Protocol Cont rol System Administrator Guide 3-10 Email Ser ver or SMTP (Simp le Mail T ransfer Protocol) The Email server settings page enables you to configure email serv er settings and to specify a return email address for undeli verable email.
Protocol Cont rol System Administrator Guide 3-11 MaiLinX Remote Printing MaiLinX Remote Printing provides the follo wing ke y features: ■ The ability to send print jobs t o a group of printers. ■ Print services across f irew alls and proxies. ■ Status reporting using email mes sages.
Protocol Cont rol System Administrator Guide 3-12 MaiLinX Alerts About MaiLinX Alerts MaiLinX alerts enable the printe r to automatically send email to you and/o r specified users when the follo wing conditions occur: ■ The printer requires attention or when service is needed.
Protocol Cont rol System Administrator Guide 3-13 EtherT alk T o change EtherT alk settings: 1. Launch your web browser . 2. Enter the printer’ s IP address in the bro wser’ s Addre ss fi e l d . 3. Click Pr operties . 4. Select the Pro tocols folder on the left na vigation panel.
Cloning System Administrator Guide 3-14 Cloning Cloning enables you to conf igure one printer an d then copy that conf iguration to another printer on the same network. Y o u can access cloning using CentreW are IS or CentreW a re W eb . Using CentreW are IS, you can select the settings you want to clone from one printer to another printer .
System Administrator Guide 4-1 This chapter includes: ■ Basic Concepts on page 4 -2 ■ Securing the Printer in a High Security En vironment on page 4-5 ■ Managing Certificates on page 4-6 ■ Con.
Basic Concepts System Administrator Guide 4-2 Basic Concepts This section includes: ■ About Admin and Key User Accounts on page 4-2 ■ About HTTP , HTTPS, and SSL/TLS on page 4-3 ■ About Certific.
Basic Concepts System Administrator Guide 4-3 About HTTP , HTTPS, and SSL/TLS HTTP (Hyper T ext T ransfer Protocol) is the pr otocol used to communicate across the internet between the printer web server and the web brow ser (clients).
Basic Concepts System Administrator Guide 4-4 If you want to use HTTPS, each printer must hav e a unique certificate that is accepted by each bro wser used to access the printer . This allows the printer web server to use HTTPS and encrypt data between the web br o wser and the printer .
Securing the Print er in a High Security Environment System Administrator Guide 4-5 Securing the Printer in a High Security Environment If you are concerned about the security of your pr inter in a hi.
Managing Certificates System Administrator Guide 4-6 Managing Certificates T o modify a self-signed certificate so it is specifi c to your printer or to install a do wnloaded root-signed certificate on the printer: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d .
Configuring SSL System Administrator Guide 4-7 Configuring SSL Once a certificate is set up, you can select when to use SSL to secure the connection between the printer and the server . Note: Y ou can restrict user access to SSL pages in CentreW are IS.
Configuring Administrato r and Key User Settings System Administrator Guide 4-8 Configuring Administrator and Key User Settings T o prev ent unauthorized changes to printer settings: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d .
Configuring the Prin t Host Access List System Administrator Guide 4-9 Configuring the Print Host Access List T o prev ent unauthorized printing to your printer: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d .
Controlling Access to Color Printing System Administrator Guide 4-10 Controlling Access to Color Printing Note: Color access controls are av aila ble on color printers only . T o control the user’ s access to color printing, you can require the use of a 4-digit numeric password to print in color .
Securing the Hard Drive System Administrator Guide 4-11 Securing the Hard Drive This section includes: ■ Selecting the Hard Dri ve Overwrite Security Option on page 4-11 ■ Selecting the Automatic .
Securing the Hard Drive System Administrator Guide 4-12 Using CentreWare IS T o select the Hard Dri ve Overwrite Security option: 1. Launch your web browser . 2. Enter the printer’ s IP address in the bro wser’ s Addre ss fi e l d . 3. Click Pr operties .
Securing the Hard Drive System Administrator Guide 4-13 a. Select Overwrite Remo vals , and then press the OK button to select On or Off . Note: Remov e Job Files does not remov e sav ed or protected print job f iles. 4. T o remov e all secure, personal, and pr oof print files e very day at a set time: a.
802.1X Configuration System Administrator Guide 4-14 802.1X Configuration Introduction to 802.1X and EAP The 802.1X IEEE standard def ines port-based , authenticated networ k access control for Ethernet local area networks (LANs).
