Intermec IF2 IF2 Network Reader User Manual - Page 33

How to Use the IF2 Securely

Page 33 highlights

Chapter 1 - About the RFID Reader How to Use the IF2 Securely To help protect the integrity and security of your data, the IF2 supports a variety of secure access methods: • You can use a secure web browser session (HTTPS) to access the IF2. For help, see "Use the Web Browser Interface" on page 11. • You can configure and use network security methods, or disable basic configuration through the serial port. For help, see "Configure Security" on page 26. IF2 Network Reader User Manual 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119

Chapter 1 — About the RFID Reader
IF2 Network Reader User Manual
19
How to Use the IF2 Securely
To help protect the integrity and security of your data, the IF2
supports a variety of secure access methods:
You can use a secure web browser session (HTTPS) to access the
IF2. For help, see
“Use the Web Browser Interface” on page 11.
You can configure and use network security methods, or disable
basic configuration through the serial port. For help, see
“Configure Security” on page 26.