Summary of Phaser 8560

  • Page 1

    Www.Xerox.Com/support office printers system guide administrator p h a s e r ® 6 3 6 0 c o l o r l a s e r p r i n t e r p h a s e r ® 8 5 6 0 c o l o r p r i n t e r p h a s e r ® 4 5 1 0 l a s e r p r i n t e r.

  • Page 2

    Copyright © 2007 xerox corporation. All rights reserved. Unpublished rights reserved under the copyright laws of the united states. Contents of this publication may not be reproduced in any form without permission of xerox corporation. Copyright protection claimed includes all forms of matters of co...

  • Page 3

    System administrator guide i contents 1 overview resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 printingscout alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

  • Page 4

    Contents system administrator guide ii protocol control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 http. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

  • Page 5

    Contents system administrator guide iii 5 printing features secure, personal, personal saved, proof, print with and saved print jobs . . . . . . . . . . . . . 5-2 smart trays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5...

  • Page 6

    Contents system administrator guide iv ftp parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6 status notification parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

  • Page 7: Resources

    System administrator guide 1-1 this section includes: ■ resources on page 1-1 ■ printingscout alerts on page 1-2 ■ phasersmart technical support on page 1-2 ■ xerox support centre on page 1-4 ■ centreware internet services (is) on page 1-5 you can obtain information regarding your printer and its ca...

  • Page 8: Printingscout Alerts

    Printingscout alerts system administrator guide 1-2 printingscout alerts printingscout is an automated tool that is installed with the xerox printer driver. It automatically checks the printer status when a print job is sent. If the printer is unable to print a job, printingscout automatically displ...

  • Page 9

    Phasersmart technical support system administrator guide 1-3 using centreware is to access phasersmart technical support from centreware is: 1. Launch your web browser. 2. Enter your printer’s ip address in the browser’s address field (http://xxx.Xxx.Xxx.Xxx). 3. Click the support tab. 4. Select the...

  • Page 10: Xerox Support Centre

    Xerox support centre system administrator guide 1-4 xerox support centre the xerox support centre is a utility that is installed when running the driver installer. It is available for systems with windows 2000 and later or mac os x, version 10.2 and higher. The xerox support centre appears on the de...

  • Page 11

    Centreware internet services (is) system administrator guide 1-5 centreware internet services (is) centreware is provides a simple interface that enables you to manage, configure, and monitor networked printers from your desktop using an embedded web server. Centreware is gives administrators easy a...

  • Page 12: Network Installation

    System administrator guide 2-1 this chapter includes: ■ using a startup network configuration file on page 2-2 ■ printer driver installation features on page 2-3 ■ discovery protocols on page 2-5 see also: advanced features guide at www.Xerox.Com/support network installation features.

  • Page 13: About The Configuration File

    Using a startup network configuration file system administrator guide 2-2 using a startup network configuration file this section includes: ■ about the configuration file on page 2-2 ■ configuration file requirements on page 2-2 ■ specifying the location of the configuration file on page 2-2 about t...

  • Page 14: Walk-Up Printing Driver

    Printer driver installation features system administrator guide 2-3 printer driver installation features this section includes: ■ walk-up printing driver on page 2-3 ■ walk-up installation on page 2-3 ■ installation from the printer’s hard drive or the web on page 2-4 ■ discovery protocols on page 2...

  • Page 15: Auto-Configuring Driver

    Printer driver installation features system administrator guide 2-4 installation from the printer’s hard drive or the web you can install the printer driver from the printer’s hard drive. This is especially useful if you do not have the software and documentation cd-rom . Note: if the printer doesn’...

  • Page 16: Discovery Protocols

    Discovery protocols system administrator guide 2-5 discovery protocols this section includes: ■ ddns/wins on page 2-5 ■ dns (domain name services) on page 2-6 ■ service location protocol on page 2-6 ■ upnp (universal plug and play) on page 2-7 ddns/wins ddns/wins settings can be obtained from the bo...

  • Page 17: Dns (Domain Name Services)

    Discovery protocols system administrator guide 2-6 dns (domain name services) dns settings reference servers by name and allow you to enter and view host names rather than ip addresses. Note: turning multicast dns on allows the printer to be automatically discovered on a tcp/ip network by apple maci...

