User manual
Security
TPG User Manual 51
5 Security
The following security mechanisms can be configured and activated
according to your demands:
What information do
you need?
• ’How to Control the Access to the TPG Control Center’ Ö52
• ’How to Control the Access to the TPG (TCP Port Access Control)’
Ö53
• ’How to Use Certificates Correctly’ Ö55
• ’How to Use Authentication Methods’ Ö62
A number of security mechanisms are available to
ensure optimum security for the TPG. This chapter
describes how to make use of these security
mechanisms.