SecuritySecurity ................................................................................................................................................................ 221Protecting the Machine from Unauthorized Access ....................................................................................... 222Preventing Unauthorized Access .................................................................................................................. 223Setting Access Privileges .............................................................................................................................. 225Setting the System Manager ID ............................................................................................................. 226Setting the Department ID Management .............................................................................................. 228Setting a Remote UI PIN ........................................................................................................................ 235Restricting Communication by Using Firewalls ............................................................................................. 237Specifying IP Addresses for Firewall Rules ............................................................................................. 238Specifying MAC Addresses for Firewall Rules ......................................................................................... 242Changing Port Numbers ............................................................................................................................... 245Setting a Proxy ............................................................................................................................................. 247Restricting the Machine's Functions ................................................................................................................ 249Restricting USB Functions ............................................................................................................................. 250Disabling HTTP Communication ................................................................................................................... 252Disabling Remote UI ..................................................................................................................................... 253Implementing Robust Security Features ......................................................................................................... 254Enabling SSL Encrypted Communication for the Remote UI ......................................................................... 255Configuring IPSec Settings ........................................................................................................................... 259Configuring IEEE 802.1X Authentication ....................................................................................................... 268Configuring Settings for Key Pairs and Digital Certificates ........................................................................... 273Generating Key Pairs ............................................................................................................................. 274Using CA-issued Key Pairs and Digital Certificates ................................................................................. 282Verifying Key Pairs and Digital Certificates ............................................................................................. 286Security220