KM Embedded. Configuration Guide. AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK



Similar documents
Konica Minolta Embedded

Manager. Configuration Guide. ICS Software Solutions Clarendon House Church Lane Naphill HP14 4US Buckinghamshire

File Management Utility User Guide

NSi Mobile Installation Guide. Version 6.2

Konica Minolta s Optimised Print Services (OPS)

Active Directory integration with CloudByte ElastiStor

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Bitrix Site Manager ASP.NET. Installation Guide

AXIS 70U - Using Scan-to-File

Appendix E. Captioning Manager system requirements. Installing the Captioning Manager

Sophos for Microsoft SharePoint startup guide

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

RoomWizard Synchronization Software Manual Installation Instructions

Network Load Balancing

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

WhatsUp Gold v16.3 Installation and Configuration Guide

Indian Standards on DVDs. Installation Manual Version 1.0. Prepared by Everonn Education Ltd

NETWRIX USER ACTIVITY VIDEO REPORTER

LepideAuditor Suite for File Server. Installation and Configuration Guide

FTP Server Configuration

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # )

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

Advanced Event Viewer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Quick Scan Features Setup Guide

Using TS-ACCESS for Remote Desktop Access

SmartSync Monitor Help

HP Device Manager 4.6

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

Version 3.8. Installation Guide

Installation Notes for Outpost Network Security (ONS) version 3.2

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc.

SafeCom Smart Printing Administrator s Quick Guide

NETWORK PRINT MONITOR User Guide

Scan to Cloud Installation Guide

Sophos Endpoint Security and Control standalone startup guide

Integrating LANGuardian with Active Directory

KM-1820 FS-1118MFP. Network Scanner Setup Guide

Setting Up Scan to SMB on TaskALFA series MFP s.

Capture Pro Software FTP Server System Output

MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER

3 Setting up Databases on a Microsoft SQL 7.0 Server

DocuPrint C3290 FS Features Setup Guide

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Freshservice Discovery Probe User Guide

Update Instructions

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Software Version 5.1 November, Xerox Device Agent User Guide

SMS Database System Quick Start. [Version 1.0.3]

Training module 2 Installing VMware View

Accessing the Media General SSL VPN

KM-1820 FS-1118MFP. Network Scanner Setup Guide

Mobile Device Management Version 8. Last updated:

Setting up SMTP in Talis Decisions

PrintFleet Local Beacon

Send to Network Folder. Embedded Digital Sending

NSi Mobile Administrator Guide. Version 6.2

Using Device Discovery

Ipswitch WS_FTP Server

Quick Start Guide for Parallels Virtuozzo

Configuring the WT-4 for ftp (Ad-hoc Mode)

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Installation Guide for Pulse on Windows Server 2008R2

SQL Server 2008 R2 Express Edition Installation Guide

Using Internet or Windows Explorer to Upload Your Site

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

Installing Policy Patrol on a separate machine

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

MadCap Software. Upgrading Guide. Pulse

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.

Quick Start Guide for VMware and Windows 7

Introduction and Overview

Microsoft Virtual Labs. Administering the IIS 7 File Transfer Protocol (FTP) Server

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

Propalms TSE Quickstart Guide

Using SSH Secure Shell Client for FTP

User s Manual. Management Software for ATS

GP REPORTS VIEWER USER GUIDE

Contents. 2 Pre-installation checklist

Setting Up Your FTP Server

XIA Configuration Server

Creating client-server setup with multiple clients

NETWRIX EVENT LOG MANAGER

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

WhatsUp Gold v16.1 Installation and Configuration Guide

Defender Token Deployment System Quick Start Guide

Sage 200 Web Time & Expenses Guide

Installation Guide for Pulse on Windows Server 2012

RemotelyAnywhere Getting Started Guide

Pcounter Web Report 3.x Installation Guide - v Pcounter Web Report Installation Guide Version 3.4

