NARRATION: Welcome to the bizhub C3850FS/C3850/C3350
Web Based Technical Training Course. This course will cover
lessons regarding the Controller and Fax portion of the bizhub
C3850FS/C3850/C3350. Please take the test after completing
this course.
NARRATION: This screen provides an overview on how to navigate through this course.
NARRATION: In this course, you should be able to complete
the following items.
NARRATION: The following “Product Overview” topics will be
covered in this lesson.
NARRATION: These are the changes in the product overview.
NARRATION: These are the controller specifications.
NARRATION: These are the interface connections.
NARRATION: The following CD-ROMs are supplied with the
machine.
NARRATION: This is a list of the supported operating systems.
NARRATION: This section will cover the control panel.
NARRATION: This slide explains the names and functions of
the control panel keys. The illustration shows the control panel
with an optional keypad installed. For details, refer to the
attached PDF file.
NARRATION: This is a continuation of the control panel keys.
NARRATION: Click on the simulation link and use the panel
simulation to check the items. Note that the service mode is
not included in these panel simulations. For information on the
Utility menu, refer to the attached PDF file.
NARRATION: This is an explanation of the destinations that
can be registered with this machine.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “PageScope Web Connection”
topics will be covered in this lesson.
NARRATION: These are the changes in the PageScope Web
Connection specifications.
NARRATION: These are the PageScope Web Connections
specifications. This list identifies differences from the existing
product.
NARRATION: This is an explanation of the operations required
to use PageScope Web Connection. For information on the
login method, refer to the attached PDF file.
NARRATION: This slide explains the screen configuration of
PageScope Web Connection.
NARRATION: This slide explains the display and setting items
of PageScope Web Connection. For details, refer to the
attached PDF file.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “Copy Functions” topics will be
covered in this lesson.
NARRATION: These are the changes in the copy functions.
NARRATION: These are the copy specifications.
NARRATION: This is a continuation of the copy specifications.
This list identifies differences from the existing product.
NARRATION: This is the basic copy operation process.
NARRATION: This is an explanation of the copy settings.
NARRATION: This is an explanation of the copy settings. This
list identifies differences from the existing product.
NARRATION: This is an explanation of making an interrupt
copy.
NARRATION: This is an explanation of recalling a
programmed copy job.
NARRATION: This is an explanation of making a proof copy.
NARRATION: This is an explanation of how to copy the front
and back sides of a card on the same side of a single sheet.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “Print Functions” topics will be
covered in this lesson.
NARRATION: These are the changes in the print functions.
NARRATION: These are the print specifications. This list
identifies differences from the existing product.
NARRATION: These are the print specifications. This list
identifies differences from the existing product.
NARRATION: This is the basic print operation process.
NARRATION: This section will cover the printer driver
installation and uninstallation.
NARRATION: Before using this machine as a printer, you need
to install the printer driver on the computer. For information on
the installation and uninstallation procedure on the Windows
environment, refer to the attached PDF files.
NARRATION: Before using this machine as a printer, you need
to install the printer driver on the computer and add the printer
to the computer. For information on the installation and
uninstallation procedure on the Mac OS environment, refer to
the attached PDF files.
NARRATION: Before using this machine as a printer, you need
to install the printer driver on the computer. For information on
the installation procedure on the Linux environment, refer to
the attached PDF file.
NARRATION: This is an explanation of the printer driver
settings. For information on the setting items of the printer
driver, refer to the attached PDF files.
NARRATION: This is an explanation of the job retention
function.
NARRATION: To print the job from the HDD, you need to
perform user authentication on this machine. When you are
successfully authenticated, the job of the login user is
automatically printed. This enhances security as well as
ensures smooth operation.
NARRATION: This is an explanation of printing directly from a
USB memory device.
NARRATION: This is an explanation of directly printing from a
computer.
NARRATION: This section will cover the AirPrint function.
NARRATION: This is the AirPrint overview.
