Jump to content

Security Features: Difference between revisions

From Teltonika Networks Wiki
Created page with "==Security features== In the table below you can find all the security features supported by Teltonika's devices. <table class="wikitable"> <tr> <th width="200">..."
 
No edit summary
 
(6 intermediate revisions by 2 users not shown)
Line 3: Line 3:
In the table below you can find all the security features supported by Teltonika's devices.
In the table below you can find all the security features supported by Teltonika's devices.


<table class="wikitable">
{| class="wikitable"
    <tr>
|+
        <th width="200">Security measurement type</th>
|-
      <th width="200">Security measurement name</th>
! Category !! Feature !! Default !! Purpose/Description
      <th width="200">By default</th>
|-
<th width="500">Details</th>
| rowspan="5" | '''DDoS Protection''' || SYN Flood Protection || On || Blocks excessive SYN requests to prevent resource exhaustion.
    </tr>
|-
    <tr>
| Ping Flood Protection || Off || Mitigates ICMP (Ping) flood attacks.
      <td rowspan="5">DDOS Prevention</td>
|-
      <td>SYN Flood Protection</td>
| SSH Attack Prevention || Off || Blocks excessive SSH requests.
      <td>On</td>
|-
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td>
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests.
    </tr>
|-
    <tr>
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests.
      <td>Remote ICMP Requests</td>
|-
      <td>On</td>
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands.
      <td>An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).</td>
|-
    </tr>
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access.
    <tr>
|-
      <td>SSH Attack Prevention</td>
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts.
      <td>Off</td>
|-
      <td>A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests.</td>
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set.
    </tr>
|-
    <tr>
| SYN-RST Attack || Off || Prevents abrupt TCP session resets.
      <td>HTTP Attack Prevention</td>
|-
      <td>Off</td>
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set.
      <td>A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests.</td>
|-
    </tr>
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls.
    <tr>
|-
      <td>HTTPS Attack Prevention</td>
| NULL Flags Attack || Off || Blocks TCP packets with no flags set.
      <td>Off</td>
|-
      <td>Hypertext Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
| rowspan="4" | '''Access Control Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords.
    </tr>
|-
    <tr>
| HTTP Access || Off || Disabled by default; use only with strong passwords.
      <td rowspan="6">Port Scan Prevention</td>
|-
      <td>Port Scan</td>
| HTTPS Access || Off || Disabled by default; use only with strong passwords.
      <td>Off</td>
|-
<td>A port scan is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port.</td>
| CLI Access || Off || Disabled by default; use only with strong passwords.
    </tr>
|-
    <tr>
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN.
      <td>SYN-FIN attack</td>
|-
      <td>Off</td>
| HTTP Access || On || Allows local WebUI configuration over LAN.
<td>An attacker may send TCP/IP packets with the SYN and FIN TCP/IP flags set to a target system, ranging across all ports, to find open TCP/IP ports for further attacks. The target system will drop packets which are destined to open ports and send back RST/ACK packets for closed ports. The attacker may gather information from the system responses.</td>
|-
    </tr>
| HTTPS Access || On || Allows local WebUI configuration over LAN.
    <tr>
|-
      <td>SYN-RST attack</td>
| CLI Access || On || Allows local command-line configuration over LAN.
      <td>Off</td>
|-
<td>SYN-RST attack, also known as TCP reset attack, is an abrupt closure of the session which causes the resources allocated to the connection to be immediately released and all other information about the connection is erased. TCP reset is identified by the RESET flag in the TCP header.</td>
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default).
    </tr>
|-
    <tr>
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default).
      <td>X-Mas attack</td>
|-
      <td>Off</td>
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password.
<td>Christmas Tree (X-Mas) Attack is designed to send a very specifically crafted TCP packet to a device on the network. This crafting of the packet is one that turns on a bunch of flags. There is some space set up in the TCP header, called flags. And these flags all are turned on or turned off, depending on what the packet is doing.</td>
|-
    </tr>
| Default Admin Password || On || Default password is present on the device label.
    <tr>
|-
      <td>FIN scan</td>
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced.
      <td>Off</td>
|-
<td>FIN packets can bypass firewalls without modification. Closed ports reply to a FIN packet with the appropriate RST packet, whereas open ports ignore the packet on hand. This is typical behavior due to the nature of TCP.</td>
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding.
    </tr>
|-
    <tr>
| UART Interface || Admin password || Requires password to prevent unauthorized physical access.
      <td>NULLflags attack</td>
|}
      <td>Off</td>
 
