Dell B3465dnf Secure Scan To E Mail Administrator's Guide User Manual Administrator Guide4 En Us

User Manual: Dell dell-b3465dnf - Secure Scan to E-mail Administrator's Guide

Open the PDF directly: View PDF PDF.
Page Count: 24

Secure Scan to E-mail
Administrator's Guide
June 2013 www.dell.com | dell.com/support/printers
A00
Contents
Overview.....................................................................................................3
Configuring Secure Scan to E-mail................................................................4
Configuring printer settings for use with the application.........................................................................4
Configuring TCP/IP settings ................................................................................................................................4
Configuring printer email settings .....................................................................................................................4
Configuring the application settings..........................................................................................................6
Securing access to the application............................................................................................................7
Using Secure Scan to E-mail..........................................................................9
Sending secure email...............................................................................................................................9
Troubleshooting.........................................................................................11
Secure Scan to E-mail issues....................................................................................................................11
Secure Scan to E-mail LDAP issues..........................................................................................................14
Secure Scan to E-mail licensing issues.....................................................................................................15
Appendix....................................................................................................16
Notices.......................................................................................................18
Index..........................................................................................................23
Contents 2
Overview
Secure Scan To E
mail is an application that runs in place of the standard printer email function and lets you digitally
sign and encrypt email sent from the printer.
Additional required applications
For the security features of the application to work correctly, the following must be installed and running on the printer:
Smart Card Authentication Client. This is needed to secure access to the email function by requiring users to log
in to the printer when they attempt to use the function. The authentication module is also needed to retrieve:
The authenticated user’s email address so that the user can send email from the printer
The user certificates needed for digital signing and encryption
The Application Access Manager. This application lets you secure access to the printer email function by associating
the function with the authentication module. For more information on Application Access Manager, see the
Application Access Manager Administrator’s Guide.
For a list of application requirements, including supported printers and required firmware versions, see the Readme
file.
For information on physically setting up the printer or using the printer features, see the printer User's Guide. After
completing initial setup tasks according to the printer User's Guide, see the Networking Guide that came with the printer
for information on how to connect the printer to your network.
Overview 3
Configuring Secure Scan to E-mail
Configuring printer settings for use with the application
Even if the printer has been set up previously, make sure all settings have been configured to enable the security
features of the application to work correctly.
Configuring TCP/IP settings
Make sure all necessary TCP/IP settings have been configured.
1From the Embedded Web Server, click Settings or Configuration.
2Click Network/Ports > TCP/IP.
3Under the TCP/IP heading, do the following:
Verify the domain name. Normally, the domain will be the same one assigned to user workstations.
If you are using a static IP address, then verify the WINS server address and the DNS server address. If a backup
DNS server is available, then type the backup DNS server address.
If the printer is located in a different domain than the domain controller, any e-mail servers you are using, or
any file shares to which printer users may need to scan, then list the additional domains in the Domain Search
Order field. Separate each domain name with a comma. If everything is in the same domain, then you can leave
the Domain Search Order field blank.
4Click Submit.
Configuring printer email settings
For the application to work correctly, the SMTP, email, and address book settings on the printer must be configured.
Configuring SMTP settings
1From the Embedded Web Server, click Settings or Configuration.
2Click E-mail/FTP Settings > SMTP Setup.
3Under the SMTP Setup heading, configure the following settings:
Primary SMTP Gateway—Type the IP address or host name of the primary SMTP server the printer will use for
sending e-mail.
Note: If you are using Kerberos to authenticate users to the SMTP server, then you must use the host name.
Primary SMTP Gateway Port—Enter the port number of the primary SMTP server.
Secondary SMTP Gateway—If you are using a secondary or backup SMTP server, then type the server IP address
or host name.
Secondary SMTP Gateway Port—If you are using a secondary or backup SMTP server, then enter the server
port number.
SMTP Timeout—Specify the number of seconds the printer will wait for a response from the SMTP server before
timing out.
Configuring Secure Scan to E-mail 4
Reply Address—Make sure this field is cleared.
Use SSL/TLS—Select Disabled, Negotiate, or Required to specify whether e-mail will be sent using an encrypted
link.
4Under the Authentication heading, configure the following settings:
SMTP Server Authentication—If the SMTP server requires user credentials, then select Kerberos 5. If Kerberos
is not supported, then select No authentication required.
Note: If the SMTP server requires user authentication to send an e-mail but does not support Kerberos,
then the IP address or host name of the printer must be added to the SMTP server as a relay.
DeviceInitiated Email—Select None or Use Device SMTP Credentials.
Note: If the printer must provide credentials to send an e-mail, then enter the appropriate information
under the Device Credentials heading.
UserInitiated Email—Select Use Session User ID and Password if you are using Kerberos authentication. Select
None if you are not using Kerberos authentication.
5Click Submit.
Configuring e-mail server settings
1From the Embedded Web Server, click Settings or Configuration.
2Click E-mail/FTP Settings > E-mail Settings.
3Under the E-mail Server Settings heading, configure the following settings:
Subject—Type a default subject line for each e-mail sent from the printer. For example, Scanned Document.
