Confirmed users
502
edits
Gdestuynder (talk | contribs) |
Gdestuynder (talk | contribs) No edit summary |
||
Line 170: | Line 170: | ||
* Use IP ACLs to control access to systems. | * Use IP ACLs to control access to systems. | ||
* Trust the office network for access to devices. | * Trust the office network for access to devices. | ||
* Use [https://en.wikipedia.org/wiki/TCP_Wrapper TCP Wrapper] for access control. |