Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Axxon One 소프트웨어 패키지를 기반으로 보안 시스템을 구축하는 데는 다음과 같은 권장 단계가 포함됩니다.

  1. 보안 시스템 설정 선택 (전문가의 도움을 받아 진행)
  2. 제한된 접근 권한을 가진 별도의 로컬 네트워크 구축
  3. 로컬 네트워크 각 구간에 필요한 충분한 대역폭 계산
  4. 선택한 보안 시스템 설정이 구현될 소프트웨어 및 하드웨어 플랫폼 선택 및 설정 (

Building a security system based on the Axxon One software package includes the following recommended stages:

  1. Selecting a configuration for the security system (with the help of professionals)
  2. Building a separate local area network with restricted access
  3. Calculating the sufficient bandwidth required for each segment of the local area network
  4. Selecting and configuring the software and hardware platform on which the selected security system configuration will be implemented (selecting and configuring personal computers to act as servers and clients in accordance with the requirements, as referenced in the section titled Implementation Requirements for the Axxon One Software Package, 운영체제 요구사항)
  5. Selecting and connecting reliable equipment that is optimally suited for a specific security system (with the help of professionals)
  6. 섹션을 참조하여 서버 및 클라이언트로 사용할 개인 컴퓨터를 선택 및 설정)
  7. 특정 보안 시스템에 최적화된 신뢰성 높은 장비 선택 및 연결 (전문가의 도움을 받아 진행)
  8. 요구사항에 따라 Axxon One 소프트웨어 패키지를 사용하는 인력 교육 (인력수 및 자격에 대한 요구 사항 섹션 참조Training personnel to work with the Axxon One software package in accordance with the requirements (see the section titled Requirements for Personnel Quantity and Qualifications).