  • Page 18

    Discovery protocols system administrator guide 2-7 upnp (universal plug and play) upnp provides a simplified method to obtain an ip address for a printer, locate devices on the network, and display those devices on desktop computers. 1. Launch your web browser. 2. Enter your printer’s ip address in ...

  • Page 19: Network

    System administrator guide 3-1 this chapter includes: ■ printer neighborhood on page 3-2 ■ job accounting on page 3-3 ■ usage profile reports on page 3-4 ■ xerox usage analysis tool on page 3-5 ■ protocol control on page 3-6 ■ cloning on page 3-14 network administration features.

  • Page 20: Printer Neighborhood

    Printer neighborhood system administrator guide 3-2 printer neighborhood printer neighborhood is a tool in centreware is that enables you to search for printers on your network, check their status, and manage them remotely. You can also install, manage, and view printer usage information. Access to ...

  • Page 21: Job Accounting

    Job accounting system administrator guide 3-3 job accounting the printer stores information about print jobs. This information is stored in a log file, which lists job records. Each job record contains fields such as user name, job name, pages printed, job times, and toner or ink used. Not all field...

  • Page 22: Usage Profile Reports

    Usage profile reports system administrator guide 3-4 usage profile reports usage profile reports provide information on many aspects of printer usage, such as ink or toner used, number of pages printed, and paper types used, gathered during the life of the printer. From this page you can view or pri...

  • Page 23: Xerox Usage Analysis Tool

    Xerox usage analysis tool system administrator guide 3-5 xerox usage analysis tool the xerox usage analysis tool (uat) enables you to collect and analyze enterprise-wide xerox network printer usage data with customizable features: ■ cost analysis : track printing costs by groups of users or by group...

  • Page 24: Protocol Control

    Protocol control system administrator guide 3-6 protocol control this section includes: ■ http on page 3-6 ■ tcp/ip on page 3-7 ■ port 9100 on page 3-7 ■ lpr on page 3-8 ■ ipp (internet printing protocol) on page 3-8 ■ snmp (simple network management protocol) on page 3-9 ■ ftp (file transfer protoc...

  • Page 25: Tcp/ip

    Protocol control system administrator guide 3-7 tcp/ip to change tcp/ip settings: 1. Launch your web browser. 2. Enter your printer’s ip address in the browser’s address field (http://xxx.Xxx.Xxx.Xxx). 3. Click properties . 4. Select the protocols folder on the left navigation panel. 5. Select tcp/i...

  • Page 26: Lpr

    Protocol control system administrator guide 3-8 lpr lpr is an application-level printing protocol that uses tcp/ip to establish connections between printers and workstations on a network. To change lpr settings: 1. Launch your web browser. 2. Enter your printer’s ip address in the browser’s address ...

  • Page 27: Ftp (File Transfer Protocol)

    Protocol control system administrator guide 3-9 snmp (simple network management protocol) snmp is a set of protocols designed to help manage complex networks. Snmp-compliant devices store data about themselves in mibs and return this data to the snmp requesters. The snmp configuration pages provide ...

  • Page 28

    Protocol control system administrator guide 3-10 email server or smtp (simple mail transfer protocol) the email server settings page enables you to configure email server settings and to specify a return email address for undeliverable email. You can configure email server settings in centreware is ...

  • Page 29: Mailinx Remote Printing

    Protocol control system administrator guide 3-11 mailinx remote printing mailinx remote printing provides the following key features: ■ the ability to send print jobs to a group of printers. ■ print services across firewalls and proxies. ■ status reporting using email messages. Mailinx remote printi...

  • Page 30: Mailinx Alerts

    Protocol control system administrator guide 3-12 mailinx alerts about mailinx alerts mailinx alerts enable the printer to automatically send email to you and/or specified users when the following conditions occur: ■ the printer requires attention or when service is needed. ■ the printer displays an ...

  • Page 31: Ethertalk

    Protocol control system administrator guide 3-13 ethertalk to change ethertalk settings: 1. Launch your web browser. 2. Enter the printer’s ip address in the browser’s address field (http://xxx.Xxx.Xxx.Xxx). 3. Click properties . 4. Select the protocols folder on the left navigation panel. 5. Select...

  • Page 32: Cloning

    Cloning system administrator guide 3-14 cloning cloning enables you to configure one printer and then copy that configuration to another printer on the same network. You can access cloning using centreware is or centreware web. Using centreware is, you can select the settings you want to clone from ...