802.1X Configuration System Administrator Guide 4-15 7. Install root certif icate – If you select EAP method(s) that require a root certificat e, you can: ■ Install a ne w root certificate. ■ Use the already e xistin g root certif icate. ■ Choose not to v alidate server .
Locking the Cont rol Panel Menus System Administrator Guide 4-16 Locking the Control Panel Menus T o prev ent others from changing settings in the printer setup menus, you can lock some of the control panel menus. This is useful when printers are located in public pl aces, such as schools, libraries, and of fice/print centers.
Configuring SNMP System Administrator Guide 4-17 Configuring SNMP This section includes: ■ Configuring SNMP for Maximum Security on pa ge 4-17 ■ Configuring SNMP v1/v2c on page 4-18 ■ Configurin.
Configuring SNMP System Administrator Guide 4-18 d. On the Administrative Security Settings page, clear the V iew Configuration W eb Page s and Modify Conf iguration W eb Pages check boxes fo r users who should not hav e access to these pages . 6. Set up the SNMP Administrativ e and Ke y User accounts to con figure SNMP v3: a.
Configuring SNMP System Administrator Guide 4-19 Adding or Editing T raps for SNMP v1/v2c T o add or edit traps for SNMP v1v2c: 1. On the SNMP Configurati on page: Click the Configur e SNMP v1v2c b utton, and then click the Conf igure T raps button. The Conf igure T raps page lists the current T rap Destination Addresses for the SNMP protocol.
Configuring SNMP System Administrator Guide 4-20 Configuring SNMP v3 When configuring SNMP v3, you can set up: ■ Administrativ e, K ey , Any User , and Dri ver a ccounts with Pri v acy an d Authentication Ke ys associated with each account. ■ SNMP user read and write access.
Configuring SNMP System Administrator Guide 4-21 The Key User Account Settings ■ User Name : The Ke y User account name defined on the Configur e SNMP v3: K ey User Account page. ■ A uthentication Protocol : The protocol associated with the Authentication K ey selected on the Conf igure SNMP v3 K ey User Account page.
Configuring SNMP System Administrator Guide 4-22 Configuring the SNMP Access Control List T o set up a li st of hosts that are a ut horized to access the printer using SNMP: 1. Launch your web browser . 2. Enter your printer’ s IP address in the bro wser’ s Address fie l d .
Configuring SNMP System Administrator Guide 4-23 Disabling SNMP If you are not using SNMP , disable it to prev ent unauthorized access through applications that use these protoc ols.
System Administrator Guide 5-1 . This chapter includes: ■ Personal, Secure, Proof, Shared Sa ved, Personal Sav ed, and Print W ith Jobs on page 5-2 ■ Smart T rays on page 5-2 ■ Ja m R ec over y .
Personal, Secure, Proo f, Shared Saved, Personal Sa ved, and Print With Jobs System Administrator Guide 5-2 Personal, Secure, Proof, Shared Saved, Personal Saved, and Print With Jobs These features are av ailable if your printer has an internal hard driv e.
Jam Recovery System Administrator Guide 5-3 Jam Recover y Note: Jam recov ery is not av ailable on all printers , see the documentation that came with your printer for more information. The jam recov ery settings enable you to select ho w the printer handles jobs that are in the process of printing when a media jam occurs.
System Administrator Guide 6-1 T erms and Abbreviations Glossar y T erms and Abbreviations D efinitions access control list A CentreW are IS f eature that enables you to limit access to devices . Admin account A CentreW are IS f eature that enables you to limit access to specific printer functions by specifying a name and passw ord.
Terms and Abbreviations System Administrator Guide 6-2 EAP EAP(Extensible A uthentication Protoc ol) is the standard auth entication mechanism carried over 802. 1X. The EAP method is an inner authentication protocol that provides the secure mechanism for the authentication exchange .
Terms and Abbreviations System Administrator Guide 6-3 mDNS mDNS (multicast DNS) is a multicast-based discov er y protocol that enables you to find your printer on an Apple networ k or another device that uses multicast-based discov er y .
Terms and Abbreviations System Administrator Guide 6-4 RADIUS Radius (Remote Authentication Dial In User Ser vice) is a ser ver used f or remote use r authentication a nd a ccounting. It can be used on any network that needs a centralized authentication and/or accou nting ser vice for its w orkstations.
System Administrator Guide A-1 The printer has a configuration card that stores network parameters and conf iguration (N, DN, DX, etc.) data. The configuration card is hot swappable, enabling you to share or replace it, providing an alternati ve to on-si te service.
