Tektronix K1297-G20 Computer Monitor User Manual


 
Getting Started
K1297-G20 Monitor User Manual
57
Security Requirements
Security Requirements for Stand Alone Systems. The pre-configuration of the
device has been chosen for a stand-alone system without enhanced security
requirements for ease of operation. Particular security measures are not
necessary.
Security Requirements for Network Operation. If you apply the Protocol Tester
within a network or by way of a modem, then implement further and
enhanced security measures.
We strongly recommend to observe for instance the following general
statements:
H Access via an individual LAN
If you operate your Protocol Testers within an individual LAN
network, then protect this network against access from other PCs.
H Access via a company-wide Intranet
If you operate your Protocol Testers within an Intranet, then implement
an extended user administration and employ up-to-date virus scanners
and firewalls.
H Access via Internet or modem
If you want to access your Protocol Tester via the Internet, implement
the same security measures as in Intranets (see above). You can also
implement additional security measures with the help of virtual private
networks (VPNs).
To implement additional security measures, contact your local system
administrator or the Tektronix service center.
CAUTION. The implementation of extended security measures is your sole
responsibility. It is realized at customers own risk and without liability to
Tektronix.
You should implement these measures especially while applying the
Remote Desktop software or when transferring files via a network.