Black Box Black Box Network Services FaxReceiver Fax Machine User Manual


 
Copyright 2006 Black Box Page 4
44
4 of
of of
of 49
4949
49
Introduction
The Black Box FaxReceiver MC200A is designed to receive a fax and convert it into
an email to allow distribution that is more convenient and unwanted faxes can be
electronically deleted. The Black Box Fax-Receiver receives the fax and puts it into a
mail-server mailbox. From there, you or an administrator can read and re-distribute
the fax to the appropriate email recipient on the network or print it if necessary.
This reduces paper waste, speeds up the communication and distribution of
information, allows automatic backup of received faxes and eliminates the need to
maintain a fax machine solely for the purpose of receiving faxes.
Easy Configuration
The setup is done using Telnet, which allows configuration in any network
environment like Windows, Unix or Apple. Any Workstation or PC with Telnet
capabilities and access to the network can be used to configure the unit.
Features
External all voltage power supply (100-240 Volts, 50-60 Hz)
Extremely low power consumption of less than 5 watts.
Remote management from any PC
Retains its setup in Flash memory.
Powers up in less than 10 seconds.
Three login types, CRAM-MD5, LOGIN (AUTH=LOGIN) and non-authenticated.
System Architecture
The FaxReceiver MC200A uses a PCMCIA card to connect to the Fax Line; this allows the
FaxReceiver MC200A to be used in any country in the world for which there is a PCMCIA
fax/modem card available that fulfills the local standards.
The FaxReceiver MC200A connects directly to an Ethernet 10/100baseTx network via fixed IP
or DHCP. Before operating the device a number of parameters have to be set up in the
FaxReceiver MC200A to allow log on to your company or Internet provider's mail server.
3 different login types, CRAM-MD5, LOGIN (AUTH=LOGIN) and non-authenticated. It will try
CRAM-MD5, first. If that fails, it falls back to insecure authentication (same as
Outlook Express uses), and it will fall back further to non-authenticated login if that
fails.
Setting up is achieved using the Telnet protocol and a telnet application is available for any
operating system. Check your PC, Apple or Unix operator manual.
Since the device only relies on TCP/IP and SMTP it will work in any common network
environment.