HomeSearch by PurposeConfiguring the Operating Environment for Scan Transmission

Search by Purpose

Configuring the Operating Environment for Scan Transmission

To configure the Scan to E-mail environment ([E-Mail TX (SMTP)])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [E-Mail Settings]
          • [E-Mail TX (SMTP)]

Configure the settings to send an E-mail from this machine.

Settings

Description

[ON]/[OFF]

Select whether to send an E-mail from this machine.

[ON] is specified by default.

[Scan to E-mail]

Select whether to use the E-mail transmission function.

Using this function allows you to send the scanned original data as an E-mail attachment.

[ON] is specified by default.

[Status Notification]

Select whether to use the E-mail notification function.

If a warning such as paper addition, toner replacement, or paper jam occurs on this machine, it can be sent to a registered E-mail address.

[ON] is specified by default.

[Total Counter Notification]

Select whether to use the total counter notification function.

Using this function allows you to send counter information managed by this machine to the registered E-mail address.

[ON] is specified by default.

[SMTP Server Address]

Enter the address of your E-mail server (SMTP).

Use one of the following formats.

  • Example of host name entry: "host.example.com"

  • Example of IP address (IPv4) entry: "192.168.1.1"

  • Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"

[Server Capacity Reduction Send Method]

Select the sending method to reduce the load of the E-mail server (SMTP).

  • [Binary Division]: Divides an E-mail based on the setting of [Binary division Size] when sending a large E-mail.

  • [Stop Scan TX max. limit is exceeded]: Stops sending an E-mail when its size exceeds the maximum value specified in [Server Capacity limit].

  • [Stop URL when max. limit is exceeded]: Notifies the E-mail address specified as the destination of the download URL without attaching files when the E-mail size exceeds the maximum value specified in [Server Capacity limit].

  • [Always Send via URL]: Notifies the E-mail address specified as the destination of the download URL without attaching files.

[No Limit] is specified by default.

[Binary division Size]

Enter the size to divide an E-mail when [Binary Division] is selected in [Server Capacity Reduction Send Method].

[Server Capacity limit]

Enter the maximum E-mail size allowable for the E-mail server (SMTP) when [Stop Scan TX max. limit is exceeded] or [Stop URL when max. limit is exceeded] is selected in [Server Capacity Reduction Send Method]. Tap [No Limit] to clear the selection, and enter the size.

[No Limit] is specified by default.

[Connection Timeout]

Change the timeout period for a communication with the E-mail server (SMTP), as required.

[60] sec. is specified by default.

[SSL/TLS Settings]

Select the method to encrypt communications with the E-mail server (SMTP).

Select [SMTP over SSL] or [Start TLS] according to your environment.

[OFF] is specified by default.

[Port No.]

If necessary, change the port number of the E-mail server (SMTP).

In normal circumstances, you can use the original port number.

[25] is specified by default.

[Port Number(SSL)]

If necessary, change the SSL communication port number.

In normal circumstances, you can use the original port number.

This option is available when [SMTP over SSL] is selected for [SSL/TLS Settings].

[465] is specified by default.

[Certificate Verification Level Settings]

To validate the certificate during SSL communication, select items to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period. [Confirm] is specified by default.

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer. [Do Not Confirm] is specified by default.

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path). The chain is validated by referencing the external certificates managed on this machine. [Do Not Confirm] is specified by default.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired. [Do Not Confirm] is specified by default.

  • [CN]: Confirm whether CN (Common Name) of the certificate matches the server address. [Do Not Confirm] is specified by default.

[Detail Settings]

Configure SMTP authentication or POP before SMTP authentication according to your environment.

[SMTP Authentication]

Select whether to use SMTP authentication. If [ON] is selected, configure the following settings. [OFF] is specified by default.

  • [User ID]: Enter the user ID for SMTP authentication (using up to 64 characters).

  • [Password]: Enter the password of the user name you entered into [User ID] (using up to 64 characters).

