This is my archive

Deriving IP addresses 

Deriving IP addresses  Your specific security context determines the network structure and also the IP addresses. To assign the IP addresses that are suitable for you, you must derive them from your security context. The following is an example security context that you must adapt to your… Read More

Checking the integrity state 

Checking the integrity state  If the Security Profile is activated, an integrity state check is performed after each boot and log-in to the WBM.  The integrity state is displayed in the WBM in the page header line right to the Security Profile state field.  Note: Every event… Read More