IC Realtime IPFX-D80V-IRW1 Product Manual - Page 193
Establish the 802.1x access authentication system to reduce the risk of unauthorized
View all IC Realtime IPFX-D80V-IRW1 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 193 highlights
The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. Cybersecurity Recommendations 185
Cybersecurity Recommendations
185
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.