Video Tutorial:Click here for the video tutorial of this topic.
Step 1: Set up a strong password
Step 2: Enable HTTP/HTTPS access only where required
Step 3: Create Source Specific Access Rules
Step 4: Implement User Authentication
Step 5: Create and monitor user account based on requirement
Step 6: Log Automation
Step 7: Use of Reporting Software
Step 8: Storage of backup settings
Step 1: Set up a strong password:
Step 2: Enable HTTP/HTTPS access only where required:
Step 3: Create Source Specific Access Rules:
NOTE: The home IP address should be a static WAN IP.
Step 4: Implement User Authentication:
Step 5: Create and monitor User Account based on requirement:
Step 6: Log Automation:
Step 7: Use of Reporting Software:
Step 8: Storage of Backup Settings: