
63
IT security advices
IT security is an important aspect of deployment of any device connected
into wired or wireless networks. It is not important from application and
measurement device standpoint only, but overall integrity of network
infrastructure itself. Any not adequately secured network device or IoT device
may to compromise security of network. Following chapter contains list of the
recommendation how to securely use WiFi sensors.
WiFi sensor security.
WiFi sensors have integrated advanced security
features. There are three types of user accounts with predefined rules for
each user type. These rules are described at chapter
. WiFi sensors
are shipped without enabled security. It is strongly recommended to enable
device security when device is used at the final deployment. It should be
used as strongest password as possible. It should be at least 10 character
long together including numbers and multiple special characters. Never use
same password for different devices or accounts.
WiFi sensors can be switched from WiFi client mode into AP mode using
physical buttons at device. After switching into AP mode WiFi sensor acts as
an access point with capability connection up to four clients. By default, this
AP mode is not protected, that means open WiFi network. It is strongly
recommended to enable WPA2 security with strong password as possible for
AP mode.
Device does not use UPnP feature by any kind. List of ingress ports at device
you find at
Infrastructure security.
At final deployment are WiFi sensors connected to
infrastructure access point or router with WiFi capability. It is recommended
to connect WiFi sensors into separate WiFi network with own SSID. This WiFi
network should have own separate VLAN tag as well. It is recommend using
strong password together with WPA2 PMF or WPA3 security. Do not use
WEP security.
Access from another location.
In case of access from another location
(outside local network) to WiFi sensor is required, it is recommended to use
VPN. Do not expose device directly into internet by direct port forwarding at
the gateway or NAT. This approach can prevent potential direct attack to the
device.
Firmware update.
It is recommended to use latest firmware inside device.
Firmware file should be obtained from official sources like a manufacturer
webpages or direct contact with technical support only. Never use firmware
from unofficial sources. Such firmware may to affect proper function of device
or compromise security.
Decommission.
In case of device decommission, sold or moving to another
side, be aware that device may to contain confidential information.
is a recommended approach to avoid such leak.
Device security support.
Technical support may to be contacted in can any
concerns or questions related to device security.