Sharp AR M162 AR-M162 AR-M207 Operation Manual Suite - Page 178

Creating A Box For F-code Transmission - password

Page 178 highlights

TRANSMISSION USING F-CODES When communication occurs involving a box, the communication will only take place if the sub-address and passcode that the other machine sends match the sub-address and passcode programmed in your machine for that box. Therefore, to allow communication, you must inform the other party of the sub-address and passcode of the box. Likewise, to send a fax to a box in another machine or use polling to retrieve a document from a box, you must know the sub-address and passcode of that box. (Note that assigning names simply makes it easier to manage boxes; you do not need to inform the other party of a box name.) However, you must inform the other party of the sub-address and passcode for a box. This machine uses the term "sub-address" for the location of the memory box and the term "passcode" for the password that allows communication; however, other fax machines of other manufacturers may use different terms. When asking the other party for a sub-address and passcode, you may find it useful to refer to the 3-character alphabetical terminology used by the ITU-T. Your machine Sub-address Passcode F-code polling memory box SEP PWD ITU-T F-code confidential box SUB SID F-code relay broadcast function SUB SID CREATING A BOX FOR F-CODE TRANSMISSION F-code operations that use boxes include F-code polling memory (page 50), F-code confidential transmission (page 55), and F-code relay broadcast transmission (page 58). A box is created by programming a name for the box, and up to 10 boxes for each operation type can be created. The information programmed in each box varies slightly depending on the type of operation. For information on programming, editing, and deleting boxes, see "PROGRAMMING, EDITING, AND DELETING F-CODE MEMORY BOXES" on page 74. After you have programmed a box, inform the other party of the box's sub-address and passcode. 4 Note If you attempt to create a box when 10 boxes have already been created for that operation type, a message will appear and you will not be able to create the box. Delete any unused boxes and then create the new box. (See "PROGRAMMING, EDITING, AND DELETING F-CODE MEMORY BOXES" on page 74.) 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

49
TRANSMISSION USING F-CODES
4
When communication occurs involving a box, the communication will only take place if the sub-address and
passcode that the other machine sends match the sub-address and passcode programmed in your machine for that
box. Therefore, to allow communication, you must inform the other party of the sub-address and passcode of the
box. Likewise, to send a fax to a box in another machine or use polling to retrieve a document from a box, you must
know the sub-address and passcode of that box. (Note that assigning names simply makes it easier to manage
boxes; you do not need to inform the other party of a box name.) However, you must inform the other party of the
sub-address and passcode for a box.
This machine uses the term "sub-address" for the location of the memory box and the term "passcode" for the
password that allows communication; however, other fax machines of other manufacturers may use different terms.
When asking the other party for a sub-address and passcode, you may find it useful to refer to the 3-character
alphabetical terminology used by the ITU-T.
CREATING A BOX FOR F-CODE TRANSMISSION
F-code operations that use boxes include F-code polling memory (page 50), F-code confidential transmission (page
55), and F-code relay broadcast transmission (page 58).
A box is created by programming a name for the box, and up to 10 boxes for each operation type can be created.
The information programmed in each box varies slightly depending on the type of operation. For
information on programming, editing, and deleting boxes, see "PROGRAMMING, EDITING, AND DELETING
F-CODE MEMORY BOXES" on page 74.
After you have programmed a box, inform the other party of the box's sub-address and passcode.
Your machine
ITU-T
F-code polling memory box
F-code confidential box
F-code relay broadcast function
Sub-address
SEP
SUB
SUB
Passcode
PWD
SID
SID
If you attempt to create a box when 10 boxes have already been created for that operation type, a
message will appear and you will not be able to create the box. Delete any unused boxes and then
create the new box. (See "
PROGRAMMING, EDITING, AND DELETING F-CODE MEMORY BOXES" on
page 74.)
Note