Sign In
Upload
Manuals
Brands
Belden Manuals
Switch
HIRSCHMANN HiOS-2A
Belden HIRSCHMANN HiOS-2A Manuals
Manuals and User Guides for Belden HIRSCHMANN HiOS-2A. We have
1
Belden HIRSCHMANN HiOS-2A manual available for free PDF download: User Manual
Belden HIRSCHMANN HiOS-2A User Manual (66 pages)
Security BOBCAT Rail Switch
Brand:
Belden
| Category:
Switch
| Size: 1 MB
Table of Contents
Table of Contents
3
Document History
7
Safety Instructions
9
About this Manual
11
Key
12
Security Planning
13
Introduction
13
Subject
13
Audience
13
Scope
13
Capability Security Level
14
Document Outline
14
Defense in Depth
15
Purpose
15
Defense in Depth Vs. Hardening
15
Responsibilities
15
Example
15
Impact of the System Lifecycle to the Device Lifecycle
17
VLAN Plan
17
Impact of Device Requirements on System Planning
18
Secure Installation Location
18
Plan a Dedicated User Account Login Policy
19
Plan a Dedicated User Account Password Policy
19
Plan a Dedicated User Account Name and Access Role Policy for Device Management
20
Plan a Dedicated Logging Policy
20
VLAN Plan Considerations Depending on Redundancy Protocols
21
Network Time Synchronization Considerations
21
Device Security
23
Security Vs. Functionality
23
Prerequisites for Installation and Setup
24
Recommended Installation Work Step Sequence
25
Reasons for the Recommended Installation Work Step Sequence
25
Recommended Preparation for Installation
25
Choice of a Secure Installation Location
26
Device Availability Requirements
26
Software Update
27
Security Configuration
28
Assign a Static IP Address for the Device Management
29
Disable Hidiscovery Access
29
Configure a VLAN Dedicated to Management Access
29
Disable Logical Access to the Signal Contact
30
Disable Logical Access to the Digital Input
30
Disable Logical Access to Unused Ports and SFP Slots
30
Configure Power over Ethernet
30
Disable Booting from an External Memory
31
Disable Automatic Device Software Update from an External Memory
31
Disable Writing a Configuration Profile to an External Memory
31
Disable Loading a Configuration Profile from an External Memory
31
Disable Loading a Configuration Profile that Lacks a Valid Fingerprint
32
Disable Insecure Management Protocols
32
Configure Management IP Access Restrictions
32
Configure a Dedicated HTTPS Certificate
33
Configure a Dedicated SSH Host Key Pair
33
Configure a Dedicated User Account Login Policy
33
Configure a Dedicated User Account Password Policy
34
Configure Dedicated User Account Names and Access Roles for Device Management
34
Adapt Session Timeouts
35
Configure Time Synchronization
35
Configure Logging
36
Configure Dedicated Login Banners
36
Configure Advanced Device Security
36
Configure Advanced User Authentication
36
Create a Backup of Device-Specific Data
37
Possible Hardware Modifications for Security
38
Restrict Physical Access to the USB Port
38
Restrict Physical Access to Network Ports or SFP Slots
38
Restrict Physical (Visual) Access to the Device and Port Leds
38
Restrict Physical Access to the Signal Contact
38
Restrict Physical Access to the Digital Input
38
Device Installation
39
Data Connections
39
Signal Contact Considerations
39
Digital Input Considerations
39
Operation
40
Environmental Conditions
40
Connectivity
40
Maintenance
41
Software Update
41
Hardware Enhancement
41
Hardware Replacement
41
Hardware Repair
41
Decommissioning
42
Destruction of Confidential Data and Secrets
42
Secure Physical Destruction of Device and Components
42
Network Security Support
43
Introduction
43
Prerequisites for Setting up Network Security
44
Employ Defense in Depth for Your Network Infrastructure
45
Hardening the Network Infrastructure
46
Measures to Secure the Network Infrastructure
47
Restrict Logical Access to Your Network
48
Configure a Dedicated Management VLAN
48
Configure VLAN Segregation
48
Disable GVRP and MVRP
48
Configure Port Security
48
Configure Acls
48
Secure the Network Protocols Used
49
Disable GMRP and MMRP
49
Secure the Redundancy Protocols Used
50
Secure RSTP Guards and Helper Protocols
50
Secure MRP
50
Secure HIPER Ring
50
Secure Ring/Network Coupling
50
Configure Attack Protection Functions
51
Configure Denial of Service (Dos) Protection
51
Configure Rate Limiters
51
Configure Network Time Synchronization
52
Configure Logging
53
Configure an Audit Trail
53
A Index
55
B Further Support
63
C Readers' Comments
64
Advertisement
Advertisement
Related Products
Belden Hirschmann HiOS-2S
Belden HIRSCHMANN HiOS-2E EES
Belden Hirschmann SPIDER Standard Line Series
Belden HIRSCHMANN SPIDER II PoE
Belden HIRSCHMANN Dragon PTN
Belden HIRSCHMANN BOBCAT eXtreme Performance
Belden HIRSCHMANN BXP
Belden HirschmannRS20-0900 Series
Belden Hirschmann Rail Switch Power Lite
Belden Hirschmann SPIDER SL Series
Belden Categories
Switch
Monitor
Control Unit
Control Panel
Cables and connectors
More Belden Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL