visable.png

Skip header
 

Programming/Changing Transfer Boxes

This section describes how to set up a Transfer Box.

This function turns the machine into a fax relay station. Documents sent with a SUB Code that matches the SUB Code programmed as a Transfer Box are received, and then relayed to a programmed receiver.

Since documents can be sent to multiple destinations in a single transfer request, you can economize on call charges when sending to distant destinations.

Illustration of Transfer Boxes

Inform the Requesting Party of the SUB Code assigned to the Transfer Box. When they want to have a document transferred by your machine, ask them to send the document using SUB Code Transmission and specify this SUB Code. If a password has also been programmed, inform them of this too, and ask them to enter it as the SID code.

You can store the following items:

1Press [Facsimile Features].

2Press [General Settings].

3Press [Box Setting].

4Check that [Program / Change] is selected.

5Select the box to program.

When programming a new box, press [Not Programmed].

Operation panel screen illustration

To change a box already programmed, press it, and then proceed to step 8.

6Press [Transfer Box].

7Enter a Box name, and then press [OK].

8Enter a SUB Code.

Operation panel screen illustration

To change the SUB Code, press [Clear] or the [Clear/Stop] key, and then try again. To change Box name, press [Box Name], and then repeat from step 7.

9To Program End Receivers, select a Receiving Station.

You can store five Receiving Station.

10Specify End Receivers with Destination keys, and then press [OK].

Operation panel screen illustration

Press the key on the left of the display to switch the destination between fax number, e-mail address, Internet Fax destination, and folder destination.

IP-Fax destination appears in the fax destination list.

A reception station can also be registered as a group destination. In such a case, a maximum of 498 parties including End Receivers 1-5 can be specified in a group.

11To program a password, press [Password].

If you do not want to program a password, proceed to step 14.

12Enter a password, and then press [OK].

If you make a mistake, press [Clear] or the [Clear/Stop] key before pressing [OK], and then try again.

13Re-enter the password, and then press [OK].

If you make a mistake, press [Clear] or the [Clear/Stop] key before pressing [OK], and then try again.

To change the password after pressing [OK], press [Password] and repeat step 12 and 13, or press [Cancel] and repeat from step 11.

14Press [Security].

If not specifying the security function, proceed to step 17.

Security is set to use S/MIME authentication. For details about the security settings, consult your administrator.

15Select the security functions.

Operation panel screen illustration

To specify encryption for documents for transfer to receiving station, press [Encryption]. To use the encryption function, the address must be stored in the Address Book and have the encryption option enabled. For details about Encryption, consult your administrator.

To attach a signature to documents for documents for transfer to receiving station, press [Signature]. For details about Signature, consult your administrator.

16Press [OK].

17Press [OK].

18Press [Exit].

19Press the [User Tools/Counter] key.

Note

  • After documents are transferred, Transfer Result Reports are not sent back to the sender.

  • You can set the fax destination, Internet Fax destination, IP-Fax destination, e-mail destination, or folder destination, as a reception station.

  • If you have specified folder destination for the transmission destination, you can specify the file format used for transferring to receiving station. See “Parameter Settings” (switch 21, bit 3).

  • After documents are transferred, they are deleted.

  • When this function is set to on, the machine prints out the received documents it transfers and a Transfer Result Report after the transfer has finished. If you do not want it to print, contact your service representative.

  • You can edit boxes in the same way you program them.

  • If you delete a destination specified as a reception destination using the destination list, the settings of the reception destination are also deleted, so they must be registered again. When a destination is changed, a document is transmitted to the new destination. If there is no destination of the specified type, you can set which destination to be used as an alternative destination. See “Parameter Settings” (switch 32, bit 0).

  • Select [Encrypt All] in the encryption settings and encrypted e-mail is sent regardless of the encryption settings in [Security]. For details about encryption, consult your administrator.

  • The electronic signature is limited in the following ways, depending on the S/MIME settings on Web Image Monitor. For details about the electronic signature, consult your administrator.

    • If [Set Individually] is set:

      You can set [Signature] in [Security] and attach an electronic signature to email for every transmission.

    • If [Do not Use Signatures] is set:

      Even if you press [Security], [Signature] does not appear.

    • If [Use Signatures] is set:

      An electronic signature is attached when you send email. The [Signature] setting in [Security] cannot be cancelled.