Brother HL-L6200DW(T) 用户指南
Secure Print (Macintosh).................................................................................................................... 75
Print a Document Using the BR-Script3 Printer Driver (PostScript
Print a Document Using the BR-Script3 Printer Driver (PostScript
(Macintosh)......................................................................................................................................... 77
Monitor the Status of the Machine from Your Computer (Macintosh)................................................. 78
Print Options (Macintosh)................................................................................................................... 79
Monitor the Status of the Machine from Your Computer (Macintosh)................................................. 78
Print Options (Macintosh)................................................................................................................... 79
Print One Page Duplicates on Different Types of Paper .............................................................................. 85
Cancel a Print Job........................................................................................................................................ 87
Test Print ...................................................................................................................................................... 88
Cancel a Print Job........................................................................................................................................ 87
Test Print ...................................................................................................................................................... 88
Before Configuring Your Brother Machine for a Wireless Network..................................................... 95
Configure Your Machine for a Wireless Network................................................................................ 96
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
Configure Your Machine for a Wireless Network................................................................................ 96
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
Configure Your Machine for a Wireless Network in Ad-Hoc Mode (For IEEE 802.11b/g/n) ............. 103
Configure Your Machine for a Wireless Network Using the Machine's Control Panel Setup
Configure Your Machine for a Wireless Network Using the Machine's Control Panel Setup
Wizard .............................................................................................................................................. 109
Configure Your Machine for a Wireless Network When the SSID Is Not Broadcast ........................ 112
Configure Your Machine for an Enterprise Wireless Network .......................................................... 115
Use Wi-Fi Direct
Configure Your Machine for a Wireless Network When the SSID Is Not Broadcast ........................ 112
Configure Your Machine for an Enterprise Wireless Network .......................................................... 115
Use Wi-Fi Direct
Print the Network Configuration Report............................................................................................ 135
Print the WLAN Report..................................................................................................................... 136
Configure the SNTP Protocol Using Web Based Management ....................................................... 139
Print the WLAN Report..................................................................................................................... 136
Configure the SNTP Protocol Using Web Based Management ....................................................... 139
Gigabit Ethernet (Wired Network Only) ............................................................................................ 142
Reset the Network Settings to the Factory Settings......................................................................... 144
Reset the Network Settings to the Factory Settings......................................................................... 144
Before Using Network Security Features ......................................................................................... 152
Secure Function Lock 3.0................................................................................................................. 153
Use Active Directory
Secure Function Lock 3.0................................................................................................................. 153
Use Active Directory
Use LDAP Authentication................................................................................................................. 163
Manage Your Network Machine Securely Using SSL/TLS............................................................... 167
Manage Your Network Machine Securely Using IPsec .................................................................... 200
Send an Email Securely ................................................................................................................... 218
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ............................................... 223
Store Print Log to Network ............................................................................................................... 228
Manage Your Network Machine Securely Using SSL/TLS............................................................... 167
Manage Your Network Machine Securely Using IPsec .................................................................... 200
Send an Email Securely ................................................................................................................... 218
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ............................................... 223
Store Print Log to Network ............................................................................................................... 228
Home > Table of Contents
ii