<td>A Null Scan is a series of TCP packets that contain a sequence number of 0 and no set flags. In a production environment, there will never be a TCP packet that doesn’t contain a flag. Because the Null Scan does not contain any set flags, it can sometimes penetrate firewalls and routers that filter incoming packets with particular flags.</td>
==RUTxxx series security features==
    </tr>
 
    <tr>
In the table below you can find all the security features supported by Teltonika's '''RUTxxx''' series devices.
      <td rowspan="8">Access Control</td>
 
      <td>Remote SSH access</td>
{| class="wikitable"
      <td>Off</td>
|+
<td>All Remote access is disabled by default. If user is using remote access feature it may be a security threat. If user decides to use this feature - it is recommended to use a strong password.</td>
|-
    </tr>
! Category !! Feature !! Default !! Purpose/Description
    <tr>
|-
      <td>Remote HTTP access</td>
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion.
      <td>Off</td>
|-
<td>All Remote access is disabled by default. If user is using remote access feature it may be a security threat. If user decides to use this feature - it is recommended to use a strong password.</td>
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks.
    </tr>
|-
    <tr>
| SSH Attack Prevention || Off || Blocks excessive SSH requests.
      <td>Remote HTTPS access</td>
|-
      <td>Off</td>
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests.
<td>All Remote access is disabled by default. If user is using remote access feature it may be a security threat. If user decides to use this feature - it is recommended to use a strong password.</td>
|-
    </tr>
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests.
    <tr>
|-
      <td>Remote CLI access</td>
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands.
      <td>Off</td>
|-
<td>All Remote access is disabled by default. If user is using remote access feature it may be a security threat. If user decides to use this feature - it is recommended to use a strong password.</td>
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access.
    </tr>
|-
    <tr>
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts.
      <td>Local SSH access</td>
|-
      <td>On</td>
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set.
<td>Enabled by default for user convenience, allows possibility of configuring the device when user is in the same LAN.</td>
|-
    </tr>
| SYN-RST Attack || Off || Prevents abrupt TCP session resets.
    <tr>
|-
      <td>Local HTTP access</td>
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set.
      <td>On</td>
|-
<td>Enabled by default for user convenience, allows possibility of configuring the device when user is in the same LAN.</td>
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls.
    </tr>
|-
    <tr>
| NULL Flags Attack || Off || Blocks TCP packets with no flags set.
      <td>Local HTTPS access</td>
|-
      <td>Off</td>
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords.
<td>By default turned off - where is no scenario where HTTPS usage would be needed "out side the box".</td>
|-
    </tr>
| HTTP Access || Off || Disabled by default; use only with strong passwords.
    <tr>
|-
      <td>Local CLI access</td>
| HTTPS Access || Off || Disabled by default; use only with strong passwords.
      <td>On</td>
|-
<td>Enabled by default for user convenience, allows possibility of configuring the device when user is in the same LAN.</td>
| CLI Access || Off || Disabled by default; use only with strong passwords.
    </tr>
|-
    <tr>
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN.
      <td rowspan="2">Block Unwanted Access</td>
|-
      <td>SSH Access Secure</td>
| HTTP Access || On || Allows local WebUI configuration over LAN.
      <td>On</td>
|-
<td>By default, device allows a maximum of 5 login attempts (user defined). If all attempts are used, device will block SSH access from that source.</td>
| HTTPS Access || On || Allows local WebUI configuration over LAN.
    </tr>
|-
    <tr>
| CLI Access || On || Allows local command-line configuration over LAN.
      <td>WebUI Access Secure</td>
|-
      <td>On</td>
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default).
<td>By default, device allows a maximum of 5 login attempts (user defined). If all attempts are used, device will block WebUI access from that source.</td>
|-
    </tr>
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default).
    <tr>
|-
      <td>Configuration via SMS</td>
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password.
      <td>SMS Utilities</td>
|-
      <td> By router admin password</td>
| Default Admin Password || On || Default password is present on the device label.
<td>Default authorization method for configuration via SMS command is by router admin password. It's very important to have a strong password for admin account.</td>
|-
    </tr>
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced.
    <tr>
|-
      <td>Default admin password</td>
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding.
      <td>First login</td>
|-
      <td>On</td>
| UART Interface || Admin password || Requires password to prevent unauthorized physical access.
<td>Default password for Teltonika's devices is admin01 (weak password) but on first login to WebUI - RutOS forcefully requires user to change it. It is recommended to use a strong password</td>
|}
    </tr>
 
