Table of Contents VI
Table of Contents
Cybersecurity Recommendations ........................................................................................................... I
Foreword .................................................................................................................................................. III
Important Safeguards and Warnings ..................................................................................................... V
1 Checklist ................................................................................................................................................. 1
1.1 Package ......................................................................................................................................... 1
1.2 Port Definition ................................................................................................................................ 1
1.2.1 Front Panel ......................................................................................................................... 2
1.2.2 Rear Panel .......................................................................................................................... 2
1.3 Device Installation ......................................................................................................................... 3
2 Local Application ................................................................................................................................... 4
2.1 Function Architecture ..................................................................................................................... 4
2.2 Business Config ............................................................................................................................. 5
2.2.1 Basic Setting ....................................................................................................................... 5
2.2.2 Network Setting .................................................................................................................. 5
2.3 Operation Management ................................................................................................................. 8
2.3.1 Operation Analysis .............................................................................................................. 8
2.3.2 System Management .......................................................................................................... 9
3 Config System ..................................................................................................................................... 10