User guide

4
Firewall .................................................................................................................................................................... 22
IP Blocking ........................................................................................................................................................... 22
Invalid Login Attack Blocking .............................................................................................................................. 22
Event Logging .......................................................................................................................................................... 22
Recommended Practices ............................................................................................................................................. 23
Acronyms ..................................................................................................................................................................... 23
Further information ..................................................................................................................................................... 23
Appendix A: Supported SSL Cipher Suites ................................................................................................................... 24
Appendix B: Secure Shell Encryption ........................................................................................................................... 25