      <td>Certificates</td>
==RUTXxxx series security features==
      <td>Root CA</td>
 
      <td>Pre-uplouded</td>
In the table below you can find all the security features supported by Teltonika's '''RUTXxxx''' series devices.
<td>Root CA certificate are only needed if you want to use HTTPS for your services. There is a default file already preloaded in this device which will be overwritten by any uploaded file.</td>
 
    </tr>
{| class="wikitable"
      <td>Universal Plug and Play</td>
|+
      <td>UPnP</td>
|-
      <td>Not installed / Off</td>
! Category !! Feature !! Default !! Purpose/Description
<td>UPnP doesn't require any sort of authentication from the user. Any application running on your computer in LAN can ask the router to forward a port over UPnP, which is why the malware can abuse UPnP. Recommendation - If you don’t use it when leave it not installed or turned off.</td>
|-
    </tr>
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion.
      <td>Universal Asynchronous Receiver – Transmitter</td>
|-
      <td>UART</td>
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks.
      <td> By router admin password</td>
|-
<td>Many manufacturers are implementing UART interfaces on their devices. If this interface is not password protected, security of the device may be compromised. If malicious 3rd party gains physical access to the device it will have full control of the router via UART interface, this is a reason why our devices have password protected UART interfaces.</td>
| SSH Attack Prevention || Off || Blocks excessive SSH requests.
    </tr>
|-
</table>
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests.
|-
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests.
|-
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands.
|-
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access.
|-
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts.
|-
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set.
|-
| SYN-RST Attack || Off || Prevents abrupt TCP session resets.
|-
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set.
|-
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls.
|-
| NULL Flags Attack || Off || Blocks TCP packets with no flags set.
|-
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords and appropriate firewall rules.
|-
| HTTP Access || Off || Disabled by default; unencrypted traffic, avoid usage.
|-
| HTTPS Access || Off || Disabled by default; use only with strong passwords and appropriate firewall rules.
|-
| CLI Access || Off || Disabled by default; use only with strong passwords and appropriate firewall rules.
|-
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN.
|-
| HTTP Access || On || Allows local WebUI configuration over LAN. Unencrypted traffic, avoid usage.
|-
| HTTPS Access || On || Allows local WebUI configuration over LAN.
|-
| CLI Access || On || Allows local command-line configuration over LAN.
|-
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password.
|-
| Default Admin Password || On || Default password is present on the device label.
|-
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced.
|-
| rowspan="3" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding.
|-
| UART Interface || Admin password || Requires password to prevent unauthorized physical access.
|-
| TPM || On || Enabled by default. Securely stores cryptographic keys and other sensitive data.
|}
 
==RUTMxxx series security features==
 
In the table below you can find all the security features supported by Teltonika's '''RUTMxxx''' series devices.
 
