Product Manual

46
profiles for some other authorized users using $PASH
proprietary commands.
Remember that registered users have exactly the same
rights as the administrator, including managing users
through $PASH commands.
2. Enabled with Anonymous Access: Anyone who has been
given the IP address or host name of the receiver has
direct access to the Web Server (no log-in required). Only
receiver monitoring is allowed in this case. An anonymous
user CANNOT change the receiver configuration.
After the Web Server has been launched with this level of
security, the administrator, or any other authorized user,
can log in on the Security page (see on-line Help attached
to this web page).
3. Disabled: No security is implemented with this option.
Anyone who has been given the IP address or host name
of the receiver has direct access to the Web Server, both
for monitoring the receiver or changing its configuration.
With this low security level, the receiver owner will be well-
advised to keep the receiver IP address or host name as
confidential as possible.
WiFi-Based TCP/IP
Connection
Setting Up the WiFi Device
If the WiFi device has been turned off, it first needs to be
turned back on:
On the receiver front panel, press one of the horizontal
keys until you see the WiFi screen.
–Press OK.
Select ON:
–Press OK again. After a few seconds the screen
displays “WiFi ... ON”.