2.2 Network Security

Please refer the vendor specific documentation for making the environment more safe and secured.