Protecting the Network94WS-07XConnecting the machine to a network allows you link it to computers and mobile devices for more convenientoperations. However, this also creates risks of unauthorized access and eavesdropping over the network.By configuring the security settings according to your network environment, you can reduce these risks to ensuresafer use of the machine.Filtering Using the Firewall SettingsAllows communications only with devices that have a specific IP address or MAC address to preventunauthorized access.Setting the Firewall(P. 302)Port ControlIf the port number being used by a communicating device, such as a computer or server, is changed, changethe setting on the machine too. In addition, if it is clear that there is an unneeded protocol, use of theprotocol is prohibited on the machine and that port is closed to prevent intrusion from the outside.Changing the Port Number(P. 305)Using a Proxy ServerUsing a proxy server to connect the machine to a network not only facilitates managing communication withexternal networks but blocks unauthorized access and consolidates anti-virus protection for enhancedsecurity.Using a Proxy(P. 306)Encryption of Communication Using TLSYou can use TLS to encrypt communication when using Remote UI. This reduces the risks of dataeavesdropping and tampering during communication.Using TLS(P. 308)Using the Machine in a Network with IEEE 802.1X AuthenticationWhen connecting the machine to a network that uses IEEE 802.1X authentication, you must configure thesettings on the machine such as the authentication method managed by the authentication server.Using IEEE 802.1X(P. 310)Managing and Verifying the Key and CertificateYou can generate a key and certificate used to encrypt communication and register a key and certificateobtained from a certification authority. By configuring the settings to check the revocation status of acertificate (using OCSP), you can check to see if a certificate received from a certification authority has beenrevoked.Managing and Verifying a Key and Certificate(P. 312)◼ See AlsoFor the network settings at setup, see the following.Configuring Your Machine for Your Network Environment(P. 75)Security301