Siemens RUGGEDCOM ROX II User Manual page 55

Hide thumbs Also See for RUGGEDCOM ROX II:
Table of Contents

Advertisement

RUGGEDCOM ROX II
CLI User Guide
mitigates against attacks such as SSL/TLS Protocol Initialization Vector Implementation Information Disclosure
Vulnerability (e.g. BEAST).
• For optimal security, use SNMPv3 whenever possible and apply strong passwords.
• Validate the integrity of the firmware often. This task can be automated by scheduling a job to repeat every day
or week. Firmware integrity can also be checked automatically at start-up.
If an unauthorized/unexpected modification is detected, inspect the syslog for messages related to firmware
integrity to identify which programs and/or files may have been compromised. If remote system logging is
configured, this task can also be automated using scripts to identify key log messages.
For more information about checking the firmware integrity, refer to
Integrity".
Policy
• Periodically audit the device to make sure it complies with these recommendations and/or any internal security
policies.
• Review the user documentation for other Siemens products used in coordination with the device for further
security recommendations.
Section 1.4
Available Services by Port
The following table lists the services available by the device, including the following information:
• Services
The service supported by the device
• Port Number
The port number associated with the service
• Port Open
The port state, whether it is always open and cannot be closed, or open only, but can be configured
• Port Default
The default state of the port (i.e. open or closed)
• Access Authorized
Denotes whether the ports/services are authenticated during access
Services
SSH
SSH (Service Mode)
NETCONF
SFTP
HTTP
NTP
SNMP
Available Services by Port
Port Number
TCP/22
TCP/222
TCP/830
TCP/2222
TCP/80
UDP/123
UDP/161
Section 4.13, "Monitoring Firmware
Port Open
Open (if configured with login)
Open (if configured with login)
Open (if configured with login)
Open (if configured with login)
Open (if configured with login)
Open (if configured)
Open (if configured with login)
Chapter 1
Introduction
Port
Access
Default
Authorized
Open
Yes
Closed
Yes
Open
Yes
Closed
Yes
Open
N/A
Closed
No
Closed
Yes
9

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents