Security - IBA ibaClock Manual

Time synchronization module for ibapda systems
Table of Contents

Advertisement

14

Security

Continuously advanced attack techniques in the field of IT as well as ever-new security
gaps in proprietary as well as open-source software or hardware make unauthorized
network accesses easier. It is therefore recommended to connect network-capable iba
devices to untrusted networks only with sufficient protection, such as a firewall.
Figure 16: Example of a network configuration with remote access
50
Manual
Issue 1.4
ibaClock

Advertisement

Table of Contents
loading

Table of Contents