Ricoh SP200 NW o instalando el controlador tipo PCL-6 en Sierra

1

¿Hay alguna manera de hacer que esta impresora funcione? Hace mucho tiempo lo hice funcionar en Ubuntu con el controlador PCL-6 (no estoy seguro del nombre), ¿hay un controlador similar para Sierra?

Ya probé IPP con el controlador PostScript universal, pero no funciona.

Aquí está la salida nmap que puede ser útil:

Mys-iMac:~ me$ nmap -v -A 192.168.1.36

Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-02 18:52 MSK
NSE: Loaded 144 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 18:52
Completed NSE at 18:52, 0.00s elapsed
Initiating NSE at 18:52
Completed NSE at 18:52, 0.00s elapsed
Initiating Ping Scan at 18:52
Scanning 192.168.1.36 [2 ports]
Completed Ping Scan at 18:52, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 18:52
Completed Parallel DNS resolution of 1 host. at 18:52, 0.18s elapsed
Initiating Connect Scan at 18:52
Scanning 192.168.1.36 [1000 ports]
Discovered open port 80/tcp on 192.168.1.36
Discovered open port 2323/tcp on 192.168.1.36
Discovered open port 9100/tcp on 192.168.1.36
Connect Scan Timing: About 47.27% done; ETC: 18:53 (0:00:35 remaining)
Discovered open port 515/tcp on 192.168.1.36
Discovered open port 631/tcp on 192.168.1.36
Completed Connect Scan at 18:53, 65.74s elapsed (1000 total ports)
Initiating Service scan at 18:53
Scanning 4 services on 192.168.1.36
Completed Service scan at 18:54, 90.20s elapsed (5 services on 1 host)
NSE: Script scanning 192.168.1.36.
Initiating NSE at 18:54
Completed NSE at 18:57, 126.78s elapsed
Initiating NSE at 18:57
Completed NSE at 18:57, 8.34s elapsed
Nmap scan report for 192.168.1.36
Host is up (2.3s latency).
Not shown: 994 closed ports
PORT     STATE    SERVICE    VERSION
80/tcp   open     http?
515/tcp  open     printer?
| fingerprint-strings: 
|   TerminalServer: 
|_    Fictive printer queue short information
631/tcp  open     ipp?
2323/tcp open     telnet
| fingerprint-strings: 
|   GenericLines: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> 
|     192.168.1.36#0> 
|     192.168.1.36#0>
|   GetRequest: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> GET / HTTP/1.0
|     ipcom_shell : Unknown command: 'GET'.
|     192.168.1.36#0> 
|     192.168.1.36#0>
|   Help: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> HELP
|     ipcom_shell : Unknown command: 'HELP'.
|     192.168.1.36#0>
|   NULL: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0>
|   RPCCheck: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> (r
|     [D|(r
|   SIPOptions: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> OPTIONS sip:nm SIP/2.0
|     ipcom_shell : Unknown command: 'OPTIONS'.
|     192.168.1.36#0> Via: SIP/2.0/TCP nm;branch=foo
|     ipcom_shell : Unknown command: 'Via:'.
|     192.168.1.36#0> From: <sip:nm@nm>;tag=root
|     ipcom_shell : Unknown command: 'From:'.
|     192.168.1.36#0> To: <sip:nm2@nm2>
|     ipcom_shell : Unknown command: 'To:'.
|     192.168.1.36#0> Call-ID: 50000
|     ipcom_shell : Unknown command: 'Call-ID:'.
|     192.168.1.36#0> CSeq: 42 OPTIONS
|     ipcom_shell : Unknown command: 'CSeq:'.
|     192.168.1.36#0> Max-Forwards: 70
|     ipcom_shell : Unknown command: 'Max-Forwards:'.
|     192.168.1.36#0> Content-Length: 0
|     ipcom_shell : Unknown command: 'Content-Length:'.
|     192.168.1.36#0> Contact: <sip:nm@nm>
|     ipcom_shell : Unknown command: 'Contact:'.
|     192.168.1.36#0> Accept: application/
|   tn3270: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> 
|_    IBM-3279-4-E
5002/tcp filtered rfe
9100/tcp open     jetdirect?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port515-TCP:V=7.50%I=7%D=7/2%Time=59591700%P=x86_64-apple-darwin13.4.0%
SF:r(TerminalServer,29,"Fictive\x20printer\x20queue\x20short\x20informatio
SF:n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port2323-TCP:V=7.50%I=7%D=7/2%Time=595916FF%P=x86_64-apple-darwin13.4.0
SF:%r(NULL,94,"\xff\xfb\x03\xff\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20I
SF:nterpeak\x20AB\x202000-2005\.\x20All\x20rights\x20reserved\.\r\n\r\nWel
SF:come\x20to\x20IPCOM\x20SHELL\.\x20Type\x20help\x20for\x20a\x20list\x20o
SF:f\x20commands\.\r\n\r\n192\.168\.1\.36#0>\x20")%r(tn3270,AF,"\xff\xfb\x
SF:03\xff\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000
SF:-2005\.\x20All\x20rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x2
SF:0SHELL\.\x20Type\x20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\
SF:n192\.168\.1\.36#0>\x20\xff\xfe\x18\xff\xfe\x19\xff\xfc\x19\xff\xfe
Mys-iMac:~ me$ nmap -v -A 192.168.1.36

Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-02 18:52 MSK
NSE: Loaded 144 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 18:52
Completed NSE at 18:52, 0.00s elapsed
Initiating NSE at 18:52
Completed NSE at 18:52, 0.00s elapsed
Initiating Ping Scan at 18:52
Scanning 192.168.1.36 [2 ports]
Completed Ping Scan at 18:52, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 18:52
Completed Parallel DNS resolution of 1 host. at 18:52, 0.18s elapsed
Initiating Connect Scan at 18:52
Scanning 192.168.1.36 [1000 ports]
Discovered open port 80/tcp on 192.168.1.36
Discovered open port 2323/tcp on 192.168.1.36
Discovered open port 9100/tcp on 192.168.1.36
Connect Scan Timing: About 47.27% done; ETC: 18:53 (0:00:35 remaining)
Discovered open port 515/tcp on 192.168.1.36
Discovered open port 631/tcp on 192.168.1.36
Completed Connect Scan at 18:53, 65.74s elapsed (1000 total ports)
Initiating Service scan at 18:53
Scanning 4 services on 192.168.1.36
Completed Service scan at 18:54, 90.20s elapsed (5 services on 1 host)
NSE: Script scanning 192.168.1.36.
Initiating NSE at 18:54
Completed NSE at 18:57, 126.78s elapsed
Initiating NSE at 18:57
Completed NSE at 18:57, 8.34s elapsed
Nmap scan report for 192.168.1.36
Host is up (2.3s latency).
Not shown: 994 closed ports
PORT     STATE    SERVICE    VERSION
80/tcp   open     http?
515/tcp  open     printer?
| fingerprint-strings: 
|   TerminalServer: 
|_    Fictive printer queue short information
631/tcp  open     ipp?
2323/tcp open     telnet
| fingerprint-strings: 
|   GenericLines: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> 
|     192.168.1.36#0> 
|     192.168.1.36#0>
|   GetRequest: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> GET / HTTP/1.0
|     ipcom_shell : Unknown command: 'GET'.
|     192.168.1.36#0> 
|     192.168.1.36#0>
|   Help: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> HELP
|     ipcom_shell : Unknown command: 'HELP'.
|     192.168.1.36#0>
|   NULL: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0>
|   RPCCheck: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> (r
|     [D|(r
|   SIPOptions: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> OPTIONS sip:nm SIP/2.0
|     ipcom_shell : Unknown command: 'OPTIONS'.
|     192.168.1.36#0> Via: SIP/2.0/TCP nm;branch=foo
|     ipcom_shell : Unknown command: 'Via:'.
|     192.168.1.36#0> From: <sip:nm@nm>;tag=root
|     ipcom_shell : Unknown command: 'From:'.
|     192.168.1.36#0> To: <sip:nm2@nm2>
|     ipcom_shell : Unknown command: 'To:'.
|     192.168.1.36#0> Call-ID: 50000
|     ipcom_shell : Unknown command: 'Call-ID:'.
|     192.168.1.36#0> CSeq: 42 OPTIONS
|     ipcom_shell : Unknown command: 'CSeq:'.
|     192.168.1.36#0> Max-Forwards: 70
|     ipcom_shell : Unknown command: 'Max-Forwards:'.
|     192.168.1.36#0> Content-Length: 0
|     ipcom_shell : Unknown command: 'Content-Length:'.
|     192.168.1.36#0> Contact: <sip:nm@nm>
|     ipcom_shell : Unknown command: 'Contact:'.
|     192.168.1.36#0> Accept: application/
|   tn3270: 
|     Copyright (c) Interpeak AB 2000-2005. All rights reserved.
|     Welcome to IPCOM SHELL. Type help for a list of commands.
|     192.168.1.36#0> 
|_    IBM-3279-4-E
5002/tcp filtered rfe
9100/tcp open     jetdirect?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port515-TCP:V=7.50%I=7%D=7/2%Time=59591700%P=x86_64-apple-darwin13.4.0%
SF:r(TerminalServer,29,"Fictive\x20printer\x20queue\x20short\x20informatio
