
User’s Manual
8
Recommendation measures to enhance platform cyber security:
1.
Enable Account Binding IP/MAC
It is recommended to enable the account binding IP/MAC mechanism, and configure the
IP/MAC of the terminal where the commonly used client is located as an allowlist to further
improve access security.
2.
Change Password Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3.
Turn On Account Lock Mechanism
The account lock function is enabled by default at the factory, and it is recommended to keep it
on to protect the security of your account. After the attacker has failed multiple password
attempts, the corresponding account and source IP will be locked.
4.
Reasonable Allocation of Accounts and Permissions
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
5.
Close Non-essential Services and Restrict the Open Form of Essential Services
If not needed, it is recommended to turn off NetBIOS (port 137, 138, 139), SMB (port 445),
remote desktop (port 3389) and other services under Windows, and Telnet (port 23) and SSH
(port 22) under Linux. At the same time, close the database port to the outside or only open to a
specific IP address, such as MySQL (port 3306), to reduce the risks faced by the platform.
6.
Patch the Operating System/Third Party Components
It is recommended to regularly detect security vulnerabilities in the operating system and
third-party components, and apply official patches in time.
7.
Security Audit
Check online users: It is recommended to check online users irregularly to identify whether
there are illegal users logging in.
View the platform log: By viewing the log, you can get the IP information of the attempt to
log in to the platform and the key operation information of the logged-in user.
8.
The Establishment of a Secure Network Environment
In order to better protect the security of the platform and reduce cyber security risks, it is
recommended that:
Follow the principle of minimization, restrict the ports that the platform maps externally by
firewalls or routers, and only map ports that are necessary for services.
Based on actual network requirements, separate networks: if there is no communication
requirement between the two subnets, it is recommended to use VLAN, gatekeeper, etc. to
divide the network to achieve the effect of network isolation.