Security
Security ................................................................................................................................................................ 217
Protecting the Machine from Unauthorized Access ....................................................................................... 218
Preventing Unauthorized Access .................................................................................................................. 219
Setting Access Privileges .............................................................................................................................. 221
Setting the System Manager PIN ........................................................................................................... 222
Setting a Remote UI PIN ........................................................................................................................ 224
Restricting Communication by Using Firewalls ............................................................................................. 226
Specifying IP Addresses for Firewall Rules ............................................................................................. 227
Specifying MAC Addresses for Firewall Rules ......................................................................................... 231
Changing Port Numbers ............................................................................................................................... 234
Setting a Proxy ............................................................................................................................................. 236
Restricting the Machine's Functions ................................................................................................................ 238
Disabling HTTP Communication ................................................................................................................... 239
Disabling Remote UI ..................................................................................................................................... 240
Implementing Robust Security Features ......................................................................................................... 241
Enabling TLS Encrypted Communication for the Remote UI ......................................................................... 242
Conguring IEEE 802.1X Authentication ....................................................................................................... 245
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 250
Generating Key Pairs ............................................................................................................................. 252
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 259
Verifying Key Pairs and Digital Certicates ............................................................................................. 262
Security
216