?
Solved

win95, DLC,  and HP JetDirect

Posted on 1997-02-22
1
Medium Priority
?
594 Views
Last Modified: 2013-12-23
How does one configure Microsofts 32-bit DLC/LCC protocol to
talk with a HP JetDirect print server??  I downloaded the latest driver file that included help files but the only configuration suggestion were: "you must install a network printer"  -- NO KIDDING!!!

  I've configure a HP JetDirect-based printer to work with Windows NT using DLC protocol and there were no problems.  The install wizard in NT had a 'add port' button where you could add a virtual local port to map the the JetDirect card.  I can't figure out how to do the same thing under win95.

-GA
0
Comment
Question by:boulder
1 Comment
 
LVL 3

Accepted Solution

by:
ot earned 200 total points
ID: 1542963
HP does not support DLC for printing to JetDirects in Windows 95. Instead they have chosen IPX/SPX for the "Direct mode" printing to JetDirect Printservers.

0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question