Cybersecurity Recommendations
IX
14.
Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend:
-
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
-
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
-
Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
Summary of Contents for THIP-P2078FM-IR
Page 1: ...Thermal Hybrid Speed Dome Quick Start Guide V1 0 0 ...
Page 14: ...Design 3 Pole mount bracket mm inch Corner mount bracket mm inch ...
Page 22: ...Installation 11 Wall mount installation ...
Page 23: ...Installation 12 Pole mount installation ...
Page 24: ...Installation 13 Corner mount installation Ceiling mount installation ...
Page 29: ...Lightening and Surge Protection 18 Appendix figure 1 1 Lightening protection ...