Message—Type a default message for the body of each e-mail sent from the printer. For example, Please
see the attached document.
Send me a copy—You do not need to configure this setting. When the Secure Email application is installed and
running, the “Send me a copy” option is always available to users when they send email from the printer,
regardless of how this setting is configured.
4Click Submit.
Configuring scan settings
1From the Embedded Web Server, click Settings or Configuration.
2Click E-mail/FTP Settings > E-mail Settings.
3Under the E-mail Settings heading, configure the following settings if necessary:
Color—To reduce the file size of scanned documents and images, select Off or Gray.
Resolution—The recommended range is between 150 dpi and 300 dpi. You can choose a higher resolution to
improve image quality, but higher resolutions increase the file size of scanned documents and images.
Transmission Log—The recommended setting is Print only for error.
E-mail Bit Depth—Select 8 bit for grayscale imaging or 1 bit for black and white.
4Adjust the other scan settings if necessary.
5Click Submit.
Configuring Secure Scan to E-mail 5
Configuring the address book
Configuring these settings enables users to search your network global address book for e-mail addresses.
1From the Embedded Web Server, click Settings or Configuration.
2Click Network/Ports > Address Book Setup.
3Configure the following settings:
Server Address—Type the host name (not the IP address) of the LDAP server.
Server Port—Enter the server port number that will be used for address book lookups. The most commonly
used values are:
NonSSL connections—Port 389 (the default setting on the printer)
SSL connections—Port 636
NonSSL Global Catalog—Port 3268
SSL Global Catalog—Port 3269
LDAP Certificate Verification—Select Never, Allow, Try, or Demand.
Use GSSAPI—Select this check box.
Mail Attribute—Type a name for the mail attribute (usually “mail”).
Fax Number Attribute—Leave this set to the default value.
Search Base—Type one or more values to be used when querying the LDAP directory. Separate multiple values
with a comma.
Search Timeout—Specify the maximum number of seconds allowed for each LDAP query.
Displayed Name—Select the combination of LDAP attributes to use to find the displayed name for an e-mail
address (also referred to as the “friendly” name). If you are not sure which option to select, then leave this set
to the default value.
Max Search Results—Specify the maximum number of search results to be returned from an LDAP query.
Use user credentials—Select this check box. This ensures that the address book is protected by the credentials
that are provided when you secure access to the address book function. See “Securing access to the address
book” on page 8.
4Click Submit.
Configuring the application settings
Configuring digital signing
1Access the application configuration settings from the Embedded Web Server.
2Configure the following setting:
Sign Email—Do one of the following:
Select Prompt User to let users choose to digitally sign their e-mail.
Select Disabled to disable digital signing.
Select Always Sign to require all email to be digitally signed.
Note: For users to digitally sign email, they must have a valid digital signing certificate.
3Click Apply.
Configuring Secure Scan to E-mail 6
Configuring email encryption
1Access the application configuration settings from the Embedded Web Server.
2Configure the following settings:
Encrypt Email—Do one of the following:
Select Prompt User to let users choose to encrypt their email.
Select Disabled to disable encryption.
Select Always Encrypt to require all email to be encrypted.
Note: For users to send encrypted email to a recipient, the recipient must be in the global address book
and must have a valid encryption certificate.
Encryption Algorithm—Select an algorithm to use for encrypting email. The most common setting is “Triple
DES.”
LDAPPrimary Certificate—Specify the LDAP attribute to search for a recipient's encryption certificate. The most
common setting is “userSMIMECertificate.”
LDAPAlternate Certificate—Specify the LDAP attribute to search if a recipient's encryption certificate is not
found in the primary attribute. The most common setting is “userCertificate.”
Signing Algorithm—Select the algorithm to use for digital signature. The most common setting is “SHA1.”
User can only send to self—Select this check box to allow users to send email only to themselves.
3Click Apply.
Securing access to the application
Note: Before securing access to the application, make sure that an authentication module application and the
Application Access Manager are installed and running on the printer. For more information about Application Access
Manager, see the Application Access Manager Administrator’s Guide.
This application runs in place of the standard email function on the printer. For the security features of the application
to work correctly, you must use an authentication module to secure access to the printer email function. When users
attempt to access the secured email function, they will be prompted to authenticate.
After the authentication module has been associated with the email function, it must be configured to specify where
the printer should retrieve an authenticated user’s email address when the user sends an email. The user’s email
address will be placed in the “From” field of the sent email.
To secure access to the email function and specify where to get the user’s email address:
1From the Embedded Web Server, click Settings or Configuration.
2Click Security > Security Setup.
3From Step 2 under the Advanced Security Setup heading, click Security Template, and then click Add a Security
Template.
4Type a name for the security template (for example, Secure Email).
5From the Authentication Setup dropdown menu, select the authentication module you want to use to secure access
to the email function, and then click Save Template.
6From the Embedded Web Server, click Settings or Configuration, and then click Security > Security Setup.
7From Step 3 under the Advanced Security Setup heading, click Access Controls.
Configuring Secure Scan to E-mail 7
8If necessary, expand the Function Access folder.
