Brother HL-5580D User Manual page 267

Hide thumbs Also See for HL-5580D:
Table of Contents

Advertisement

Home > Glossary
Node Name
The Node Name is a machine name on the network. This name is often referred to as a NetBIOS name; it will be
the name that is registered by the WINS server on your network. Brother recommends the name
"BRNxxxxxxxxxxxx" for a wired network or "BRWxxxxxxxxxxxx" for a wireless network (where "xxxxxxxxxxxx" is
your machine's MAC address / ethernet address.)
PEAP
Protected Extensible Authentication Protocol (PEAP) is a version of EAP method developed by Cisco Systems,
®
Inc., Microsoft
Corporation and RSA Security. PEAP creates an encrypted Secure Sockets Layer (SSL)/
Transport Layer Security (TLS) tunnel between a client and an authentication server, for sending a user ID and
password. PEAP provides mutual authentication between the server and the client.
The Brother machine supports the following inner authentications:
PEAP/MS-CHAPv2
PEAP/GTC
Peer-to-Peer
Peer-to-Peer is a type of printing in a peer-to-peer environment. In a peer-to-peer environment, each computer
sends and receives data directly to and from each device. There is no central server controlling access or
machine sharing.
Protocols
Protocols are the standardised sets of rules for transmitting data on a network. Protocols allow users to gain
access to network-connected resources. The print server used on your Brother machine supports the
Transmission Control Protocol/Internet Protocol (TCP/IP) protocol.
Public Key Cryptosystem
A Public Key Cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of keys (a
public key and a private key) and use a different component of the pair for different steps of the algorithm.
RARP
Reverse Address Resolution Protocol (RARP) finds the logical address for a machine that knows only its physical
address.
To use RARP, contact your network administrator.
Resolution
The number of vertical and horizontal lines per inch.
Secure Function Lock 3.0
Secure Function Lock 3.0 increases security by restricting the use of functions.
263

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hl-5585dHl-5590dHl-5595dn

Table of Contents