SyncThru™ Web Service

This chapter gives you step-by-step instructions for setting up the network environment through SyncThru™Web Service.

[Note]
  • Internet Explorer® 6.0 or higher is the minimum requirement for SyncThru™ Web Service.

  • Some menus may not appear on the display screen depending on the settings or models. If so, it is not applicable to your machine.

What is SyncThru™Web Service?

If you have connected your machine to a network and set up TCP/IP network parameters correctly, you can manage the machine via SyncThru™ Web Service. Use SyncThru™ Web Service to:

  • View the machine’s device information and check its current status.

  • Change TCP/IP parameters and set up other network parameters.

  • Change the printer preference.

  • Set the email notifications advising of the machine’s status.

  • Get support for using the machine.

  • Upgrade machine software.

Required web browser

You need one of the following web browsers to use SyncThru™Web Service.

  • Internet Explorer® 6.0 or higher

  • Chrome 4.0 or higher

  • FireFox 3.0 or higher

  • Safari 3.0 or higher

Connecting to SyncThru™ Web Service

IPv4 supported web browser

  1. Start a web browser, such as Internet Explorer®, that supports IPv4 addressing as a URL.

    Enter the machine’s IP address (http://xxx.xxx.xxx.xxx) in the address field and press the Enter key or click Go.

    [Note]

    You can get the machine’s IP address from the machine report (seeReport).

  2. Your machine’s SyncThru™ Web Service website opens.

IPv6 supported web browser

  1. Start a web browser, such as Internet Explorer®, that supports IPv6 addressing as a URL.

  2. Select one of the IPv6 addresses (Stateless Address, Stateful Address, Manual Address) from Network Configuration Report.

    [Note]

    You can get the machine’s IPv6 address from the machine report (seeReport).

  3. Enter the IPv6 addresses (eg., http://[3ffe:10:88:194:213:77ff:fe82:75b]).

    [Caution]

    The address must be enclosed in '[ ]' brackets.

  4. Your machine’s SyncThru™ Web Service website opens.

Logging into SyncThru™ Web Service

Before configuring options in SyncThru™ Web Service, you need to log-in as an administrator. You can still use SyncThru™ Web Service without logging in, but you will not have access to or view the Settings tab and the Security tab.

  1. Click Login on the upper right of the SyncThru™ Web Service website.

    A log-in page appears.

  2. Type in the ID and Password and select the Domain. Then click on LOGIN.

    Use the same login ID, Password, Domain as when logging in from the machine (see Log-in .)

    [Note]

    If you want to create a new user or change the password, see Security tab.

Information tab

This tab gives you general information about your machine. You can check things, such as the machine’s status, supplies’ status, count information, network information, and more. You can also print reports, such as configuration page.

  • Active AlertsYou can check the current alerts in the machine. Use this information to troubleshoot machine errors.

  • SuppliesYou can check the supplies’ information. For toner cartridges and imaging units, supplies’ status is displayed with a visual graph showing you the amount of each supply left. Page counts are also available which can help you predict when to change the supplies. This feature is also available from the machine (see Supplies Life).

  • Usage CountersYou can check the billing information and usage counter of the machine. This feature is also available from the machine (see Counter).

  • Current SettingsShows the current settings of the machine and network.

  • Machine InformationShows the current machine settings.

  • Network InformationShows the current network settings. Use this page as a reference and change the necessary settings needed for using the network.

  • Security InformationShows the current security settings of the machine and network.

  • Print InformationYou can print all the reports provided by your machine. You can use these reports to help you maintain your machine. This feature is also available in the machine (see Report).

Box tab

You can manage the Box. This feature is also available from the machine (see Using Box).

Forward / Print / Send / Download

You can manage the folder and files in Forward, Print, Send, Download.

  • AddYou can create Box in Print, Send, Download tab and Secured Box in Print, Send tab.

  • DeleteYou can delete Box and file in Forward, Print, Send, Download tab.

  • EditYou can edit Box and file name in Print, Send, Download tab.

  • BrowseIf you want to browse the Box, check the Box you want then click Browse.

  • TaskYou can copy and move the Box and files in Print, Send, Download tab.

Address book tab

You can manage the address book. This feature is also available from the machine (see Understanding the address screen).

  • IndividualYou can manage individual entries in the address book.

  • GroupYou can manage group address books.

Settings tab

Settings tab has sub menus, Machine Settings and Network Settings. You cannot view or access this tab if you do not log-in as an administrator (see Logging into SyncThru™ Web Service).

  • Machine SettingsYou can set machine settings.

    • SystemYou can set machine related settings.

    • PrinterYou can set print related settings such as darkness or adjust the background. This feature is also available from the machine (see Print Settings).

    • CopyYou can set copy related settings such as darkness or adjusting the background. This feature is also available from the machine (see Setting options).

    • FaxYou can set fax related settings such as fax number or redial times. This feature is also available from the machine (see Understanding the fax screen).

    • Scan & SendYou can set scan related settings. This feature is also available from the machine (see Understanding the Scan & Send screen).

    • Box: You can set box related settings.This feature is also available from the machine (see Using Box).

    • Address Book Setting: This address book contains contacts that are available to all users. You can use the address book to make contacts available to anyone who uses the machine.

    • E-mail Notification: When an error occurs or the consumables are running out, the machine sends a notification to the administrator via e-mail. You can set whether to use this feature or not. You can also select which alerts to receive and when.

  • Network SettingsYou can set up the network environment to use your machine as a network machine. You can also set the settings from the machine. Refer to the network setup chapter (see Network Setup).

