Brother DCP-8110DN Manuel - Sayfa 36

Yazdırma Sunucusu Brother DCP-8110DN için çevrimiçi göz atın veya pdf Manuel indirin. Brother DCP-8110DN 36 sayfaları. Quick setup guide - english
Ayrıca Brother DCP-8110DN için: Gelişmiş Kullanıcı Kılavuzu (50 sayfalar), Ağ Kılavuzu (29 sayfalar), Manuel (27 sayfalar), Hızlı Kurulum Kılavuzu (23 sayfalar), Kullanıcı Kılavuzu (23 sayfalar), Ürün Güvenlik Kılavuzu (23 sayfalar), Gelişmiş Kullanıcı Kılavuzu (39 sayfalar), Ürün Güvenlik Kılavuzu (22 sayfalar)

Brother DCP-8110DN Manuel
Troubleshooting

Network terms

Secure Socket Layer (SSL)
The security communication protocol encrypt data to prevent security threats.
Internet Printing Protocol (IPP)
IPP is a standard printing protocol used for managing and administering print jobs. It can be used both
locally and globally so anyone in the world can print to the same machine.
IPPS
The version of the printing protocol Internet Printing Protocol (IPP Version 1.0) that uses SSL.
HTTPS
The version of the internet protocol Hyper text Transfer Protocol (HTTP) that uses SSL.
CA (Certificate Authority)
A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding
between the data items in a certificate.
CSR (Certificate Signing Request)
A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR
contains information identifying the applicant, the public key generated by the applicant and the digital
signature of the applicant.
Certificate
A Certificate is the information that binds together a public key with an identity. The certificate can be used
to verify that a public key belongs to an individual. The format is defined by the x.509 standard.
Public key cryptosystem
A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of
keys (a public key and a private key) and use a different component of the pair for different steps of the
algorithm.
Shared key cryptosystem
A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two
different steps of the algorithm (such as encryption and decryption).
6
6
32