User Guide

Table Of Contents
Implementing Robust Security Features
1469-086
Authorized users may incur unanticipated losses fr
om attacks by malicious third parties, such as sning, spoong,
and tampering of data as it ows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
br
owser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI.
Enabling TLS Encrypted Communication for the Remote UI(P. 426)
IEEE 802.1X Authentication
IEEE 802.1X is a standard and mechanism for blocking unauthorized access to the network by collectively
managing user authentication information. If a de
vice tries to connect to the 802.1X network, the device must
go through user authentication in order to prove that the connection is made by an authorized user.
Authentication information is sent to and checked by a RADIUS server, which permits or rejects communication
to the network depending on the authentication result. If authentication fails, a LAN switch (or an access point)
blocks access from the outside of the network. The machine can connect to an 802.1X network as a client
device.
Conguring IEEE 802.1X Authentication
(P. 429)
LINKS
Conguring Settings for Ke
y Pairs and Digital Certicates(P. 434)
Security
425