9From the Email Function dropdown menu, select your security template.
10 Click Submit.
11 Access the authentication module application configuration settings from the Embedded Web Server.
12 Configure the setting that specifies where to retrieve user email addresses when sending email.
13 If necessary, configure the other authentication module settings.
14 Click Apply.
Securing access to the address book
For users to search the global address book for email addresses, you must use the authentication module to secure
access to the address book function.
1From the Embedded Web Server, click Settings or Configuration.
2Click Security > Security Setup.
3From Step 2 under the Advanced Security Setup heading, click Security Template, and then click Add a Security
Template. If you have already created a security template for the authentication module you want to use, then skip
to step 6.
4Type a name for the security template (for example, Secure Email).
5From the Authentication Setup dropdown menu, select the authentication module you want to use to secure access
to the address book function, and then click Save Template.
6From the Embedded Web Server, click Settings or Configuration, and then click Security > Security Setup.
7From Step 3 under the Advanced Security Setup heading, click Access Controls.
8If necessary, expand the Function Access folder.
9From the Address Book dropdown menu, select your security template.
10 Click Submit.
For more information on configuring security templates and using access controls, see the Embedded Web Server
Administrator’s Guide for your printer.
Configuring Secure Scan to E-mail 8
Using Secure Scan to E-mail
Note: If users log in to the application manually (using a user name and password), then you must enable the
authentication module application setting that prompts the printer to retrieve all user information before allowing
users to access secured applications. This ensures that a manual login user’s email address is stored in the login
session and is available for use with Secure Email. If this setting is not enabled, then manual login users cannot send
email to themselves automatically. The “Send me a copy” option will not be available.
Sending secure email
Note: You can return to the printer home screen if you want to cancel the sending of the email.
1Load the document into the printer.
Note: Documents may be loaded into the Automatic Document Feeder (ADF) or on the scanner glass. For
information on the different methods of loading documents, see the User’s Guide that came with the printer.
2From the printer home screen, touch the application icon.
3If prompted, enter your authentication credentials.
4Use the keyboard to type an email address, or search the address book. Select Send me a copy if you want to
automatically send a copy of the email to yourself.
5Touch Next Address to add additional recipients.
6When you are done adding recipients, touch Email It.
7If prompted, select whether to digitally sign the email, encrypt the email, or do both. Leave both options cleared
to send an unsigned, unencrypted email.
Note: Depending on how the application is configured, you may see only one option, or you may not see this
prompt at all.
8If prompted, enter your PIN or password for sending digitally signed email.
9To digitally sign email, you must have a valid digital signing certificate. If a signing certificate error message appears,
then follow the instructions on the screen:
If the message “No signing certificate is available to sign your email” appears, then touch Next to send the email
without a digital signature, or return to the home screen to cancel the sending of the email.
If the message “The email cannot be sent because your signing certificate could not be found” appears, then
you will need to obtain a signing certificate, or the application will need to be configured to allow you to send
unsigned email.
10 For encrypted email to be sent to a recipient, the recipient must be in the global address book and must have a
valid encryption certificate. If an encryption certificate error message appears, then follow the instructions on the
screen:
If the message “Cannot encrypt email for one or more recipients” appears, then do one of the following:
Select Send encrypted email only to send encrypted email only to recipients who have encryption
certificates. Recipients who do not have encryption certificates will not receive the email.
Select Send all emails unencrypted to send unencrypted email to all recipients.
Return to the home screen to cancel the sending of the email.
Using Secure Scan to E-mail 9
If the message “Encryption certificate not found for one or more recipients” appears, then touch Next to send
encrypted email only to recipients who have encryption certificates (recipients who do not have encryption
certificates will not receive the email), or return to the home screen to cancel the sending of the email.
If the message “No encryption certificates could be found for any of the addresses you entered” appears, then
touch Next to send unencrypted email to all recipients, or return to the home screen to cancel the sending of
the email.
If the message “The email cannot be sent because encryption certificates could not be found for any recipients”
appears, then each recipient will need to obtain an encryption certificate, or the application will need to be
configured to allow you to send unencrypted email.
The printer performs a connection test with the email server, and then scans the first page of your document.
11 To scan additional pages, load the next page, and then touch Scan the Next Page. If you have no more pages to
scan, then touch Finish the Job.
Using Secure Scan to E-mail 10
Troubleshooting
Secure Scan to E-mail issues
“The email cannot be sent because your email address could not be retrieved”
error message
This error occurs when the authentication module could not retrieve the user’s email address. Try one or more of the
following:
MAKE SURE THE PRINTER EMAIL FUNCTION IS SECURED
For the authentication module to retrieve user email addresses, the printer email function must be secured
correctly. See “Securing access to the application” on page 7.
MAKE SURE USER EMAIL ADDRESSES ARE RETRIEVED CORRECTLY
1Access the authentication module application configuration settings from the Embedded Web Server.
2Make sure the setting that specifies where the printer should retrieve user email addresses is configured
correctly.
3Click Apply.
CHECK THE LDAP SETTINGS
For information about resolving LDAP issues, see “Secure Scan to E-mail LDAP issues” on page 14.