{| class="wikitable"
|+
|-
! Category !! Feature !! Default !! Purpose/Description
|-
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion.
|-
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks.
|-
| SSH Attack Prevention || Off || Blocks excessive SSH requests.
|-
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests.
|-
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests.
|-
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands.
|-
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access.
|-
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts.
|-
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set.
|-
| SYN-RST Attack || Off || Prevents abrupt TCP session resets.
|-
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set.
|-
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls.
|-
| NULL Flags Attack || Off || Blocks TCP packets with no flags set.
|-
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTP Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTPS Access || Off || Disabled by default; use only with strong passwords.
|-
| CLI Access || Off || Disabled by default; use only with strong passwords.
|-
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN.
|-
| HTTP Access || On || Allows local WebUI configuration over LAN.
|-
| HTTPS Access || On || Allows local WebUI configuration over LAN.
|-
| CLI Access || On || Allows local command-line configuration over LAN.
|-
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password.
|-
| Default Admin Password || On || Default password is present on the device label.
|-
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced.
|-
| rowspan="3" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding.
|-
| UART Interface || Admin password || Requires password to prevent unauthorized physical access.
|-
| TPM || On || Enabled by default. Securely stores cryptographic keys and other sensitive data.
|}
 
== RUTCxxx series security features ==
 
{| class="wikitable"
|+
|-
! Category !! Feature !! Default !! Purpose/Description
|-
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion.
|-
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks.
|-
| SSH Attack Prevention || Off || Blocks excessive SSH requests.
|-
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests.
|-
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests.
|-
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands.
|-
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access.
|-
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts.
|-
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set.
|-
| SYN-RST Attack || Off || Prevents abrupt TCP session resets.
|-
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set.
|-
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls.
|-
| NULL Flags Attack || Off || Blocks TCP packets with no flags set.
|-
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTP Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTPS Access || Off || Disabled by default; use only with strong passwords.
|-
| CLI Access || Off || Disabled by default; use only with strong passwords.
|-
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN.
|-
| HTTP Access || On || Allows local WebUI configuration over LAN.
|-
| HTTPS Access || On || Allows local WebUI configuration over LAN.
|-
| CLI Access || On || Allows local command-line configuration over LAN.
|-
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password.
|-
| Default Admin Password || On || Default password is present on the device label.
|-
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced.
|-
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding.
|-
| UART Interface || Admin password || Requires password to prevent unauthorized physical access.
|}
 
==TRBxxx series security features==
 
In the table below you can find all the security features supported by Teltonika's '''TRBxxx''' series devices.
 
{| class="wikitable"
|+
|-
! Category !! Feature !! Default !! Purpose/Description
|-
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion.
|-
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks.
|-
| SSH Attack Prevention || Off || Blocks excessive SSH requests.
|-
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests.
|-
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests.
|-
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands.
|-
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access.
|-
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts.
|-
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set.
|-
| SYN-RST Attack || Off || Prevents abrupt TCP session resets.
|-
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set.
|-
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls.
|-
| NULL Flags Attack || Off || Blocks TCP packets with no flags set.
|-
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTP Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTPS Access || Off || Disabled by default; use only with strong passwords.
|-
| CLI Access || Off || Disabled by default; use only with strong passwords.
|-
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN.
|-
| HTTP Access || On || Allows local WebUI configuration over LAN.
|-
| HTTPS Access || On || Allows local WebUI configuration over LAN.
|-
| CLI Access || On || Allows local command-line configuration over LAN.
|-
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password.
|-
| Default Admin Password || On || Default password is present on the device label.
|-
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced.
|-
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding.
|-
| UART Interface || Admin password || Requires password to prevent unauthorized physical access.
|}
 
== TSWxxx series security features ==
 
In the table below you can find all the security features supported by Teltonika's '''TSWxxx''' series devices.
 
