14
©
SOLIDA SYSTEMS INTERNATIONAL
2016
-
Disabled
4.4.1 About Tor Exit Nodes
The Tor exit nodes list contain IP addresses of known Tor network end point IP addresses. It is
common by hackers to use Tor exit nodes for their attack traffic to mask its origin. In some rare
cases, the use of the Tor network is valid. Examples would be in countries that censor their citizens
Internet traffic. In those circumstances the Tor network can be used to circumvent such
censorship. Then it is recommended to disable the inclusion of Tor endpoints in the IP blacklist.
4.5 Set Mobile Application Password
The appliance can be monitored with a mobile phone application. This application requires a
password to log into the cloud server that will provide the events and notifications to the
application.
Figure 4.7 Setting the mobile application password