System Administrator Guide A-2 General Information Parameters ■ Printer Name ■ Startup Page En abled ■ Printer ID ■ Sys/Start Job ■ Job T imeout ■ Load P aper T imeout ■ Menu T imeout .
System Administrator Guide A-3 PCL Parameters ■ Fon t N u mb e r ■ Pitch ■ Point Size ■ Symbol Set ■ Orientation ■ For m L e ng t h ■ Line T ermination ■ Color Mode (on color printers) ■ Wi d e A 4 USB 2.
System Administrator Guide A-4 EtherT alk Parameters ■ Enabled ■ Disabled ■ Language ■ Filtering ■ Name ■ Printer T ype ■ Zone ■ Network Node TCP/IP Parameters ■ Enabled ■ Disabled.
System Administrator Guide A-5 SSDP Parameter ■ Enabled ■ Disabled ■ SSDP TTL NBNS (WINS) Parameters ■ Node T ype ■ WINS Servers Access Control Parameter ■ Host Access List LPR Parameters .
System Administrator Guide A-6 CentreWare IS (HTTP) Parameters ■ Enabled ■ Disabled ■ Custom Link ■ Refresh Delay ■ Administrator Pa ssword ■ Key U se r P a s s wo r d ■ Use SSL FTP Para.
System Administrator Guide B-1 Printer Control Language (PCL) and Printer Job Language (PJL) commands can be used to control print job settings and printer def aults . In addition to the standard PCL and PJL commands, the Phaser prin ters support Xerox-un ique PCL and PJL commands.
System Administrator Guide B-2 SRA3 (320 x 450 mm) <Esc>&l 202A Statement (5.5 x 8.5 in.) <Esc>&l1 5A T abloid (11 x 17 in.) <Esc>&l6A T abloid Extra (12 x 18 in.) <Esc>&l201A Ex ecutive (7.25 x 10.5 in.) <Esc>&l1A Letter (8.
System Administrator Guide B-3 Media T ype The follo wing table lists the most common PCL comm ands fo r supported media types. For information on which media sizes are supported in your printer , and the trays that support them, print the Pa per T ips page fro m your printer’ s control panel.
System Administrator Guide B-4 Input T rays The follo wing table lists the mo st common PCL commands for the input trays supported b y your printer . The table also lists the alternate tray used if the optional input tray is not installed. Note: When more than one co mmand is listed, you can use either command.
System Administrator Guide B-5 Output T rays The follo wing table lists the PCL commands and PJL v alues for the output trays supported by your printer , if applicable.
System Administrator Guide B-6 Phaser PJL Commands The follo wing table lists the most commonly used HP PJL and Xerox-unique PJL co mmands. See also: HP Printer J ob Language T echnical Refer ence for the standard set of PJL commands.
System Administrator Guide B-7 @PJL XJAHOSTNAM E=“ hostname ” Roman-8 characters 1-255 Sets the host name for Job Accounting. @PJL XJA USERNAME=“ username ” Roman-8 characters 1-255 Sets the user name for Job Accounting.
System Administrator Guide B-8 @PJL XPCLP APERSRC x = yx is 0, 1, 2, 3, 4, 5, 6, 7, 8, 20, 21, 22, 23, which is the number in the <Esc>&l#H tra y selection commands. y is -1 for A utoSelect, 0 for the current tra y (eject page), 1 for T r ay 1 , 2 fo r T r ay 2 , etc.
System Administrator Guide C-1 Original SSLeay License Copyright © 1995-1998 Eric Y oung (eay@cryptsoft.com). All rights r eserv ed. This package is an SSL implementation writte n b y Eric Y oung (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’ s SSL.
System Administrator Guide C-2 THIS SOFTW ARE IS PR O V IDED BY ERIC Y OUNG “ AS IS” AND ANY EXPRESS OR IMPLIED W ARRANTIES, INCLUDING, BUT NO T LIMITED T O, THE IMPLIED W ARRANTIES OF MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED.
System Administrator Guide C-3 Part 2: Networks Associates T echnolo gy , Inc. copyright notice (BS D) ----- Copyright © 2001-2003, Networks Associates T echnology , Inc.
System Administrator Guide C-4 Part 3: Cambridg e Broadband L td. copyri ght notice (BSD) ----- Copyright © 2001-2003, Cambridge Br oadband Ltd. All rights reserved.
System Administrator Guide C-5 MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUT ORS BE LIABLE FOR ANY DIRECT , INDIRECT , IN.
