Cybersecurity Recommendations
IX
14.
Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend:
-
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
-
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
-
Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
Содержание THIP-P2078FM-IR
Страница 1: ...Thermal Hybrid Speed Dome Quick Start Guide V1 0 0 ...
Страница 14: ...Design 3 Pole mount bracket mm inch Corner mount bracket mm inch ...
Страница 22: ...Installation 11 Wall mount installation ...
Страница 23: ...Installation 12 Pole mount installation ...
Страница 24: ...Installation 13 Corner mount installation Ceiling mount installation ...
Страница 29: ...Lightening and Surge Protection 18 Appendix figure 1 1 Lightening protection ...