Figure 21
Security policy diagram
Figure 21 illustrates a group of IP clients, the subnet they are on, and the SMC
network name that has been given to those clients. Figure 22 on
shows, in the Web UI, how the IP client network is tied to the policy and
Figure 23 on
page 127
UNIStim.
Secure UNIStim deployment
shows group of IP clients that does not support secure
Secure Multimedia Controller
Page 125 of 260
page 126
Implementation Guide