Xerox FAX System (J) Fax Machine User Manual


 
v
Allowing the Receiving Party to Initiate Reception (Polling Communication) ..........................5-8
Preparing Documents for a Polling Transmission ..........................................................................................5-8
Receiving Documents Using Polling Reception ..............................................................................................5-9
Communicating Using F-Codes (F-Code Based Communication) ........................................5-11
What F-Codes are used in this fax? ...............................................................................................................5-11
What are F-Code Boxes? ................................................................................................................................5-11
Communicating Confidentially (F-Code Based Confidential Communication) .......................5-12
Registering New F-Code Confidential Boxes ................................................................................................5-12
Modifying or Deleting F-Code Confidential Boxes .......................................................................................5-14
Sending Documents Using F-Code Based Confidential Transmission ........................................................5-15
Printing Out Documents from an F-Code Confidential Box ........................................................................5-16
Printing Out an F-Code Confidential Box List .............................................................................................5-17
Entering Documents into an F-Code Confidential Box ................................................................................5-18
Receiving Documents from an F-Code Based Bulletin Board ......................................................................5-20
Using a Relay Station to Send Your Documents
(F-Code Based Relay Broadcast Communication) .................................................................5-22
Registering New F-Code Relay Boxes ...........................................................................................................5-22
Modifying or Deleting F-Code Relay Boxes ...................................................................................................5-24
Sending Documents as an F-Code Based Relay Broadcast Transmission ..................................................5-25
Printing Out an F-Code Relay Box List ........................................................................................................5-27
Having Received Faxes Forwarded to Another Fax Number (Fax Forwarding) ....................5-28
Registering the Fax Forwarding Information ...............................................................................................5-28
Modifying Registered Fax Forwarding Information .....................................................................................5-29
Turning Fax Forwarding ON/OFF ................................................................................................................5-30
Dialing Multiple Destinations as a Group (Group Dial Keys) .................................................5-31
Registering New Group Dial Keys .................................................................................................................5-31
Modifying or Deleting Registered Information .............................................................................................5-32
Dialing With a Group Dial Key .....................................................................................................................5-34
Printing Out a Group Dial List ......................................................................................................................5-35
Saving Specific Communication Settings as a Single Program (Program Keys) ..................5-36
Registering New Program Keys .....................................................................................................................5-36
Modifying or Deleting Registered Information .............................................................................................5-38
Using a Program Key .....................................................................................................................................5-39
Printing Out a Program Dial List ..................................................................................................................5-40
Enabling Communication Only When Certain Passwords Match
(Password Check Communication) ........................................................................................5-42
Registering New Permit Telephone Numbers ..............................................................................................5-42
Modifying or Deleting Permit Telephone Numbers ......................................................................................5-44
Registering New Permit IDs ..........................................................................................................................5-45
Modifying or Deleting Permit IDs .................................................................................................................5-46
Turning Password Check Communication ON/OFF ....................................................................................5-47
Communicating with Encrypted Documents (Encrypted Communication) ............................5-48
Registering New Encryption Keys .................................................................................................................5-48
Modifying or Deleting Encryption Keys ........................................................................................................5-50
Registering New Encryption Boxes ...............................................................................................................5-51
Modifying or Deleting Encryption Boxes ......................................................................................................5-53
Performing the Operation at the Transmitting Fax .....................................................................................5-54
Performing the Operation at the Receiving Fax ...........................................................................................5-54
Printing Out Documents from an Encryption Box .......................................................................................5-55
Printing Out an Encryption Key List ............................................................................................................5-56
Contents