Configuration and operation
4.2 Security recommendations
CP 1242-7 GPRS V2
Operating Instructions, 10/2016, C79000-G8976-C311-02
39
● Only use passwords with a high password strength. Avoid weak passwords for example
"password1", "123456789" or similar.
● Make sure that all passwords are protected and inaccessible to unauthorized personnel.
See also the preceding section for information on this.
● Do not use one password for different users and systems.
Protocols
Secure and non-secure protocols
● Only activate protocols that you require to use the system.
● Use secure protocols when access to the device is not prevented by physical protection
measures.
The NTP protocol provides a secure alternative with NTP (secure).
Table: Meaning of the column titles and entries
The following table provides you with an overview of the open ports on this device.
●
Protocols that the device supports.
●
Port number assigned to the protocol.
●
– Open
The port is open at the start of the configuration.
– Closed
The port is closed at the start of the configuration.
●
– Open
The port is always open and cannot be closed.
– Open according to configuration
The port is open if it has been configured.
– Open (login, when configured)
As default the port is open. After configuring the port, the communications partner
needs to log in.
●
Specifies whether or not the protocol authenticates the communications partner during
access.