  • Page 33: Security Features

    System administrator guide 4-1 this chapter includes: ■ basic concepts on page 4-2 ■ securing the printer in a high security environment on page 4-5 ■ managing certificates on page 4-6 ■ configuring ssl on page 4-7 ■ configuring administrator and key user settings on page 4-8 ■ configuring the print...

  • Page 34: Basic Concepts

    Basic concepts system administrator guide 4-2 basic concepts this section includes: ■ about admin and key user accounts on page 4-2 ■ about http, https, and ssl/tls on page 4-3 ■ about certificates on page 4-3 ■ about access control lists on page 4-4 about admin and key user accounts admin and key u...

  • Page 35: About Certificates

    Basic concepts system administrator guide 4-3 about http, https, and ssl/tls http (hyper text transfer protocol) is the protocol used to communicate across the internet between the printer web server and the web browser (clients). Because the data is transmitted in plain text and passwords are only ...

  • Page 36: About Access Control Lists

    Basic concepts system administrator guide 4-4 if you want to use https, each printer must have a unique certificate that is accepted by each browser used to access the printer. This allows the printer web server to use https and encrypt data between the web browser and the printer. In addition, beca...

  • Page 37: Environment

    Securing the printer in a high security environment system administrator guide 4-5 securing the printer in a high security environment if you are concerned about the security of your printer in a high security environment, such as a college or printing kiosk, you can configure settings in centreware...

  • Page 38: Managing Certificates

    Managing certificates system administrator guide 4-6 managing certificates to modify a self-signed certificate so it is specific to your printer or to install a downloaded root-signed certificate on the printer: 1. Launch your web browser. 2. Enter your printer’s ip address in the browser’s address ...

  • Page 39: Configuring Ssl

    Configuring ssl system administrator guide 4-7 configuring ssl once a certificate is set up, you can select when to use ssl to secure the connection between the printer and the server. Note: you can restrict user access to ssl pages in centreware is. For more information, see configuring administrat...

  • Page 40

    Configuring administrator and key user settings system administrator guide 4-8 configuring administrator and key user settings to prevent unauthorized changes to printer settings: 1. Launch your web browser. 2. Enter your printer’s ip address in the browser’s address field (http://xxx.Xxx.Xxx.Xxx). ...

  • Page 41

    Configuring the print host access list system administrator guide 4-9 configuring the print host access list to prevent unauthorized printing to your printer: 1. Launch your web browser. 2. Enter your printer’s ip address in the browser’s address field (http://xxx.Xxx.Xxx.Xxx). 3. Click properties ....

  • Page 42

    Controlling access to color printing system administrator guide 4-10 controlling access to color printing note: color access controls are available on color printers only. To control the user’s access to color printing, you can require the use of a 4-digit numeric password to print in color. To requ...

  • Page 43: Securing The Hard Drive

    Securing the hard drive system administrator guide 4-11 securing the hard drive this section includes: ■ selecting the hard drive overwrite security option on page 4-11 ■ selecting the automatic removal of secure, personal, and proof jobs option on page 4-12 selecting the hard drive overwrite securi...

  • Page 44: Proof Jobs Option

    Securing the hard drive system administrator guide 4-12 using centreware is to select the hard drive overwrite security option: 1. Launch your web browser. 2. Enter the printer’s ip address in the browser’s address field (http://xxx.Xxx.Xxx.Xxx). 3. Click properties . 4. Select the security folder o...

  • Page 45

    Securing the hard drive system administrator guide 4-13 4. To remove all secure, personal, and proof print files every day at a set time: a. Select daily removal , and then press the ok button to select on or off . B. Select remove at hh:mm , and then press the ok button. C. Enter the hour, and then...

  • Page 46: 802.1X Configuration

    802.1x configuration system administrator guide 4-14 802.1x configuration introduction to 802.1x and eap the 802.1x ieee standard defines port-based, authenticated network access control for ethernet local area networks (lans). With 802.1x, the user or device must pass network access control by succ...

  • Page 47

    802.1x configuration system administrator guide 4-15 7. Install root certificate – if you select eap method(s) that require a root certificate, you can: ■ install a new root certificate. ■ use the already existing root certificate. ■ choose not to validate server. 8. Install device certificate – if ...

