User Guide 73
Create an Unrestricted Pass Through
and Trusted network computers are not protected from potential threats,
do not use the Pass Through feature