Before Configuring Your Brother Machine for a Wireless Network
...................................................
350
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
™
(WPS)
..................................................................................................................................
351
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
™
(WPS)
..................................................................................................................................
352
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast
.........................
354
Configure Your Machine for an Enterprise Wireless Network
..........................................................
356
Use Wi-Fi Direct
®
.............................................................................................................................
358
Advanced Network Features
......................................................................................................................
367
Print the Network Configuration Report
............................................................................................
368
Fax Using the Internet (I-Fax)
..........................................................................................................
369
Configure and Operate LDAP Search
..............................................................................................
388
Synchronize Time with the SNTP Server Using Web Based Management
.....................................
391
Technical Information for Advanced Users
.................................................................................................
394
Reset the Network Settings to Factory Default
................................................................................
395
Print the WLAN Report
.....................................................................................................................
396
Security
..............................................................................................................................................
399
Before Using Network Security Features
...................................................................................................
400
Secure Function Lock 3.0
..........................................................................................................................
401
Before Using Secure Function Lock 3.0
...........................................................................................
402
Configure Secure Function Lock 3.0 Using Web Based Management
............................................
403
Scan Using Secure Function Lock 3.0
.............................................................................................
404
Configure Public Mode for Secure Function Lock 3.0
......................................................................
405
Additional Secure Function Lock 3.0 Features
.................................................................................
406
Register a new IC Card Using Machine's Control Panel
..................................................................
407
Register an External IC Card Reader
...............................................................................................
408
Use Active Directory Authentication
...........................................................................................................
409
Introduction to Active Directory Authentication
.................................................................................
410
Configure Active Directory Authentication Using Web Based Management
....................................
411
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication)
.................................................................................................................................
412
Use LDAP Authentication
...........................................................................................................................
413
Introduction to LDAP Authentication
................................................................................................
414
Configure LDAP Authentication Using Web Based Management
....................................................
415
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication)
.................................................................................................................................
416
Manage Your Network Machine Securely Using SSL/TLS
........................................................................
417
Certificates and Web Based Management
.......................................................................................
418
Manage Your Network Machine Securely Using IPsec
..............................................................................
440
Introduction to IPsec
.........................................................................................................................
441
Configure IPsec Using Web Based Management
............................................................................
442
Configure an IPsec Address Template Using Web Based Management
.........................................
443
Configure an IPsec Template Using Web Based Management
.......................................................
445
Send an Email Securely
.............................................................................................................................
454
Configure Email Sending Using Web Based Management
..............................................................
455
Send an Email with User Authentication
..........................................................................................
456
Send an Email Securely Using SSL/TLS
.........................................................................................
457
Send or Receive an Email Securely
...........................................................................................................
458
Home > Table of Contents
iv