System Administrator Guide C-6 VxWorks This product may include software licensed to W ind Riv er by third pa rties. The following notices are provided to comply with the terms of such licenses. Wind River VxW orks This product may include software dev elope d by WIDE Project and its contrib utors.
System Administrator Guide C-7 This product may include software copyright David A. Hinds. Use, redistrib ution, and modification of this code is permitted subject to the follo wing conditions: 1. Redistribution of this code must preserve this co pyright notice.
System Administrator Guide C-8 THE IMPLIED W ARRANTIES OF MER C HANT AB ILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE A UTHOR OR CONTRIBUT ORS BE LIABLE FOR ANY DI.
System Administrator Guide C-9 not be used in advertising or publicity pertai ning to distribution of the softw are or the documentation without specif ic, written prior pe rmission.
System Administrator Guide C-10 distribute, sublicense, and/or sell copies of th e Software, and to permit persons to whom the Software is furnished to do so, subject to th e following condi tions: The abov e copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
System Administrator Guide C-11 THEOR Y OF LIABILITY , WHETHER IN CONTRA CT , STRICT LIABILITY , OR TOR T (INCLUDING NEGLIGENCE OR O THER WISE) ARISING IN ANY W A Y OUT OF TH E USE OF THIS SOFTW ARE, EVEN IF AD VISED OF THE POSSIBILITY OF SUCH DA M AG E .
System Administrator Guide C-12 (INCLUDING NEGLIGENCE OR O THER WISE) ARISING IN ANY W A Y OUT OF TH E USE OF THIS SOFTW ARE, EVEN IF AD VISED OF THE POSSIBILITY OF SUCH DA M AG E . This product contains software developed by the Apache Software F oundation ( www .
System Administrator Guide C-13 SNiFF+/SNiFF+ PRO Copyright © 1992– 1997 Compuware Corporation Copyright © 198 4–1997 Fai rCom Corporation Copyright © 1996–2000 Gre g Stein and Mark Hammond C.
System Administrator Guide C-14 WHETHER IN AN A CTION OF CONTRA CT , TOR T OR O THER WISE, ARISING FR OM, OUT OF OR IN CONNECTION WITH THE SOFTW ARE OR THE USE OR O THER DEALINGS IN THE SOFTW ARE. This product may contain software that is based in part on the work of the Independent JPEG Group.
System Administrator Guide C-15 Data Security , Inc. makes no representations co ncerning either the merchantability of this software or the suitability of this software for any particular purpose. It is pro vided “as is” without e xpress or implied warranty of any kind .
System Administrator Guide C-16 Other Components of this product, including without limitation Wind Ri ver W orkbench, T ornado, VxW orks, and W ind Ri ver PPP , include softwa re deri ved from the RSA Data Security , Inc. MD5 Message-Digest Algorithm, and copyrigh t © RSA Data Security , Inc.
System Administrator Guide C-17 redistrib ution of a standard UnZipSFX binary (in cluding SFXW iz) as part of a self-extracting archi ve; that is permitted without inclusion of this license, as long as the normal SFX banner has not be en removed from the binary or disabled.
System Administrator Guide C-18 GO VERNMENT USE: If you are acquiring this softw are on behalf of the U.S. g ove rnment, the Gov ernment shall ha ve only "Restricted Righ ts" in the software an d related docu mentation as defined in the Federal Acqu isition Regulations (F ARs) in Cl ause 52.
System Administrator Guide C-19 3. Y ou may otherwise modify your cop y of this P ackage in an y way , provided that you insert a prominent notice in each changed file sta ting ho w and when you ch anged that file, and provided that you do at least ONE of the follo wing: a.
System Administrator Guide C-20 8. Aggregati on of this Package with a commerci al distrib ution is alw ays permitted provided that the use of this P ackage is embedded; that is, when no overt attempt is made to make this Package's interf aces visible to the end us er of the commercial distrib ution.
System Administrator Guide C-21 W e protect your rights with a two-step method: (1) we copyright the library , and (2) we offer you this license, which giv es you legal permission to cop y , distribute and/ or modify the library . T o protect each distributor , we want to make it very clear that there is no warranty for the free library .
System Administrator Guide C-22 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICA TION 1. This License Ag reement applies to an y softwa re library or other program which contains a notice p.
System Administrator Guide C-23 (For e xample, a function in a library to comput e square roots has a purpose that is entirely well-defined independent of the application.
System Administrator Guide C-24 When a “work that uses the Library” uses mate rial from a header file that is part of the Library , the object code for the work may be a deriv ativ e work of the Library e ven though the source code is not.
