Index
Index
1 | Introduction | 4 | ||
2 | Security Services | 6 | ||
| 2.1 | Assumptions | 6 | |
| 2.2 | System | 6 | |
| 2.2.1 | Firewall | 6 | |
| 2.2.2 | VPN | 7 | |
| 2.2.3 | Removable Media | 8 | |
| 2.2.4 | Firmware Update | 9 | |
| 2.3 | Configuration Management | 9 | |
| 2.3.1 | First Initiation | 10 | |
| 2.3.2 | User Management: | 10 | |
| 2.3.3 | Learning | 10 | |
| 2.4 | Key Management | 11 | |
3 | Security Analysis | 12 | ||
| 3.1 | Network and Protocol Analysis | 12 | |
| 3.1.1 | VPN | 12 | |
| 3.1.2 | Firewall | 13 | |
| 3.1.3 | Firmware Update | 14 | |
| 3.1.4 | Operating System | 14 | |
| 3.1.5 | Web Server | 14 | |
| 3.1.6 | Time Synchronization and Logging | 15 | |
| 3.2 | Configuration | 15 | |
| 3.2.1 | Configuration Files | 16 | |
| 3.2.2 | Bridge | 16 | |
4 | Summary | 17 | ||
5 | References | 18 |
escrypt GmbH | 2 |