
Security hardening guide
The security hardening guide provides information about the following areas:
•
Assuring compliance with the cybersecurity criteria that govern the target environment
•
Designing safe and secure deployment architecture
•
Providing a reference for settings that you configure during deployment
To ensure the safe and secure deployment of the KT-1 controller, complete the following steps:
1.
Ensure that you understand and plan your controller architecture. For more information, see
.
2.
After you complete your architectural plan, install the controller and make application-
specific configuration changes. For more information, see
Architecture
The KT-1 architecture includes the following components:
•
The KT-1 controller that you can configure in one of three modes:
- Stand-alone mode: use as a stand-alone access device with an Ethernet connection for
direct configuration.
- EntraPass mode: connect to a base server with the Entrapass application through an
Ethernet or RS-485 connection.
- Cloud mode: connect to the cloud service using an Ethernet connection.
•
The controller commonly has at least one reader connected to it. You can connect multiple
readers and input/output modules to the controller.
See the following guidelines that relate to your chosen controller architecture.
Connecting to EntraPass using RS-485
If you connect the controller to EntraPass using an RS-485 bus, the connection is not encrypted or
authenticated.
•
Ensure that you isolate and secure the connection wires inside the walls of the installation in
a safe area.
•
Ensure that you cannot access wires from an exterior wall.
Connecting to EntraPass using Ethernet
•
To connect the controller to EntraPass in TCP mode, even if the link is encrypted and secure,
use a LAN or VLAN.
Note:
The controller does not support the direct use of a VPN. Connect a VPN through a
router.
Connecting to the cloud using the internet
If you connect the controller to the cloud service using the internet, the cloud connection is
protected by certificate-based authentication.
•
If possible, when you connect the controller to the internet, use a firewall.
Connecting a stand-alone controller using Ethernet
•
To connect a stand-alone controller, configure your username and password. Use these
details to access the secure Kantech registration web pages to configure the controller.
Note:
Complete this process during the initial setup.
KT-1 One-Door Controller Installation Guide
31
Содержание Tyco KT-1
Страница 1: ...KT 1 One Door Controller Installation Guide D29008966R009 2021 03 08 DN2186 2103 ...
Страница 2: ......
Страница 8: ......
Страница 24: ...Figure 5 KT 1 PCB inputs and outputs 22 KT 1 One Door Controller Installation Guide ...
Страница 26: ...Figure 6 KT 1 controller with KT PS4085 power supply 24 KT 1 One Door Controller Installation Guide ...
Страница 29: ...Figure 8 KT 1 PCB EU inputs and outputs KT 1 One Door Controller Installation Guide 27 ...
Страница 56: ...KT 1 One Door Controller Installation Guide 54 ...