Installation should include following the
manufacturer's instructions
business and security requirements to securely enable applications across a network.