26
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
It is recommended that you enable your device's firewall or blacklist and whitelist
feature to reduce the risk that your device might be attacked.