User Manual

Table Of Contents
Additional Methods of Configuring Your Brother Machine for a Wireless Network .................................... 351
Before Configuring Your Brother Machine for a Wireless Network................................................... 352
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 353
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 354
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 356
Configure Your Machine for an Enterprise Wireless Network .......................................................... 358
Use Wi-Fi Direct
®
............................................................................................................................. 360
Advanced Network Features...................................................................................................................... 369
Print the Network Configuration Report............................................................................................ 370
Fax Using the Internet (I-Fax) .......................................................................................................... 371
Configure and Operate LDAP Search .............................................................................................. 390
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 393
Technical Information for Advanced Users................................................................................................. 396
Reset the Network Settings to Factory Default ................................................................................ 397
Print the WLAN Report..................................................................................................................... 398
Security .............................................................................................................................................. 401
Before Using Network Security Features ................................................................................................... 402
Secure Function Lock 3.0 .......................................................................................................................... 403
Before Using Secure Function Lock 3.0........................................................................................... 404
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 405
Scan Using Secure Function Lock 3.0 ............................................................................................. 406
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 407
Additional Secure Function Lock 3.0 Features................................................................................. 408
Register a new IC Card Using Machine's Control Panel .................................................................. 409
Register an External IC Card Reader............................................................................................... 410
Use Active Directory Authentication........................................................................................................... 411
Introduction to Active Directory Authentication................................................................................. 412
Configure Active Directory Authentication Using Web Based Management .................................... 413
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication) ................................................................................................................................. 414
Use LDAP Authentication........................................................................................................................... 415
Introduction to LDAP Authentication ................................................................................................ 416
Configure LDAP Authentication Using Web Based Management.................................................... 417
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication) ................................................................................................................................. 418
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 419
Certificates and Web Based Management....................................................................................... 420
Manage Your Network Machine Securely Using IPsec.............................................................................. 442
Introduction to IPsec......................................................................................................................... 443
Configure IPsec Using Web Based Management ............................................................................ 444
Configure an IPsec Address Template Using Web Based Management ......................................... 445
Configure an IPsec Template Using Web Based Management ....................................................... 447
Send an Email Securely............................................................................................................................. 456
Configure Email Sending Using Web Based Management.............................................................. 457
Send an Email with User Authentication .......................................................................................... 458
Send an Email Securely Using SSL/TLS ......................................................................................... 459
Home > Table of Contents
iv