SF:n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port2323-TCP:V=7.50%I=7%D=7/2%Time=595916FF%P=x86_64-apple-darwin13.4.0
SF:%r(NULL,94,"\xff\xfb\x03\xff\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20I
SF:nterpeak\x20AB\x202000-2005\.\x20All\x20rights\x20reserved\.\r\n\r\nWel
SF:come\x20to\x20IPCOM\x20SHELL\.\x20Type\x20help\x20for\x20a\x20list\x20o
SF:f\x20commands\.\r\n\r\n192\.168\.1\.36#0>\x20")%r(tn3270,AF,"\xff\xfb\x
SF:03\xff\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000
SF:-2005\.\x20All\x20rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x2
SF:0SHELL\.\x20Type\x20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\
SF:n192\.168\.1\.36#0>\x20\xff\xfe\x18\xff\xfe\x19\xff\xfc\x19\xff\xfe%pre%\x
SF:ff\xfc%pre%IBM-3279-4-E")%r(GenericLines,B8,"\xff\xfb\x03\xff\xfb\x01\xff\
SF:xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\.\x20All\x20r
SF:ights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL\.\x20Type\x2
SF:0help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\.168\.1\.36#0>
SF:\x20\r\n192\.168\.1\.36#0>\x20\r\n192\.168\.1\.36#0>\x20")%r(GetRequest
SF:,EE,"\xff\xfb\x03\xff\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpea
SF:k\x20AB\x202000-2005\.\x20All\x20rights\x20reserved\.\r\n\r\nWelcome\x2
SF:0to\x20IPCOM\x20SHELL\.\x20Type\x20help\x20for\x20a\x20list\x20of\x20co
SF:mmands\.\r\n\r\n192\.168\.1\.36#0>\x20GET\x20/\x20HTTP/1\.0\r\r\nipcom_
SF:shell\x20:\x20Unknown\x20command:\x20'GET'\.\r\n192\.168\.1\.36#0>\x20\
SF:r\n192\.168\.1\.36#0>\x20")%r(RPCCheck,A5,"\xff\xfb\x03\xff\xfb\x01\xff
SF:\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\.\x20All\x20
SF:rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL\.\x20Type\x
SF:20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\.168\.1\.36#0
SF:>\x20\(r\x1b\[D\x1b\[D\|\(r\x1b\[D\x1b\[D")%r(Help,D2,"\xff\xfb\x03\xff
SF:\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\
SF:.\x20All\x20rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL
SF:\.\x20Type\x20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\.
SF:168\.1\.36#0>\x20HELP\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'HE
SF:LP'\.\r\n192\.168\.1\.36#0>\x20")%r(SIPOptions,3D6,"\xff\xfb\x03\xff\xf
SF:b\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\.\x
SF:20All\x20rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL\.\
SF:x20Type\x20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\.168
SF:\.1\.36#0>\x20OPTIONS\x20sip:nm\x20SIP/2\.0\r\nipcom_shell\x20:\x20Unkn
SF:own\x20command:\x20'OPTIONS'\.\r\n192\.168\.1\.36#0>\x20Via:\x20SIP/2\.
SF:0/TCP\x20nm;branch=foo\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'V
SF:ia:'\.\r\n192\.168\.1\.36#0>\x20From:\x20<sip:nm@nm>;tag=root\r\nipcom_
SF:shell\x20:\x20Unknown\x20command:\x20'From:'\.\r\n192\.168\.1\.36#0>\x2
SF:0To:\x20<sip:nm2@nm2>\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'To
SF::'\.\r\n192\.168\.1\.36#0>\x20Call-ID:\x2050000\r\nipcom_shell\x20:\x20
SF:Unknown\x20command:\x20'Call-ID:'\.\r\n192\.168\.1\.36#0>\x20CSeq:\x204
SF:2\x20OPTIONS\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'CSeq:'\.\r\
SF:n192\.168\.1\.36#0>\x20Max-Forwards:\x2070\r\nipcom_shell\x20:\x20Unkno
SF:wn\x20command:\x20'Max-Forwards:'\.\r\n192\.168\.1\.36#0>\x20Content-Le
SF:ngth:\x200\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'Content-Lengt
SF:h:'\.\r\n192\.168\.1\.36#0>\x20Contact:\x20<sip:nm@nm>\r\nipcom_shell\x
SF:20:\x20Unknown\x20command:\x20'Contact:'\.\r\n192\.168\.1\.36#0>\x20Acc
SF:ept:\x20application/");