  • [Domain Name]: Enter the domain name (realm) for SMTP authentication (using up to 253 characters). This item is necessary when the SMTP authentication method is Digest-MD5.
    Enter the domain name if two or more domains (realm) exist. When only one domain (realm) exists, no entry is required. The domain name is notified from the E-mail server (SMTP) at the initial communication, and communication is automatically performed using that domain name.

  • [Authentication Setting]: Select whether to synchronize the SMTP authentication with the user authentication of this machine. This item is necessary when the user authentication is installed on this machine.
    [Use Set Value]: Uses values entered at [User ID] and [Password]. If SMTP authentication fails because the user who sends an E-mail does not match the user specified in the [User ID], specify the E-mail address to be applied to Envelope-From in [Envelope-From Setting]. If you select [Do Not Set] in [Envelope-From Setting], the E-mail address of the administrator of this machine will be applied to Envelope-From. For details on the E-mail address of the administrator of this machine, refer to Here.
    [Use User Auth. ID and Password]: Uses the user name and password of the registered user of this machine as [User ID] and [Password] for the SMTP authentication.
    [Use Set Value] is specified by default.

  • [SMTP Authentication Method]: Select the authentication method to be used for SMTP authentication.

[POP Before SMTP Authentication]

Select whether to use POP before SMTP.

Configure the setting if your environment requires the POP Before SMTP Authentication to send an E-mail.

[OFF] is specified by default.

[POP Before SMTP Time]

If necessary, change the waiting time until starting E-mail transmission after the POP authentication is successful.

[5 sec.] is specified by default.

To configure settings for improving the E-mail security using S/MIME ([S/MIME Communication Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [E-Mail Settings]
          • [S/MIME Communication Settings]

Configure settings to enable use of S/MIME on this machine. This function enables E-mail encryption and addition of a digital signature, and enhances E-mail security.

Settings

Description

[ON]/[OFF]

Select whether to use S/MIME.

[OFF] is specified by default.

[Digital Signature]

To add digital signature when sending E-mails, select a method to add it.

  • [Do not add signature]: Does not add the signature.

  • [Always add signature]: Always adds the signature. The digital signature is automatically added without performing special setting before sending an E-mail.

  • [Select when sending]: The user must select whether to add digital signature before sending an E-mail.

[Do not add signature] is specified by default.

[E-Mail Text Encryption Method]

Select the method to encrypt the E-mail text.

[3DES] is specified by default.

[Print S/MIME Information]

Select whether to print S/MIME information when this machine receives an S/MIME E-mail.

[No] is specified by default.

[Automatically Obtain Certificates]

Select whether to automatically obtain certificate from the received E-mail.

The obtained certificate is additionally registered in the E-mail address that matches the E-mail address described in the certificate.

[No] is specified by default.

[Certificate Verification Level Settings]

When verifying the obtained certificate while [Automatically Obtain Certificates] is set to [Yes], select an item to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period. [Confirm] is specified by default.

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer. [Do Not Confirm] is specified by default.

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path). The chain is validated by referencing the external certificates managed on this machine. [Do Not Confirm] is specified by default.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired. [Do Not Confirm] is specified by default.

[Digital Signature Type]

To add a digital signature when sending E-mails, select its authentication method.

[SHA-1] is specified by default.

To configure the FTP transmission environment ([FTP TX Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [FTP Settings]
          • [FTP TX Settings]

Configure settings to enable use of the FTP transmission function on this machine.

Settings

Description

[ON]/[OFF]

Select whether to use the FTP transmission function of this machine.

Selecting this option sends the scanned original data to the FTP server.

[ON] is specified by default.

[Proxy Server Address]

To access to the FTP server via a proxy server, enter the proxy server address.

Use one of the following formats.

  • Example of host name entry: "host.example.com"

  • Example of IP address (IPv4) entry: "192.168.1.1"

  • Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"

[Proxy Server Port Number]

If necessary, change the proxy server port number.