{| class="wikitable"
|+
|-
! Category !! Feature !! Default !! Purpose/Description
|-
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion.
|-
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks.
|-
| SSH Attack Prevention || Off || Blocks excessive SSH requests.
|-
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests.
|-
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests.
|-
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands.
|-
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access.
|-
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts.
|-
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set.
|-
| SYN-RST Attack || Off || Prevents abrupt TCP session resets.
|-
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set.
|-
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls.
|-
| NULL Flags Attack || Off || Blocks TCP packets with no flags set.
|-
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTP Access || Off || Disabled by default; use only with strong passwords.
|-
| HTTPS Access || Off || Disabled by default; use only with strong passwords.
|-
| CLI Access || Off || Disabled by default; use only with strong passwords.
|-
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN.
|-
| HTTP Access || On || Allows local WebUI configuration over LAN.
|-
| HTTPS Access || On || Allows local WebUI configuration over LAN.
|-
| CLI Access || On || Allows local command-line configuration over LAN.
|-
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default).
|-
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password.
|-
| Default Admin Password || On || Default password is present on the device label.
|-
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced.
|-
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding.
|-
| UART Interface || Admin password || Requires password to prevent unauthorized physical access.
|}
 
[[Category:Security]]

Latest revision as of 14:30, 18 August 2025

Main Page > FAQ > Security > Security Features

Security features

In the table below you can find all the security features supported by Teltonika's devices.

Category Feature Default Purpose/Description
DDoS Protection SYN Flood Protection On Blocks excessive SYN requests to prevent resource exhaustion.
Ping Flood Protection Off Mitigates ICMP (Ping) flood attacks.
SSH Attack Prevention Off Blocks excessive SSH requests.
HTTP Attack Prevention Off Blocks excessive HTTP requests.
HTTPS Attack Prevention Off Blocks excessive HTTPS requests.
Custom Configuration Custom Rules Empty Allows adding custom firewall rules via iptables commands.
DMZ Off Allows separating LAN-side network into separate zones with heavily restricted access.
Port Scan & TCP Attack Protection Port Scan Prevention Off Detects and blocks port scanning attempts.
SYN-FIN Attack Off Blocks packets with both SYN and FIN flags set.
SYN-RST Attack Off Prevents abrupt TCP session resets.
X-Mas Attack Off Blocks TCP packets with multiple unusual flags set.
FIN Scan Off Blocks FIN packets used to bypass firewalls.
NULL Flags Attack Off Blocks TCP packets with no flags set.
Access Control – Remote SSH Access Off Disabled by default; use only with strong passwords.
HTTP Access Off Disabled by default; use only with strong passwords.
HTTPS Access Off Disabled by default; use only with strong passwords.
CLI Access Off Disabled by default; use only with strong passwords.
Access Control – Local SSH Access On Allows local configuration over LAN.
HTTP Access On Allows local WebUI configuration over LAN.
HTTPS Access On Allows local WebUI configuration over LAN.
CLI Access On Allows local command-line configuration over LAN.
Login Protection SSH Login Attempts On Blocks IP after 10 failed attempts (default).
WebUI Login Attempts On Blocks IP after 10 failed attempts (default).
Configuration Security SMS Utilities Admin password SMS commands require admin password.
Default Admin Password On Default password is present on the device label.
Certificates Root CA Preloaded Default root certificate included; can be replaced.
Other Protections UPnP Not installed / Off Disabled to prevent unauthorized port forwarding.
UART Interface Admin password Requires password to prevent unauthorized physical access.

RUTxxx series security features

In the table below you can find all the security features supported by Teltonika's RUTxxx series devices.

