The embedded web page allows administrators to flash update printer firmware or access printer settings using a web browser to easily monitor printer status and change default settings.
MarkNet print servers and the standard Ethernet connection support these protocols: TCP/IP IPV4, TCP/IP IPv6, Novell (IPX/SPX including NetWare Directory Services), AppleTalk™ and LexLink (DLC/LLC). All protocols can be active simultaneously. Simultaneous protocol support allows you to print from different systems without reconfiguring the print server.
SNMPv3, IPSec and 802.1x authentication provide security measures for communications and data encryption in supported printers and MFPs. SNMPv3 supports encrypted and authenticated management traffic protecting remote configuration and device status messages. IPSec can be used with both TCP/IP IPv4 and IPv6 networks and provides encryption and authentication of communications at the network layer.
An internal print server to connect to a 100BaseFX or a 10BaseFL fiber optic network using a ST connector. No EMF emissions by design and works in electrically noisy environments such as a factory or warehouse. Locate your printer or MFP thousands of feet (hundreds of meters) away from the wiring closet.
The firmware resides in flash memory which allows upgrades via software download. Firmware upgrades are flashable and can simultaneously address multiple devices. Management is simplified by network settings that can be established either automatically or remotely - configure using MarkVision, command line or the GUI utilities.
|Packaged Size (mm - H x W x D)
|Packaged Weight, kg
|Overpack Weight (kg)
|Network Protocol Support
|Network Printing Methods
|Network Management Protocols
|Microsoft Windows Operating Systems Supported
|Apple Operating Systems Supported
|Linux Operating Systems Supported
|Novell Operating Systems Supported
|UNIX Operating Systems Supported
|Other Operating Systems Supported
|Country of Origin
1This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)