Solved

Xerox WorkCentre 6605 setting up email scanning

Posted on 2013-06-08
1
5,176 Views
Last Modified: 2013-06-28
How do I setup Email scanning in my Xerox WorkCentre 6605 setting.  I know I do the following:

1. At your computer, open a Web browser, type the IP address of the printer in the address field,
then press Enter or Return.
Note: If you do not know the IP address of your printer, see Finding the IP Address of Your
Printer on page 30.
2. Click Properties.
3. In the left pane, under Protocols, click Email Settings.
4. Type the following information:
• Next to Enter the "From" Email Address, type an appropriately formatted email address to
appear in the From field of emails from the printer.
• For SMTP Server (IP Address or DNS Name), type the IP address or DNS name of the
SMTP server.
If you do not know the IP Address or DNS Name of the SMTP server, click Auto Detect
SMTP Server.
• For SMTP Port, type the default port number of 25 for SMTP, or select a number from the
range provided.
5. Select an Authentication Type.
Note: Ensure that the authentication type is compatible with your SMTP server.
6. If authentication is required, enter a valid SMTP Login Name for the SMTP Server.
7. If authentication is required, enter a valid password for the SMTP server.
8. Re-enter the password.
9. Scroll down, then click Save Changes.

But it fails to connect when I put SMTP login namen and password.  What goes in these fields?  Thanks.
0
Comment
Question by:Tlingit
1 Comment
 
LVL 32

Accepted Solution

by:
Rodney Barnhardt earned 500 total points
ID: 39233055
I really depends on how your email server is configured. We use Exchange, so is there an SMPT relay set up in the Hub? If so, has the IP address of the printer been entered to allow relaying. Also, on our Xerox, we do not us authentication for email. Does the account you are using have an account in AD, if so, does it also have a mailbox on the mail server?
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question