NSE: Script Post-scanning.
Initiating NSE at 18:57
Completed NSE at 18:57, 0.00s elapsed
Initiating NSE at 18:57
Completed NSE at 18:57, 0.00s elapsed
Read data files from: /usr/local/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 292.69 seconds
\x SF:ff\xfc%pre%IBM-3279-4-E")%r(GenericLines,B8,"\xff\xfb\x03\xff\xfb\x01\xff\ SF:xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\.\x20All\x20r SF:ights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL\.\x20Type\x2 SF:0help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\.168\.1\.36#0> SF:\x20\r\n192\.168\.1\.36#0>\x20\r\n192\.168\.1\.36#0>\x20")%r(GetRequest SF:,EE,"\xff\xfb\x03\xff\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpea SF:k\x20AB\x202000-2005\.\x20All\x20rights\x20reserved\.\r\n\r\nWelcome\x2 SF:0to\x20IPCOM\x20SHELL\.\x20Type\x20help\x20for\x20a\x20list\x20of\x20co SF:mmands\.\r\n\r\n192\.168\.1\.36#0>\x20GET\x20/\x20HTTP/1\.0\r\r\nipcom_ SF:shell\x20:\x20Unknown\x20command:\x20'GET'\.\r\n192\.168\.1\.36#0>\x20\ SF:r\n192\.168\.1\.36#0>\x20")%r(RPCCheck,A5,"\xff\xfb\x03\xff\xfb\x01\xff SF:\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\.\x20All\x20 SF:rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL\.\x20Type\x SF:20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\.168\.1\.36#0 SF:>\x20\(r\x1b\[D\x1b\[D\|\(r\x1b\[D\x1b\[D")%r(Help,D2,"\xff\xfb\x03\xff SF:\xfb\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\ SF:.\x20All\x20rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL SF:\.\x20Type\x20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\. SF:168\.1\.36#0>\x20HELP\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'HE SF:LP'\.\r\n192\.168\.1\.36#0>\x20")%r(SIPOptions,3D6,"\xff\xfb\x03\xff\xf SF:b\x01\xff\xfd\x1fCopyright\x20\(c\)\x20Interpeak\x20AB\x202000-2005\.\x SF:20All\x20rights\x20reserved\.\r\n\r\nWelcome\x20to\x20IPCOM\x20SHELL\.\ SF:x20Type\x20help\x20for\x20a\x20list\x20of\x20commands\.\r\n\r\n192\.168 SF:\.1\.36#0>\x20OPTIONS\x20sip:nm\x20SIP/2\.0\r\nipcom_shell\x20:\x20Unkn SF:own\x20command:\x20'OPTIONS'\.\r\n192\.168\.1\.36#0>\x20Via:\x20SIP/2\. SF:0/TCP\x20nm;branch=foo\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'V SF:ia:'\.\r\n192\.168\.1\.36#0>\x20From:\x20<sip:nm@nm>;tag=root\r\nipcom_ SF:shell\x20:\x20Unknown\x20command:\x20'From:'\.\r\n192\.168\.1\.36#0>\x2 SF:0To:\x20<sip:nm2@nm2>\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'To SF::'\.\r\n192\.168\.1\.36#0>\x20Call-ID:\x2050000\r\nipcom_shell\x20:\x20 SF:Unknown\x20command:\x20'Call-ID:'\.\r\n192\.168\.1\.36#0>\x20CSeq:\x204 SF:2\x20OPTIONS\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'CSeq:'\.\r\ SF:n192\.168\.1\.36#0>\x20Max-Forwards:\x2070\r\nipcom_shell\x20:\x20Unkno SF:wn\x20command:\x20'Max-Forwards:'\.\r\n192\.168\.1\.36#0>\x20Content-Le SF:ngth:\x200\r\nipcom_shell\x20:\x20Unknown\x20command:\x20'Content-Lengt SF:h:'\.\r\n192\.168\.1\.36#0>\x20Contact:\x20<sip:nm@nm>\r\nipcom_shell\x SF:20:\x20Unknown\x20command:\x20'Contact:'\.\r\n192\.168\.1\.36#0>\x20Acc SF:ept:\x20application/"); NSE: Script Post-scanning. Initiating NSE at 18:57 Completed NSE at 18:57, 0.00s elapsed Initiating NSE at 18:57 Completed NSE at 18:57, 0.00s elapsed Read data files from: /usr/local/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 292.69 seconds

Panel de la impresora:

    
pregunta blits 02.07.2017 - 18:49

0 respuestas

Lea otras preguntas en las etiquetas