In normal circumstances, you can use the original port number.

[21] is specified by default.

[Port No.]

If necessary, change the FTP server port number.

In normal circumstances, you can use the original port number.

[21] is specified by default.

[Connection Timeout]

If necessary, change the time-out time to limit a communication with the FTP server.

[60 sec.] is specified by default.

To configure the SMB transmission environment ([Client Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [SMB Settings]
          • [Client Settings]

Configure settings to enable use of the SMB client function of this machine.

Settings

Description

[ON]/[OFF]

Select whether to use the SMB client function of this machine.

Using this function allows you to send the scanned original data to a shared folder of a computer.

[ON] is specified by default.

[SMB Authentication Setting]

Select an authentication method for SMB transmission according to your environment.

  • [NTLM v1]: Performs the NTLM v1 authentication. This option is available in the NT domain environment.

  • [NTLM v2]: Performs NTLM v2 authentication. This option is available in the NT domain environment.

  • [NTLM v1/v2]: Performs NTLMv1 authentication when NTLMv2 authentication fails. This option is available in the NT domain environment.

  • [Kerberos]: Performs Kerberos authentication. This option is available in the Active Directory domain environment.

[NTLM v1] is specified by default.

[Authentication Setting if Kerberos Fails]

If [Kerberos] is selected in [SMB Authentication Setting], select whether to perform NTLM authentication when Kerberos authentication has failed.

  • [Enable NTLM v1/v2]: NTLMv2 authentication is performed when Kerberos authentication fails, and NTLMv1 authentication is performed when NTLMv2 authentication fails. This option is available when both the Active Directory and NT domains are specified.

  • [Disable NTLM]: Assumes that authentication fails when Kerberos authentication has failed.

[Disable NTLM] is specified by default.

[User Authentication(NTLM)]

Select whether to use user authentication via the NTLM server.

[ON] is specified by default.

[DFS Setting]

Select whether to use DFS when the distributed file system (DFS) is installed.

[ON] is specified by default.

[Single Sign-On Setting]

Configure the single sign-on function for SMB transmission.

By using the user authentication information (login name and password) of this machine as SMB destination authentication information (host name and password), you can avoid the problem of having to specify SMB destination authentication information, allowing construction of a single sign-on environment for SMB transmission.

  • [Default Domain Name]: Enter the default domain name to be added to the host name of the destination at SMB transmission (using up to 64 characters).
    If the domain name of the destination is not specified by the user when sending data using SMB, the domain name specified here is added. This item is not required when Active Directory is used as an authentication server.

  • [SMB User Credential Setting]: Select whether to use the user authentication information (login name and password) of this machine as SMB destination authentication information (host name and password).
    [OFF] is specified by default.

  • [Edit SMB User Credentials]: This option is available when [ON] is selected in [SMB User Credential Setting].
    Selecting [Restrict] registers SMB destinations, excluding the user ID and password specified at login. However, using Web Connection, an SMB destination is registered, including the user ID and password.
    Selecting [Allow] enables you to select whether to register SMB destinations, including the user ID and password. Selecting [Register excluding User ID and Password] automatically adds the user ID and password at SMB transmission.
    [Restrict] is specified by default.

[SMB security Signature Setting]

Select whether to enable the SMB signature of this machine to suit your environment.

  • [No Limit]: Disables the SMB signature of this machine.

  • [Only when Requested]: Enables the SMB signature of this machine (client) only when the SMB signature is requested from the server side. If the SMB signature is not requested from the server side, operations are performed while the SMB signature of this machine (client) remains disabled, and a connection is possible even when the SMB signature on the server side is disabled.

  • [Required]: Enables the SMB signature of this machine. To establish a connection, the SMB signature is also required on the server side. If the SMB signature on the server side is disabled, it will not be possible a connection.

[Only when Requested] is specified by default.