  • Page 48

    Locking the control panel menus system administrator guide 4-16 locking the control panel menus to prevent others from changing settings in the printer setup menus, you can lock some of the control panel menus. This is useful when printers are located in public places, such as schools, libraries, an...

  • Page 49: Configuring Snmp

    Configuring snmp system administrator guide 4-17 configuring snmp this section includes: ■ configuring snmp for maximum security on page 4-17 ■ configuring snmp v1/v2c on page 4-18 ■ configuring snmp v3 on page 4-20 ■ configuring the snmp access control list on page 4-22 ■ disabling snmp on page 4-2...

  • Page 50: Configuring Snmp V1/v2C

    Configuring snmp system administrator guide 4-18 d. On the administrative security settings page, clear the view configuration web pages and modify configuration web pages check boxes for users who should not have access to these pages. 6. Configure snmp v3 by setting up the snmp administrative and ...

  • Page 51

    Configuring snmp system administrator guide 4-19 adding or editing traps for snmp v1/v2c to add or edit traps for snmp v1v2c: 1. On the snmp configuration page: click the configure snmp v1v2c button, and then click the configure traps button. The configure traps page lists the current trap destinati...

  • Page 52: Configuring Snmp V3

    Configuring snmp system administrator guide 4-20 configuring snmp v3 when configuring snmp v3, you can set up: ■ administrative, key, any user, and driver accounts with privacy and authentication keys associated with each account. ■ snmp user read and write access. ■ an access control list that limi...

  • Page 53

    Configuring snmp system administrator guide 4-21 the key user account settings ■ user name : the key user account name defined on the configure snmp v3: key user account page. ■ authentication protocol : the protocol associated with the authentication key; selected on the configure snmp v3 key user ...

  • Page 54

    Configuring snmp system administrator guide 4-22 configuring the snmp access control list to set up a list of hosts that are authorized to access the printer using snmp: 1. Launch your web browser. 2. Enter your printer’s ip address in the browser’s address field (http://xxx.Xxx.Xxx.Xxx). 3. Click p...

  • Page 55: Disabling Snmp

    Configuring snmp system administrator guide 4-23 disabling snmp if you are not using snmp, disable it to prevent unauthorized access through applications that use these protocols. If you disable snmp, the following driver features are also disabled: ■ printingscout alerts ■ walk-up printing installe...

  • Page 56: Printing Features

    System administrator guide 5-1 . This chapter includes: ■ secure, personal, personal saved, proof, print with and saved print jobs on page 5-2 ■ smart trays on page 5-2 ■ jam recovery on page 5-3 printing features.

  • Page 57: With and Saved Print Jobs

    Secure, personal, personal saved, proof, print with and saved print jobs system administrator guide 5-2 secure, personal, personal saved, proof, print with and saved print jobs these features are available if your printer has an internal hard drive. These jobs are stored on the hard drive and remain...

  • Page 58: Jam Recovery

    Jam recovery system administrator guide 5-3 jam recovery note: jam recovery is not available on all printers, check the documentation that came with your printer for more information. The jam recovery settings enable you to select how the printer handles jobs that are in the process of printing when...

  • Page 59: Terms and Abbreviations

    System administrator guide 6-1 terms and abbreviations glossary terms and abbreviations definitions access control list a centreware is feature that enables you to limit access to devices, as well as device configuration and management features. Admin account a centreware is feature that enables you...

  • Page 60

    Terms and abbreviations system administrator guide 6-2 driver software that is loaded on the client workstation that prepares data to be sent to the printer. Eap eap(extensible authentication protocol) is the standard authentication mechanism carried over 802.1x. The eap method is an inner authentic...

  • Page 61

    Terms and abbreviations system administrator guide 6-3 mdns mdns (multicast dns) is a multicast-based discovery protocol that enables you to find your printer on an apple network or another device that uses multicast-based discovery. Mib mib (management information base) provides specific informatio...

  • Page 62

    Terms and abbreviations system administrator guide 6-4 radius radius (remote authentication dial in user service) is a server used for remote user authentication and accounting. It can be used on any network that needs a centralized authentication and/or accounting service for its workstations. Slp ...

  • Page 63: Configuration Card

    System administrator guide a-1 the printer has a configuration card that stores network parameters and configuration (n, dn, dx, etc.) data. The configuration card is hot swappable, enabling you to share or replace it, providing an alternative to on-site service. Network settings are saved on the co...

