3 IT security
Observe the following recommendations to operate the product safely.
3.1 General
–
Ensure that only authorized personnel have access to the device.
–
Only use the device within an ESP (electronic security perimeter). Do not con-
nect the device to the Internet in an unprotected state. Use mechanisms for
vertical and horizontal network segmentation and security gateways (fire-
walls) at the transition points.
–
Ensure that the device is only operated by trained personnel who are familiar
with IT security.
–
Check regularly whether software updates are available for the device and
perform the updates.
7820658/06 EN IT security
13