To register basic information required to use this machine as an SMB server ([SMB Server Common Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [SMB Settings]
          • [SMB Server Settings]
            • [SMB Server Common Settings]

Configure common settings to use the machine as an SMB server.

Settings

Description

[SMB Host Name]

Enter the host name of this machine (using up to 15 characters).

[Workgroup]

Enter the name of the workgroup that contains this machine (using up to 15 characters).

[WORKGROUP] is specified by default.

[SMB Authentication Protocol]

Select the SMB authentication protocol to be used in the machine.

In Windows Vista and after, select [SMB1.0/SMB2.0] to use the SMB2.0 protocol.

[SMB1.0/SMB2.0] is specified by default.

[SMB security Signature Setting]

Select whether to enable the SMB signature of this machine to suit your environment.

  • [No Limit]: Disables the SMB signature of this machine.

  • [Only when Requested]: Enables the SMB signature of this machine (server) only when the SMB signature is requested from the client side. If the SMB signature is not requested from the client side, operations are performed while the SMB signature of this machine (server) remains disabled, and a connection is possible even when the SMB signature in the client side is disabled.

  • [Required]: Enables the SMB signature of this machine. To establish a connection, the SMB signature is also required in the client side. If the SMB signature in the client side is disabled, it will not be possible a connection.

[Only when Requested] is specified by default.

To configure the SMB printing environment ([SMB Print Setting])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [SMB Settings]
          • [SMB Server Settings]
            • [SMB Print Setting]

Configure settings to perform SMB printing on this machine.

This option is available when sharing a printer on the Windows network using SMB.

Settings

Description

[ON]/[OFF]

Select whether to use the SMB print function.

[OFF] is specified by default.

[Print Service Name]

Enter a print service name (using up to 12 upper case characters).

To enable the Share SMB File function of the Public User Box ([Share SMB File Setting])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [SMB Settings]
          • [SMB Server Settings]
            • [Share SMB File Setting]

Select whether to use the Share SMB File function.

Using the Share SMB File function allows you to share files with other PCs on the network using the Public User Box of this machine.

[OFF] is specified by default.

To register the WINS server for this machine ([WINS/NetBIOS Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [SMB Settings]
          • [WINS/NetBIOS Settings]

If the WINS server is installed to resolve the name, register it.

Settings

Description

[ON]/[OFF]

Select whether to use the WINS server.

[ON] is specified by default.

[Automatic Retrieval Settings]

Select whether to automatically obtain the address of the WINS server.

This item is necessary when DHCP is enabled.

[Enable] is specified by default.

[WINS Server Address]

Enter the WINS server address when manually specifying it.

Use the following entry formats.

  • Example of entry: "192.168.1.1"

[Node Type Setting]

Select the name resolution method.

  • [B Node]: Query by broadcast

  • [P Node]: Makes inquires to the WINS server.

  • [M Node]: Makes inquiries to the broadcast and WINS server in sequence.

  • [H Node]: Makes inquiries to the WINS server and broadcast in sequence.

[H Node] is specified by default.

To specify whether to enable the direct hosting SMB service ([Direct Hosting Setting])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [SMB Settings]
          • [Direct Hosting Setting]

Select whether to enable the direct hosting SMB service. If enabled, a peer can be specified using the IP address (IPv4 or IPv6) or host name.

[ON] is specified by default.

To specify whether to check if there are sub folders when searching for an SMB sharing folder ([SMB Browsing setting])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [SMB Settings]
          • [SMB Browsing setting]

Select whether to check if there are sub folders when searching for an SMB sharing folder on the network.

  • [Enable Sub search]: Checks whether there are sub folders. If there are sub folders, "+" is displayed on the parent folder icon.

  • [Disable Sub search]: Does not check whether there are sub folders. Select this option to shorten the time required to display the result when searching for a folder.

[Disable Sub search] is specified by default.