“Your email cannot be sent because your signing certificate could not be
retrieved” error message
CHECK THE USERS SIGNING CERTIFICATE
For users to digitally sign email, they must have a valid digital signing certificate. Make sure the user has a signing
certificate and that the authentication module you are using to retrieve certificates is configured correctly.
“No signing certificate is available to sign your e-mail. Press Next to continue
without digital signature” or “The email cannot be sent because your signing
certificate could not be found” error message
Email can be digitally signed only if users have a valid digital signing certificate. Users cannot digitally sign email if
they do not have a signing certificate or if the login method used does not support retrieving signing certificates.
If you configured the application to allow users to choose whether to digitally sign their email, then the first error
message is shown to users who do not have signing certificates. They can either send the email without a digital
signature or return to the home screen to cancel the sending of the email.
Troubleshooting 11
If you configured the application to require email to be digitally signed, then the second error message is shown to
users who do not have signing certificates. These users cannot send email. If you want all e-mail sent from the printer
to be digitally signed, then make sure a signing certificate is available for each user.
“The e-mail cannot be sent because an error occurred trying to retrieve user
certificates from the LDAP server” error message
Try one or more of the following:
CHECK THE ADDRESS BOOK SETUP
For information about configuring address book settings, see Configuring the address book” on page 6.
MAKE SURE THE ADDRESS BOOK FUNCTION IS SECURED
For users to search the global address book for email addresses, the address book function must be secured correctly.
See “Securing access to the address book” on page 8.
CHECK THE LDAP SETTINGS
For information about resolving LDAP issues, see “Secure Scan to E-mail LDAP issues” on page 14.
MAKE SURE THE PRINTER IS CONNECTED TO THE NETWORK
Make sure all appropriate network cables are connected securely and the network settings of the printer are
configured correctly. For information on networking the printer, see the printer User’s Guide on the Software and
Documentation CD that came with the printer.
“Cannot encrypt email for one or more recipients. Choose one of the following”
or “Encryption certificate not found for one or more recipients. Press Next to
send e-mail only to recipients with certificates” error message
These errors indicate that the user tried to send encrypted email to one or more recipients who do not have encryption
certificates. For users to send encrypted email to a recipient, the recipient must be in the global address book and
must have a valid encryption certificate. Users cannot send encrypted email to recipients who do not have encryption
certificates.
If you configured the application to allow users to choose whether to encrypt their email, then the first error message
is shown to users when one or more recipients do not have encryption certificates. Users can choose one of the following
on the printer touch screen:
Send encrypted email only—Encrypted email will be sent only to recipients who have encryption certificates.
Recipients who do not have encryption certificates will not receive the email.
Send all emails unencrypted—Unencrypted email will be sent to all recipients.
Users can also return to the home screen to cancel the sending of the email.
If you configured the application to require email to be encrypted, then the second error message is shown to users
when one or more recipients do not have encryption certificates. Users can either send encrypted email only to
recipients who have encryption certificates (recipients who do not have encryption certificates will not receive the
email), or they can return to the home screen to cancel the sending of the email.
Troubleshooting 12
“No encryption certificates could be found for any of the addresses you entered.
Press Next to send the email without encryption” or “The email cannot be sent
because encryption certificates could not be found for any recipients” error
message
These errors indicate that none of the recipients the user tried to send an encrypted email to have encryption
certificates. For users to send encrypted email to a recipient, the recipient must be in the global address book and
must have a valid encryption certificate. Users cannot send encrypted email to recipients who do not have encryption
certificates.
If you configured the application to allow users to choose whether to encrypt their email, then the first error message
is shown to users when encryption certificates could not be found for any recipients. Users can either send unencrypted
email to all recipients or return to the home screen to cancel the sending of the email.
If you configured the application to require email to be encrypted, then the second error message is shown to users
when encryption certificates could not be found for any recipients. If this occurs, then users cannot send email. If you
want all email sent from the printer to be encrypted, then make sure each recipient has an encryption certificate in
the global address book.
“Unable to connect to the e-mail server” error message
This error usually occurs when there is a problem with the SMTP or email settings on the printer. See “Configuring
printer email settings” on page 4, or try one or more of the following:
MAKE SURE THE PRINTER IS CONNECTED TO A DOMAIN
1From the Embedded Web Server, click Settings or Configuration.
2Click Network/Ports > TCP/IP.
3Under the TCP/IP heading, make sure the information typed in the Domain Name field is correct.
4Click Submit.
Note: For more information about TCP/IP settings, see “Configuring TCP/IP settings” on page 4.
CHECK THE SMTP SERVER AUTHENTICATION SETTING
1From the Embedded Web Server, click Settings or Configuration.
2Click E-mail/FTP Settings > SMTP Setup.
3Under the Authentication heading, from the SMTP Server Authentication menu, do one of the following:
Select Kerberos 5 if the SMTP server requires user credentials.
Select No authentication required if Kerberos is not supported.
Note: If the SMTP server requires user authentication for sending e-mail but does not support Kerberos, then
the IP address or host name of the printer must be added to the SMTP server as a relay.
