Xerox® Phaser 3320DN/3320DNI System Administrator Guide ©2012 Xerox Corporation

Total Page:16

File Type:pdf, Size:1020Kb

Xerox® Phaser 3320DN/3320DNI System Administrator Guide ©2012 Xerox Corporation Version 1.0 February 2012 Xerox® Phaser 3320DN/3320DNI System Administrator Guide ©2012 Xerox Corporation. XEROX® and XEROX and Design® are trademarks of Xerox Corporation in the United States and/or other countries. Document version 1.0: February 2012 Table of Contents 1Introduction Who should use this Guide? . .8 Machine Overview. .9 Product Configurations . .9 Control Panel Overview . 10 2 Machine Connection Machine Parts and Connection Ports . 12 Front View . 12 Rear View . 13 Initial Connection . 13 Administrator Access . 14 Wireless Connectivity (Phaser 3320DNI) . 14 Configure Ethernet Settings . 15 Print a Configuration Report . 16 Install the Additional Memory Card (Optional) . 16 CentreWare Internet Services . 18 3 Network Installation TCP/IP. 24 Configure Static IPv4 Addressing at the Machine . 24 Configure Dynamic IPv4 Addressing at the Machine . 25 Configure TCP/IP Settings using Internet Services . 26 Unix . 29 HP-UX Client (Version 10.x) . 29 Solaris 2.x . 30 SCO . 32 Linux CUPS. 33 Linux LPR via PrintTool. 34 Linux LPRng . 35 4 Printer Drivers Overview . 38 Windows - Installing Driver. 39 Macintosh - Installing Driver . 41 Linux - Installing Drivers . 43 Installing the SmartPanel . 43 Installing the Printer Setting Utility . 43 Xerox Phaser 3320DN/3320DNI 3 System Administrator Guide Unix - Installing Drivers . 45 Setting up the printer . 45 Uninstalling the printer driver package . 46 Sharing your Machine Locally . 47 Windows . 47 Macintosh. 48 Windows Printing. 49 LPR Printing . 49 Internet Printing Protocol (IPP) Port. 52 Raw TCP/IP Printing (Port 9100) . 54 USB Printing. 55 Configure the Windows Printer Driver . 56 Manual Printer Driver Configuration . 56 Apple Mac . 58 TCP/IP Printing (OSX) . 58 Configure your Apple Mac Printer Driver. 59 5Security Security @ Xerox. 61 Security Settings . 62 Administrator Accounts . 62 Feature Management. 62 Restart Device . 63 Machine Digital Certificate Management . 64 SNMP. ..
Recommended publications
  • Stickybrain™ User's Guide
    STICKYBRAIN™ USER’S GUIDE CHRONOS LLC MAY 12, 2005 1 LICENSE AGREEMENT, COPYRIGHTS, & TRADEMARKS PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE CHRONOS SOFTWARE. BY USING THE CHRONOS SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, DO NOT INSTALL OR USE THE SOFTWARE. IF YOU DO NOT AGREE TO THE TERMS OF THE LICENSE, YOU MAY RETURN THE CHRONOS SOFTWARE TO THE PLACE WHERE YOU OBTAINED IT FOR A REFUND. IF THE CHRONOS SOFTWARE WAS ACCESSED ELECTRONICALLY, CLICK "DISAGREE/DECLINE". FOR CHRONOS SOFTWARE INCLUDED WITH YOUR PURCHASE OF HARDWARE, YOU MUST RETURN THE ENTIRE HARDWARE/SOFTWARE PACKAGE IN ORDER TO OBTAIN A REFUND. IMPORTANT NOTE: This software may be used to reproduce materials. It is licensed to you only for reproduction of non-copyrighted materials, materials in which you own the copyright, or materials you are authorized or legally permitted to reproduce. If you are uncertain about your right to copy any material, you should contact your legal advisor. 1. General. The software, documentation and any supporting documents accompanying this License whether on disk, in read only memory, on any other media or in any other form (collectively the "Chronos Software") are licensed, not sold, to you by Chronos LLC ("Chronos") for use only under the terms of this License, and Chronos reserves all rights not expressly granted to you. The rights granted herein are limited to Chronos' and its licensors' intellectual property rights in the Chronos Software and do not include any other patents or intellectual property rights.
