Security
Security ................................................................................................................................................................ 202
Protecting the Machine from Unauthorized Access ....................................................................................... 203
Preventing Unauthorized Access .................................................................................................................. 204
Setting Access Privileges .............................................................................................................................. 206
Setting the System Manager ID ............................................................................................................. 207
Setting the Department ID Management .............................................................................................. 209
Setting a Remote UI PIN ........................................................................................................................ 216
Restricting Communication by Using Firewalls ............................................................................................. 218
Specifying IP Addresses for Firewall Rules ............................................................................................. 219
Specifying MAC Addresses for Firewall Rules ......................................................................................... 223
Changing Port Numbers ............................................................................................................................... 226
Setting a Proxy ............................................................................................................................................. 228
Restricting the Machine's Functions ................................................................................................................ 230
Restricting USB Functions ............................................................................................................................. 231
Disabling HTTP Communication ................................................................................................................... 232
Disabling Remote UI ..................................................................................................................................... 233
Implementing Robust Security Features ......................................................................................................... 234
Enabling SSL Encrypted Communication for the Remote UI ......................................................................... 235
Conî ´guring IPSec Settings ........................................................................................................................... 239
Conî ´guring IEEE 802.1X Authentication ....................................................................................................... 248
Conî ´guring Settings for Key Pairs and Digital Certiî ´cates ........................................................................... 253
Generating Key Pairs ............................................................................................................................. 254
Using CA-issued Key Pairs and Digital Certiî ´cates ................................................................................. 262
Verifying Key Pairs and Digital Certiî ´cates ............................................................................................. 266
Security
201