Manual
ibaClock
50
Issue 1.4
14
Security
Continuously advanced attack techniques in the field of IT as well as ever-new security
gaps in proprietary as well as open-source software or hardware make unauthorized
network accesses easier. It is therefore recommended to connect network-capable iba
devices to untrusted networks only with sufficient protection, such as a firewall.
Figure 16: Example of a network configuration with remote access