EMR Link Server Interface Installation

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

APPLICATION NOTE. CC5MPX Digital Camera and IPn3Gb Cellular Modem 10/14. App. Note Code: 3T-Z

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

LifeSize Control Installation Guide

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS

Transcription:

KM Embedded Configuration Guide AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK T: 0113 2730300 F: 0113 2730302 E: info@altman.co.uk W: www.altman.co.uk

Table of Contents Table of Contents... 2 Requirements... 4 Installation/Uninstallation... 4 Opening XPR Enterprise KM Embedded... 4 Overview... 4 Home... 5 Navigation... 5 General... 6 Configuring Pcounter... 6 Charge Groups... 6 Charge Group Alias... 6 Charge Group Entry... 7 Charge Group Display... 7 Charge Sub Groups... 7 Charge Sub Group Alias... 7 Charge Sub Group Entry... 8 Charge Sub Group Display... 8 Device Administration... 8 Functionality... 9 Cluster Settings... 9 Pricing... 9 Currency... 9 Copy Pricing... 10 Scan Pricing... 10 Fax Pricing... 11 Applications... 11 Authentication... 11 Authentication Type... 12 Self-Registration... 12 Print... 13 Quick Print... 13 Apply Selected Groups for Print... 13 Scan... 14 Scan job logging... 14 Scanning Options... 14 FTP Settings... 15 Active Directory Settings... 15 Scan to Email Settings... 16 Scan to User Folder Settings... 17 Scan to Group Folder Settings... 18 AIT Ltd Page 2 of 28

Remote Authentication... 18 IP Card Reader Authentication... 18 IP Biometric Authentication... 18 USB Card Reader Authentication... 19 IP Device Communication... 19 Konica Minolta USB Card Readers... 19 YSoft USB Card Readers... 20 Card Reader PIN Entry... 20 Device Deployment... 20 Manage Search Protocol... 20 Search Types... 20 UPnP Searching... 21 SNMP Ping Searching... 21 SNMP Broadcast Searching... 22 Device Searching... 22 Device Deployment... 23 Request Successful... 23 Request Failed... 24 Hide Devices... 24 Device Management... 25 Device Description... 25 Device Print Queue... 25 Manage Device Print Queue Association... 26 Remote Authentication Device... 26 Licensing... 27 Service... 27 Starting and Stopping the service... 27 Listening... 28 AIT Ltd Page 3 of 28

Requirements The Microsoft.NET Framework version 3.5 SP1 needs to be installed on the target machine. An active (client) license is needed by each device. The number of licenses allowed is determined when you purchase your support license for the product. During the 30 day evaluation period you may license up to 500 devices. The product should be installed on the same server as the Pcounter administration software; in a Windows environment this will be the Pcounter data server. The server must have a valid Pcounter Pro license. Please ensure that all the devices are configured correctly and are running the required firmware to support OpenAPI version 2.3.x connections. Refer to the readme file for information on how to configure the devices for OpenAPI. Installation/Uninstallation Installation of this software will provide a 30 day evaluation period. To install, open the installation MSI file XPR Enterprise KM Embedded x.x.x.x.msi and follow the wizard. To uninstall, go to the Windows Start menu and select All Programs then XPR Enterprise, XPR Enterprise KM Embedded and finally XPR Enterprise KM Embedded- Uninstall. This will take you through the removal process. Opening XPR Enterprise KM Embedded From the Windows Start menu, select All Programs then XPR Enterprise, XPR Enterprise KM Embedded and finally XPR Enterprise KM Embedded - Configuration. Alternatively click the XPR Enterprise KM Embedded - Configuration shortcut on your Windows Desktop. Overview XPR Enterprise KM Embedded enables embedded devices to charge for services such as printing, photocopying and scanning against a user s Pcounter account. It supports both Pcounter for Windows and Pcounter for Netware. AIT Ltd Page 4 of 28