To configure the WebDAV transmission environment ([WebDAV Client Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [WebDAV Settings]
          • [WebDAV Client Settings]

Configure settings to enable use of the WebDAV client function of this machine.

Settings

Description

[ON]/[OFF]

Select whether to use the WebDAV client function of this machine.

Selecting this option sends the scanned original data to the WebDAV server.

[ON] is specified by default.

[Proxy Server Address]

To access to the WebDAV server via a proxy server, enter your proxy server address.

Use one of the following formats.

  • Example of host name entry: "host.example.com"

  • Example of IP address (IPv4) entry: "192.168.1.1"

  • Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"

[Proxy Server Port Number]

If necessary, change the proxy server port number.

In normal circumstances, you can use the original port number.

[8080] is specified by default.

[User Name]

Enter the user name to log in to the proxy server (using up to 63 characters).

[Password]

Enter the password of the user name you entered into [User Name] (using up to 63 characters).

[Chunk Transmission]

Select whether to transmit data by dividing it into some chunks.

Configure the setting if your WebDAV server supports chunk transmission.

[No] is specified by default.

[Connection timeout]

If necessary, change the time-out time to limit a communication with the WebDAV server.

[60 second] is specified by default.

[Server Auth. Character Code]

Select a character code to perform the authentication under the WebDAV server.

You can use this setting when [Japanese] is specified for the language to be displayed on the Touch Panel.

[UTF-8] is specified by default.

[Certificate Verification Level Settings]

To validate the certificate during SSL communication, select items to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period. [Confirm] is specified by default.

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer. [Do Not Confirm] is specified by default.

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path). The chain is validated by referencing the external certificates managed on this machine. [Do Not Confirm] is specified by default.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired. [Do Not Confirm] is specified by default.

  • [CN]: Confirm whether CN (Common Name) of the certificate matches the server address. [Do Not Confirm] is specified by default.

To register the name of this machine to be searched using the WS discovery function ([DPWS Common Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [DPWS Settings]
          • [DPWS Common Settings]

Configure settings to detect this machine using the Web service.

Settings

Description

[Friendly Name]

Enter the name of this machine to be displayed when being searched using the Web service from the computer (using up to 62 characters).

Use a name that helps you easily identify this machine.

[Publication Service]

When using this machine in one of the following environments, select [Enable].

  • Environment where NetBIOS is disabled in Windows Vista/7/8.1/10/Server 2008/Server 2008 R2/Server 2012/Server 2012 R2

  • Environment constructed so that only communications using IPv6 are allowed.

Up to 512 destinations can be detected in Publication Service (including detection counts by NetBIOS).

[Enable] is specified by default.

[Enable SSL]

Specify whether to use the SSL for Web service communication.

[OFF] is specified by default.

[Certificate Verification Level Settings]

To validate the certificate during SSL communication, select items to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period. [Confirm] is specified by default.

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer. [Do Not Confirm] is specified by default.

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path). The chain is validated by referencing the external certificates managed on this machine. [Do Not Confirm] is specified by default.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired. [Do Not Confirm] is specified by default.

To configure the WS printing environment ([Printer Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [DPWS Settings]
          • [Printer Settings]

Configure settings to perform Web service printing.

Settings

Description

[ON]/[OFF]

Select whether to use the WS print function.

[OFF] is specified by default.

[Printer Name]

Enter the name of this machine when using it as the WS printer (using up to 63 characters).

[Printer Location]

Enter a printer location if necessary (using up to 63 characters).

[Printer Information]

Enter printer information if necessary (using up to 63 characters).

[WSD Print V2.0 Setting]

Select whether to use functions of WS printing version 2.0. When you connect this machine from the computer compatible with version 2.0, you can issue a printing prenotification to this machine, send account information, specify parameters for the advanced device functions, or obtain the device capability and localization information.

[Enable] is specified by default.

To configure the WS scanning environment ([Scanner Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [DPWS Settings]
          • [Scanner Settings]

Configure settings to perform Web service scanning.

