IT security of the product
The product can be set to different access levels. Certain parameters are only visible within the corresponding access level. Authentication is implemented by using static access data. These data are not used to defend against attacks on IT security but to protect against unintentional modification.
The following access levels are available:
Level | Access |
|---|---|
Default | Freely accessible for all users |
Advanced | Extended parameterization options for users |
Internal | Internal access for advanced diagnostics and configuration |