Operation Manual

Implementing Robust Security Features
0X7U-04E
Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sning, spoong,
and tampering of data as it ows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
browser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI.
Using TLS for Encrypted Communications(P. 294)
IPSec Communication
While TLS only encrypts data used on a specic application, such as a Web browser or an e-mail application,
IPSec encrypts the whole (or payloads of) IP packets. This enables IPSec to offer a more versatile security system
than TLS. Conguring IPSec Settings(P. 298)
IEEE 802.1X Authentication
IEEE 802.1X is a standard and mechanism for blocking unauthorized access to the network by collectively
managing user authentication information. If a device tries to connect to the 802.1X network, the device must
go through user authentication in order to prove that the connection is made by an authorized user.
Authentication information is sent to and checked by a RADIUS server, which permits or rejects communication
to the network depending on the authentication result. If authentication fails, a LAN switch blocks access from
the outside of the network. The machine can connect to an 802.1X network as a client device.
Conguring
IEEE 802.1X Authentication(P. 309)
LINKS
Conguring Settings for Key Pairs and Digital Certicates(P. 315)
Security
293