Home Once the application is running the home page will be displayed. This page shows the applications product information. Figure 1 Navigation Use the options in the navigation menu on the right of the application to configure XPR Enterprise KM Embedded. Figure 2 AIT Ltd Page 5 of 28

General General settings are system wide and apply to every device configured to run the OpenAPI applications. Configuring Pcounter XPR Enterprise KM Embedded supports both Pcounter for Windows and Pcounter for Netware. To configure Pcounter, select the appropriate operating system and press the configure button. Figure 3 Charge Groups During the authentication process the user may be prompted to enter a charge group (Client Code) to be associated with their transaction. This selection of charge groups can be switched off by selecting None. Alternatively the user may be prompted to enter a charge group associated to them or a charge group from the complete list by selecting User or All charge groups. Figure 4 Charge Group Alias An alias may be set for charge groups. This alias will need to be entered prior to deploying to any devices. This alias will then be displayed on the device during use. Figure 5 AIT Ltd Page 6 of 28

Charge Group Entry If charge groups have been selected, it is possible to force a user to enter a charge group during the authentication process. If the require charge group checkbox is not selected then a user can bypass entering a group to be associated with the transaction. Figure 6 Charge Group Display The charge group display option will determine what is displayed in the charge group list. Figure 7 Charge Sub Groups Charge Sub Groups may also be selected during the authentication process. The user may be prompted to enter a charge sub group(sub Code) to be associated with their transaction, providing the selected charge group has one or more associated charge sub groups. This selection of charge sub groups can be switched off by unchecking the Use sub groups checkbox. If charge sub groups exist for a charge group and this setting is disabled, any sub groups will be ignored. Figure 8 Charge Sub Group Alias As with charge groups an alias can also be set for charge sub groups. This will also need to be set prior to deploying to any devices and will be displayed during use. Figure 9 AIT Ltd Page 7 of 28

Charge Sub Group Entry This setting will force a user to enter a charge sub group, providing their selected charge group has some associated sub groups. Figure 10 Charge Sub Group Display The charge sub group display option will determine what is displayed in the charge sub group list. Figure 11 Device Administration Set the device administration password and the OpenAPI logging level before deploying the OpenAPI applications. The password you set must be the same as the administrator password on the device. It is recommended that same password is used for all devices, otherwise you will need to change the password here before you deploy to each device, which could be a lengthy process if you have a large number of devices. Figure 12 AIT Ltd Page 8 of 28

Functionality Each device has native application functionality for copy, print, scan etc. This functionality can be switched on or off. These settings are system wide and will apply to all devices. Figure 13 Cluster Settings XPR Enterprise KM Embedded has full support for Microsoft clustering. To enable cluster support, the application will need to be installed on to both nodes. The node that sets cluster support will be nominated as the master. All settings should be made on this node. On the slave node run the service configuration and set cluster support on. This node will just read its configuration set from the master. Ensure that both nodes have the correct path to the central shared location. Figure 14 Pricing Currency and pricing can be set for all the varying copy, scan and fax options available. Currency The currency is used for display purposes and is shown on the KM device against the users balance. Figure 15 AIT Ltd Page 9 of 28

Copy Pricing Copy pricing is divided into 3 different paper sizes. If the paper size is unknown then the unknown pricing will be applied. For colour and duplex copies a price multiplier will be applied. The multiplier will be based on the mono page size and multiplied appropriately if it is colour, duplex or both. Some KM devices are capable of applying a finishing method to the copy job. This can also be charged for if used. Figure 16 Scan Pricing Scan pricing can be accounted for as Network Fax, Pull Scan and Push Scan. The Scan to Email and Scan to User Folder applications use the Push Scan method, However if you are using the native scan functions these can also be accounted for as Network Fax or Pull Scans depending on the native scan function selected. Colour scanning can also be charged for by using the multiplier on the base scan price. Figure 17 AIT Ltd Page 10 of 28

