{"id":169780,"date":"2024-03-11T12:16:02","date_gmt":"2024-03-11T17:16:02","guid":{"rendered":"https:\/\/www.een.com\/?post_type=app_note&#038;p=169780"},"modified":"2024-09-26T09:04:29","modified_gmt":"2024-09-26T14:04:29","slug":"an062","status":"publish","type":"app_note","link":"https:\/\/www.een.com\/es\/docs\/app-notes\/an062\/","title":{"rendered":"Essential firewall configuration guide for securing Eagle Eye Cloud VMS"},"content":{"rendered":"\n<p>For users that maintain advanced firewall configurations with a specified allow list, new IP additions must be updated in order to maintain surveillance system functionality. This document provides a source to ensure that firewall configurations are always kept up to date.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.een.com\/wp-content\/uploads\/2024\/09\/EE-AN062-Essential-Firewall-Configuration-Guide-for-Securing-Eagle-Eye-Cloud-VMS.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of EE-AN062-Essential-Firewall-Configuration-Guide-for-Securing-Eagle-Eye-Cloud-VMS.\"><\/object><a id=\"wp-block-file--media-bf389905-1559-42ae-8d28-bed96f8c80a3\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2024\/09\/EE-AN062-Essential-Firewall-Configuration-Guide-for-Securing-Eagle-Eye-Cloud-VMS.pdf\">EE-AN062-Essential-Firewall-Configuration-Guide-for-Securing-Eagle-Eye-Cloud-VMS<\/a><a href=\"https:\/\/www.een.com\/wp-content\/uploads\/2024\/09\/EE-AN062-Essential-Firewall-Configuration-Guide-for-Securing-Eagle-Eye-Cloud-VMS.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bf389905-1559-42ae-8d28-bed96f8c80a3\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>For users that maintain advanced firewall configurations with a specified allow list, new IP additions must be updated in order to maintain surveillance system functionality. This document provides a source &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/es\/docs\/app-notes\/an062\/\"> <span class=\"screen-reader-text\">Essential firewall configuration guide for securing Eagle Eye Cloud VMS<\/span> Leer m\u00e1s &raquo;<\/a><\/p>\n","protected":false},"featured_media":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"101754,161204,72196,144384,15425,161197","_relevanssi_noindex_reason":""},"categories":[1731],"tags":[1752,1736],"class_list":["post-169780","app_note","type-app_note","status-publish","hentry","category-installation-and-configuration","tag-administration","tag-installation"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/app_note\/169780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/app_note"}],"about":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/types\/app_note"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/media?parent=169780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/categories?post=169780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/tags?post=169780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}