Solved

Xerox WorkCentre 6605 setting up email scanning

Posted on 2013-06-08
1
4,988 Views
Last Modified: 2013-06-28
How do I setup Email scanning in my Xerox WorkCentre 6605 setting.  I know I do the following:

1. At your computer, open a Web browser, type the IP address of the printer in the address field,
then press Enter or Return.
Note: If you do not know the IP address of your printer, see Finding the IP Address of Your
Printer on page 30.
2. Click Properties.
3. In the left pane, under Protocols, click Email Settings.
4. Type the following information:
• Next to Enter the "From" Email Address, type an appropriately formatted email address to
appear in the From field of emails from the printer.
• For SMTP Server (IP Address or DNS Name), type the IP address or DNS name of the
SMTP server.
If you do not know the IP Address or DNS Name of the SMTP server, click Auto Detect
SMTP Server.
• For SMTP Port, type the default port number of 25 for SMTP, or select a number from the
range provided.
5. Select an Authentication Type.
Note: Ensure that the authentication type is compatible with your SMTP server.
6. If authentication is required, enter a valid SMTP Login Name for the SMTP Server.
7. If authentication is required, enter a valid password for the SMTP server.
8. Re-enter the password.
9. Scroll down, then click Save Changes.

But it fails to connect when I put SMTP login namen and password.  What goes in these fields?  Thanks.
0
Comment
Question by:Tlingit
1 Comment
 
LVL 32

Accepted Solution

by:
Rodney Barnhardt earned 500 total points
ID: 39233055
I really depends on how your email server is configured. We use Exchange, so is there an SMPT relay set up in the Hub? If so, has the IP address of the printer been entered to allow relaying. Also, on our Xerox, we do not us authentication for email. Does the account you are using have an account in AD, if so, does it also have a mailbox on the mail server?
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now