Server User Manual
Table Of Contents
- Network User’s Guide
- Applicable models
- Definitions of notes
- IMPORTANT NOTE
- Table of Contents
- Section I: Network Operation
- 1 Introduction
- 2 Changing your machine’s network settings
- 3 Configuring your machine for a wireless network (For HL-5470DW(T) and HL-6180DW(T))
- Overview
- Confirm your network environment
- Wireless configuration temporarily using a USB cable (Recommended for Windows®)
- Configuration using the machine’s control panel Setup Wizard
- One push configuration using WPS (Wi-Fi Protected Setup) or AOSS™
- Configuration using the PIN Method of WPS (Wi-Fi Protected Setup)
- Configuration in Ad-hoc mode (For IEEE 802.11b)
- 4 Control panel setup
- Overview
- Network menu (For HL-5470DW(T) and HL-6180DW(T))
- Reset the network settings to the factory default
- Printing the Printer Settings Page (For HL-5450DN(T))
- Printing the Network Configuration Report (For HL-5470DW(T) and HL-6180DW(T))
- Printing the WLAN report (For HL-5470DW(T) and HL-6180DW(T))
- Function table and default factory settings
- 5 Web Based Management
- 6 Security features
- Overview
- Managing your network machine securely using SSL/TLS
- Secure Management using BRAdmin Professional 3 (Windows®)
- Printing documents securely using SSL/TLS
- Sending an E-mail securely
- Using IEEE 802.1x authentication
- Using Certificates for device security
- Managing multiple certificates
- 7 Troubleshooting
- Section II: Network Glossary
- 8 Types of network connections and protocols
- 9 Configuring your machine for a network
- 10 Wireless network terms and concepts (For HL-5470DW(T) and HL-6180DW(T))
- 11 Additional network settings from Windows®
- Types of additional network settings
- Installing drivers used for printing via Web Services (Windows Vista® and Windows® 7)
- Uninstalling drivers used for printing via Web Services (Windows Vista® and Windows® 7)
- Network printing installation for Infrastructure mode when using Vertical Pairing (Windows® 7)
- 12 Security terms and concepts
- Section III: Appendixes
- Index
103
12
12
Security features 12
Security terms 12
CA (Certificate Authority)
A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding
between the data items in a certificate.
CSR (Certificate Signing Request)
A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR
contains information identifying the applicant, the public key generated by the applicant and the digital
signature of the applicant.
Certificate
A Certificate is the information that binds together a public key with an identity. The certificate can be used
to verify that a public key belongs to an individual. The format is defined by the x.509 standard.
CA Certificate
A CA Certificate is the certification that identifies the CA (Certificate Authority) itself and owns its private
key. It verifies a certificate issued by the CA.
Digital signature
A Digital signature is a value computed with a cryptographic algorithm and appended to a data object in
such a way that any recipient of the data can use the signature to verify the data's origin and integrity.
Public key cryptosystem
A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of
keys (a public key and a private key) and use a different component of the pair for different steps of the
algorithm.
Shared key cryptosystem
A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two
different steps of the algorithm (such as encryption and decryption).
Security terms and concepts 12