EasyManua.ls Logo

W&T Com-Server++ - Com-Server Network Security

W&T Com-Server++
228 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
215
W&T Appendix
Subject to error and alteration
The Com-Server and network security
Network security has rightly taken on added significance in
recent times. All the experts are in agreement that there can
be no such thing as absolute security given today’s level of
technology. Every customer must decide for himself what the
appropriate balance is between security, functionality and
cost for his specific circumstances.
In order to provide the customer with the greatest possible
flexibility which is oriented towards changing security re-
quirements from a pure testing and installation environment
to critical production applications, the safety measures have
been made highly customer-configurable. The present docu-
ment provides an overview of the safety measures which have
been implemented and can be used on the Com-Servers. It is
presumed here that the original W&T firmware (without any
customer modifications) is being used. Additional details can
be found in the respective sections of this manual.
The authorization concept of the Com-Server
Control and configuration access to the Com-Servers is pro-
tected by the system password. The factory default setting
is for no system password, so that anyone logging in has
full access to the corresponding settings and functions. To
prevent unauthorized access, it is therefore recommended
that a system password be used. Additional measures in this
regard, such as the composition and regular changing of this
password, should be taken by the customer in an organizatio-
nal way.
The system password is transmitted to the Com-Server wit-
hout encoding. It must therefore be ensured if necessary that
password-protected access can be gained only over an Intra-
net which the customer deems to be safe. For access over the
public Internet, additional measures such as the addition of a
VPN tunnel (Virtual Private Network) should be taken. This is

Table of Contents

Related product manuals