Table of Contents IV
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings .................................................................................................... III
1 Checklist ................................................................................................................................................. 1
Package ........................................................................................................................................ 1 1.1
Port Definition ................................................................................................................................ 1 1.2
1.2.1 Front Panel ......................................................................................................................... 1
1.2.2 Rear Panel .......................................................................................................................... 2
Device Installation ......................................................................................................................... 2 1.3
2 Local Application ................................................................................................................................... 3
Function Architecture .................................................................................................................... 3 2.1
Business Configuration ................................................................................................................. 4 2.2
2.2.1 Basic Setting ....................................................................................................................... 4
2.2.2 Network Setting .................................................................................................................. 4
Operation Management ................................................................................................................ 7 2.3
2.3.1 Operation Analysis .............................................................................................................. 7
2.3.2 System Management .......................................................................................................... 7
3 Configuring System .............................................................................................................................. 9
Cybersecurity Recommendations ................................................................................... 10 Appendix 1