4Click Submit.
Troubleshooting 13
PROVIDE THE SERVER HOST NAME IF THE SMTP SERVER USES KERBEROS
If the SMTP server uses Kerberos for authentication, then you must provide the server host name, not the IP address.
1From the Embedded Web Server, click Settings or Configuration.
2Click E-mail/FTP Settings > SMTP Setup.
3Under the SMTP Setup heading, verify or correct the following settings:
Primary SMTP Gateway—Type the host name (not the IP address) of the primary SMTP server the printer
uses for sending e-mail.
Secondary SMTP Gateway—If you are using a secondary or backup SMTP server, then type the server host
name (not the IP address).
4Click Submit.
MAKE SURE PORT 25 IS NOT BLOCKED
Make sure the server and firewall settings are configured to allow communication between the printer and the SMTP
server on Port 25.
MAKE SURE THE PRINTER IS CONNECTED TO THE NETWORK
Make sure all appropriate network cables are connected securely and the network settings of the printer are
configured correctly. For information on networking the printer, see the printer User’s Guide on the Software and
Documentation CD that came with the printer.
“Send me a copy” is not available
For the “Send me a copy” option to appear on the printer control panel, the user’s email address must be available in
the login session before Secure Email starts running.
MAKE SURE ALL USER INFORMATION IS PLACED IN THE LOGIN SESSION
1Access the authentication module application configuration settings from the Embedded Web Server.
2Enable the setting that prompts the printer to retrieve all user information before allowing users to access secured
applications.
3Click Apply.
Secure Scan to E-mail LDAP issues
LDAP lookups fail
Try one or more of the following:
MAKE SURE PORT 389 (NONSSL) AND PORT 636 (SSL) ARE NOT BLOCKED BY A FIREWALL
The printer uses these ports to communicate with the LDAP server. The ports must be open for LDAP lookups to
work.
Troubleshooting 14
VERIFY THAT THE ADDRESS BOOK SETUP CONTAINS THE HOST NAME FOR THE LDAP SERVER
1From the Embedded Web Server, click Settings or Configuration.
2Click Network/Ports > Address Book Setup.
3Verify that the host name (not the IP address) of the LDAP server appears in the Server Address field.
4Click Submit.
IF THE LDAP SERVER REQUIRES SSL, THEN VERIFY OR CORRECT THE ADDRESS BOOK SETUP SETTINGS
1From the Embedded Web Server, click Settings or Configuration.
2Click Network/Ports > Address Book Setup.
3Verify or correct the following settings:
Server Port—Set this to 636.
Use SSL/TLS—Select SSL/TLS.
LDAP Certificate Verification—Select Never.
4Click Submit.
NARROW THE LDAP SEARCH BASE
Narrow the LDAP search base to the lowest possible scope that includes all necessary users.
VERIFY THAT THE LDAP ATTRIBUTES BEING SEARCHED FOR ARE CORRECT
Make sure all LDAP attributes for the user are correct.
Secure Scan to E-mail licensing issues
License error
Try one or more of the following:
MAKE SURE THE APPLICATION IS LICENSED
Applications require a license to run.
For more information on purchasing a license, contact your Dell representative.
MAKE SURE THE LICENSE IS UPTODATE
Make sure the license for the application has not yet expired. Check the license expiry date using the Embedded Web
Server.
Troubleshooting 15
Appendix
Accessing application configuration settings using the
Embedded Web Server
1Obtain the printer IP address:
From the printer home screen
From the TCP/IP section in the Network/Ports menu
By printing a network setup page or menu settings page, and then finding the TCP/IP section
Note: An IP address appears as four sets of numbers separated by periods, such as 123.123.123.123.
2Open a Web browser, and then type the printer IP address in the address field.
The Embedded Web Server appears.
3From the navigation menu on the left, click Settings or Configuration, and then do one of the following:
Click Apps > Apps Management.
Click Device Solutions > Solutions (eSF).
Click Embedded Solutions.
4From the list of installed applications, click the application you want to configure, and then click Configure.
Licensing applications
Applications require a valid electronic license to run on select printers.
For more information on purchasing a license for an application, or for any other licensing information, contact your
Dell representative.
Exporting and importing a configuration using the Embedded
Web Server
You can export configuration settings into a text file, and then import it to apply the settings to other printers.
1From the Embedded Web Server, click Settings or Configuration, and then do one of the following:
Click Apps > Apps Management.
Click Device Solutions > Solutions (eSF).
Click Embedded Solutions.
2From the list of installed applications, click the name of the application you want to configure.
Appendix 16
3Click Configure, and then do one of the following:
To export a configuration to a file, click Export, and then follow the instructions on the computer screen to save
the configuration file.
Note: If a JVM Out of Memory error occurs, then repeat the export process until the configuration file
is saved.
To import a configuration from a file, click Import, and then browse to the saved configuration file that was
exported from a previously configured printer.
Notes:
Before importing the configuration file, you can choose to preview it first.
If a timeout occurs and a blank screen appears, then refresh the Web browser, and then click Apply.
