...
All available ports for all enabled connectors are checked. More info in Connectors and ports.
Secure connectors are always preferred to insecure connectors.
For example, if a device is available over both Telnet and SSH, SSH will be used.
...
...
All available ports for all enabled connectors are checked. More info in Connectors and ports.
Secure connectors are always preferred to insecure connectors.
For example, if a device is available over both Telnet and SSH, SSH will be used.
...