    [Show full text]
  • Openstep User Interface Guidelines
    OpenStep User Interface Guidelines 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. Part No: 802-2109-10 A Sun Microsystems, Inc. Business Revision A, September 1996 1996 Sun Microsystems, Inc. 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. Portions Copyright 1995 NeXT Computer, Inc. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from UNIX System Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third-party font software, including font technology in this product, is protected by copyright and licensed from Sun's suppliers. This product incorporates technology licensed from Object Design, Inc. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, and OpenWindows are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries.
    [Show full text]
  • Tinkertool System 6 Reference Manual Ii
    Documentation 0632-1969/2 TinkerTool System 6 Reference Manual ii Version 6.99, July 21, 2021. US-English edition. MBS Documentation 0632-1969/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Trademarks or service marks are used for identification purposes only.
    [Show full text]
  • Installation and User's Guide
    GNUstep Installation and User’s Guide Version 0.6.5 February 8, 2000 Permissions Copyright (C) 1999-2000 Free Software Foundation. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions. Apple™, OpenStep™, and the Apple logo are trademarks of Apple Computers, Inc. registered in the U.S. and other countries. PostScript™, Display PostScript™ and Adobe™ are trademarks of Adobe Systems Incorporated and may be registered in certain jurisdictions. Other company and product names mentioned herein might be trademarks of their respective companies. About the Free Software Foundation The Free Software Foundation (FSF) is dedicated to eliminating restrictions on copying, redistribution, understanding, and modification of computer programs. We do this by promoting the development and use of free software in all areas of computing---but most particularly, by helping to develop the GNU operating system. Many organizations distribute whatever free software happens to be available. In contrast, the Free Software Foundation concentrates on development of new free software---and on making that software into a coherent system that can eliminate the need to use proprietary software. Besides developing GNU, FSF distributes copies of GNU software and manuals for a distribution fee, and accepts tax-deductible gifts to support GNU development.
    [Show full text]
  • Using the Gnustep Appkit a Guide to Using Various Parts of the Gnustep Appkit for Application Development
    Using the GNUstep AppKit A guide to using various parts of the GNUstep AppKit for application development Christopher Armstrong c 2005-2006 Christopher Armstrong. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2, as published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". This documentation is provided on an "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND USEFULNESS OF THE DOC- UMENTATION IS WITH YOU (THE LICENSEE). IN NO EVENT WILL THE COPYRIGHT HOLDERS BE LIABLE FOR DAMAGES, INCLUDING ANY DIRECT, INDIRECT, SPE- CIAL, GENERAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENTATION (INCLUDING BUT NOT LIMITED TO LOSS OF DATA, USE, OR PROFITS; PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES; OR BUSINESS INTERUPTION) HOWEVER CAUSED, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Table of Contents 1 Introduction ........................................... 1 1.1 Overview ..................................................................... 1 1.2 Implementation Details ........................................................ 1 1.2.1 Drag and Drop ..........................................................
    [Show full text]
  • Parliant Phonevalet Users Guide
    PhoneValet 6.0.2 User’s Guide Copyright 2002-2009 Parliant Corporation. All Rights Reserved. All trade names referenced herein are either trademarks or registered trademarks of their respective companies. Table of Contents Address Book Dialing ............................................................................................ 23 Overview....................................................................................2 Clipboard Dialing ................................................................................................... 24 Installation ................................................................................2 AppleScript dialing................................................................................................. 24 Running PhoneValet for the First Time ................................................................... 2 Call Logging ............................................................................ 24 Multiple Line Configurations .................................................................................... 4 Caller ID ................................................................................................................ 25 Voice Mail..................................................................................4 Dialing Numbers from the Call Log........................................................................ 25 Reading the Call Log............................................................................................. 25 Configuring Voice Mail............................................................................................
