For information about network access requirements for discovery of target hosts, see Section 2.6.1, Requirements for Discovery.