Security requirements – Tektronix K1297-G20 User Manual

Page 69

Advertising
background image

Getting Started

K1297-G20 Monitor User Manual

57

Security Requirements

Security Requirements for Stand Alone Systems.

The pre-configuration of the

device has been chosen for a stand-alone system without enhanced security
requirements for ease of operation. Particular security measures are not
necessary.

Security Requirements for Network Operation.

If you apply the Protocol Tester

within a network or by way of a modem, then implement further and
enhanced security measures.

We strongly recommend to observe for instance the following general
statements:

H Access via an individual LAN

If you operate your Protocol Testers within an individual LAN
network, then protect this network against access from other PCs.

H Access via a company-wide Intranet

If you operate your Protocol Testers within an Intranet, then implement
an extended user administration and employ up-to-date virus scanners
and firewalls.

H Access via Internet or modem

If you want to access your Protocol Tester via the Internet, implement
the same security measures as in Intranets (see above). You can also
implement additional security measures with the help of virtual private
networks (VPNs).

To implement additional security measures, contact your local system
administrator or the Tektronix service center.

CAUTION. The implementation of extended security measures is your sole
responsibility. It is realized at customer’s own risk and without liability to
Tektronix.

You should implement these measures especially while applying the
Remote Desktop software or when transferring files via a network.

Advertising