Brother International HL-2270DW Network Users Manual - English - Page 36

Security features

Page 36 highlights

7 Security features 7 Overview 7 In today's world there are many security threats to your network and the data that travels over it. Your Brother machine employs some of the latest network security and encryption protocols available today. These network features can be integrated into your overall network security plan to help protect your data and prevent unauthorized access to the machine. This chapter explains how to configure them. You can configure following security features:  Sending an E-mail securely (See Sending an E-mail securely on page 33.)  Secure Management using BRAdmin Professional 3 (Windows®) (See Secure Management using BRAdmin Professional 3 (Windows®) on page 35.) Note We recommend to disable the FTP and TFTP protocols. Accessing the machine using these protocols is not secure. (For how to configure the protocol settings, see How to configure the machine settings using 7 Web Based Management (web browser) on page 31.) 32

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47

32
7
7
Overview
7
In today’s world there are many security threats to your network and the data that travels over it. Your Brother
machine employs some of the latest network security and encryption protocols available today. These
network features can be integrated into your overall network security plan to help protect your data and
prevent unauthorized access to the machine. This chapter explains how to configure them.
You can configure following security features:
Sending an E-mail securely (See
Sending an E-mail securely
on page 33.)
Secure Management using BRAdmin Professional 3 (Windows
®
) (See
Secure Management using
BRAdmin Professional 3 (Windows
®
)
on page 35.)
Note
We recommend to disable the FTP and TFTP protocols. Accessing the machine using these protocols is
not secure. (For how to configure the protocol settings, see
How to configure the machine settings using
Web Based Management (web browser)
on page 31.)
Security features
7