221In This ChapterSecurity Settings ....................................................................................221Configuring IP Access Control ..............................................................232SSL Certificates .....................................................................................234Security Banner .....................................................................................237Security SettingsFrom the Security Settings page, you can specify login limitations, userblocking, password rules, and encryption and share settings.Raritan SSL certificates are used for public and private key exchanges,and provide an additional level of security. Raritan web server certificatesare self-signed. Java applet certificates are signed by a VeriSigncertificate. Encryption guarantees that your information is safe fromeavesdropping and these certificates ensure that you can trust that theentity is Raritan, Inc.To configure the security settings:1. Choose Security > Security Settings. The Security Settings pageopens.2. Update the Login Limitations (on page 222) settings asappropriate.3. Update the Strong Passwords (on page 224) settings asappropriate.4. Update the User Blocking (on page 225) settings as appropriate.5. Update the Encryption & Share settings as appropriate.6. Click OK.Chapter 9 Security Management