NARRATION: Shown here is the Example for a Network
Environment.
NARRATION: These are the Control Panel settings for AirPrint
and Connection timeout.
NARRATION: These are the settings for using Web
Connection.
NARRATION: Shown here is the procedure for using the
AirPrint function.
NARRATION: These are the restrictions to using the AirPrint
function. Disabling the functions listed here will also disable
AirPrint.
NARRATION: This section will cover the Mopria Print function.
NARRATION: This is the Mopria Print overview.
NARRATION: Shown here is the Example of printing in a
Network Environment.
NARRATION: Shown here is the procedure for using Mopria
Print .
NARRATION: These are the restrictions for using the Mopria
Print function. If on of these functions are disabled after the
Mopria Print function is enabled, the Mopria function will also
be disabled.
NARRATION: In this lesson, you learned about the following
items.
Narration: Take this quiz to test your knowledge.
NARRATION: The following “Scan Functions” topics will be
covered in this lesson.
NARRATION: These are the scan specifications.
NARRATION: This is the process of the basic scan operation.
For details, refer to the attached PDF files.
NARRATION: This section will cover the Scan to E-mail
function.
NARRATION: With Scan to E-mail, original data scanned by
this machine is sent to any E-mail address as an E-mail
attachment.
NARRATION: This is an explanation of the settings for using
Scan to E-mail. For details, refer to the attached PDF file.
NARRATION: This is an explanation of the Scan to Me
function.
NARRATION: This section will cover the Scan to SMB function.
NARRATION: With Scan to SMB, original data scanned by this
machine is sent to a shared folder of a computer. To use this
function, specify the computer or file server as a destination.
NARRATION: This is an explanation of the settings for using
Scan to SMB. For details, refer to the attached PDF file.
NARRATION: This is an explanation of the Scan to Home
function.
NARRATION: With Scan to FTP, original data scanned by this
machine is sent to an FTP server. This function is useful when
transferring a file through an FTP server.
NARRATION: This is an explanation of the settings to use
Scan to FTP. For details, refer to the attached PDF file.
NARRATION: With Scan to WebDAV, original data scanned by
this machine is sent to a WebDAV server. This function is
useful when transferring a file through the WebDAV server.
NARRATION: This is an explanation of the settings to use
Scan to WebDAV. For details, refer to the attached PDF file.
NARRATION: With Scan to External Memory, original data
scanned by this machine is saved in the USB memory device
connected to this machine.
NARRATION: With Scan to HDD, original data scanned by this
machine is saved in the built-in HDD. The original data saved
in the HDD can be downloaded via the Web browser on the
computer.
NARRATION: This explains the use of the files saved in the
HDD.
NARRATION: With the Web Service Scan function, you import
the original data by issuing a scan instruction from a computer
without configuring complicated system settings, or send the
original data scanned by this machine to a computer.
NARRATION: This is an explanation of the settings to use the
Web Service scan function. For details, refer to the attached
PDF file.
NARRATION: You can convert the original data scanned by
this machine into a file, and import it from a computer on the
network using TWAIN/WIA-compatible applications. For details,
refer to the attached PDF file.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “Fax Functions” topics will be
covered in this lesson.
NARRATION: This is the change to the fax functions. Windows
XP support has ended.
NARRATION: This section will cover the overview of the fax
functions.
NARRATION: This explains the overview of the G3 fax.
NARRATION: This explains the overview of Internet fax.
NARRATION: This explains the overview of PC-FAX.
NARRATION: This section will cover the fax specifications.
NARRATION: These are the G3 fax specifications. This list
identifies differences from the existing product.
NARRATION: These are the Internet fax specifications.
NARRATION: These are the PC-FAX specifications. This list
identifies differences from the existing product.
NARRATION: This section will cover the initial settings of the
fax functions.
NARRATION: This is an explanation of the settings to use G3
fax. For details, refer to the attached PDF file.
NARRATION: This is an explanation of the settings to use
Internet fax. For details, refer to the attached PDF file.
