signature. A warning message might also appear if you attempt to access this machine through Web
Image Monitor with SSL enabled. To enable authentication from the client computer, install the
intermediate certificate on the client computer, and then reestablish connection.
• Intermediate certificates cannot be installed on this machine.
Enabling SSL/TLS
After installing the device certificate in the machine, enable the SSL/TLS setting.
This procedure is used for a self-signed certificate or a certificate issued by a certificate authority.
1. Open a Web browser.
2. Enter "http://(the machine's IP address or host name)/" in the address bar.
3. Click [Login].
The network administrator can log in.
Enter the login user name and login password.
4. Click [Configuration], and then click [SSL/TLS] under "Security".
5. Click [Active] for the protocol version used in "SSL/TLS".
6. Select the encryption communication mode for "Permit SSL/TLS Communication".
7. If you want to disable a protocol, click [Inactive] next to "SSL2.0", "SSL3.0", or "TLS".
Note that if you have selected [Active] in step 5, at least one of these protocols must be enabled.
8. In "Encryption Strength Setting", select the encryption strength (key length) for AES, 3DES,
DES, RC4, and RC2.
You must specify at least one encryption standard by selecting at least one key length.
Depending on whether "SSL2.0", "SSL3.0", and "TLS" is set to "Active" or "Inactive", the items you
can check vary.
9. Click [OK].
10. Click [OK].
11. Click [Logout].
• If you set "Permit SSL/TLS Communication" to [Ciphertext Only], enter " https://(the machine's IP
address or host name)/" to access the machine.
• The TLS version is 1.0.
• If you set "Permit SSL/TLS Communication" to [Ciphertext Only], communication will not be possible
if you select a protocol that does not support a Web browser, or specify an encryption strength setting
only. If this is the case, enable communication by setting [Permit SSL / TLS Communication] to
[Ciphertext / Cleartext] using the machine's control panel, and then specify the correct protocol and
encryption strength.
Protection Using Encryption
161