Fax Pricing The KM devices support 4 different resolutions of fax documents. These can all be priced individually with a connection and a communication duration charge applied. There are also two fax lines available, that can be used to allow a different connection and communication charge. Figure 18 Applications It is best to use the default values for port and timeout settings unless the ports are already in use. Ports and timeout settings are applied to each of the applications to be installed. Authentication The communication settings for Authentication are shown below. If the Authentication application port number is changed this must be reflected on the device. Authentication uses SSL so please refer to the device documentation on how to enable the device for OpenAPI, how to create the SSL certificate. Figure 19 User Login settings and port numbers cannot be changed by simply stopping the service. These settings will only be modifiable if none of your devices have active licenses. To alter these settings, the applications and licenses must be de-registered from all devices and then re-registered with the new settings applied. AIT Ltd Page 11 of 28

Authentication Type The user login method needs to be specified when the applications are deployed. This login method will be used on each selected device. Authentication can take place directly on the KM device by keying either your network username and password or your user ID and PIN number. Alternatively a user can also authenticate via a network authentication device. Username and Password Authentication Figure 20 User ID and PIN Authentication Figure 21 If the second credential (Password or PIN) is not required, an option to mask the input of the first credential can be selected. This will mask the users input with asterisks when entering either their Username or User ID. Figure 22 Self-Registration Enabling the Self-Registration option will allow users to assign a card to their Pcounter account. This option is only available if the system is using IP or USB card readers for authentication. If this option is enabled and a user presents an unknown card to the reader, the user will be prompted to assign the unknown card to their account. Figure 23 AIT Ltd Page 12 of 28

Print The communication settings for Print are shown below. The port number should only be changed if it is already in use. All print communication can be secured by enabling SSL for print. This must be selected at deployment. Figure 24 Quick Print Quick print is a feature allowing print job release as soon as the user has authenticated on the KM device. There is an option to allow for unlimited balance users only or all users. If this is enabled for all users the users balance has insufficient funds to release all print jobs, only what they can afford will be released and the additional print jobs will remain in the queue. Figure 25 Apply Selected Groups for Print Charge group and sub group selection can be done during print job submission via the popup dialog, however charge group and sub group selection during the authentication process on device can now be assigned to print jobs by selecting this option. Figure 26 AIT Ltd Page 13 of 28

Scan The communication settings for Scan are shown below. The port number should only be changed if it is already in use. All scan communication can be secured by enabling SSL for scan. This must be selected at deployment. Figure 27 Scan job logging Scan job logging can be enabled by selecting the option shown below. If selected, the logs will show the user, scan job, destination, date/time and device the job was processed on. Figure 28 Scanning Options Scanning options allows scan job resolution, colour types and document formats to be enabled or disabled on the KM device. These are global settings and will be reflected on every device running XPR Enterprise KM Embedded. Scanning Options Figure 29 N.B. All the above settings affect all scanning on the KM device, however only the PDF file format is a supported document type for both the XPR Enterprise KM Embedded Scan to Email and Scan to Folder applications. AIT Ltd Page 14 of 28

FTP Settings FTP is the method used to transfer scan jobs from the KM device to the file system. It is therefore essential to ensure that these settings are correct as they are sent to the KM device during installation. Figure 30 Active Directory Settings If the scan applications are using Active Directory to obtain user settings, the following information must be provided to allow the login user to obtain this information. The user must have sufficient rights to read the directory information. Figure 31 AIT Ltd Page 15 of 28

Scan to Email Settings Scan to Email can either obtain the users email address from their active directory account, or derive the email address. If the email address is derived, the Email Domain Name value is used. It takes the currently logged on username and will prepend it to specified value, for example: user1 + @ + yourdomain.com = user1@yourdomain.com SMTP Server and login details need to be correctly specified. If the SMTP server requires authentication, select the Use SMTP Authentication box and input the correct password for the sender account. Figure 32 If the box is selected to Allow Alternate Email Address, the user has the ability within the application to input a different email address for sending the scanned document to. AIT Ltd Page 16 of 28

