User Manual
38
Specific devices: an individual computer or Bluetooth cellular telephone are
examples of specific devices.
Specific class of device: “computer” is an example of a class of devices
Specific type of device within a class: “laptop” is an example of a specific type
of device within the “computer” class of devices.
The devices to be discovered can be mixed-and-matched; you can discover one or more
specific devices, classes of devices and types of devices within a class at the same time.
Remove a device from the list of devices to be discovered
In the Bluetooth Configuration Panel, from the Discovery tab, select the device to be
removed and click the Delete button.
Temporarily override the discovery of specific devices
In the Bluetooth Configuration Panel, from the Discovery tab, select “Report all
Bluetooth devices.” The specifically selected devices will be discovered along with all
other devices.
To re-enable specific device discovery re-select “Report only selected Bluetooth
devices.”
5. Security
5.1 AUTHENTICATION
Authentication is used to verify identity; it requires a passkey or link key from the remote
device. When a remote device attempts access, a visual and/or audio warning notifies the
local operator.
If the notification is ignored, access is denied after a preset timeout.
When devices are “paired,” those devices automatically exchange a Link Key and
Authentication is carried out without operator intervention.
5.2 AUTHORIZATION
Authorization is Yes-or-No security that requires operator intervention to avoid having
the connection time out and fail.
Authorization is limited to:
Yes, you may connect (click the balloon to proceed)
No, you may not connect (ignore the balloon prompt and the connection will fail).
NOTE: If “Report only selected Bluetooth devices” is not selected the Delete button will
not be available.
NOTE: When all devices are deleted an error message will appear if “Report all Bluetooth
devices” is not selected.