• IP filter
• Local authentication
• Network authentication
At the end of the chapter you will be able to...
• integrate the device in the network.
• have an informed dialog with the administrator.
• protect the device from unauthorized network access
(flexible securityconcept).
• set up different network scan modes.
• establish administrative security functions