Appendix 17
Notices
Edition notice
June 2013
The following paragraph does not apply to any country where such provisions are inconsistent with local law: THIS
PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some
states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may
not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the
information herein; these changes will be incorporated in later editions. Improvements or changes in the products or
the programs described may be made at any time.
Trademarks
Information in this document is subject to change without notice.
Reproduction of this material in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell and the DELL logo are trademarks of Dell Inc.; Microsoft and Windows are registered
trademarks of Microsoft Corporation. Other trademarks and trade names may be used in this document to refer to the
entities claiming the marks and names of their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
GOVERNMENT END USERS
The Software Program and any related documentation are "Commercial Items," as that term is defined in 48 C.F.R.
2.101, "Computer Software" and "Commercial Computer Software Documentation," as such terms are used in 48 C.F.R.
12.212 or 48 C.F.R. 227.7202, as applicable. Consistent with 48 C.F.R. 12.212 or 48 C.F.R. 227.7202-1 through 227.7207-4,
as applicable, the Commercial Computer Software and Commercial Software Documentation are licensed to the U.S.
Government end users (a) only as Commercial Items and (b) with only those rights as are granted to all other end users
pursuant to the terms and conditions herein.
GNU Lesser General Public License
View the GNU Lesser General Public License online at http://www.gnu.org/licenses/lgpl.html.
Dell End-User License Agreement
This is a legal agreement ("Agreement") between you, the user, and Dell Products L.P, a Texas limited partnership, or
Dell Global B.V. (Singapore Branch), a Singapore branch of a company incorporated in The Netherlands with limited
liability, on behalf of Dell Inc. and Dell Inc.’s subsidiaries and affiliates (together "Dell"). This Agreement covers all
software (and upgrades, updates and feature enhancements thereto) that is distributed by Dell and for which there is
no separate license agreement between you and the manufacturer or owner of the software (collectively the
"Software"). This Agreement is not for the sale of Software or any other intellectual property. All title and intellectual
Notices 18
property rights in and to Software are owned and retained by the manufacturer or owner of the Software. All rights
not expressly granted under this Agreement are reserved by the manufacturer or owner of the Software. By opening
or breaking the seal on the Software packet(s), installing, downloading, activating the Software, click-accepting these
terms, or using the Software, you agree to be bound by the terms of this Agreement. If you do not agree to these terms,
you may not install, download, activate, or otherwise use the Software and must promptly return for a full refund all
Software (including accompanying media, written materials, and packaging) or delete any Software, as directed by Dell;
for software included with your purchase of hardware, you must return the entire hardware/software package. The
right to a full refund does not apply to any updates or upgrades subject to the terms of this Agreement. If you are an
entity, you acknowledge that the individual accepting these terms has appropriate authority to do so and to bind you.
Subject to the terms, conditions and limitations of this Agreement, Dell grants you a limited, nonexclusive,
nontransferable (except as set forth herein), non-assignable license, to use the Software (in object code only) only on
as many computers, devices, or in such configurations as you are expressly entitled, or one computer or device, if no
other entitlement is specified, and for only such period as you are entitled, in the case of a term license, and perpetually,
if no term is specified. You may use the Software only on Dell computers or devices, with the exception of mobile device
application software specifically designed by Dell to be run on non-Dell hardware. "Use" means to install, store, load,
execute, and display the Software. If you are a commercial customer of Dell, you hereby grant Dell, or an agent selected
by Dell, the right to perform an audit of your use of the Software during normal business hours; you agree to cooperate
with Dell in such audit; and you agree to provide Dell with all records reasonably related to your use of the Software.
The audit will be limited to verification of your compliance with the terms of this Agreement. The Software is protected
by United States and other applicable copyright laws and international treaties and may be protected under the patent
laws of the applicable jurisdiction. You may make one copy of the Software solely for backup or archival purposes or
transfer it to a single hard disk or storage device provided you keep the copy solely for backup or archival purposes.
You shall reproduce and include copyright and other proprietary notices on and in any copies for the Software. You
may not sublicense, rent, or lease the Software or copy the written materials accompanying the Software. You may
transfer the Software and all accompanying materials on a permanent basis as part of a sale or transfer of the Dell
product on which it was preloaded by Dell, where applicable, if you retain no copies and the recipient agrees to the
terms hereof. Any such transfer must include the most recent update and all prior versions. You may not reverse
engineer, decompile or disassemble, modify, or create derivative works of the Software. If the package accompanying
your Dell computer or device contains optical discs or other storage media, you may use only the media appropriate
for your computer or device. You may not use the optical discs or storage media on another computer, device, or
network, or loan, rent, lease, or transfer them to another user except as permitted by this Agreement.
Limited Warranty and Limitation of Liability
Dell warrants that the Software media (if applicable) will be free from defects in materials and workmanship under
normal use for 90 days from the date you receive them. This warranty is limited to you and is not transferable. Any
implied warranties are limited to 90 days from the date you receive the Software. Some jurisdictions do not allow limits
on the duration of an implied warranty, so this limitation may not apply to you. The entire liability of Dell and its
suppliers, and your exclusive remedy, shall be, at Dell's option, either (a) termination of this Agreement and return of
the price paid for the Software or (b) replacement of any media not meeting this warranty that is sent with a return
authorization number to Dell, within the 90-day warranty period, at your cost and risk. This limited warranty is void if
any media damage has resulted from accident, abuse, misapplication, or service or modification by someone other
than Dell. Any replacement media is warranted for the remaining original warranty period or 30 days, whichever is
longer.
