Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
™
(WPS)
..................................................................................................................................
416
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast
.........................
419
Configure Your Machine for an Enterprise Wireless Network
..........................................................
422
Use Wi-Fi Direct
®
.............................................................................................................................
427
Advanced Network Features
......................................................................................................................
439
Print the Network Configuration Report
............................................................................................
440
Fax Using the Internet (I-Fax)
..........................................................................................................
441
Configure and Operate LDAP Search
..............................................................................................
463
Synchronize Time with the SNTP Server Using Web Based Management
.....................................
467
Technical Information for Advanced Users
.................................................................................................
471
Reset the Network Settings to Factory Default
................................................................................
472
Print the WLAN Report
.....................................................................................................................
473
Security
..............................................................................................................................................
476
Before Using Network Security Features
...................................................................................................
477
Secure Function Lock 3.0
..........................................................................................................................
478
Before Using Secure Function Lock 3.0
...........................................................................................
479
Configure Secure Function Lock 3.0 Using Web Based Management
............................................
480
Scan Using Secure Function Lock 3.0
.............................................................................................
481
Configure Public Mode for Secure Function Lock 3.0
......................................................................
482
Additional Secure Function Lock 3.0 Features
.................................................................................
483
Register a new ID Card Using Machine's Control Panel
..................................................................
484
Manage Your Network Machine Securely Using SSL/TLS
........................................................................
485
Certificates and Web Based Management
.......................................................................................
486
Send or Receive an Email Securely
...........................................................................................................
511
Configure Email Sending or Receiving Using Web Based Management
.........................................
512
Send an Email with User Authentication
..........................................................................................
513
Send or Receive an Email Securely Using SSL TLS
.......................................................................
514
Use IEEE 802.1x Authentication for a Wired or a Wireless Network
.........................................................
516
What Is IEEE 802.1x Authentication?
..............................................................................................
517
Configure IEEE 802.1x Authentication for a Wired or a Wireless Network Using Web Based
Management (Web Browser)
............................................................................................................
518
IEEE 802.1x Authentication Methods
...............................................................................................
520
Mobile/Web Connect
.........................................................................................................................
521
Brother Web Connect
.................................................................................................................................
522
Brother Web Connect Overview
.......................................................................................................
523
Online Services Used with Brother Web Connect
............................................................................
524
Conditions for Using Brother Web Connect
......................................................................................
526
Set Up Brother Web Connect
...........................................................................................................
530
Scan and Upload Documents Using Brother Web Connect
.............................................................
540
Upload a Document from an External Memory Device Using Brother Web Connect
......................
542
Download and Print Documents Using Brother Web Connect
.........................................................
544
Download and Save a Document to an External Memory Device Using Brother Web Connect
......
548
FaxForward to Cloud or E-mail
........................................................................................................
550
Google Cloud Print
™
..................................................................................................................................
554
Google Cloud Print
™
Overview
........................................................................................................
555
Before Using Google Cloud Print
™
..................................................................................................
556
Home > Table of Contents
iv