    • GeneralYou can set general machine information to use in the network and set ethernet settings. This feature is also available from the machine (see Ethernet).

    • TCP/IPv4, TCP/IPv6, Raw TCP/IP, LPR, IPP,Telnet, WSD, SLP, UPNP, mDNS, CIFS, SNMP, SNMPv1/v2, SNMPv3: You can set protocol settings.This feature is also available from the machine

    • Outgoing Mail Server (SMTP)You can set server settings for outgoing emails. If this setting is not configured, you cannot use scan to email feature. Outgoing emails will be sent through SMTP server you set here. This feature is also available from the machine (see Network Protocol).

    • HTTPYou can allow or block users from accessing the SyncThru™ Web Service. This feature is also available from the machine (see Network Protocol).

    • Proxy: You can set proxy settings and enable authentication to connect to licence server through http proxy server. These proxy settings are provided currently only if the administrator wants to update an XOA application’s license online through proxy server.

Security tab

The security tab has System Security, Network Security, User Access Control and System Log. You cannot access this tab if you do not log-in as an administrator (see Log-in ).

  • System SecurityFrom the SyncThru™ Web Service, select the Security tab > System Security.

    • System AdministratorEnter the system administrator’s information. The machine sends email notification to the email address set here. This feature is also available from the machine (see Contact Information).

    • Feature ManagementYou can enable/disable network features. Check the features you want to enable and click Apply.

    • Information HidingYou can enable/disable network features. Check the features you want to enable and click Apply.

    • Restart DeviceYou can reboot your machine. Click the Restart Now button to reboot.

  • Network SecurityFrom the SyncThru™ Web Service, select the Security tab > Network Security.

    • Digital CertificateYou can manage digital certificates. A digital certificate is an electronic certificate that verifies the secure association between communication nodes. You need to add the certificate for SSL communication. This feature is also available from the machine (see Network Security).

    • Secure Connection: You can enable or disable secure connection to use more enhanced secure network channel. For secure communication, using the Secure Connection feature is recommended.

    • SNMPv3: You can set SNMPv3.

    • IP SecurityYou can set IP security settings.

    • IP/MAC FilteringYou can set filtering options for IP and MAC addresses. If the administrator does not add a filtering rule for IPv4, IPv6, and MAC addresses, nothing is filtered. If the administrator has added a filtering rule, filtering will be applied to the entered IPv4, IPv6, and MAC addresses.

    • IPv4 FilteringYou can enable/disable IPv6 filtering as well as manage filtering rules. This feature is also available from the machine (see Network filtering settings).

    • IPv6 FilteringYou can enable/disable IPv6 filtering as well as manage filtering rules. This feature is also available from the machine (see Network filtering settings).

    • MAC FilteringYou can enable/disable Mac filtering as well as manage filtering rules. This feature is also available from the machine (see Network filtering settings).

    • 802.1xYou can enable/disable 802.1x Security as well as manage filtering rules. This feature is also available from the machine (see 802.1x).

  • External Authentication ServerSet the servers for authentication.

  • 802.1x: You can enable 802.1x authentication, which is a port-based authentication. If this authentication is enabled, the machine is not allowed to access through the protected side of the network until the machine is authorized. Use this feature to protect your network. This feature is also available from the machine (see 802.1x).

  • User Access ControlYou can restrict users from accessing the machine or application. You can also give specific permission for user to only use certain feature of the machine. For example, you can allow user A to only use print feature. In this case, user A will not be able to scan, copy or fax with the machine.

    • Authentication (Activating access control): You can choose the authentication method for user authentication. Select a mode and click on the Options button. This feature is also available from the machine (see Authentication).

    • Authorization (Giving rights): You can give permissions to a user to only use certain features of the machine.

    • Authority Management You can give different rights to different users. For example, you can allow user A to use all the machine’s functions while giving user B only the right to print.

    • AccountingYou can manage accounts.

    • User profileYou can store user information on the machine’s hard drive. You can use this feature to manage the users using the machine. You can also group the users and manage them as a group. You can add up to 1,000 entries. User identified by user ID and password are allowed to modify their password. They are allowed to view all of their profile information. When it comes to the role, users are allowed to see only the role they belong to but not its permissions.

  • System LogYou can keep logs of events that have happened in the machine. The administrator can record and manage the machine usage information by keeping the system log files. The system log files are stored on the machine’s HDD (hard disk drive), and when it is full, it will erase old data. Export and save the important audit data separately using the exporting feature.

    • Log configuration: You can enable or disable keeping logs. You can also backup log files by periods and transfer to a repository server.

    • Log Viewer: You can view, delete, and search log files.

Maintenance tab

This tab allows you to maintain your machine by upgrading firmware, managing applications, and setting contact information for sending emails. You can also connect to the Samsung website or download manuals and drivers by selecting the Link menu.

  • Firmware VersionYou can check the firmware version used in the machine. Check the version and update it if necessary. This feature is also available from the machine (see Machine Details).

  • Application ManagementYou can add or delete applications/license. If you add an application, you need to activate the license of the installed application. Some applications may not have a license. This feature is also available from the machine (see Application Management)

  • Backup/Restore: You can backup the machine’s configurations and restore the configuration when there is a problem with the machine. The saved (backed up) files can also be used to configure other machines.

  • Contact Information: You can view contact information. To change the information, (see Contact Information).

  • LinkYou can view links to useful websites where you can:

    • view product information and get support (Samsung website).

    • download manuals and drivers.

    • order consumable supplies.

    • register your machine on-line.