User Manual

Table Of Contents
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 407
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 410
Configure Your Machine for an Enterprise Wireless Network .......................................................... 413
Use Wi-Fi Direct
®
............................................................................................................................. 418
Advanced Network Features...................................................................................................................... 430
Print the Network Configuration Report............................................................................................ 431
Fax Using the Internet (I-Fax) .......................................................................................................... 432
Configure and Operate LDAP Search .............................................................................................. 454
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 458
Technical Information for Advanced Users................................................................................................. 462
Reset the Network Settings to Factory Default ................................................................................ 463
Print the WLAN Report..................................................................................................................... 464
Security .............................................................................................................................................. 467
Before Using Network Security Features ................................................................................................... 468
Secure Function Lock 3.0 .......................................................................................................................... 469
Before Using Secure Function Lock 3.0........................................................................................... 470
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 471
Scan Using Secure Function Lock 3.0 ............................................................................................. 472
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 473
Additional Secure Function Lock 3.0 Features................................................................................. 474
Register a new ID Card Using Machine's Control Panel .................................................................. 475
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 476
Certificates and Web Based Management....................................................................................... 477
Send or Receive an Email Securely........................................................................................................... 502
Configure Email Sending or Receiving Using Web Based Management......................................... 503
Send an Email with User Authentication .......................................................................................... 504
Send or Receive an Email Securely Using SSL TLS ....................................................................... 505
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ......................................................... 507
What Is IEEE 802.1x Authentication? .............................................................................................. 508
Configure IEEE 802.1x Authentication for a Wired or a Wireless Network Using Web Based
Management (Web Browser)............................................................................................................ 509
IEEE 802.1x Authentication Methods............................................................................................... 511
Mobile/Web Connect......................................................................................................................... 512
Brother Web Connect................................................................................................................................. 513
Brother Web Connect Overview....................................................................................................... 514
Online Services Used with Brother Web Connect............................................................................ 515
Conditions for Using Brother Web Connect...................................................................................... 517
Set Up Brother Web Connect........................................................................................................... 521
Scan and Upload Documents Using Brother Web Connect............................................................. 531
Upload a Document from an External Memory Device Using Brother Web Connect ...................... 533
Download and Print Documents Using Brother Web Connect ......................................................... 535
Download and Save a Document to an External Memory Device Using Brother Web Connect...... 539
FaxForward to Cloud or E-mail ........................................................................................................ 541
Google Cloud Print
.................................................................................................................................. 545
Google Cloud Print
Overview ........................................................................................................ 546
Before Using Google Cloud Print
.................................................................................................. 547
Home > Table of Contents
iv