Managing Trusted Hosts
Trusted hosts are authorized computers with which the reader is allowed to communicate. Enable this feature to
allow only computers listed in the trusted host list to access the Administrator Console. This allows administrators
to restrict unauthorized hosts from accessing the reader even if they are on the same network as the reader. When
disabled (the default), the reader logs the IP addresses of any computers that attempt to access the reader to
provide a history of attempted accesses.
To manage trusted hosts:
Click Trusted Hosts, the Trusted Hosts window appears.
1.
Trusted Hosts Window
Figure 3-36
To add a trusted host to the list, enter the IP address in the IP Address: field, then click Add Host.
2.
To delete a trusted host, select the host address from the Current Trusted Hosts list, then click Delete Host.
3.
Click Enable Trusted Hosts Check to prevent computers not in the trusted host list from accessing the reader.
4.
To allow all hosts in the network to access the reader, click Disable Trusted Hosts Check.
Administrator Console 3 - 41