User's Manual

Managing Trusted Hosts
Trusted hosts are authorized computers with which the AR400 is allowed to communicate. Enable this
feature to allow only computers listed in the trusted host list to access the Administrator Console. This
allows administrators to restrict unauthorized hosts from accessing the AR400 even if they are on the
same network as the AR400. When disabled (the default), the AR400 logs the IP addresses of any
computers that attempt to access the AR400 to provide a history of attempted accesses.
To manage trusted hosts:
1. Click Trusted
Hosts.
Figure 3-29. Trusted Hosts Window
2. To add a trusted host to the list, enter the IP address in the IP Address: field, then click Add Host.
3. To delete a trusted host, select the host’s address from the Current Trusted Hosts list, then click
Delete Host.
4. Click Enable Trusted Hosts Check to prevent computers not in the trusted host list from accessing
the AR400.
5. To allow all hosts in the network to access the AR400, click Disable Trusted Hosts Check.