System Administrator Guide C-25 For an e xecutable, the required form of the “w ork tha t uses the Library” must include any data and utility programs need ed for reproducing the e xecutable from it.
System Administrator Guide C-26 If any portion of this section is held in va lid or unenforceable under an y particular circumstan ce, the balance o f the section is intended to apply , and the section as a whole is intended to apply in other circumstances.
System Administrator Guide C-27 2. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LA W OR AGREED T O IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY O THER P AR T Y WHO MA Y MODIFY AND/OR REDISTRIBUTE THE LIB.
System Administrator Guide C-28 OpenSSL License OpenSSL License Copyright © 1998–2003 The OpenSSL Pr oject. All rights reserved. Redistribu tion and use in source and binary forms, with or without modification, are permitted provided that the follo wing conditions are met: 1.
System Administrator Guide C-29 gSOAP Public License V ersion 1.3a The gSO AP public license is deriv ed from the Mo zilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 te xt are 1.0.1, 2.1.(c),(d), 2. 2.(c),(d), 8.2.
System Administrator Guide C-30 1.11. “Source Code” means the preferred form of the Covered Code for making modif ications to it, including all modules it contains, plus any associated interface d.
System Administrator Guide C-31 3. DISTRIBUTION OBLIGA TIONS 3.1. Application o f License. The Modif ications which Y ou create or to which Y ou contribute are governed by the terms of this License, including without limitation Section 2.
System Administrator Guide C-32 3.5. Required Notices. Y ou must duplicate the notice in Exhibit A in each file of the Source Code. If i t is not possible to put such notice in a particular Source Cod.
System Administrator Guide C-33 6. VERSIONS OF THE LICENSE 6.1. Ne w V ersions. Grantor may publish revised and/or new v ersions of the License from time to time . Each version will be gi ven a distinguishing ve rsion number . 6.2. Effect of Ne w V ersio ns.
System Administrator Guide C-34 THE A UTHORS EXPRESSL Y DISCLAIM ANY LIABILITY RESUL TING FR OM USE OF THE SOFTW AR E IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIR ONMENTS AND A CCEPTS NO LIABILITY IN RESPECT OF ANY A CTIONS OR CLAIMS B ASED ON THE USE OF THE SOFTW ARE IN ANY SUCH ONLINE EQUIPMENT IN HAZARDOUS ENVIR ONMENTS BY Y OU.
System Administrator Guide C-35 10. U .S. GO VERNMENT END USERS 11. MISCELLANEOUS 12. RESPONSIBILITY FOR CLAIMS As between Initial De veloper and the Contrib uto rs, each party is responsible for clai.
System Administrator Guide C-36 EXHIBIT B. “Part of the softw are embedded in this product is gSO AP software. Portions created b y gSO AP are Copyright (c) 2001–2004 Robert A.
System Administrator Guide Index-1 Index A about the configuration file, 2-2 access control lists, 4-4 definition, 6-1 specifying access to pr inter settings, 4-8 specifying printer access using SNMP,.
Index System Administrator Guide Index-2 certificates, 4-3 definition, 6-1 root-signed, 4-4 self-signed, 4-3 setting up, 4-6 changing email server settings, 3-10 EtherTalk settings, 3-13 FTP settings,.
Index System Administrator Guide Index-3 G getting help Online Support Assistan t, 1-1 PhaserSMART Technical Support, 1-1, 1-2 PrintingScout alerts, 1-2 Technical Support, 1-1 glossary, 6-1 GNU Toolki.
Index System Administrator Guide Index-4 O Online Support Assistan t, 1-1 OpenSSL License, C-28 options automatic removal of secure, personal, and proof jobs, 4 -12 hard drive overwrite security, 4-11.
Index System Administrator Guide Index-5 setting up certificate, 4-6 MaiLinX alerts, 3-12 MaiLinX remote printing, 3-11 usage profile reporting, 3- 4 SLP, 2-6 definition, 6-4 Smart Trays, 5-2 definiti.
An important point after buying a device Xerox 1235/DX (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Xerox 1235/DX yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Xerox 1235/DX - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Xerox 1235/DX you will learn all the available features of the product, as well as information on its operation. The information that you get Xerox 1235/DX will certainly help you make a decision on the purchase.
If you already are a holder of Xerox 1235/DX, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Xerox 1235/DX.
However, one of the most important roles played by the user manual is to help in solving problems with Xerox 1235/DX. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Xerox 1235/DX along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center