Settings

Description

[ON]/[OFF]

Select whether to use the WS scan transmission function.

[OFF] is specified by default.

[Scanner Name]

Enter the name of this machine when using it as the WS scanner (using up to 63 characters).

[Scanner Location]

Enter a scanner location if necessary (using up to 63 characters).

[Scanner Information]

Enter scanner information if necessary (using up to 63 characters).

[Connection Timeout]

Change the time-out time to limit a communication with the computer if necessary.

[120 second] is specified by default.

To register the discovery proxy server for WS scanning or WS printing ([DPWS Extension Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [DPWS Settings]
          • [DPWS Extension Settings]

Configure settings to perform Web service printing or scanning using the discovery proxy defined by WS-Discovery in the environment where the multicast communication is restricted.

Settings

Description

[Enable Proxy]

Select whether to use a discovery proxy.

[OFF] is specified by default.

[Register Proxy]

Register a discovery proxy server to perform Web service printing or scanning.

Select a number to be registered, and configure the following items.

[Host Name]

Enter the discovery proxy server address.

Use one of the following formats.

  • Example of host name entry: "host.example.com"

  • Example of IP address (IPv4) entry: "192.168.1.1"

  • Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"

[File Path]

Enter the service name at the path of the URL where the WS-Discovery service is published in the discovery proxy server (using up to 255 characters).

[SSL Setting]

Specify whether to use the SSL for a communication with a discovery proxy server.

[OFF] is specified by default.

[Port Number]

If necessary, change the port number of the discovery proxy server.

In normal circumstances, you can use the original port number.

[80] or [443] (in use of SSL) is specified by default.

To specify whether to associate with the scan server ([Distributed Scan Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [Distributed Scan Settings]

This machine can be integrated into the system using the Distributed Scan Management.

Select whether to use the scan function associated with the distributed scan server of Windows Server 2008 R2/Server 2012/Server 2012 R2.

The function sends the original data scanned on this machine to the distributed scan server. When receiving the file, the scan server carries out sending to the SMB folder, E-mail address, or Microsoft Office SharePoint Server based on the registered scan process.

[OFF] is specified by default.

  • Enable WS scan, and configure the SSL communication settings in advance.

  • This machine must join the Active Directory domain in advance.

To register the LDAP server or Active Directory used for destination searching ([LDAP Settings])

To display:
  • [Utility]
    • [Administrator Settings]
      • [Network Settings]
        • [LDAP Settings]

Configure the settings to search for destinations from the LDAP server or Active Directory.

Settings

Description

[Enabling LDAP]

Select whether to use the LDAP server to search for a destination.

Using this function allows you to search for an E-mail address or fax number via the LDAP server when sending the scanned original data.

[OFF] is specified by default.

[Setting Up LDAP]

Register the LDAP server used to search for a destination.

Select an unregistered key, and enter the required information.

For details on settings, refer to the settings of [Setting Up LDAP] shown below.

[Default LDAP Server Setting]

Select the default LDAP server to search for a destination.

When registering multiple LDAP servers, set the frequently used LDAP server as the default.

[Default Search Result Display Setting]

Select whether an E-mail address, fax number, or Internet fax number is given priority to be displayed as the destination search result when searching for destinations from the LDAP server.

To use this function, install the optional Fax Kit in this machine or enable the Internet Fax function.

[E-mail] is specified by default.

Settings of [Setting Up LDAP]

Settings

Description

[LDAP Server Name]

Enter the name of the LDAP server (using up to 32 characters).

Use a name that helps you easily identify the server.

[LDAP Setting]

Configure settings for LDAP search operations.

  • [Max.Search Results]: Change the maximum number of destinations to be displayed as search results, if necessary. [100] is specified by default.

  • [Timeout]: Change the timeout interval for communication with the LDAP server, if required. [60 Second] is specified by default.

