Configuring the Network Security Settings2KUS-064Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sniffing, spoofing,and tampering of data as it flows over a network. To protect your important and valuable information from theseattacks, the machine supports the following features to enhance security and secrecy.Firewall SettingsUnauthorized access by third parties, as well as network attacks and intrusions, can be blocked by limitingcommunication only to devices that have a specific IP address or MAC address. Restricting Communicationby Using Firewalls(P. 298)Changing Port NumbersA protocol that is used to exchange information with other devices is assigned port numbers that arepredetermined according to the type of protocol. The port number must be the same for all communicationdevices; therefore, changing it to an arbitrary number is important to prevent hacking from outside.Changing Port Numbers(P. 304)Proxy SettingsWhen the client devices are connected to an external network, communication is established through the proxyserver. When the proxy server is used, websites can be browsed more safely, therefore, security can beexpected to be enhanced. Setting a Proxy(P. 305)TLS Encrypted CommunicationTLS is a protocol for encryption for data sent over a network and is often used for communication via a Webbrowser or an e-mail application. TLS enables secure network communication when you access the machinefrom a computer via the Remote UI. Configuring the Key and Certificate for TLS(P. 307)Managing the Machine296