Implementing Robust Security Features0YSF-04KAuthorized users may incur unanticipated losses from attacks by malicious third parties, such as sniffing, spoofing,and tampering of data as it flows over a network. To protect your important and valuable information from theseattacks, the machine supports the following features to enhance security and secrecy.TLS Encrypted CommunicationTLS is a protocol for encryption for data sent over a network and is often used for communication via a Webbrowser or an e-mail application. TLS enables secure network communication when you access the machinefrom a computer via the Remote UI. Using TLS for Encrypted Communications(P. 297)IPSec CommunicationWhile TLS only encrypts data used on a specific application, such as a Web browser or an e-mail application,IPSec encrypts the whole (or payloads of) IP packets. This enables IPSec to offer a more versatile security systemthan TLS. Configuring IPSec Settings(P. 301)IEEE 802.1X AuthenticationIEEE 802.1X is a standard and mechanism for blocking unauthorized access to the network by collectivelymanaging user authentication information. If a device tries to connect to the 802.1X network, the device mustgo through user authentication in order to prove that the connection is made by an authorized user.Authentication information is sent to and checked by a RADIUS server, which permits or rejects communicationto the network depending on the authentication result. If authentication fails, a LAN switch blocks access fromthe outside of the network. The machine can connect to an 802.1X network as a client device. ConfiguringIEEE 802.1X Authentication(P. 312)LINKSConfiguring Settings for Key Pairs and Digital Certificates(P. 318)Security296