Table of Contents VI
Table of Contents
Cybersecurity Recommendations ........................................................................................................... I
Foreword .................................................................................................................................................. III
Important Safeguards and Warnings ..................................................................................................... V
1 Checklist ................................................................................................................................................. 1
1.1 Package ......................................................................................................................................... 1
1.2 Port Definition ................................................................................................................................ 1
1.2.1 Front Panel ......................................................................................................................... 2
1.2.2 Rear Panel .......................................................................................................................... 2
2 Config System ....................................................................................................................................... 4
2.1 Login and Initialize Config System ................................................................................................ 4
2.2 Ethernet Config .............................................................................................................................. 5
3 Config DSS Client .................................................................................................................................. 8
3.1 Download and Install Client ........................................................................................................... 8
3.2 Log in Client ................................................................................................................................. 10
3.3 Initialize Client ............................................................................................................................. 10