Management
After initial setup, maintenance of the system and programming of security functions are performed by personnel trained in the procedure using the embedded
The next chapter covers the basic procedure for setting up the hardware.
8
After initial setup, maintenance of the system and programming of security functions are performed by personnel trained in the procedure using the embedded
The next chapter covers the basic procedure for setting up the hardware.
8