  • Page 64: Postscript Parameters

    General information parameters system administrator guide a-2 general information parameters ■ printer name ■ startup page enabled ■ printer id ■ sys/start job ■ job timeout ■ load paper timeout ■ menu timeout ■ power saver timeout ■ intelligent ready ■ paper source ■ tray 1 or tray 1 (mpt) ■ tray 2...

  • Page 65: Pcl Parameters

    Pcl parameters system administrator guide a-3 pcl parameters ■ font number ■ pitch ■ point size ■ symbol set ■ orientation ■ form length ■ line termination ■ color mode (on color printers) ■ wide a4 usb 2.0 parameters ■ language ■ wait timeout hard drive parameters the hard drive parameters are only...

  • Page 66: Certificates

    Certificates system administrator guide a-4 certificates ■ device certificate ■ friendly name ■ root certificate 802.1x ■ enabled ■ disabled ethertalk parameters ■ enabled ■ disabled ■ language ■ filtering ■ name ■ printer type ■ zone ■ network node tcp/ip parameters ■ enabled ■ disabled ■ host name...

  • Page 67: Dns Parameters

    Dns parameters system administrator guide a-5 dns parameters ■ primary server ■ secondary server ■ multicast dns (bonjour) enable slp parameters ■ enabled ■ disabled ■ directory agent discovery enable ■ directory agent ■ scope 1 ■ scope 2 ■ scope 3 ■ slp multicast enable ■ slp multicast ttl ■ slp mt...

  • Page 68: Snmp Parameters

    Appsocket (port 9100) parameters system administrator guide a-6 appsocket (port 9100) parameters ■ enabled ■ disabled ■ language ■ filtering ipp (internet printing protocol) parameters ■ enabled ■ disabled ■ language ■ filtering ■ network path snmp parameters ■ snmp v1/v2c ■ snmp v3 ■ host access li...

  • Page 69

    Status notification parameter system administrator guide a-7 status notification parameter ■ disabled ■ enabled ■ sysadmin email address ■ service email address ■ key user email address mailinx remote printing parameters ■ language ■ filtering ■ pop3 server ■ pop3 user name ■ pop3 password ■ pop3 po...

  • Page 70: Printer Commands

    System administrator guide b-1 printer control language (pcl) and printer job language (pjl) commands can be used to control print job settings and printer defaults. In addition to the standard pcl and pjl commands, the phaser printers support xerox-unique pcl and pjl commands. This appendix lists t...

  • Page 71: Phaser Pcl Commands

    Phaser pcl commands system administrator guide b-2 phaser pcl commands this section includes: ■ media size on page b-2 ■ media type on page b-3 ■ input trays on page b-4 ■ output trays on page b-4 media size the following table lists the most common pcl commands for supported media sizes. For inform...

  • Page 72: Media Type

    Phaser pcl commands system administrator guide b-3 media type the following table lists the most common pcl commands for supported media types. For information on which media sizes are supported in your printer, and the trays that support them, print the paper tips page from your printers control pa...

  • Page 73: Input Trays

    Phaser pcl commands system administrator guide b-4 input trays the following table lists the most common pcl commands for the input trays supported by your printer. The table also lists the alternate tray used if the optional input tray is not installed. Note: when more than one command is listed, y...

  • Page 74: Phaser Pjl Commands

    Phaser pjl commands system administrator guide b-5 phaser pjl commands the following table lists the most commonly used hp pjl and xerox-unique pjl commands. See also: hp printer job language technical reference for the standard set of pjl commands. Pjl command values description @pjl fsdelete name=...

  • Page 75

    Phaser pjl commands system administrator guide b-6 @pjl xjausername=“ username ” roman-8 characters 1-255 sets the user name for job accounting. @pjl xjobpassword= value 4-digit string (1-9) assigns the job password used by secure print. @pjl xpersonaljob n/a starts a personal print job. @pjl xproof...

  • Page 76

    Phaser pjl commands system administrator guide b-7 @pjl xpclpapersrc x = y x is 0, 1, 2, 3, 4, 5, 6, 7, 8, 20, 21, 22, 23, which is the number in the &l#h tray selection commands. Y is -1 for autoselect, 0 for the current tray (eject page), 1 for tray 1, 2 for tray 2, etc., and 99 for the factory de...

