Chapter 6: Using the Web Interface300Configuring Security SettingsThe PX3TS provides tools to control access. You can enable the internalfirewall, create firewall rules, and set login limitations. In addition, youcan create and install the certificate or set up external authenticationservers for access control. This product supports SHA-2 TLS certificates.Tip: To force all HTTP accesses to the PX3TS to be redirected to HTTPS,see Changing HTTP(S) Settings(on page 292).Submenu command Refer toIP Access ControlCreating IP Access Control Rules (on page 301)Role Access ControlCreating Role Access Control Rules (on page 304)SSL CertificateSetting Up an SSL/TLS Certificate (on page 307)AuthenticationSetting Up External Authentication (on page 312)Login SettingsConfiguring Login Settings (on page 321)Password PolicyConfiguring Password Policy (on page 322)Service AgreementEnabling the Restricted Service Agreement (on page 323)