Scan to User Folder Settings Scan to Folder can either obtain the users home folder from their active directory account, or derive the folder path. If the folder is derived, the User Root Folder value is used. It takes the currently logged on username and appends it to specified value, for example: UserRootFolder + \ + user1 +\ It is also possible to specify a sub folder within the user s home folder. This can be obtained from a field within their active directory account or set directly as the user sub folder name. If the sub folder is used, it will be appended to the path regardless of how the users home folder was derived. Scan to User Folder Settings (Derived from Active Directory) Figure 33 Scan to User Folder Settings (Derived from User Root Folder) Figure 34 AIT Ltd Page 17 of 28

Scan to Group Folder Settings Scan to Group Folder requires a root folder to be specified. All scan jobs can be processed into this folder. Alternatively a sub folder can be used by looking up the folder name from a field value held in active directory against the logged in user. This would be appended to the group root folder, for example: ScanGroupFolder + \ + ActiveDirectoryFieldValue +\ Scan to Group Folder Settings Figure 35 Remote Authentication Remote device authentication provides the ability for users to logon to a device by either presenting their card to an attached card reader or presenting their finger to an attached biometric scanner. None of these options should be enabled if the system is not using any remote authentication devices. IP Card Reader Authentication If IP card readers are being used to authenticate users the Enable IP card readers needs to be selected. This will ensure the server listens for IP card reader remote connections on the specified port. If this option is not selected, an IP card reader cannot be assigned to a device. Figure 36 IP Biometric Authentication If biometric scanners are being used to authenticate users the Enable IP biometric devices needs to be selected. The biometric device server address must be specified. This will ensure the server listens for IP biometric remote connections on the specified port. If this option is not selected, an IP biometric scanner cannot be assigned to a device. Figure 37 AIT Ltd Page 18 of 28

USB Card Reader Authentication If USB card readers are being used to authenticate users the Enable USB card readers needs to be selected. The output settings for the device must also be specified. These settings will need to be determined based on the card number assigned to the users account. Figure 38 IP Device Communication All IP authentication devices need to use the same port shown below. This needs to be reflected on the XPR Enterprise Biometric Server if the system is using biometric authentication and the IP card readers also need to use this port for communication. Figure 39 Konica Minolta USB Card Readers If Konica Minolta USB readers are in use on any devices, the following information must be supplied for reading the output for authentication. Figure 40 AIT Ltd Page 19 of 28

YSoft USB Card Readers If YSoft USB readers are in use on any devices, the following information must be supplied for reading the output for authentication. Figure 41 Card Reader PIN Entry If the Require PIN option is selected, all users will be prompted to enter their PIN number on the device after they have presented their card to the attached card reader. This option applies to IP and USB card readers. Figure 42 Device Deployment XPR Enterprise KM Embedded must be deployed to each device. Manage Search Protocol Before embedded applications can be deployed on to your devices, the communication and deployment settings must be specified. Click Search Protocol in the work pane to select and manage the device search. The Search Protocol specifies the method used to locate devices across your network. Figure 43 Search Types There are three supported methods for device searching. UPnP (Universal Plug and Play), SNMP Ping and SNMP Broadcast. The SNMP methods support both version 1 and version 3. AIT Ltd Page 20 of 28

UPnP Searching This is probably the most reliable search and requires no configuration but will only search across the subnet from where the search is instigated. Figure 44 SNMP Ping Searching SNMP Ping is a more powerful search allowing the IP search range to be specified. However, this method is non-specific i.e. it will return embedded device addresses and the addresses of other, non-embedded devices, so care must be taken when selecting devices for deployment. Figure 45 AIT Ltd Page 21 of 28

