User Manual

Table Of Contents
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 416
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 419
Configure Your Machine for an Enterprise Wireless Network .......................................................... 422
Use Wi-Fi Direct
®
............................................................................................................................. 427
Advanced Network Features...................................................................................................................... 439
Print the Network Configuration Report............................................................................................ 440
Fax Using the Internet (I-Fax) .......................................................................................................... 441
Configure and Operate LDAP Search .............................................................................................. 463
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 467
Technical Information for Advanced Users................................................................................................. 471
Reset the Network Settings to Factory Default ................................................................................ 472
Print the WLAN Report..................................................................................................................... 473
Security .............................................................................................................................................. 476
Before Using Network Security Features ................................................................................................... 477
Secure Function Lock 3.0 .......................................................................................................................... 478
Before Using Secure Function Lock 3.0........................................................................................... 479
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 480
Scan Using Secure Function Lock 3.0 ............................................................................................. 481
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 482
Additional Secure Function Lock 3.0 Features................................................................................. 483
Register a new ID Card Using Machine's Control Panel .................................................................. 484
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 485
Certificates and Web Based Management....................................................................................... 486
Send or Receive an Email Securely........................................................................................................... 511
Configure Email Sending or Receiving Using Web Based Management......................................... 512
Send an Email with User Authentication .......................................................................................... 513
Send or Receive an Email Securely Using SSL TLS ....................................................................... 514
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ......................................................... 516
What Is IEEE 802.1x Authentication? .............................................................................................. 517
Configure IEEE 802.1x Authentication for a Wired or a Wireless Network Using Web Based
Management (Web Browser)............................................................................................................ 518
IEEE 802.1x Authentication Methods............................................................................................... 520
Mobile/Web Connect......................................................................................................................... 521
Brother Web Connect................................................................................................................................. 522
Brother Web Connect Overview....................................................................................................... 523
Online Services Used with Brother Web Connect............................................................................ 524
Conditions for Using Brother Web Connect...................................................................................... 526
Set Up Brother Web Connect........................................................................................................... 530
Scan and Upload Documents Using Brother Web Connect............................................................. 540
Upload a Document from an External Memory Device Using Brother Web Connect ...................... 542
Download and Print Documents Using Brother Web Connect ......................................................... 544
Download and Save a Document to an External Memory Device Using Brother Web Connect...... 548
FaxForward to Cloud or E-mail ........................................................................................................ 550
Google Cloud Print
.................................................................................................................................. 554
Google Cloud Print
Overview ........................................................................................................ 555
Before Using Google Cloud Print
.................................................................................................. 556
Home > Table of Contents
iv