User`s guide
Table Of Contents
- NETWORK USER’S GUIDE
- Table of Contents
- 1 Introduction
- 2 Configuring your machine for a network
- Overview
- IP addresses, subnet masks and gateways
- Step by step chart
- Setting the IP address and subnet mask
- Changing the print server settings
- Using the BRAdmin Light utility to change the print server settings
- Using the BRAdmin Professional 3 utility to change print server settings (Windows®)
- Using the control panel to change the print server settings
- Using Web Based Management (web browser) to change the print/scan server settings
- Using Remote Setup to change the print server settings (Not available for Windows Server® 2003/2008) (Not available for DCP-8085DN)
- Using other methods to change print server settings
- 3 Control panel setup
- 4 Driver Deployment Wizard (Windows® only)
- 5 Network printing from Windows®: basic TCP/IP Peer-to-Peer printing
- 6 Internet printing for Windows®
- 7 Network printing from Macintosh using the BR-Script 3 driver
- 8 Web Based Management
- Overview
- How to configure the machine settings using Web Based Management (web browser)
- Password information
- Secure Function Lock 2.0 (Not available for MFC-8370DN)
- Changing the Scan to FTP configuration using a web browser
- Changing the Scan to Network configuration using a web browser
- Changing the LDAP configuration using a web browser (For MFC-8880DN)
- 9 LDAP operation (For MFC-8880DN)
- 10 Internet fax and Scan to E-mail (E-mail server) (For MFC-8880DN)
- Internet fax Overview
- Getting connected
- Control panel key functions
- Sending an Internet fax
- Manually entering text
- Receiving E-mail or Internet fax
- Receiving an Internet fax to your computer
- Forwarding received E-mail and fax messages
- Relay broadcasting
- TX Verification Mail
- Setup Mail TX
- Setup Mail RX
- Error mail
- Important information on Internet fax
- Scan to E-mail (E-mail server) overview
- Internet fax Overview
- 11 Security features
- 12 Troubleshooting
- Appendix A
- Using services
- Other ways to set the IP address (for advanced users and administrators)
- Using DHCP to configure the IP address
- Using BOOTP to configure the IP address
- Using RARP to configure the IP address
- Using APIPA to configure the IP address
- Using ARP to configure the IP address
- Using the TELNET console to configure the IP address
- Using the Brother Web BRAdmin server software for IIS to configure the IP address
- Installation when using web services (Windows Vista®)
- Installation when using a Network Print Queue or Share (printer driver only)
- Appendix B
- Appendix C
- Index
87
11
11
Overview 11
In today’s world there are many security threats to your network and the data that travels over it. Your Brother
machine employs some of the latest network security and encryption protocols available today. These
network features can be integrated into your overall network security plan to help protect your data and
prevent unauthorized access to the machine. This chapter explains various security protocols supported and
how to configure them.
Security terms 11
CA (Certificate Authority)
A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding
between the data items in a certificate.
CSR (Certificate Signing Request)
A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR
contains information identifying the applicant, the public key generated by the applicant and the digital
signature of the applicant.
Certificate
A Certificate is the information that binds together a public key with an identity. The certificate can be used
to verify that a public key belongs to an individual. The format is defined by the x.509 standard.
Digital signature
A Digital signature is a value computed with a cryptographic algorithm and appended to a data object in
such a way that any recipient of the data can use the signature to verify the data's origin and integrity.
Public key cryptosystem
A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of
keys (a public key and a private key) and use a different component of the pair for different steps of the
algorithm.
Shared key cryptosystem
A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two
different steps of the algorithm (such as encryption and decryption).
Security features 11