    [Show full text]
  • The Operating Manual
    THE OPERATING MANUAL Vision Laboratory Volen Center for Complex Systems Brandeis University, Waltham MA Robert Sekuler, Laboratory Director mailto:[email protected] September 2, 2018 1 Contents 1 Purpose of this document.3 2 Research projects.4 3 Research collaborators4 4 Current/recent publications4 5 Communication4 6 Transparency and Reproducibility5 7 Experimental subjects.6 8 Equipment.8 9 Coding/programming. 12 10 Experimental design. 24 11 Literature sources. 24 12 Document preparation. 25 13 Scientific meetings 32 14 Essential background info 33 15 Labspeak1. 38 1This coinage, labspeak, was suggested by Orwell’s coinage “newspeak” in his novel 1984. Unlike “newspeak”, though, labspeak is mean to facilitate and sharpen thought and communication, not subvert them. 2 1 Purpose of this document. This document is meant to ease newcomers’ integration into the operation of the Vision Laboratory located in Brandeis University’s Volen Center. The document presents a lot of information, but there may be only one truly essential thing for new lab members to know: ”If you are uncertain, ask.” To repeat: ”If you are uncertain, ask.” Corollaries to this advice? “If you’re working on a document and are unsure about how it’s progressing, ask someone else to read it.” “ If you’re working on a project and realize that you can use some advice, ask for it.” It’s simple: never hesitate to take advantage of fellow lab members’ knowledge, fresh eyes and advice. When you encounter something that you don’t know, or are not sure about, and have made a good faith effort to work out on your own, it only makes good sense to ask.
    [Show full text]
  • Inside Mac OS X: System Overview Is Intended for Anyone Who Wants to Develop Software for Mac OS X
    Inside Mac OS X System Overview July 2002 Apple Computer, Inc. and TrueType are trademarks of THE WARRANTY AND REMEDIES SET © 2000–2002 Apple Computer, Inc. Apple Computer, Inc., registered in FORTH ABOVE ARE EXCLUSIVE AND All rights reserved. the United States and other countries. IN LIEU OF ALL OTHERS, ORAL OR WRITTEN, EXPRESS OR IMPLIED. No No part of this publication may be Carbon, Quartz, and Velocity Engine Apple dealer, agent, or employee is reproduced, stored in a retrieval are trademarks of Apple Computer, authorized to make any modification, system, or transmitted, in any form or Inc. extension, or addition to this warranty. by any means, mechanical, electronic, Enterprise Objects, Enterprise Objects photocopying, recording, or Framework, NeXT, Objective-C, and Some states do not allow the exclusion or otherwise, without prior written OpenStep are registered trademarks limitation of implied warranties or permission of Apple Computer, Inc., of NeXT Software, Inc., registered in liability for incidental or consequential with the following exceptions: Any the United States and other countries. damages, so the above limitation or person is hereby authorized to store Java and all Java-based trademarks exclusion may not apply to you. This documentation on a single computer are trademarks or registered warranty gives you specific legal rights, for personal use only and to print trademarks of Sun Microsystems, and you may also have other rights which copies of documentation for personal Inc., in the United States and other vary from state to state. use provided that the documentation countries. contains Apple’s copyright notice. Netscape Navigator is a trademark of The Apple logo is a trademark of Netscape Communications Apple Computer, Inc.
    [Show full text]
  • Avaya Call Management System Release 15 Software Installation, Maintenance, and Troubleshooting Guide
    Avaya Call Management System Release 15 Software Installation, Maintenance, and Troubleshooting Guide February 2010 © 2010 Avaya Inc. All Rights Reserved. Preventing toll fraud "Toll fraud" is the unauthorized use of your telecommunications system by an Notice unauthorized party (for example, a person who is not a corporate employee, While reasonable efforts were made to ensure that the information in this agent, subcontractor, or is not working on your company's behalf). Be aware document was complete and accurate at the time of printing, Avaya Inc. can that there can be a risk of toll fraud associated with your system and that, if toll assume no liability for any errors. Changes and corrections to the information fraud occurs, it can result in substantial additional charges for your in this document might be incorporated in future releases. telecommunications services. Documentation disclaimer Avaya fraud intervention Avaya Inc. is not responsible for any modifications, additions, or deletions to If you suspect that you are being victimized by toll fraud and you need technical the original published version of this documentation unless such modifications, assistance or support, call Technical Service Center Toll Fraud Intervention additions, or deletions were performed by Avaya. Customer and/or End User Hotline at +1-800-643-2353 for the United States and Canada. For additional agree to indemnify and hold harmless Avaya, Avaya's agents, servants and support telephone numbers, see the Avaya Support Web site: employees against all claims, lawsuits, demands and judgments arising out of, http://www.avaya.com/support or in connection with, subsequent modifications, additions or deletions to this documentation to the extent made by the Customer or End User.
