Additional Methods of Configuring Your Brother Machine for a Wireless Network
....................................
351
Before Configuring Your Brother Machine for a Wireless Network
...................................................
352
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
™
(WPS)
..................................................................................................................................
353
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
™
(WPS)
..................................................................................................................................
354
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast
.........................
356
Configure Your Machine for an Enterprise Wireless Network
..........................................................
358
Use Wi-Fi Direct
®
.............................................................................................................................
360
Advanced Network Features
......................................................................................................................
369
Print the Network Configuration Report
............................................................................................
370
Fax Using the Internet (I-Fax)
..........................................................................................................
371
Configure and Operate LDAP Search
..............................................................................................
390
Synchronize Time with the SNTP Server Using Web Based Management
.....................................
393
Technical Information for Advanced Users
.................................................................................................
396
Reset the Network Settings to Factory Default
................................................................................
397
Print the WLAN Report
.....................................................................................................................
398
Security
..............................................................................................................................................
401
Before Using Network Security Features
...................................................................................................
402
Secure Function Lock 3.0
..........................................................................................................................
403
Before Using Secure Function Lock 3.0
...........................................................................................
404
Configure Secure Function Lock 3.0 Using Web Based Management
............................................
405
Scan Using Secure Function Lock 3.0
.............................................................................................
406
Configure Public Mode for Secure Function Lock 3.0
......................................................................
407
Additional Secure Function Lock 3.0 Features
.................................................................................
408
Register a new IC Card Using Machine's Control Panel
..................................................................
409
Register an External IC Card Reader
...............................................................................................
410
Use Active Directory Authentication
...........................................................................................................
411
Introduction to Active Directory Authentication
.................................................................................
412
Configure Active Directory Authentication Using Web Based Management
....................................
413
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication)
.................................................................................................................................
414
Use LDAP Authentication
...........................................................................................................................
415
Introduction to LDAP Authentication
................................................................................................
416
Configure LDAP Authentication Using Web Based Management
....................................................
417
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication)
.................................................................................................................................
418
Manage Your Network Machine Securely Using SSL/TLS
........................................................................
419
Certificates and Web Based Management
.......................................................................................
420
Manage Your Network Machine Securely Using IPsec
..............................................................................
442
Introduction to IPsec
.........................................................................................................................
443
Configure IPsec Using Web Based Management
............................................................................
444
Configure an IPsec Address Template Using Web Based Management
.........................................
445
Configure an IPsec Template Using Web Based Management
.......................................................
447
Send an Email Securely
.............................................................................................................................
456
Configure Email Sending Using Web Based Management
..............................................................
457
Send an Email with User Authentication
..........................................................................................
458
Send an Email Securely Using SSL/TLS
.........................................................................................
459
Home > Table of Contents
iv