Section 5. System Overview
• PakBus over TCP/IP
• Ping
• POP3
• SMTP
• SNMP
• Telnet
• Web API
• XML
5.3.11 Security — Overview
Related Topics:
• Security — Overview (p. 92)
• Security — Details
(p. 467)
The CR1000 is supplied void of active security measures. By default, RS-232,
Telnet, FTP and HTTP services, all of which give high level access to CR1000
data and CRBasic programs, are enabled without password protection.
You may wish to secure your CR1000 from mistakes or tampering. The
following may be reasons to concern yourself with datalogger security:
• Collection of sensitive data
• Operation of critical systems
• Networks accessible by many individuals
If you are concerned about security, especially TCP/IP threats, you should send
the latest operating system
(p. 86) to the CR1000, disable un-used services, and
secure those that are used. Security actions to take may include the following:
• Set passcode lockouts
• Set PakBus/TCP password
• Set FTP username and password
• Set AES-128 PakBus encryption key
• Set .csipasswd file for securing HTTP and web API
• Track signatures
• Encrypt program files if they contain sensitive information
• Hide program files for extra protection
• Secure the physical CR1000 and power supply under lock and key
Note All security features can be subverted through physical access to the
CR1000. If absolute security is a requirement, the physical CR1000 must be kept
in a secure location.
Related Topics
• Auto Calibration — Overview (p. 92)
• Auto Calibration — Details (p. 344)
• Auto-Calibration — Errors (p. 490)
• Offset Voltage Compensation (p. 323)
• Factory Calibration (p. 94)
• Factory Calibration or Repair Procedure (p. 476)
The CR1000 auto-calibrates to compensate for changes caused by changing
92