XIO USER MANUAL | 2106424MNAA | 117
—
8 Configure security (recommended)
To secure access to the XIO, review the security features implemented.
8.1 Access points
Totalflow user interfaces and host products support connection with the XIO through several types of
communication ports, protocols, and services. These are points of entry that could be subject to
inexperienced, unauthorized or malicious access through a point-to-point connection or a network
connection. Physical access to the ports must be controlled to protect local and remote access. Enable on-
board security or enforce authentication before establishing a connection with any of the ports.
This section lists the communication ports, services, protocols, and the open Transmission Control Protocol
(TCP) ports that must be considered when securing devices.
8.2 Communication interfaces
The table below lists the default communication ports available in the XIO with standard configuration.
These ports are pre-configured from the factory. When enabled, these ports are ready for use, but are not
secured.
Unprotected ports make the full functionality of the device available to any user. Configure security
passcode or role-based authentication to prevent unauthorized access.
Table 8-1: Default communication ports on the XIO
communication
ports, default names
state
protocol
Security feature available
Totalflow/USB
(Read-only)
Bi-Level Security code authentication or Role-base
Authentication (Role-base Authentication, RBAC)
Totalflow/TCP
(Read-only)
Bi-Level Security code authentication or Role-base
Authentication (Role-base Authentication, RBAC)
TF – Remote
(Configurable)
Bi-Level Security code authentication or Role-base
Authentication (Role-base Authentication, RBAC)
The Totalflow protocol is an unsecured protocol. As such, the intended application
should be assessed to ensure that these protocols are suitable before implementation.
The Ethernet ports on the XIO might connect to a network and peripheral
. If the peripheral devices send real-time measurement data to the XIO, configure
connections correctly to prevent loss of this data due to network issues. See
section 10 Ethernet
.
The Table below lists the wireless interfaces available in XIO devices with standard configuration.