  • Page 77: Acknowledgements

    System administrator guide c-1 original ssleay license copyright © 1995-1998 eric young (eay@cryptsoft.Com). All rights reserved. This package is an ssl implementation written by eric young (eay@cryptsoft.Com). The implementation was written so as to conform with netscape’s ssl. This library is free...

  • Page 78

    System administrator guide c-2 this software is provided by eric young “as is” and any express or implied warranties, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the author or contributors be liable f...

  • Page 79

    System administrator guide c-3 part 2: networks associates technology, inc. Copyright notice (bsd) ----- copyright © 2001-2003, networks associates technology, inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the f...

  • Page 80

    System administrator guide c-4 part 3: cambridge broadband ltd. Copyright notice (bsd) ----- copyright © 2001-2003, cambridge broadband ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are ...

  • Page 81

    System administrator guide c-5 merchantability and fitness for a particular purpose are disclaimed. In no event shall the copyright holders or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of subs...

  • Page 82

    System administrator guide c-6 vxworks this product may include software licensed to wind river by third parties. The following notices are provided to comply with the terms of such licenses. Wind river vxworks this product may include software developed by wide project and its contributors. Permiss...

  • Page 83

    System administrator guide c-7 this product may include software copyright david a. Hinds. Use, redistribution, and modification of this code is permitted subject to the following conditions: 1. Redistribution of this code must preserve this copyright notice. 2. Binary distributions must include thi...

  • Page 84

    System administrator guide c-8 the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the author or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, proc...

  • Page 85

    System administrator guide c-9 not be used in advertising or publicity pertaining to distribution of the software or the documentation without specific, written prior permission. Intel corporation does not warrant, guarantee or make any representations regarding the use of, or the results of the use...

  • Page 86

    System administrator guide c-10 distribute, sublicense, and/or sell copies of the software, and to permit persons to whom the software is furnished to do so, subject to the following conditions: the above copyright notice and this permission notice shall be included in all copies or substantial port...

  • Page 87

    System administrator guide c-11 theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage. This product may include software copyright © 2003 ericsson r...

  • Page 88

    System administrator guide c-12 (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage. This product contains software developed by the apache software foundation ( www.Apache.Org/ ). This product contains antlr softw...

  • Page 89

    System administrator guide c-13 sniff+/sniff+ pro copyright © 1992–1997 compuware corporation copyright © 1984–1997 faircom corporation copyright © 1996–2000 greg stein and mark hammond copyright © 1999 the apache software foundation copyright © 2001 xperts software wind river usb host stack this pr...

  • Page 90

    System administrator guide c-14 whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software. This product may contain software that is based in part on the work of the independent jpeg group. Wind river ppp...

  • Page 91

    System administrator guide c-15 data security, inc. Makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind. These notices must be retained i...

  • Page 92

    System administrator guide c-16 other components of this product, including without limitation wind river workbench, tornado, vxworks, and wind river ppp, include software derived from the rsa data security, inc. Md5 message-digest algorithm, and copyright © rsa data security, inc. All rights reserv...

  • Page 93

    System administrator guide c-17 redistribution of a standard unzipsfx binary (including sfxwiz) as part of a selfextracting archive; that is permitted without inclusion of this license, as long as the normal sfx banner has not been removed from the binary or disabled. 3. Altered versions--including,...

  • Page 94

    System administrator guide c-18 government use: if you are acquiring this software on behalf of the u.S. Government, the government shall have only "restricted rights" in the software and related documentation as defined in the federal acquisition regulations (fars) in clause 52.227.19 (c) (2). If y...

  • Page 95

    System administrator guide c-19 3. You may otherwise modify your copy of this package in any way, provided that you insert a prominent notice in each changed file stating how and when you changed that file, and provided that you do at least one of the following: a. Place your modifications in the pu...

  • Page 96

    System administrator guide c-20 8. Aggregation of this package with a commercial distribution is always permitted provided that the use of this package is embedded; that is, when no overt attempt is made to make this package's interfaces visible to the end user of the commercial distribution. Such u...

  • Page 97

    System administrator guide c-21 we protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no ...

  • Page 98

    System administrator guide c-22 terms and conditions for copying, distribution and modification 1. This license agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of ...