Category Feature Default Purpose/Description
DDoS Protection SYN Attack Protection On Blocks excessive SYN requests to prevent resource exhaustion.
Ping Attack Protection Off Mitigates ICMP (Ping) flood attacks.
SSH Attack Prevention Off Blocks excessive SSH requests.
HTTP Attack Prevention Off Blocks excessive HTTP requests.
HTTPS Attack Prevention Off Blocks excessive HTTPS requests.
Custom Configuration Custom Rules Empty Allows adding custom firewall rules via iptables commands.
DMZ Off Allows separating LAN-side network into separate zones with heavily restricted access.
Port Scan & TCP Attack Protection Port Scan Prevention Off Detects and blocks port scanning attempts.
SYN-FIN Attack Off Blocks packets with both SYN and FIN flags set.
SYN-RST Attack Off Prevents abrupt TCP session resets.
X-Mas Attack Off Blocks TCP packets with multiple unusual flags set.
FIN Scan Off Blocks FIN packets used to bypass firewalls.
NULL Flags Attack Off Blocks TCP packets with no flags set.
Access Control – Remote SSH Access Off Disabled by default; use only with strong passwords.
HTTP Access Off Disabled by default; use only with strong passwords.
HTTPS Access Off Disabled by default; use only with strong passwords.
CLI Access Off Disabled by default; use only with strong passwords.
Access Control – Local SSH Access On Allows local configuration over LAN.
HTTP Access On Allows local WebUI configuration over LAN.
HTTPS Access On Allows local WebUI configuration over LAN.
CLI Access On Allows local command-line configuration over LAN.
Login Protection SSH Login Attempts On Blocks IP after 10 failed attempts (default).
WebUI Login Attempts On Blocks IP after 10 failed attempts (default).
Configuration Security SMS Utilities Admin password SMS commands require admin password.
Default Admin Password On Default password is present on the device label.
Certificates Root CA Preloaded Default root certificate included; can be replaced.
Other Protections UPnP Not installed / Off Disabled to prevent unauthorized port forwarding.
UART Interface Admin password Requires password to prevent unauthorized physical access.

RUTXxxx series security features

In the table below you can find all the security features supported by Teltonika's RUTXxxx series devices.

Category Feature Default Purpose/Description
DDoS Protection SYN Attack Protection On Blocks excessive SYN requests to prevent resource exhaustion.
Ping Attack Protection Off Mitigates ICMP (Ping) flood attacks.
SSH Attack Prevention Off Blocks excessive SSH requests.
HTTP Attack Prevention Off Blocks excessive HTTP requests.
HTTPS Attack Prevention Off Blocks excessive HTTPS requests.
Custom Configuration Custom Rules Empty Allows adding custom firewall rules via iptables commands.
DMZ Off Allows separating LAN-side network into separate zones with heavily restricted access.
Port Scan & TCP Attack Protection Port Scan Prevention Off Detects and blocks port scanning attempts.
SYN-FIN Attack Off Blocks packets with both SYN and FIN flags set.
SYN-RST Attack Off Prevents abrupt TCP session resets.
X-Mas Attack Off Blocks TCP packets with multiple unusual flags set.
FIN Scan Off Blocks FIN packets used to bypass firewalls.
NULL Flags Attack Off Blocks TCP packets with no flags set.
Access Control – Remote SSH Access Off Disabled by default; use only with strong passwords and appropriate firewall rules.
HTTP Access Off Disabled by default; unencrypted traffic, avoid usage.
HTTPS Access Off Disabled by default; use only with strong passwords and appropriate firewall rules.
CLI Access Off Disabled by default; use only with strong passwords and appropriate firewall rules.
Access Control – Local SSH Access On Allows local configuration over LAN.
HTTP Access On Allows local WebUI configuration over LAN. Unencrypted traffic, avoid usage.
HTTPS Access On Allows local WebUI configuration over LAN.
CLI Access On Allows local command-line configuration over LAN.
Login Protection SSH Login Attempts On Blocks IP after 10 failed attempts (default).
WebUI Login Attempts On Blocks IP after 10 failed attempts (default).
Configuration Security SMS Utilities Admin password SMS commands require admin password.
Default Admin Password On Default password is present on the device label.
Certificates Root CA Preloaded Default root certificate included; can be replaced.
Other Protections UPnP Not installed / Off Disabled to prevent unauthorized port forwarding.
UART Interface Admin password Requires password to prevent unauthorized physical access.
TPM On Enabled by default. Securely stores cryptographic keys and other sensitive data.

