User Manual

Table Of Contents
Before Configuring Your Brother Machine for a Wireless Network................................................... 350
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 351
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 352
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 354
Configure Your Machine for an Enterprise Wireless Network .......................................................... 356
Use Wi-Fi Direct
®
............................................................................................................................. 358
Advanced Network Features...................................................................................................................... 367
Print the Network Configuration Report............................................................................................ 368
Fax Using the Internet (I-Fax) .......................................................................................................... 369
Configure and Operate LDAP Search .............................................................................................. 388
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 391
Technical Information for Advanced Users................................................................................................. 394
Reset the Network Settings to Factory Default ................................................................................ 395
Print the WLAN Report..................................................................................................................... 396
Security .............................................................................................................................................. 399
Before Using Network Security Features ................................................................................................... 400
Secure Function Lock 3.0 .......................................................................................................................... 401
Before Using Secure Function Lock 3.0........................................................................................... 402
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 403
Scan Using Secure Function Lock 3.0 ............................................................................................. 404
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 405
Additional Secure Function Lock 3.0 Features................................................................................. 406
Register a new IC Card Using Machine's Control Panel .................................................................. 407
Register an External IC Card Reader............................................................................................... 408
Use Active Directory Authentication........................................................................................................... 409
Introduction to Active Directory Authentication................................................................................. 410
Configure Active Directory Authentication Using Web Based Management .................................... 411
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication) ................................................................................................................................. 412
Use LDAP Authentication........................................................................................................................... 413
Introduction to LDAP Authentication ................................................................................................ 414
Configure LDAP Authentication Using Web Based Management.................................................... 415
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication) ................................................................................................................................. 416
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 417
Certificates and Web Based Management....................................................................................... 418
Manage Your Network Machine Securely Using IPsec.............................................................................. 440
Introduction to IPsec......................................................................................................................... 441
Configure IPsec Using Web Based Management ............................................................................ 442
Configure an IPsec Address Template Using Web Based Management ......................................... 443
Configure an IPsec Template Using Web Based Management ....................................................... 445
Send an Email Securely............................................................................................................................. 454
Configure Email Sending Using Web Based Management.............................................................. 455
Send an Email with User Authentication .......................................................................................... 456
Send an Email Securely Using SSL/TLS ......................................................................................... 457
Send or Receive an Email Securely........................................................................................................... 458
Home > Table of Contents
iv