  • Page 99

    System administrator guide c-23 (for example, a function in a library to compute square roots has a purpose that is entirely welldefined independent of the application. Therefore, subsection 2d requires that any applicationsupplied function or table used by this function must be optional: if the app...

  • Page 100

    System administrator guide c-24 when a “work that uses the library” uses material from a header file that is part of the library, the object code for the work may be a derivative work of the library even though the source code is not. Whether this is true is especially significant if the work can be...

  • Page 101

    System administrator guide c-25 for an executable, the required form of the “work that uses the library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normal...

  • Page 102

    System administrator guide c-26 if any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce ...

  • Page 103

    System administrator guide c-27 2. In no event unless required by applicable law or agreed to in writing will any copyright holder, or any other party who may modify and/or redistribute the library as permitted above, be liable to you for damages, including any general, special, incidental or conseq...

  • Page 104

    System administrator guide c-28 openssl license openssl license copyright © 1998–2003 the openssl project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source ...

  • Page 105

    System administrator guide c-29 gsoap public license version 1.3a the gsoap public license is derived from the mozilla public license (mpl1.1). The sections that were deleted from the original mpl1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified s...

  • Page 106

    System administrator guide c-30 1.11. “source code” means the preferred form of the covered code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an executable, or source code di...

  • Page 107

    System administrator guide c-31 3. Distribution obligations 3.1. Application of license. The modifications which you create or to which you contribute are governed by the terms of this license, including without limitation section 2.2. The source code version of covered code may be distributed only ...

  • Page 108

    System administrator guide c-32 3.5. Required notices. You must duplicate the notice in exhibit a in each file of the source code. If it is not possible to put such notice in a particular source code file due to its structure, then you must include such notice in a location (such as a relevant direc...

  • Page 109

    System administrator guide c-33 6. Versions of the license 6.1. New versions. Grantor may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. 6.2. Effect of new versions. Once covered code has been published under a partic...

  • Page 110

    System administrator guide c-34 the authors expressly disclaim any liability resulting from use of the software in any such on-line equipment in hazardous environments and accepts no liability in respect of any actions or claims based on the use of the software in any such online equipment in hazard...

  • Page 111

    System administrator guide c-35 10. U.S. Government end users 11. Miscellaneous 12. Responsibility for claims as between initial developer and the contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this license and y...

  • Page 112

    System administrator guide c-36 exhibit b. “part of the software embedded in this product is gsoap software. Portions created by gsoap are copyright (c) 2001–2004 robert a. Van engelen, genivia inc. All rights reserved. The software in this product was in part provided by genivia inc and any express...

  • Page 113

    System administrator guide index-1 index a about the configuration file, 2-2 access control lists, 4-4 definition, 6-1 specifying access to printer settings, 4-8 specifying printer access using snmp, 4-22 specifying printing access, 4-9 access to color printing, 4-10 accessing online manuals using c...

  • Page 114

    Index system administrator guide index-2 changing email server settings, 3-10 ethertalk settings, 3-13 ftp settings, 3-9 hard drive overwrite security setting, 4-11 ipp settings, 3-8 lpr settings, 3-8 mdns settings, 2-5 port 9100 settings, 3-7 slp settings, 2-6 tcp/ip settings, 3-7 checking printer ...

  • Page 115

    Index system administrator guide index-3 g getting help online support assistant, 1-1 phasersmart technical support, 1-1, 1-2 printingscout alerts, 1-2 technical support, 1-1 glossary, 6-1 gnu toolkit, c-12 h hard drive automatic removal of jobs option, 4-12 installing the printer driver, 2-4 overwr...

  • Page 116

    Index system administrator guide index-4 o online support assistant, 1-1 openssl license, c-28 options automatic removal of secure, personal, and proof jobs, 4-12 hard drive overwrite security, 4-11 original ssleay license, c-1 p parameters on the configuration card, a-1 pcl commands, a-1, b-1 defin...

  • Page 117

    Index system administrator guide index-5 setting up certificate, 4-6 mailinx alerts, 3-12 mailinx remote printing, 3-11 usage profile reporting, 3-4 slp, 2-6 definition, 6-4 smart trays, 5-2 definition, 6-4 smtp definition, 6-4 snmp, 3-9 access list, 4-4 configuring for maximum security, 4-17 config...