EasyManua.ls Logo

Campbell CR1000X - Datalogger Security (Continued)

Campbell CR1000X
238 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
l Networks that are accessible to many individuals
Some options to secure your datalogger from mistakes or tampering include:
l Sending the latest operating system to the datalogger. See Updating the operating system
(p. 109) for more information.
l Disabling unused services and securing those that are used. This includes disabling HTTP,
HTTPS, FTP, Telnet, and Ping network services (Device Configuration Utility > Deployment
> Network Services tab). These services can be used to discover your datalogger on an IP
network.
NOTE:
FTP, Telnet, and Ping services are disabled by default.
l Setting security codes (see following information under "Security Codes").
l Setting a PakBus/TCP password. The PakBus TCP password controls access to PakBus
communication over a TCP/IP link. PakBusTCP passwords can be set in Device
Configuration Utility.
l Disabling FTP or setting an FTP username and password in Device Configuration Utility.
l Setting a PakBus encryption (AES-128) key in Device Configuration Utility. This forces
PakBus data to be encrypted during transmission.
l Disabling HTTP/HTTPS or creating a .csipasswd file to secure HTTP/HTTPS (see
Creating a .csipasswd file (p. 103) for more information).
l Enabling HTTPS and disabling HTTP. To prevent data collection via the web interface, both
HTTP and HTTPS must be disabled.
l Tracking Operating System, Run, and Program signatures.
l Encrypting program files if they contain sensitive information (see CRBasic help
FileEncrypt() instruction or use the CRBasic Editor File menu, Save and Encrypt
option).
l Hiding program files for extra protection (see CRBasic help FileManage() instruction).
l Monitoring your datalogger for changes by tracking program and operating system
signatures, as well as CPU, USR, and CRD file contents.
l Securing the physical datalogger and power supply under lock and key.
WARNING:
All security features can be subverted through physical access to the datalogger. If absolute
security is a requirement, the physical datalogger must be kept in a secure location.
8. Maintaining your datalogger 101

Table of Contents

Related product manuals