Brother Server Version 0 ENG Manual De Usuario
![Brother](https://files.manualsbrain.com/attachments/8c662d2d9dbf4f824dfb46b9a1ababe38c435c2d/common/fit/150/50/d9563199756797e8650c01d5929471667ad930bd23805d8d5e013c9eee84/brand_logo.png)
iv
IP address .........................................................................................................................................92
Subnet mask......................................................................................................................................93
Gateway (and router).........................................................................................................................93
Subnet mask......................................................................................................................................93
Gateway (and router).........................................................................................................................93
Authentication and encryption ...........................................................................................................96
Authentication and Encryption methods for a personal wireless network .........................................97
Authentication and Encryption methods for an enterprise wireless network .....................................98
Authentication and Encryption methods for a personal wireless network .........................................97
Authentication and Encryption methods for an enterprise wireless network .....................................98
Security terms..................................................................................................................................103
Security protocols ............................................................................................................................104
Security methods for E-mail Sending ..............................................................................................105
Security protocols ............................................................................................................................104
Security methods for E-mail Sending ..............................................................................................105