Intermec IF2 IF2 Network Reader User Manual - Page 33
How to Use the IF2 Securely
View all Intermec IF2 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 33 highlights
Chapter 1 - About the RFID Reader How to Use the IF2 Securely To help protect the integrity and security of your data, the IF2 supports a variety of secure access methods: • You can use a secure web browser session (HTTPS) to access the IF2. For help, see "Use the Web Browser Interface" on page 11. • You can configure and use network security methods, or disable basic configuration through the serial port. For help, see "Configure Security" on page 26. IF2 Network Reader User Manual 19
Chapter 1 — About the RFID Reader
IF2 Network Reader User Manual
19
How to Use the IF2 Securely
To help protect the integrity and security of your data, the IF2
supports a variety of secure access methods:
•
You can use a secure web browser session (HTTPS) to access the
IF2. For help, see
“Use the Web Browser Interface” on page 11.
•
You can configure and use network security methods, or disable
basic configuration through the serial port. For help, see
“Configure Security” on page 26.