NARRATION: Before using the PC-FAX transmission function,
you will need to install the fax driver on the computer. For
information on the setting method, refer to the attached PDF
files.
NARRATION: This section will cover the basic fax
transmission operation.
NARRATION: This is the process of basic transmission
operation of G3 fax and Internet fax. For details, refer to the
attached PDF files.
NARRATION: This is the process of basic PC-FAX
transmission operation. For information on the settings of the
fax driver, refer to the attached PDF file.
NARRATION: This section will cover the various fax
transmission functions.
NARRATION: This is an explanation of the auto resending
function.
NARRATION: This is an explanation of registering a polling file.
NARRATION: This is an explanation of specifying the sending
time.
NARRATION: This is an explanation of sending a fax with a
password.
NARRATION: This is an explanation of sending a confidential
fax and specifying a relay station for sending.
NARRATION: This section will cover the various fax reception
functions.
NARRATION: This is an explanation of the RX mode for G3
fax.
NARRATION: This is an explanation of the RX method for
Internet fax.
NARRATION: This is an explanation of adding the received
date and time for printing.
NARRATION: This is an explanation of saving or forwarding an
unprintable fax.
NARRATION: This is an explanation of automatically
distributing a received fax.
NARRATION: This is an explanation of forwarding a received
fax to another destination.
NARRATION: This is an explanation of saving a received fax
to memory without printing.
NARRATION: This is an explanation of receiving a confidential
fax.
NARRATION: This is an explanation of restricting
communication peers with a password.
NARRATION: This is an explanation of receiving a polling file.
NARRATION: This is an explanation of saving a received fax
in the memory.
NARRATION: This is an explanation of stopping fax printing at
night.
NARRATION: The following types of fax reports are available.
Reports are printed automatically if certain conditions are
satisfied, or printed manually. The activity report contains the
sending and receiving results of both fax and Internet fax.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “i-Option Functions” topics will be
covered in this lesson.
NARRATION: These are the changes to the i-Option function.
NARRATION: This explains the overview of i-Option.
NARRATION: This explains the overview of i-Option.
NARRATION: This is an explanation of registering the license
kit. For details, refer to the attached PDF file.
NARRATION: This is an explanation of the Web Browser
function. For information on the Web Browser setting, refer to
the attached PDF file.
NARRATION: This is an explanation of the fonts that are
added to this machine for special purposes.
NARRATION: This is an explanation of the bar code font.
NARRATION: This is an explanation of the Unicode font.
NARRATION: This is an explanation of the OCR font.
NARRATION: If it is necessary to re-install Unicode fonts and
OCR fonts to this machine, you can re-install them from a USB
memory device.
NARRATION: This is an explanation of confirming the
additional fonts.
NARRATION: This is an explanation of the ThinPrint function.
For information on the ThinPrint setting, refer to the attached
PDF file.
NARRATION: This is an explanation of disabling the license.
For details, refer to the attached PDF file.
NARRATION: This is an explanation of initializing the license.
For details, refer to the attached PDF file.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “Wireless LAN Functions” topics
will be covered in this lesson.
Narration: Wireless LAN refers to connecting a PC to a router
wirelessly, without using a LAN cable. Requiring no wires, the
wireless LAN enables a network connection as long as radio
waves can reach the machine. For more information, see the
following sections.
Narration: This is the Wireless LAN (Client Mode). The
machine can be connected as a slave device to a wireless
LAN access point (AP).
Narration: The machine establishes a direct connection
between the machine and a PC or other device. Unlike the
Wireless LAN (Client Mode), no access point (AP) is required.
Narration: This is the Wireless LAN (AP Mode) and a wired
LAN simultaneous connectionIf certain devices need to
wirelessly access the machine, but the machine cannot be
connected to the in-house main network with the Wireless LAN
(AP Mode), the Wireless LAN (AP Mode) permits simultaneous
use with a wired LAN.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “Authentication Functions” topics
will be covered in this lesson.
