OW5000 System Security Guidelines - NEC Corporation of America
OW5000 System Security Guidelines - NEC Corporation of America
OW5000 System Security Guidelines - NEC Corporation of America
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
2-2 Securing the NetworkFigure 2-1 Firewall ProtectionPotential intruders scan computers from the Internet or within the LocalArea Network (LAN), probing for an open port where they can breakthrough and access a server.To increase security, configure the firewall to allow specific types <strong>of</strong>traffic into and out <strong>of</strong> the internal network.UCE Application Platform (UNIVERGE <strong>OW5000</strong>) <strong>System</strong> <strong>Security</strong> <strong>Guidelines</strong> - Revision 7