Chapter 4 Configuration Setting and Access Control Installation
II-2
Chapter 4 Configuration Setting and Access
Control Installation
4
4
4.
.
.1
1
1
S
S
Sy
y
ys
s
st
t
te
e
em
m
m
C
C
Co
o
on
n
nf
f
fi
i
ig
g
gu
u
ur
r
ra
a
at
t
ti
i
io
o
on
n
n
For information on configuration settings and examples of system configuration when using Access Control function,
refer to Chapter 3 “System Configuration” of the “Manual Guide”.
4
4
4.
.
.2
2
2
C
C
Co
o
on
n
nf
f
fi
i
ig
g
gu
u
ur
r
ra
a
at
t
ti
i
io
o
on
n
n
S
S
Se
e
et
t
tt
t
ti
i
in
n
ng
g
g
a
a
an
n
nd
d
d
A
A
Ac
c
cc
c
ce
e
es
s
ss
s
sC
C
Co
o
on
n
nt
t
tr
r
ro
o
ol
l
l
I
I
In
n
ns
s
st
t
ta
a
al
l
ll
l
la
a
at
t
ti
i
io
o
on
n
n
Configuration Setting and Access Control functions are installed at the same time installing the iSM server. For
information on installing and uninstalling, refer to “Server Installation” and “Client Installation” in the “User’s
Manual” or “User’s Manual (UNIX)” in accordance with the OS in use.