User's Manual
Table Of Contents
- Online User's Guide HL-L5000D/HL-L5100DN/HL-L5200DW/HL-L5200DWT/HL-L6200DW/HL-L6200DWT/HL-L6300DW
- Table of Contents
- Before You Use Your Brother Machine
- Introduction to Your Brother Machine
- Paper Handling
- Print
- Print from Your Computer (Windows®)
- Print a Document (Windows®)
- Print More Than One Page on a Single Sheet of Paper (N in 1) (Windows®)
- Print as a Poster (Windows®)
- Print on Both Sides of the Paper (Windows®)
- Print as a Booklet (Windows®)
- Secure Print (Windows®)
- Use a Macro from Your Computer (Windows®)
- Use a Preset Print Profile (Windows®)
- Change the Default Print Settings (Windows®)
- Print a Document Using the BR-Script3 Printer Driver (PostScript® 3™ Language Emulation) (Windows®)
- Monitor the Status of the Machine from Your Computer (Windows®)
- Print Settings (Windows®)
- Print from Your Computer (Macintosh)
- Print a Document (Macintosh)
- Print on Both Sides of the Paper (Macintosh)
- Print More Than One Page on a Single Sheet of Paper (N in 1) (Macintosh)
- Secure Print (Macintosh)
- Print a Document Using the BR-Script3 Printer Driver (PostScript® 3™ language emulation) (Macintosh)
- Monitor the Status of the Machine from Your Computer (Macintosh)
- Print Options (Macintosh)
- Print One Page Duplicates on Different Types of Paper
- Cancel a Print Job
- Test Print
- Print from Your Computer (Windows®)
- Network
- Get Started
- Network Management Software and Utilities
- Additional Methods of Configuring Your Brother Machine for a Wireless Network
- Before Configuring Your Brother Machine for a Wireless Network
- Configure Your Machine for a Wireless Network
- Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected Setup™ (WPS)
- Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected Setup™ (WPS)
- Configure Your Machine for a Wireless Network in Ad-Hoc Mode (For IEEE 802.11b/g/n)
- Configure Your Machine for a Wireless Network Using the Machine's Control Panel Setup Wizard
- Configure Your Machine for a Wireless Network When the SSID Is Not Broadcast
- Configure Your Machine for an Enterprise Wireless Network
- Use Wi-Fi Direct®
- Print from Your Mobile Device Using Wi-Fi Direct
- Configure Your Wi-Fi Direct Network
- Wi-Fi Direct Network Configuration Overview
- Configure Your Wi-Fi Direct Network Using the One-Push Method
- Configure Your Wi-Fi Direct Network Using the One-Push Method and Wi-Fi Protected Setup™ (WPS)
- Configure Your Wi-Fi Direct Network Using the PIN Method
- Configure Your Wi-Fi Direct Network Using the PIN Method of Wi-Fi Protected Setup™ (WPS)
- Configure Your Wi-Fi Direct Network Manually
- Advanced Network Features
- Technical Information for Advanced Users
- Security
- Lock the Machine Settings
- Network Security Features
- Before Using Network Security Features
- Secure Function Lock 3.0
- Use Active Directory® Authentication
- Use LDAP Authentication
- Manage Your Network Machine Securely Using SSL/TLS
- Introduction to SSL/TLS
- Certificates and Web Based Management
- Supported Security Certificate Features
- Create and Install a Certificate
- Manage Multiple Certificates
- Manage Your Network Machine Securely Using Web Based Management
- Manage Your Network Machine Securely Using BRAdmin Professional 3 (Windows®)
- Print Documents Securely Using SSL/TLS
- Manage Your Network Machine Securely Using IPsec
- Send an Email Securely
- Use IEEE 802.1x Authentication for a Wired or a Wireless Network
- Store Print Log to Network
- Mobile/Web Connect
- Troubleshooting
- Routine Maintenance
- Machine Settings
- Appendix
- Glossary
that is necessary for IPsec is determined and the encryption keys are shared. For IKE, the encryption keys are
exchanged using the Diffie-Hellman key exchange method, and encrypted communication that is limited to
IKE is carried out.
Select Manual.
Authentication Key (ESP,AH)
Specify the key to use for authentication. Type the In/Out values.
These settings are necessary when Custom is selected for Use Prefixed Template, Manual is selected for
IKE, and a setting other than None is selected for Hash for Encapsulating Security section.
The number of characters you can set differs depending on the setting you chose for Hash in the
Encapsulating Security section.
If the length of the specified authentication key is different than the selected hash algorithm, an error will
occur.
• MD5: 128 bits (16 bytes)
• SHA1: 160 bits (20 bytes)
• SHA256: 256 bits (32 bytes)
• SHA384: 384 bits (48 bytes)
• SHA512: 512 bits (64 bytes)
When you specify the key in ASCII Code, enclose the characters in double quotation marks (").
Code key (ESP)
Specify the key to use for encryption. Type the In/Out values.
These settings are necessary when Custom is selected in Use Prefixed Template, Manual is selected in
IKE, and ESP is selected in Protocol in Encapsulating Security.
The number of characters you can set differs depending on the setting you chose for Encryption in the
Encapsulating Security section.
If the length of the specified code key is different than the selected encryption algorithm, an error will occur.
• DES: 64 bits (8 bytes)
• 3DES: 192 bits (24 bytes)
• AES-CBC 128: 128 bits (16 bytes)
• AES-CBC 256: 256 bits (32 bytes)
When you specify the key in ASCII Code, enclose the characters in double quotation marks (").
SPI
These parameters are used to identify security information. Generally, a host has multiple Security
Associations (SAs) for several types of IPsec communication. Therefore, it is necessary to identify the
applicable SA when an IPsec packet is received. The SPI parameter, which identifies the SA, is included in
the Authentication Header (AH) and Encapsulating Security Payload (ESP) header.
These settings are necessary when Custom is selected for Use Prefixed Template, and Manual is selected
for IKE.
Enter the In/Out values. (3-10 characters)
Encapsulating Security
• Protocol
Select ESP or AH.
216