User Manual
Table Of Contents
- Contents
- Section 1. Introduction
- Section 2. System Description
- Section 3. Specifications and Diagrams
- Section 4. Installing the Reader
- Section 5. Configuring the Reader
- Section 6. Notification of Events
- Section 7. Tag Selection Filters
- Section 8. Reader Server Controls
- Section 9. Ad-hoc Queries
- Section 10. Maintaining the Reader
- Access the Reader Maintenance Console
- Manage Communication Configuration Settings
- Manage System Time Settings
- Display Version Control Information and Load Firmware via FTP
- Display the System Log and/or Access History
- Shut Down and/or Restart the System, and Turn Off the HTTP Server
- Use Online Help
- Log Out of the System
- Section 11. Cautions, Notes, and Approvals
- Section 12. Warranties and Returns
- Section 13. Contact Us
- Appendix A. Error Messages and Resolutions
AR 400 Reader User’s Manual 2003-2004 Matrics, Inc. 29
Define Trusted Hosts
To ensure the controlled and secured access to Reader Administrator Console functions, you should
designate which computers are authorized to have system access. You do this by setting up “trusted
hosts” (authorized computers.) Only computers that are registered in the system as trusted hosts can
successfully access Reader Administrator Console functions.
1. If you haven’t already done so, launch and log in to the Reader Administrator Console.
2. Click the Trusted Hosts link on the left-hand side of any page. The Trusted Hosts page displays.
Trusted hosts checking is disabled by default (to allow your first admin to log in from anywhere.)
With trusted hosts checking disabled, the IP address of any system that accesses the Reader is
automatically added to the Current Trusted Hosts List. You can use this feature to see which systems
have accessed the Reader, thereby enabling you to track down any unauthorized users.
However, if you wish to limit Reader access to only those computers that you’ve designated in the
Current Trusted Hosts List, then you should enable trusted hosts checking for higher security.