Dell and its suppliers do NOT warrant that the functions of the Software will meet your requirements or that operation
of the Software will be uninterrupted or error free. You assume responsibility for selecting the Software to achieve
your intended results and for the use and results obtained from the Software. The terms of this Agreement do not
entitle you to any maintenance or support for the Software.
DELL, ON BEHALF OF ITSELF AND ITS SUPPLIERS, DISCLAIMS ALL OTHER WARRANTIES, EXPRESS, IMPLIED, OR
OTHERWISE, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
Notices 19
PARTICULAR PURPOSE OR ANY WARRANTY REGARDING TITLE OR AGAINST INFRINGEMENT, FOR THE SOFTWARE AND
ALL ACCOMPANYING WRITTEN MATERIALS. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS; YOU MAY
HAVE OTHERS, WHICH VARY FROM JURISDICTION TO JURISDICTION.
IN NO EVENT SHALL DELL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING WITHOUT
LIMITATION DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION
OR OTHER DATA, OR OTHER PECUNIARY LOSS) ARISING OUT OF USE OR INABILITY TO USE THE SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME JURISDICTIONS DO NOT ALLOW AN EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY
TO YOU.
Hosted and InternetAccessible Software
Some or all of the Software may be remotely hosted or accessible to you through the Internet. In such case, Dell may
suspend, terminate, withdraw, or discontinue all or part of the Software or your access to the Software upon receipt
of a subpoena or law enforcement request, or when Dell believes, in its sole discretion, that you have breached any
term of this Agreement or are involved in any fraudulent, misleading, or illegal activities. Dell may modify the Software
at any time with or without prior notice to you. Dell may perform scheduled or unscheduled repairs or maintenance,
or remotely patch or upgrade the Software installed on its and your computer system(s), which may temporarily degrade
the quality of the Software or result in a partial or complete outage of the Software. Updates, patches or alerts may
be delivered from Dell servers, which may be located outside of your country. Dell provides no assurance that you will
receive advance notification of such activities or that your use of the Software will be uninterrupted or error-free.
Open Source Software
The Software may come bundled or otherwise distributed with open source software, which is subject to terms and
conditions of the specific license under which the open source software is distributed.
THIS OPEN SOURCE SOFTWARE IS DISTRIBUTED IN THE HOPE THAT IT WILL BE USEFUL, BUT IS PROVIDED "AS IS"
WITHOUT ANY WARRANTY, EXPRESS, IMPLIED, OR OTHERWISE, INCLUDING BUT NOT LIMITED TO THE IMPLIED
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR ANY WARRANTY REGARDING TITLE
OR AGAINST INFRINGEMENT. IN NO EVENT SHALL DELL, THE COPYRIGHT HOLDERS, OR THE CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT
LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS OPEN SOURCE
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Under certain open source software licenses, you are entitled to obtain the corresponding source files. You may find
corresponding source files for the Software at http://opensource.dell.com or at such other locations indicated by Dell.
Export
You are advised that the Software is subject to U.S. export laws as well as the laws of the country where it is delivered
or used. You agree to abide by these laws. Under these laws, the Software may not be sold, leased, or transferred to
restricted countries (currently Cuba, Iran, North Korea, Sudan, and Syria), restricted end users, or for restricted end
uses. You specifically agree that the Software will not be used for activities related to weapons of mass destruction,
including but not limited to activities related to the design, development, production, or use of nuclear materials,
nuclear facilities, or nuclear weapons, missiles, or support of missile projects, or chemical or biological weapons.
Notices 20
U.S. Government Restricted Rights
The software and documentation are "commercial items" as that term is defined at 48 C.F.R. 2.101, consisting of
"commercial computer software" and "commercial computer software documentation" as such terms are used in 48
C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, all U.S. Government end
users acquire the software and documentation with only those rights set forth herein. Contractor/manufacturer is Dell
Products L.P., One Dell Way, Round Rock, Texas, 78682.
Evaluation Licenses
If you have received Software for trial or evaluation purposes (“Evaluation Software”), despite anything to the contrary
in this Agreement, you may use the Evaluation Software solely for such limited evaluation period and for internal
evaluation purposes only. Evaluation Software cannot be transferred save with the written authorization of the
manufacturer or owner of the Software. You acknowledge that Dell may terminate your right to evaluate or use the
Evaluation Software, for any or no reason, effective immediately upon notice to you. NOTWITHSTANDING ANYTHING
TO THE CONTRARY IN THIS AGREEMENT, THE EVALUATION SOFTWARE IS PROVIDED TO YOU "AS IS" WITHOUT
INDEMNITY OR WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE. DELL BEARS NO
LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, SPECIAL OR CONSEQUENTIAL DAMAGES RESULTING
FROM USE (OR ATTEMPTED USE) OF THE EVALUATION SOFTWARE THROUGH AND AFTER THE EVALUATION PERIOD
AND HAS NO DUTY TO PROVIDE SUPPORT OF SUCH SOFTWARE TO YOU.
