IC Realtime IPEL-M80F-IRW2 Product Manual - Page 200

More information

Page 200 highlights

Reminder: encrypted transmission will cause some loss in transmission efficiency and affect mobile app streaming. 11.Secure Auditing ● Check online users: we suggest that you check online users regularly to check for unauthorized users. ● Check equipment log: By viewing the logs, you can identify the IP addresses that were used to log in to your devices and their key operations. 12.Network Log Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save the log for a long duration, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to a network log server for tracing. 13.Construct a Safe Network Environment In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend: ● Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. ● The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. ● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. More information Please visit the IC Realtime official website security emergency response center for security announcements and the latest security recommendations. IC Realtime LLC Address: 3050 N Andrews Ave Ext Pompano Beach, FL USA 33064 I Website: www.icrealtime.com.com I Email: [email protected] I Tel: 1(866) 997-9009 188

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

Reminder: encrypted transmission will cause some loss in transmission efficiency and affect mobile app
streaming.
11.
Secure Auditing
Check online users: we suggest that you check online users regularly to check for
unauthorized users.
Check equipment log: By viewing the logs, you can identify the IP addresses that were used to
log in to your devices and their key operations.
12.
Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need to
save the log for a long duration, it is recommended that you enable the network log function to
ensure that the critical logs are synchronized to a network log server for tracing.
13.
Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
The network should be partitioned and isolated according to the actual network needs. If there
are no communication requirements between two sub networks, it is suggested to use VLAN,
network GAP and other technologies to partition the network, so as to achieve the network
isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
More information
Please visit the IC Realtime official website security emergency response center for security
announcements and the latest security recommendations.
IC Realtime LLC
Address
:
3050 N Andrews Ave Ext Pompano Beach, FL
USA 33064
I
Website
:
www
.
icrealtime.com
.
com
I
Email: tech
@
ICRealtime
.
com
I
Tel
:
1(866)
997-9009
188