thanks a lot.. it will force me to define 60-70 ip addresses (voip, card reading terminals, ip telephones, ip fax devices) in Allowed IP addresses…
Thank you again for your help..
@Nachtfalke:
If you add the hosts to "Allowed IP addresses" or "MAC bypass" then this host will bypass CP and does not need to authenticate. The rest depends again on your firewall rules.
"Allowed IP addresses" can be defines in source or destination.