Reinforcing Security
Changing Security Settings
Encrypting Communications
Restricting Communications
- Restricting external accesses using the IP address
- Restricting Packet Transfer
- Restricting E-mail recipients using the domain
Restricting network or USB connections
- Connecting this machine to IEEE802.1X authentication environment
- Restricting functions using the USB port
- Restricting the firmware update using a USB memory with a password
Managing the certificates for this machine
- Using Different Certificates Depending on the Application
- Exporting a certificate
- Importing a certificate
- Deleting a certificate
- Verifying a certificate for peer
- Importing external certificates used for validating the chain