Loading ...
Loading ...
Loading ...
![](https://files.manualsfile.com/50917023-ktp05/bgb.png)
User’s Manual
6
the critical logs are synchronized to the network log server for tracing.
13.
Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
●
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
●
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
●
Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
●
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
Loading ...