General
This license is effective until terminated. It will terminate upon the conditions set forth above or if you fail to comply
with any of its terms. Upon termination, you agree that the Software and accompanying materials, and all copies
thereof, will be destroyed. Except as may be prohibited by local law, this Agreement is governed by the laws of the
State of Texas, without regard to principles of conflicts of laws. Each provision of this Agreement is severable. If a
provision is found to be unenforceable, this finding does not affect the enforceability of the remaining provisions of
this Agreement. This Agreement is binding on successors and assigns. Dell agrees and you agree to waive, to the
maximum extent permitted by law, any right to a jury trial with respect to the Software or this Agreement. Because
this waiver may not be effective in some jurisdictions, this waiver may not apply to you. You acknowledge that you
have read this Agreement, that you understand it, that you agree to be bound by its terms, and that this is the complete
and exclusive statement of the Agreement between you and Dell regarding the Software.
Your new Dell printer comes with patented print cartridges specially priced for a single use. Use of this cartridge confirms
your agreement to only a single use. After this single use, the license to use the cartridge terminates. The cartridge is
designed to stop working after delivering a fixed amount of printing. Regular cartridges, without these license terms,
are available for sale that may be refilled. If you do not agree to these terms, contact Dell by visiting
www.dell.com/contactdell.
Firmware updates may modify Dell printer settings and cause counterfeit and/or unauthorized products, supplies, parts,
materials (such as toners and inks), software, or interfaces to stop working. Use of genuine Dell or Dell authorized
products will not be impacted.
(Type S—Rev. 040512)
EU5D-0025
Additional copyrights
This product includes software developed by:
Copyright (c) 2002 Juha Yrjola. All rights reserved.
Notices 21
Copyright (c) 2001 Markus Friedl
Copyright (c) 2002 Olaf Kirch
Copyright (c) 2003 Kevin Stefanik
Redistribution and use in source an binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following
disclaimer.
2. Redistribution in binary form must reproduce the above copyright notice, this list of conditions, and the following
disclaimer in the documentation and/or other materials provided with the distribution:
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Notices 22
Index
A
accessing application configuration
settings
using the Embedded Web
Server 16
additional required applications 3
address book
securing 7
address book setup 4
application configuration settings
accessing 16
applications
licensing 16
C
cannot encrypt email for one or
more recipients 12
D
digital signing
configuring 6
DNS settings
configuring 4
E
e-mail
sending 4
e-mail address book 4
e-mail scan settings
configuring 4
Embedded Web Server
accessing application
configuration settings 16
encryption
configuring 6
encryption certificate not found for
one or more recipients 12
encryption certificates not
found 12, 13
exporting a configuration
using the Embedded Web
Server 16
exporting a configuration using the
Embedded Web Server 16
email
sending 9
email addresses
retrieving 7
email cannot be sent because an
error occurred trying to retrieve
user certificates from the LDAP
server 12
email cannot be sent because the
email address could not be
retrieved 11
email cannot be sent because the
signing certificate could not be
retrieved 11
email encryption
configuring 6
email function
securing 7
I
importing a configuration
using the Embedded Web
Server 16
importing a configuration using the
Embedded Web Server 16
L
LDAP lookups fail 14
license error 15
licensing applications 16
N
no encryption certificates could be
found for any of the addresses you
entered 13
no signing certificate is available to
sign your email 11
P
printer email settings
configuring 4
S
scan settings
for e-mail 4
secure email
using from the printer 9
securing access to the address
book 7
securing access to the application 7
Send me a copy is not available 14
sending email 9
signing certificate could not be
retrieved 11
signing certificate not available 11
signing certificate not found 11
SMTP settings
configuring 4
T
TCP/IP settings
configuring 4
the email cannot be sent because
encryption certificates could not be
found for any recipients 13
the email cannot be sent because
your signing certificate could not be
found 11
troubleshooting
cannot encrypt email for one or
more recipients 12
encryption certificate not found
for one or more recipients 12
encryption certificates not
found 12, 13
email cannot be sent because an
error occurred trying to retrieve
user certificates from the LDAP
server 12
email cannot be sent because the
email address could not be
retrieved 11
email cannot be sent because the
signing certificate could not be
retrieved 11
LDAP lookups fail 14
license error 15
no encryption certificates could be
found for any of the addresses
you entered 13
no signing certificate is available
to sign your email 11
Send me a copy is not available 14
signing certificate could not be
retrieved 11
signing certificate not available 11
signing certificate not found 11
Index 23
the email cannot be sent because
encryption certificates could not
be found for any recipients 13
the email cannot be sent because
your signing certificate could not
be found 11
unable to connect to the e-mail
server 13
users cannot automatically email
themselves a copy 14
U
unable to connect to the e-mail
server 13
user email addresses
retrieving 7
users cannot automatically email
themselves a copy 14
Index 24

Navigation menu