SEH Computertechnik TPG60 user manual Security

Models: TPG60

1 87
Download 87 pages 30.95 Kb
Page 55
Image 55

Security

What information do you need?

What do you want to do?

7 Security

A number of security mechanisms are available to ensure optimum security for the TPG60. The security mechanisms can be configured and activated according to your demands. The following security mechanisms are available:

’How to Protect the TPG60 against Unauthorized Access? (Password Control)’ Ö55

’How to Protect the TPG60 against Unauthorized Access? (IP Sender)’ Ö56

’How to Protect the TPG60 against Viruses?’ Ö58

’How Does the TPG60 Authenticate Itself in the network via EAP-MD5/LEAP?’ Ö59

’How Does the TPG60 Authenticate Itself in the network via EAP-TLS?’ Ö60

7.1How to Protect the TPG60 against Unauthorized Access? (Password Control)

A password can protect the TPG60 against unauthorized access. If a password was set, you must enter the password before you can save the changes to the parameters. This means that changes to the parameters can only be made using a valid password.

If you do not want your parameters to be displayed, you can set a password at this stage as well. For this purpose, the parameter Access control must be enabled. If this parameter is enabled, a password must be entered when starting the TPG Homepage or when opening the Properties dialog.

†’Defining the Password via the TPG Homepage’ Ö56

†’Defining the Password via the InterCon-NetTool’ Ö56

TPG60 User Manual

55

Page 55
Image 55
SEH Computertechnik TPG60 user manual Security