Server User Manual
Table Of Contents
- Network User’s Guide
- Applicable models
- Definitions of notes
- IMPORTANT NOTE
- Table of Contents
- Section I: Network Operation
- 1 Introduction
- 2 Changing your machine’s network settings
- 3 Configuring your machine for a wireless network (For HL-5470DW(T) and HL-6180DW(T))
- Overview
- Confirm your network environment
- Wireless configuration temporarily using a USB cable (Recommended for Windows®)
- Configuration using the machine’s control panel Setup Wizard
- One push configuration using WPS (Wi-Fi Protected Setup) or AOSS™
- Configuration using the PIN Method of WPS (Wi-Fi Protected Setup)
- Configuration in Ad-hoc mode (For IEEE 802.11b)
- 4 Control panel setup
- Overview
- Network menu (For HL-5470DW(T) and HL-6180DW(T))
- Reset the network settings to the factory default
- Printing the Printer Settings Page (For HL-5450DN(T))
- Printing the Network Configuration Report (For HL-5470DW(T) and HL-6180DW(T))
- Printing the WLAN report (For HL-5470DW(T) and HL-6180DW(T))
- Function table and default factory settings
- 5 Web Based Management
- 6 Security features
- Overview
- Managing your network machine securely using SSL/TLS
- Secure Management using BRAdmin Professional 3 (Windows®)
- Printing documents securely using SSL/TLS
- Sending an E-mail securely
- Using IEEE 802.1x authentication
- Using Certificates for device security
- Managing multiple certificates
- 7 Troubleshooting
- Section II: Network Glossary
- 8 Types of network connections and protocols
- 9 Configuring your machine for a network
- 10 Wireless network terms and concepts (For HL-5470DW(T) and HL-6180DW(T))
- 11 Additional network settings from Windows®
- Types of additional network settings
- Installing drivers used for printing via Web Services (Windows Vista® and Windows® 7)
- Uninstalling drivers used for printing via Web Services (Windows Vista® and Windows® 7)
- Network printing installation for Infrastructure mode when using Vertical Pairing (Windows® 7)
- 12 Security terms and concepts
- Section III: Appendixes
- Index
105
Security terms and concepts
12
Security methods for E-mail Sending 12
Note
You can configure the security methods settings using Web Based Management (web browser). For the
details, see How to configure the machine settings using Web Based Management (web browser)
uu page 46.
POP before SMTP (PbS) 12
The user authentication method for sending E-mail from a client. The client is given permission to use the
SMTP server by accessing the POP3 server before sending the E-mail.
SMTP-AUTH (SMTP Authentication) 12
SMTP-AUTH expands SMTP (the Internet E-mail sending protocol) to include an authentication method that
ensures the true identity of the sender is known.
APOP (Authenticated Post Office Protocol) 12
APOP expands POP3 (the Internet receiving protocol) to include an authentication method that encrypts the
password when the client receives E-mail.
SMTP over SSL 12
SMTP over SSL feature enables sending encrypted E-mail using SSL.
POP over SSL 12
POP over SSL feature enables receiving encrypted E-mail using SSL.