Acre intrusion panels may register certain network ports as listening at the transport layer. However, all security‑relevant validation, authentication, and authorization is enforced exclusively at the application layer.
As a result, while a port may appear open during network scanning, no functional access, command execution, or data processing is possible unless all application‑level security checks are successfully completed. Unauthorized or malformed requests are rejected before any security‑relevant operation occurs.
This behavior is by design and aligns with the security principles of EN 50131 and EN 50710, ensuring secure remote access and preventing unauthorized interaction with the alarm system.