Brother International HL-6180DW Network User's Guide - English - Page 63

Security features, Overview

Page 63 highlights

6 Security features 6 Overview 6 In today's world there are many security threats to your network and the data that travels over it. Your Brother machine employs some of the latest network security and encryption protocols available today. These network features can be integrated into your overall network security plan to help protect your data and prevent unauthorized access to the machine. This chapter explains how to configure them. You can configure the following security features:  Managing your network machine securely using SSL/TLS (See Managing your network machine securely using SSL/TLS uu page 58.)  Managing your network machine securely using SNMPv3 protocol (See Secure Management using Web Based Management (web browser) uu page 58 or Secure Management using BRAdmin Professional 3 (Windows®) uu page 60.) 6  Secure Management using BRAdmin Professional 3 (Windows®) (See Secure Management using BRAdmin Professional 3 (Windows®) uu page 60.)  Printing documents securely using SSL/TLS (See Printing documents securely using SSL/TLS uu page 61.)  Sending an E-mail securely (See Sending an E-mail securely uu page 62.)  Using IEEE 802.1x authentication (See Using IEEE 802.1x authentication uu page 64.)  Certificate for secure management (See Using Certificates for device security uu page 66.)  Managing multiple certificates (See Managing multiple certificates uu page 76.) Note We recommend to disable the Telnet, FTP and TFTP protocols. Accessing the machine using these protocols is not secure. (For how to configure the protocol settings, see How to configure the machine settings using Web Based Management (web browser) uu page 46.) 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

57
6
6
Overview
6
In today’s world there are many security threats to your network and the data that travels over it. Your Brother
machine employs some of the latest network security and encryption protocols available today. These
network features can be integrated into your overall network security plan to help protect your data and
prevent unauthorized access to the machine. This chapter explains how to configure them.
You can configure the following security features:
Managing your network machine securely using SSL/TLS (See
Managing your network machine securely
using SSL/TLS
uu
page 58.)
Managing your network machine securely using SNMPv3 protocol (See
Secure Management using
Web Based Management (web browser)
uu
page 58 or
Secure Management using BRAdmin
Professional 3 (Windows
®
)
uu
page 60.)
Secure Management using BRAdmin Professional 3 (Windows
®
) (See
Secure Management using
BRAdmin Professional 3 (Windows
®
)
uu
page 60.)
Printing documents securely using SSL/TLS (See
Printing documents securely using SSL/TLS
uu
page 61.)
Sending an E-mail securely (See
Sending an E-mail securely
uu
page 62.)
Using IEEE 802.1x authentication (See
Using IEEE 802.1x authentication
uu
page 64.)
Certificate for secure management (See
Using Certificates for device security
uu
page 66.)
Managing multiple certificates (See
Managing multiple certificates
uu
page 76.)
Note
We recommend to disable the Telnet, FTP and TFTP protocols. Accessing the machine using these
protocols is not secure. (For how to configure the protocol settings, see
How to configure the machine
settings using Web Based Management (web browser)
uu
page 46.)
Security features
6