2N IP intercom Configuration Manual page 152

Table of Contents

Advertisement

Tip
In the case of loss of a mobile phone with access data proceed as
follows:
Delete the Mobile Key Auth ID value for the user to block the lost phone
1.
and avoid misuse.
Re-generate the primary encryption key (optionally) to avoid misuse of
2.
the encryption key stored in the mobile device.
2N TELEKOMUNIKACE a.s., www.2n.cz
152/198

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IP intercom and is the answer not in the manual?

Table of Contents

Save PDF