  • [Initial Setting for Search Details]: Specify the default LDAP search conditions for each item. [OR] is specified by default.

  • [Change Search Attribute]: Select attributes to be specified when performing the LDAP search. The setting can be switched between [Name] (cn) and [Nickname] (displayName). [Name] is specified by default.

  • [Search]: Select whether to display candidate destinations when entering part of a name. [OFF] is specified by default.

[Server Address]

Enter the LDAP server address.

Use one of the following formats.

  • Example of host name entry: "host.example.com"

  • Example of IP address (IPv4) entry: "192.168.1.1"

  • Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"

[Search Base]

Specify the starting point to search for a user to be authenticated (using up to 255 characters).

The range from the entered origin point, including the following tree structure, is searched.

Example of entry: "cn=users,dc=example,dc=com"

[SSL Setting]

Specify whether or not to use SSL for communication with the LDAP server.

[OFF] is specified by default.

[Port Number]

If necessary, change the LDAP server port number.

In normal circumstances, you can use the original port number.

[389] is specified by default.

[Port Number (SSL)]

If necessary, change the SSL communication port number.

In normal circumstances, you can use the original port number.

[636] is specified by default.

[Certificate Verification Level Settings]

To validate the certificate during SSL communication, select items to be verified.

  • [Expiration Date]: Confirm whether the certificate is within the validity period. [Confirm] is specified by default.

  • [Key Usage]: Confirm whether the certificate is used according to the intended purpose approved by the certificate issuer. [Do Not Confirm] is specified by default.

  • [Chain]: Confirm whether there is a problem in the certificate chain (certificate path). The chain is validated by referencing the external certificates managed on this machine. [Do Not Confirm] is specified by default.

  • [Expiration Date Confirmation]: Confirm whether the certificate has expired. [Do Not Confirm] is specified by default.

  • [CN]: Confirm whether CN (Common Name) of the certificate matches the server address. [Do Not Confirm] is specified by default.

[Authentication Type]

Select the authentication method to log in to the LDAP server.

Select one appropriate for the authentication method used for your LDAP server.

  • [Anonymous]

  • [Simple]

  • [Digest-MD5]

  • [GSS-SPNEGO]

  • [NTLM v1]

  • [NTLM v2]

[Anonymous] is specified by default.

[Select Server Authentication Method]

Select the LDAP server authentication method.

  • [Use Settings]: Use the settings of [Login Name], [Password], and [Domain Name].

  • [Use User Authentication]: Synchronizes with the user authentication of this machine. Uses the user name and password of the registered user of this machine as [Login Name] and [Password].

  • [Dynamic Authentication]: The system prompts you to enter the user name and password at LDAP searching.

[Use Settings] is specified by default.

[Referral Setting]

Select whether to use the referral function, if necessary.

Make an appropriate choice to fit the LDAP server environment.

[ON] is specified by default.

[Login Name]

Log in to the LDAP server, and enter the login name to search for a user (using up to 64 characters).

[Password]

Enter the password of the user name you entered into [Login Name] (using up to 64 characters).

[Domain Name]

Enter the domain name to log in to the LDAP server (using up to 64 characters).

If [GSS-SPNEGO] is selected for [Authentication Type], enter the domain name of Active Directory.

[Search Attributes Authentication]

Select whether to enable the attribute-based authentication when [Authentication Type] is set to [Simple] and [Select Server Authentication Method] to [Dynamic Authentication].

If enabled, the user does not need to enter all of the DN (Distinguished Name) when performing authentication via the LDAP server.

[No Limit] is specified by default.

[Search Attribute]

Enter the search attribute to be automatically added before the user name (using up to 64 characters).

The attribute must start with an alphabet character.

[uid] is specified by default.

[Check Connection]

Select this option to try connecting to the LDAP server using the entered information and check if the information registered is correct.

This option is displayed when [ON] is selected in [Enabling LDAP].

[Reset All Settings]

Tap this button to reset all the contents you entered.