v
Allowing the Receiving Party to Initiate Reception
(Polling Communication)
..........................
5-8
Preparing Documents for a Polling Transmission
..........................................................................................
5-8
Receiving Documents Using Polling Reception
..............................................................................................
5-9
Communicating Using F-Codes
(F-Code Based Communication)
........................................
5-11
What F-Codes are used in this fax?
...............................................................................................................
5-11
What are F-Code Boxes?
................................................................................................................................
5-11
Communicating Confidentially
(F-Code Based Confidential Communication)
.......................
5-12
Registering New F-Code Confidential Boxes
................................................................................................
5-12
Modifying or Deleting F-Code Confidential Boxes
.......................................................................................
5-14
Sending Documents Using F-Code Based Confidential Transmission
........................................................
5-15
Printing Out Documents from an F-Code Confidential Box
........................................................................
5-16
Printing Out an F-Code Confidential Box List
.............................................................................................
5-17
Entering Documents into an F-Code Confidential Box
................................................................................
5-18
Receiving Documents from an F-Code Based Bulletin Board
......................................................................
5-20
Using a Relay Station to Send Your Documents
(F-Code Based Relay Broadcast Communication)
.................................................................
5-22
Registering New F-Code Relay Boxes
...........................................................................................................
5-22
Modifying or Deleting F-Code Relay Boxes
...................................................................................................
5-24
Sending Documents as an F-Code Based Relay Broadcast Transmission
..................................................
5-25
Printing Out an F-Code Relay Box List
........................................................................................................
5-27
Having Received Faxes Forwarded to Another Fax Number
(Fax Forwarding)
....................
5-28
Registering the Fax Forwarding Information
...............................................................................................
5-28
Modifying Registered Fax Forwarding Information
.....................................................................................
5-29
Turning Fax Forwarding ON/OFF
................................................................................................................
5-30
Dialing Multiple Destinations as a Group
(Group Dial Keys)
.................................................
5-31
Registering New Group Dial Keys
.................................................................................................................
5-31
Modifying or Deleting Registered Information
.............................................................................................
5-32
Dialing With a Group Dial Key
.....................................................................................................................
5-34
Printing Out a Group Dial List
......................................................................................................................
5-35
Saving Specific Communication Settings as a Single Program
(Program Keys)
..................
5-36
Registering New Program Keys
.....................................................................................................................
5-36
Modifying or Deleting Registered Information
.............................................................................................
5-38
Using a Program Key
.....................................................................................................................................
5-39
Printing Out a Program Dial List
..................................................................................................................
5-40
Enabling Communication Only When Certain Passwords Match
(Password Check Communication)
........................................................................................
5-42
Registering New Permit Telephone Numbers
..............................................................................................
5-42
Modifying or Deleting Permit Telephone Numbers
......................................................................................
5-44
Registering New Permit IDs
..........................................................................................................................
5-45
Modifying or Deleting Permit IDs
.................................................................................................................
5-46
Turning Password Check Communication ON/OFF
....................................................................................
5-47
Communicating with Encrypted Documents
(Encrypted Communication)
............................
5-48
Registering New Encryption Keys
.................................................................................................................
5-48
Modifying or Deleting Encryption Keys
........................................................................................................
5-50
Registering New Encryption Boxes
...............................................................................................................
5-51
Modifying or Deleting Encryption Boxes
......................................................................................................
5-53
Performing the Operation at the Transmitting Fax
.....................................................................................
5-54
Performing the Operation at the Receiving Fax
...........................................................................................
5-54
Printing Out Documents from an Encryption Box
.......................................................................................
5-55
Printing Out an Encryption Key List
............................................................................................................
5-56
Contents