Brother HL-L6250DW User Guide
Secure Print (Macintosh).................................................................................................................... 75
Print a Document Using the BR-Script3 Printer Driver (PostScript
Print a Document Using the BR-Script3 Printer Driver (PostScript
(Macintosh)......................................................................................................................................... 77
Monitor the Status of the Machine from Your Computer (Macintosh)................................................. 78
Print Options (Macintosh)................................................................................................................... 79
Monitor the Status of the Machine from Your Computer (Macintosh)................................................. 78
Print Options (Macintosh)................................................................................................................... 79
Print One Page Duplicates on Different Types of Paper .............................................................................. 85
Cancel a Print Job........................................................................................................................................ 87
Test Print ...................................................................................................................................................... 88
Cancel a Print Job........................................................................................................................................ 87
Test Print ...................................................................................................................................................... 88
Before Configuring Your Brother Machine for a Wireless Network..................................................... 95
Configure Your Machine for a Wireless Network................................................................................ 96
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
Configure Your Machine for a Wireless Network................................................................................ 96
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
Configure Your Machine for a Wireless Network in Ad-Hoc Mode (For IEEE 802.11b/g/n) ............. 103
Configure Your Machine for a Wireless Network Using the Machine's Control Panel Setup
Configure Your Machine for a Wireless Network Using the Machine's Control Panel Setup
Wizard .............................................................................................................................................. 109
Configure Your Machine for a Wireless Network When the SSID Is Not Broadcast ........................ 112
Configure Your Machine for an Enterprise Wireless Network .......................................................... 115
Use Wi-Fi Direct
Configure Your Machine for a Wireless Network When the SSID Is Not Broadcast ........................ 112
Configure Your Machine for an Enterprise Wireless Network .......................................................... 115
Use Wi-Fi Direct
Print the Network Configuration Report............................................................................................ 133
Print the WLAN Report..................................................................................................................... 134
Configure the SNTP Protocol Using Web Based Management ....................................................... 137
Print the WLAN Report..................................................................................................................... 134
Configure the SNTP Protocol Using Web Based Management ....................................................... 137
Gigabit Ethernet (Wired Network Only) ............................................................................................ 140
Reset the Network Settings to the Factory Settings......................................................................... 142
Reset the Network Settings to the Factory Settings......................................................................... 142
Before Using Network Security Features ......................................................................................... 150
Secure Function Lock 3.0................................................................................................................. 151
Use Active Directory
Secure Function Lock 3.0................................................................................................................. 151
Use Active Directory
Use LDAP Authentication................................................................................................................. 161
Manage Your Network Machine Securely Using SSL/TLS............................................................... 165
Manage Your Network Machine Securely Using IPsec .................................................................... 198
Send an Email Securely ................................................................................................................... 216
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ............................................... 221
Store Print Log to Network ............................................................................................................... 226
Manage Your Network Machine Securely Using SSL/TLS............................................................... 165
Manage Your Network Machine Securely Using IPsec .................................................................... 198
Send an Email Securely ................................................................................................................... 216
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ............................................... 221
Store Print Log to Network ............................................................................................................... 226
Home > Table of Contents
ii