Operation Manual
Conguring the Network Security Settings
1W2X-071
Authorized users may incur unanticipated losses fr
om attacks by malicious third parties, such as sning, spoong,
and tampering of data as it ows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
Firewall Settings
Unauthorized access by third parties, as well as network attacks and intrusions, can be blocked by limiting
communication only to de
vices that have a specic IP address or MAC address.
Restricting Communication
b
y Using Firewalls(P. 367)
Changing Port Numbers
A protocol that is used to exchange information with other devices is assigned port numbers that are
pr
edetermined according to the type of protocol. The port number must be the same for all communication
devices; therefore, changing it to an arbitrary number is important to prevent hacking from outside.
Changing Port Numbers(P. 374)
Proxy Settings
When the client devices are connected to an external network, communication is established through the proxy
server. When the pr
oxy server is used, websites can be browsed more safely, therefore, security can be
expected to be enhanced.
Setting a Proxy(P. 375)
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
browser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI. Conguring the Ke
y and Certicate for TLS(P. 377)
Managing the Machine
365