Environmental Monitoring
Security
Security Features
Planning and | As a network device that passes information across the network, the |
implementing | Environmental Monitoring Unit is subject to the same exposure as |
security features | other devices on the network. |
| Use the information in this section to plan and implement the security |
| features appropriate for your environment. |
Port assignments | If a Telnet, FTP, or Web server uses a |
| specify the port when using the client interface, such as a Web |
| browser. The |
| “password,” hiding the server to provide an additional level of security. |
| The TCP ports for which the Telnet, FTP, and Web servers listen are |
| initially set at the standard “well known ports” for the protocols.To hide |
| the interfaces, use any port numbers from 5000 to 65535. |
| For an example of how to access a client interface for which the port is |
| |
User names, | All user names, passwords, and community names for SNMP are |
passwords, | transferred over the network as plain text. A user who is capable of |
community names | monitoring the network traffic can determine the user names and |
| passwords required to log into the Environmental Monitoring Unit’s |
| Control Console or Web interface as an Administrator or Device |
| Manager. This security limitation of the protocols affects any device |
| using Telnet, a Web server, or an SNMP version 1 agent. |
Environmental Monitoring Unit: User’s Guide | 25 |