Brother 0 Manual De Usuario
v
IP address .......................................................................................................................................158
Subnet mask....................................................................................................................................159
Gateway (and router).......................................................................................................................159
Subnet mask....................................................................................................................................159
Gateway (and router).......................................................................................................................159
Authentication and encryption .........................................................................................................162
Authentication and Encryption methods for a personal wireless network .......................................163
Authentication and Encryption methods for an enterprise wireless network ...................................164
Authentication and Encryption methods for a personal wireless network .......................................163
Authentication and Encryption methods for an enterprise wireless network ...................................164
®
166
and Windows
®
7)....................................................................................................166
and Windows
®
7)....................................................................................................167
7)......................................................................................................................................168
Security terms..................................................................................................................................169
Security protocols ............................................................................................................................170
Security methods for E-mail Sending and Receiving ......................................................................171
Security protocols ............................................................................................................................170
Security methods for E-mail Sending and Receiving ......................................................................171