III
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings ..................................................................................................... II
1 Ports ....................................................................................................................................................... 1
1.1 Out-of-box Checking..................................................................................................................... 1
1.2 Panels and Ports ........................................................................................................................... 1
1.2.1 Front Panel ............................................................................................................................ 2
1.2.2 Rear Panel ............................................................................................................................. 3
1.3 Connecting Cables ........................................................................................................................ 4
2 Local Applications ................................................................................................................................ 5
2.1 Function Architecture ................................................................................................................... 5
2.2 System Configuration ................................................................................................................... 6
2.2.1 Basic Settings ....................................................................................................................... 6
2.2.2 Network Settings................................................................................................................... 6
2.3 Operation Management ................................................................................................................ 8
2.3.1 Operation Analysis ............................................................................................................... 8
2.3.2 System Management .......................................................................................................... 10
3 Config System ..................................................................................................................................... 12
Appendix 1 Cybersecurity Recommendations ................................................................................... 13