

![]() |
If you want to use a key and certificate that you generate yourself, generate the key and certificate before performing the procedure below. Generating the Key and Certificate for Network Communication If you want to use a key and certificate that you acquire from a certification authority (CA), register the key and certificate before performing the procedure below. Registering a Key and Certificate |
(Settings/Register).
<Network>
<TCP/IP Settings>
<TLS Settings>.
<Yes>.

press <OK>.
press <OK>.

: AvailableAlgorithm | TLS Version | |||
<TLS 1.3> | <TLS 1.2> | <TLS 1.1> | <TLS 1.0> | |
<Encryption Algo Settings> | ||||
<AES-CBC (256-bit)> | - | ![]() | ![]() | ![]() |
<AES-GCM (256-bit)> | ![]() | ![]() | - | - |
<3DES-CBC> | - | ![]() | ![]() | ![]() |
<AES-CBC (128-bit)> | - | ![]() | ![]() | ![]() |
<AES-GCM (128-bit)> | ![]() | ![]() | - | - |
<CHACHA20-POLY1305> | ![]() | - | - | - |
<Key Exchange Algo Settings> | ||||
<RSA> | - | ![]() | ![]() | ![]() |
<ECDHE> | ![]() | ![]() | ![]() | ![]() |
<X25519> | ![]() | - | - | - |
<Signature Algo Settings> | ||||
<RSA> | ![]() | ![]() | ![]() | ![]() |
<ECDSA> | ![]() | ![]() | ![]() | ![]() |
<HMAC Algo Settings> | ||||
<SHA1> | - | ![]() | ![]() | ![]() |
<SHA256> | ![]() | ![]() | - | - |
<SHA384> | ![]() | ![]() | - | - |
(Settings/Register)
(Settings/Register)
<Apply Set. Chng.>
<Yes>.![]() Starting the Remote UI with TLS |
If you try to start the Remote UI when TLS is enabled, a security alert may be displayed regarding the security certificate. In this case, check that the correct URL is entered in the address field, and then proceed to display the Remote UI screen. Starting the Remote UI |
(Settings/Register).
<Security Settings>
<Encryption Settings>.
<Prohibit Use of Weak Encryption>
<Format Encryption Method to FIPS 140>![]() |
If you set <Format Encryption Method to FIPS 140> to <On>, you can make the TLS communication encryption method comply with the United States government-approved FIPS (Federal Information Processing Standards) 140, but the following limitations apply. An error will occur if you specify a certificate for TLS that uses an algorithm not recognized by FIPS (lower than RSA2048bit). A communication error will occur if the communication destination does not support FIPS-recognized encryption algorithms. <CHACHA20-POLY1305> and <X25519> can no longer be used |