Network Security

You can increase the network security on the machine to avoid output of data and tampering data and increase the security and confidentiality.
We recommend that you set a Network Administrator (NetworkAdmin) for security reasons when using the SSO-H.
The security on the network for this machine is maintained using the following functions.
TLS Encrypted Communication
You can perform safe encrypted communication when the user is accessing the machine via a Web browser by installing a server certificate to the machine. With TLS communication, a common key that can only be used by the user and the machine is generated using the server certificate and public key. Doing so will help prevent data interception and theft. See "Key Pair and Server Certificate Settings for Encrypted TLS Communication" and "Settings for Utilizing TLS."
The structure of TLS communication is shown below.
When the user accesses the machine from their computer, the server certificate for TLS and the public key for the server are requested.
The certificate and the public key are sent to the user's computer from the machine.
Using the public key received from the server, encrypt the uniquely generated common key on the computer.
Send the encrypted common key to the machine.
Use the private key on the machine and decode the encrypted common key.
Now, the user's computer and the machine both possess the common key and can send/receive data using the common key.
A firewall is a system that prevents access by outside networks, and attacks/intrusions to the network. You can use a firewall on this machine to block access from outside network that appears to be dangerous by restricting communication from specified outside IP addresses. (See "Protocol Settings.")
SNMP is a protocol that manages the entire network. This machine supports SNMPv1 and SNMPv3. SNMP oversees and controls the communication machine connected to this machine via network. (See "Communication Environment Setup.")
IEEE 802.1X Authentication
Manages all of the authentication information via the authentication server (RADIUS: Remote Authentication Dial In User Service) and authenticates the supplicant. You can prevent unauthorized access because only the supplicant authenticated by the RADIUS server has permission to connect to the network by the authenticator.
The authenticator blocks communication for the supplicant that is not authenticated by the RADIUS server. (See "IEEE 802.1X Authentication Settings.")
IPSec Communication and FIPS 140-2
IPSec is a protocol for creating a security policy to protect data received from and sent to the IP network from threats such as interception, alteration, and theft. (See "IPSec Settings.")
You can also make the encryption method for IPSec communication comply with the United States government-approved FIPS (Federal Information Processing Standards) 140-2. (See "Using an Encryption Method That Complies with FIPS 140-2.")
MEAP Settings
You can use TLS communication when a MEAP application is used by accessing the machine via a Web browser. (See "MEAP Settings.")