Reset the Network Settings to Factory Default ................................................................................ 325
Security .............................................................................................................................................. 326
Before Using Network Security Features ................................................................................................... 327
Configure Certificates for Device Security ................................................................................................. 328
Supported Security Certificate Features .......................................................................................... 329
Step by Step Guide for Creating and Installing a Certificate ............................................................ 330
Create a Self-signed Certificate ....................................................................................................... 331
Create CSR and Install a Certificate from a Certificate Authority (CA) ............................................ 332
Import and Export the Certificate and Private Key ........................................................................... 336
Import and Export a CA Certificate................................................................................................... 339
Manage Multiple Certificates ............................................................................................................ 342
Use SSL/TLS ............................................................................................................................................. 343
Introduction to SSL/TLS ................................................................................................................... 344
Manage Your Network Machine Securely Using SSL/TLS............................................................... 347
Print Documents Securely Using SSL/TLS ...................................................................................... 352
Use SNMPv3.............................................................................................................................................. 354
Manage Your Network Machine Securely Using SNMPv3 ............................................................... 355
Use IPsec................................................................................................................................................... 357
Introduction to IPsec......................................................................................................................... 358
Configure IPsec Using Web Based Management ............................................................................ 359
Configure an IPsec Address Template Using Web Based Management ......................................... 361
Configure an IPsec Template Using Web Based Management ....................................................... 363
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ......................................................... 371
What Is IEEE 802.1x Authentication? .............................................................................................. 372
Configure IEEE 802.1x Authentication for a Wired or a Wireless Network Using Web Based
Management (Web Browser)............................................................................................................ 373
IEEE 802.1x Authentication Methods............................................................................................... 375
Use Secure Function Lock 3.0 ................................................................................................................... 376
Before Using Secure Function Lock 3.0........................................................................................... 377
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 378
Scan Using Secure Function Lock 3.0 ............................................................................................. 379
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 380
Additional Secure Function Lock 3.0 Features................................................................................. 381
Register an External IC Card Reader............................................................................................... 382
Send or Receive an Email Securely........................................................................................................... 383
Configure Email Sending or Receiving Using Web Based Management......................................... 384
Send an Email with User Authentication .......................................................................................... 385
Send or Receive an Email Securely Using SSL/TLS ....................................................................... 386
Administrator..................................................................................................................................... 387
Network Features....................................................................................................................................... 388
Security Features ....................................................................................................................................... 389
Network Security .............................................................................................................................. 390
User Authentication .......................................................................................................................... 392
Brother Management Tools ........................................................................................................................ 393
Mobile Connect ................................................................................................................................. 394
AirPrint ....................................................................................................................................................... 395
AirPrint Overview.............................................................................................................................. 396
Home > Table of Contents
iv