Protecting the Network

Connecting the machine to a network allows you link it to computers and mobile devices for more convenient operations. However, this also creates risks of unauthorized access and eavesdropping over the network.
By configuring the security settings according to your network environment, you can reduce these risks to ensure safer use of the machine.
Filtering Using Firewall Settings
Allows communications only with devices that have a specific IP address or MAC address to prevent unauthorized access.
Using a Proxy Server
Using a proxy server to connect to a network not only facilitates managing communications with external networks but blocks unauthorized access and consolidates anti-virus protection for enhanced security.
Encryption of Communication Using TLS
You can use TLS to encrypt communication when using Remote UI and sending e-mail. This reduces the risks of data eavesdropping and tampering during communication.
Encryption of Communication Using IPSec
Use Internet Protocol Security (IPSec) to encrypt data at the IP protocol level. This reduces the risks of data eavesdropping and tampering during communication without relying on an application or network configuration.
Using the Machine in a Network with IEEE 802.1X Authentication
When connecting the machine to a network that uses IEEE 802.1X authentication, you must configure the settings on the machine such as the authentication method managed by the authentication server.
Managing and Verifying Keys and Certificates
You can generate a key and certificate used to encrypt communication and register keys and certificates obtained from a certification authority. By configuring the verification method of a certificate, you can check to see if a certificate received from a communicating device is valid.

See Also

For the network settings at setup, see the following.
A0YC-1RK