Chapter 9: Security Management223 FIPS 140-2 should be enabled on the client computer and in InternetExplorer.To enable FIPS 140-2 on a Windows client:1. Select Control Panel > Administrative Tools > Local Security Policyto open the Local Security Settings dialog.2. From the navigation tree, select Select Local Policies > SecurityOptions.3. Enable "System Cryptography: Use FIPS compliant algorithms forencryption, hashing and signing".4. Reboot the client computer.To enable FIPS 140-2 in Internet Explorer:1. In Internet Explorer, select Tools > Internet Options and click on theAdvanced tab.2. Select the Use TLS 1.0 checkbox.3. Restart the browser.Configuring IP Access ControlUsing IP access control, you control access to your KX II. Note that IPaccess control restricts traffic of any kind from accessing the KX II, soNTP servers, RADIUS hosts, DNS hosts and so on must be grantedaccess to the KX II.By setting a global Access Control List (ACL) you are ensuring that yourdevice does not respond to packets being sent from disallowed IPaddresses. The IP access control is global, affecting the KX II as awhole, but you can also control access to your device at the group level.See Group-Based IP ACL (Access Control List) (on page 125) formore information about group-level control.Important: IP address 127.0.0.1 is used by the KX II local port. Whencreating an IP Access Control list, 127.0.0.1 should not be withinthe range of IP addresses that are blocked or you will not haveaccess to the KX II local port.To use IP access control:1. Select Security > IP Access Control to open the IP Access Controlpage.2. Select the Enable IP Access Control checkbox and the remainingfields on the page.3. Choose the Default Policy. This is the action taken for IP addressesthat are not within the ranges you specify. Accept - IP addresses are allowed access to the KX II device.