NARRATION: With authentication function, you can identify a
user, as well as assign privileges to a user. To allow an
unregistered user to use this machine, enable a public user. A
public user does not require user information. Set the function
permission for a public user to a highly restricted level and
allow the registered users to only the functions that they need.
This will enhance security in your office and reduce cost
without necessary usability being lost.
NARRATION: This machine supports two authentication
methods of device authentication and external server
authentication.
NARRATION: This is an explanation of device authentication.
For information on IC card authentication, refer to the attached
PDF file.
NARRATION: This section will cover the external server
authentication.
NARRATION: This is an explanation of Active Directory
authentication. The date and time of this machine must match
those of Active Directory. If they are not the same,
authentication cannot be performed.
NARRATION: This is an explanation of NTLM authentication.
NARRATION: This is an explanation of NDS authentication.
NARRATION: This is an explanation of LDAP authentication.
NARRATION: This is an explanation of the login methods
when the authentication function is enabled. For details, refer
to the attached PDF file.
NARRATION: In this lesson, you learned about the following
items.
NARRATION: The following “Security Functions” topics will be
covered in this lesson.
NARRATION: These are the changes in the seccurity functions.
NARRATION: Various functions to enhance the security in
your office are provided with this machine. Among these
security functions, SSL/TLS and IPsec use encryption
technologies to secure the network communication. IP Address
Filtering and IEEE802.1X restrict access to this machine or to
the network, and enhance security.
NARRATION: SSL/TLS is a protocol used to use an encryption
technology and to provide safety to communication between
the client and server. In this machine, you can register a
certificate issued by a certificate authority to this machine. Also,
you can create your own self-signed certificate and register it
to this machine. To protect against spoofing, however, the
certificate must be signed by a trusted certificate authority.
When you use a self-certificate, it displays a warning message.
NARRATION: This is an explanation of the settings to use
SSL/TLS. For details, refer to the attached PDF file.
NARRATION: IPsec is a protocol used to exchange the data
securely through the Internet using encryption technology.
Because data streams are sent through a virtual tunnel, it can
avoid the risk that the data is stolen by a third party.
Data is encrypted at the entrance of the tunnel. Therefore,
even if data is stolen, information will not be able to be read by
such a party, and thus confidentiality is maintained.
NARRATION: This is an explanation of the settings to use
IPsec. For details, refer to the attached PDF file.
NARRATION: IP address filtering can restrict computers
accessible to this machine.
NARRATION: This is an explanation of the settings to use IP
address filtering. For details, refer to the attached PDF file.
NARRATION: IEEE802.1X is a protocol used to authenticate
devices such as a computer and printer connected to the LAN.
Unlike the authentication between the client and server within
a LAN, it uses hardware-level authentication such as a LAN
switch and wireless LAN access point. Therefore, robust
security can be secured.
NARRATION: This is an explanation of the settings to use
IEEE802.1X. For details, refer to the attached PDF file.
NARRATION: This is an explanation of the FIPS settings. FIPS
defines security requirements for cryptographic modules.
These standards have been adopted by many organizations,
including U.S. federal government agencies. Enabling the
FIPS Mode makes the functions of this machine conform to
the FIPS.
NARRATION: This is an explanation of the Quick Security
settings . Configure a setting to enhance the security level of
this machine. The program and [Quick Security Setting]
shortcut keys can be placed on the main menu. For details,
refer to the slide.
NARRATION: If you enable the enhanced security mode, the
various security functions are forcibly configured. This allows
you to ensure higher-level security of data management. For
information on the forcibly changed settings to enable the
enhanced security mode, refer to the attached PDF file.
NARRATION: In this lesson, you learned about the following
items.
Narration: Take this quiz to test your knowledge.
NARRATION: Congratulations! You have successfully
completed the bizhub C3850FS/C3850/C3350 Controller &
Fax Web Based Technical Training Course.