
41
It is recommended that you change the default port of HTTP and other services to any port
between 1024 and 65535 to reduce the risk of being guessed by threat actors.
Network Configuration
1.
Enable Allow list
It is recommended that you turn on the allow list function, and only allow IP in the allow list to
access the device. Therefore, please be sure to add your computer IP address and supporting
device IP address to the allow list.
2.
MAC address binding
It is recommended that you bind the IP address of the gateway to the MAC address on the device
to reduce the risk of ARP spoofing.
3.
Build a secure network environment
In order to better ensure the security of devices and reduce potential cyber risks, the following
are recommended:
●
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network;
●
According to the actual network needs, partition the network: if there is no communication
demand between the two subnets, it is recommended to use VLAN, gateway and other
methods to partition the network to achieve network isolation;
●
Stablish 802.1x access authentication system to reduce the risk of illegal terminal access to
the private network.
Security Auditing
1.
Check online users
It is recommended to check online users regularly to identify illegal users.
2.
Check device log
By viewing logs, you can learn about the IP addresses that attempt to log in to the device and key
operations of the logged users.
3.
Configure network log
Due to the limited storage capacity of devices, the stored log is limited. If you need to save the
log for a long time, it is recommended to enable the network log function to ensure that the
critical logs are synchronized to the network log server for tracing.
Software Security
1.
Update firmware in time
According to the industry standard operating specifications, the firmware of devices needs to be
updated to the latest version in time in order to ensure that the device has the latest functions
and security. If the device is connected to the public network, it is recommended to enable the
online upgrade automatic detection function, so as to obtain the firmware update information
released by the manufacturer in a timely manner.
2.
Update client software in time
It is recommended to download and use the latest client software.
Physical Protection
It is recommended that you carry out physical protection for devices (especially storage devices),
such as placing the device in a dedicated machine room and cabinet, and having access control and