EasyManua.ls Logo

Ricoh IM 7000 User Manual

Ricoh IM 7000
148 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
User Guide
For RICOH IM
7000/8000/9000/9000T
Author: RICOH COMPANY, LTD.
Date: 2023.03
Part Number: D0D07432
For information not found in this manual, see the online manuals available on our web site
(https://www.ricoh.com/) or via the control panel.
Question and Answer IconNeed help?

Do you have a question about the Ricoh IM 7000 and is the answer not in the manual?

Ricoh IM 7000 Specifications

General IconGeneral
Print Resolution1200 x 1200 dpi
Duplex PrintingYes
Monthly Duty Cycle300, 000 pages
Maximum Paper SizeA3
Hard Disk Drive320 GB
Power Source220 - 240 V, 50/60 Hz
Scan Resolution600 x 600 dpi
Supported Operating SystemsWindows, Mac OS, Linux
Print Speed70 ppm (A4)
ConnectivityUSB, Ethernet, Wi-Fi
Supported Paper SizesA3, A4, A5, B4, B5, Letter, Legal
Memory (Standard)2 GB
Copy Speed70 cpm (A4)
Fax Resolution200 x 200 dpi
Network ConnectivityEthernet
First Print Speed (Black)Less than 4.5 seconds

Summary

Introduction and Basic Operations

List of Newly Added Functions (Release Notes)

Information on functions added via RICOH Always Current Technology updates.

Details of Newly Added Functions

Specific details regarding new functions available through software updates.

Functions

Core Functions: Copy, Fax, Scan, Printer, Document Server

Essential machine functions for document processing and communication.

Recommended Functions

Highlights suggested or frequently used functions for user convenience.

Maintenance and Management

Maintenance and Troubleshooting

Procedures for machine upkeep and resolving operational issues.

Settings and Security

Configuration options for machine operation and security enhancements.

Specifications

Technical details and capabilities of the machine.

Setup

Setup and Driver Installation

Guidance on initial machine setup and software driver installation.

Checking the Indicators, Icons, and Messages on the Control Panel

Understanding Control Panel Indicators and Messages

Explains meanings of icons, messages, and indicators for status and error reporting.

Collecting Logs

Log Types and Information Items

Details on Job, Access, and Eco-friendly logs, including their contents.

Downloading and Managing Logs

Procedures for downloading collected logs and managing stored data.

Deleting All Logs

Deleting logs via Control Panel or Web Image Monitor

Steps to erase all stored log data from the machine using different interfaces.

Disabling Log Transfer to Log Collection Server

Disabling Transfer via Control Panel and Web Image Monitor

Methods to stop log data from being sent to a log collection server.

Date/Time/Timer Settings

Configuring Date, Time, and Daylight Saving

Settings for machine's internal clock, time zones, and daylight saving rules.

Timer Settings for Sleep Mode and Auto Reset

Configuration of timers for sleep mode, system auto reset, and auto logout.

Logging in to Web Image Monitor

Accessing and Navigating Web Image Monitor

Instructions on how to access the machine's web interface for status and settings.

Methods for Sending/Receiving a Fax

Communication Methods: G3, IP-Fax, Internet Fax

Explains different protocols and methods for fax transmission and reception.

Scanning and Sending Documents via Fax

Procedures for scanning originals and sending them as faxes.

Names and Functions of the Control Panel

Control Panel Components: Touch Panel, Media Slots, NFC

Overview of the physical and interactive elements of the machine's control panel.

LED Indicators

Description of various LED indicators and their meanings related to machine status.

Reception Settings

Reception File and Mode Settings

Configuration for handling received fax documents, including output methods and modes.

Registering Special Senders and Box Settings

Managing specific senders and organizing received faxes into boxes.

Registering a User in the Address Book and Specifying the Login Information

For Basic Authentication

Process for registering users and their login credentials for basic authentication.

Settings for Administrator

Security Pattern/Stamp and Data Management

Settings for data security, unauthorized copy prevention, and log collection.

File Management and Security Configurations

Options for file management, encryption, network security, and access control.

Specifying Access Privileges for Documents Stored in Document Server

Managing Permissions for Users and Groups

Setting read/edit privileges for documents stored in the document server.

Using Web Image Monitor

Accessing and Navigating Web Image Monitor

Instructions on how to access the machine's web interface for status and settings.

When a Message Appears and the Machine Cannot Be Operated

Troubleshooting Error Messages

Guide to understanding and resolving common machine messages and operational issues.

Access Control

Limiting Device Access and Disabling Protocols

Restricting network access by IP address and disabling unused communication protocols.

Specifying Security Levels

Configuring security levels to enhance network protection based on protocols and encryption.

Encrypting Data to Prevent Data Leaks

Encrypting Hard Disk Data and Overwriting

Measures to protect data from leaks by encrypting the hard disk and overwriting sensitive information.

Changing the HDD Authentication Code

Securing the hard disk by setting and managing an authentication code.

Limiting Available Functions

Restricting Function Access for Users

Specifying which machine functions are accessible to individual registered users.

Preparing the Server to Use for User Authentication

Setting Up Windows and LDAP Servers for Authentication

Requirements and steps for configuring external servers for Windows or LDAP user authentication.

Registering Administrators Before Using the Machine

Administrator Privileges and Registration Workflow

Defining administrator roles and the process for registering them to manage the machine.

Security

Introduction to Security Measures

Overview of security features and their importance for protecting data and preventing unauthorized access.

Preventing Unauthorized Accesses

Measures to prevent unauthorized users from accessing the machine's functions and network.

Preventing Information Leaks

Strategies to prevent sensitive information from being leaked through various channels.

Registering the LDAP Server

Registering LDAP Server Details and Search Options

Steps to configure the machine to connect to an LDAP server for user information.

Specifying the Policy on Login/Logout

User Lockout and Auto Logout Timer Settings

Configuring policies for user lockout after failed attempts and automatic logout after inactivity.

Taking Measures to Prevent Security Threats

User Management and Network Security Measures

Implementing measures to manage users, restrict access, and secure the network environment.

Verifying Users to Operate the Machine (User Authentication)

User Authentication Methods: Basic, Windows, LDAP, User Code

Explains different methods for authenticating users to access machine functions.

Related product manuals