
Chapter 3: Software Application and Usage
3-29
2
3
4
5
6
7
8
9
15
16
17
12
111
13
14
1
'HYLFH6HWWLQJV6HFXULW\
c. Security
10
c. Security
1. Security:
&OLFNRQWKLVIXQFWLRQNH\WRDFWLYDWHLWVVXEPHQXDQGFRQ¿JXUHWKHIRO
-
lowing Security settings as listed below.
2. Encryption Settings:
7KLVZLQGRZDOORZV\RXWRFRQ¿JXUHHQFU\SWLRQVHWWLQJV
)RUFH +7736 IRU :HE $FFHVV
Check this box to enable the function-Force
HTTPS for Web Access. If enabled, you will need to use an HTTPS connection to
access to the web.
4. KVM Encryption:
7KLVRSWLRQDOORZV\RXWRFRQ¿JXUHWKHHQFU\SWLRQRIWKH5)%
protocol. RFB is used by the remote host to transmit video data displayed in the host
monitor to the local administrator machine, and transmit keyboard and mouse data
from the local administrator machine back to the remote host.
,IVHWWR2IIQRHQFU\SWLRQZLOOEHXVHG,IVHWWR7U\WKHDSSOHW-90RIWKHUHPRWH
host) will attempt to make an encrypted connection. In this case, when a connection
FDQQRWEHHVWDEOLVKHGDQXQHQFU\SWHGFRQQHFWLRQZLOOEHXVHG,IVHWWR)RUFHWKH
applet will make an encrypted connection. In this case, an error will be reported if no
connection is made.
5. IP Access Control:
7KLVVHFWLRQDOORZV\RXWRFRQ¿JXUHWKH,3$FFHVV&RQWURO
settings listed below.