    [Show full text]
  • Nextstep Programming
    To my parents, Marvin and Marian, who have put up with my addiction to computers since before I could type. - Simson To Louise, Nina, and Timmy. - Michael vii Preface Welcome! This book is about programming computers running NeXTSTEP. It’s a no- nonsense, hands-on book that teaches programmers how to write applica- tion programs that take full advantage of NeXTSTEP, the operating envi- ronment from NeXT Computer Inc. Writing programs for NeXTSTEP is fundamentally different than writing programs for other computers, because NeXTSTEP represents a radical departure from conventional programming environments. One writes NeXTSTEP programs by building systems of related but distinct parts, or objects, and connecting them together to form an integrated whole. Confin- ing different aspects of a program to different pieces makes those pieces easier to design, implement, debug, and reuse. This is what is known as object-oriented programming. NeXTSTEP embodies the principles of object oriented programming from its user interface down to its very core. This greatly simplifies the task of interfacing application programs with the NeXTSTEP operating environ- ment. The downside is that it makes the NeXTSTEP environment very dif- ferent from the environments to which most programmers are accustomed: there’s a steep curve to climb when learning to program in this easy-to-pro- gram environment (sounds strange, but it’s true). We wrote this book out of frustration: at the time, there was no single book that explained step-by-step how to write programs for NeXTSTEP. Instead, a programmer trying to approach the platform was confronted by the NeXT technical documentation and the source-code for several dozen example programs.
    [Show full text]
  • SOHO Notes™ User Guide
    SOHO Notes™ User Guide Chronos Inc. February 10, 2011 1 © 2011 Chronos Inc. All rights reserved. Under the copyright laws, this user guide may not be copied, in whole or in part, without the written consent of Chronos. Your rights to the software are governed by the accompanying software license agreement. Every effort has been made to ensure that the information in this user guide is accurate. Chronos is not respon- sible for printing or clerical errors. Chronos Inc. www.chronosnet.com SOHO Notes, the SOHO Notes logo, and the Chronos logo are trademarks of Chronos Inc. Apple, iPhoto, Mac, Macintosh, Mac OS, iTunes, App Store, and Finder are trademarks of Apple Inc., registered in the U.S. and other countries. All other trademarks, registered trademarks, service names, product and/or brand names are the sole property of their respective owners. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Chronos assumes no responsibility with regard to the per- formance or use of these products. 2 Chapter 1—Welcome Upgrade Information 8 Learning to Use SOHO Notes 8 Chapter 2—Installation Install SOHO Notes 10 Uninstall SOHO Notes 10 Uninstall “SOHO Notes” and “SOHO Tags” From The MobileMe System Preference Pane 11 Chapter 3—Getting Started Personal Database 13 Getting Started 13 Helper Applications 14 Using Multiple Databases 14 Chapter 4—Using SOHO Notes Viewer Window 16 Tabs 18 Sorting 18 Searching 19 Chapter 5—Creating Notes Creating a Note 21 Kinds of Notes 21 Text,
    [Show full text]
  • Using the Gnustep Appkit a Guide to Using Various Parts of the Gnustep Appkit for Application Development
    Using the GNUstep AppKit A guide to using various parts of the GNUstep AppKit for application development Christopher Armstrong c 2005-2006 Christopher Armstrong. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2, as published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". This documentation is provided on an "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND USEFULNESS OF THE DOC- UMENTATION IS WITH YOU (THE LICENSEE). IN NO EVENT WILL THE COPYRIGHT HOLDERS BE LIABLE FOR DAMAGES, INCLUDING ANY DIRECT, INDIRECT, SPE- CIAL, GENERAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENTATION (INCLUDING BUT NOT LIMITED TO LOSS OF DATA, USE, OR PROFITS; PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES; OR BUSINESS INTERUPTION) HOWEVER CAUSED, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.1 Overview :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Implementation Details :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2.1 Drag and Drop :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]