User Manual

XR400 RFID Reader Integrator Guide3-28
Managing Trusted Hosts
Trusted hosts are authorized computers with which the reader is allowed to communicate. Enable this feature to allow only computers
listed in the trusted host list to access the Administrator Console. This allows administrators to restrict unauthorized hosts from
accessing the reader even if they are on the same network as the reader. When disabled (the default), the reader logs the IP addresses
of any computers that attempt to access the reader to provide a history of attempted accesses.
To manage trusted hosts:
1. Click Trusted Hosts.
Figure 3-25. Trusted Hosts Window
2. To add a trusted host to the list, enter the IP address in the IP Address: field, then click Add Host.
3. To delete a trusted host, select the host’s address from the Current Trusted Hosts list, then click Delete Host.
4. Click Enable Trusted Host Check to prevent computers not in the trusted host list from accessing the reader.
5. To allow all hosts in the network to access the reader, click Disable Trusted Host Check.