SNMP Broadcast Searching SNMP Broadcast allows for the searching of subnets for devices by specifying the broadcast address. This, like SNMP Ping, may return non-embedded device addresses. Figure 46 N.B. As mentioned previously, both SNMP methods support V3; please refer to SNMP documentation and ensure that the specified user has context rights etc. Device Searching Device searching is necessary to locate the devices across your network. Once the devices have been found, they can be selected to receive and run the embedded applications. Select Search for Devices from the Actions menu. This will invoke a network search for devices based on the search method selected earlier. Figure 47 After the search has completed, any devices found will be displayed in the grid as shown below. The address of the device and the model are returned from the search and a description can be entered to identify the device location. Devices Found Figure 48 AIT Ltd Page 22 of 28

Device Deployment Checking the Licensed box for a device will check all of the other boxes for that device. These will also be highlighted in yellow indicating that the request is pending. Authentication is mandatory as this is the application that forces user login. The Print and Scan applications are optional. Device Pending Install Figure 49 There is also an option to set a default application to run on the device as soon as the user has authenticated. This feature is not available on all devices by default. Please refer to the KM device documentation for the MyPanel device requirements.select the Apply Changes option from the Actions menu to deploy the application to the selected device. Figure 50 Request Successful After a deployment request has been submitted, the application will attempt to deploy to each device based on the settings you specified. When this task is complete, the grid should display your changes highlighted in green. This indicates that the request was successful. The boxes will always show the device status (Checked = Active, Unchecked = Inactive). Click the IP address in the grid to see a list of deployment events. Device Installation Successful Figure 51 AIT Ltd Page 23 of 28

Request Failed There are many reasons why an application may fail to register on a device. Such failures are shown by highlighting the individual requests in red. The device shown below still has an active license at this point. If you need to remove the license from a device, uncheck it and click Apply. Click the IP address in the grid to see a list of deployment events. Device Installation Failed Figure 52 Hide Devices Devices may get returned from the search that will not be running the XPR Enterprise KM Embedded application. Providing the device does not have a license applied, there is an option to hide the device by selecting the Hidden checkbox within the grid. Set Device as Hidden Figure 53 To remove the selected devices from view, select the Conceal Hidden Devices option from the Actions menu. Figure 54 AIT Ltd Page 24 of 28

Device Management Once devices have been licensed and deployed, they can be individually managed. Figure 55 To manage a device, highlight it in the grid and click Device Details from the work pane. Figure 56 Device Description A description can be given to a device. This will appear against the device in the device management grid. Figure 57 Device Print Queue Once a print queue has been associated with a device it will be displayed in the device management grid. Figure 58 AIT Ltd Page 25 of 28

Manage Device Print Queue Association Pcounter Device Type, Configuration Profile and Pull Queues can also be selected for each device s queue configuration. Click the Add Association button and navigate to find the print queue. Pcounter Device Configuration Figure 59 Print queue associations can be removed or edited by clicking the Edit Association or Delete Association buttons. Remote Authentication Device If remote authentication devices are being used, select the correct device type. IP card readers and biometric scanners will need their IP address entering. The remote authentication device type will also be displayed in the device management grid. Figure 60 AIT Ltd Page 26 of 28

Licensing In order to run the XPR Enterprise Embedded applications, an active license is needed by each device. The number of device (client) licenses allowed is determined when you purchase a support license for the product. During your 30 day evaluation period you may license up to 500 devices. License Status Figure 61 Service When all of the above steps have been completed, the service can be started. The service will listen for incoming requests on your chosen IP ports. Starting and Stopping the service The service can be started and stopped from the Actions menu or the Windows Service Manager (Services.msc). Stopping the service will suspend communication between the application and the devices. Figure 62 AIT Ltd Page 27 of 28

Listening When listening is initiated for each application, your active devices should be able to communicate and function. Figure 63 N.B. Firewall software on the host server must be configured to allow for sending and receiving on the specified ports. AIT Ltd Page 28 of 28