RUTMxxx series security features

In the table below you can find all the security features supported by Teltonika's RUTMxxx series devices.

Category Feature Default Purpose/Description
DDoS Protection SYN Attack Protection On Blocks excessive SYN requests to prevent resource exhaustion.
Ping Attack Protection Off Mitigates ICMP (Ping) flood attacks.
SSH Attack Prevention Off Blocks excessive SSH requests.
HTTP Attack Prevention Off Blocks excessive HTTP requests.
HTTPS Attack Prevention Off Blocks excessive HTTPS requests.
Custom Configuration Custom Rules Empty Allows adding custom firewall rules via iptables commands.
DMZ Off Allows separating LAN-side network into separate zones with heavily restricted access.
Port Scan & TCP Attack Protection Port Scan Prevention Off Detects and blocks port scanning attempts.
SYN-FIN Attack Off Blocks packets with both SYN and FIN flags set.
SYN-RST Attack Off Prevents abrupt TCP session resets.
X-Mas Attack Off Blocks TCP packets with multiple unusual flags set.
FIN Scan Off Blocks FIN packets used to bypass firewalls.
NULL Flags Attack Off Blocks TCP packets with no flags set.
Access Control – Remote SSH Access Off Disabled by default; use only with strong passwords.
HTTP Access Off Disabled by default; use only with strong passwords.
HTTPS Access Off Disabled by default; use only with strong passwords.
CLI Access Off Disabled by default; use only with strong passwords.
Access Control – Local SSH Access On Allows local configuration over LAN.
HTTP Access On Allows local WebUI configuration over LAN.
HTTPS Access On Allows local WebUI configuration over LAN.
CLI Access On Allows local command-line configuration over LAN.
Login Protection SSH Login Attempts On Blocks IP after 10 failed attempts (default).
WebUI Login Attempts On Blocks IP after 10 failed attempts (default).
Configuration Security SMS Utilities Admin password SMS commands require admin password.
Default Admin Password On Default password is present on the device label.
Certificates Root CA Preloaded Default root certificate included; can be replaced.
Other Protections UPnP Not installed / Off Disabled to prevent unauthorized port forwarding.
UART Interface Admin password Requires password to prevent unauthorized physical access.
TPM On Enabled by default. Securely stores cryptographic keys and other sensitive data.

RUTCxxx series security features

Category Feature Default Purpose/Description
DDoS Protection SYN Attack Protection On Blocks excessive SYN requests to prevent resource exhaustion.
Ping Attack Protection Off Mitigates ICMP (Ping) flood attacks.
SSH Attack Prevention Off Blocks excessive SSH requests.
HTTP Attack Prevention Off Blocks excessive HTTP requests.
HTTPS Attack Prevention Off Blocks excessive HTTPS requests.
Custom Configuration Custom Rules Empty Allows adding custom firewall rules via iptables commands.
DMZ Off Allows separating LAN-side network into separate zones with heavily restricted access.
Port Scan & TCP Attack Protection Port Scan Prevention Off Detects and blocks port scanning attempts.
SYN-FIN Attack Off Blocks packets with both SYN and FIN flags set.
SYN-RST Attack Off Prevents abrupt TCP session resets.
X-Mas Attack Off Blocks TCP packets with multiple unusual flags set.
FIN Scan Off Blocks FIN packets used to bypass firewalls.
NULL Flags Attack Off Blocks TCP packets with no flags set.
Access Control – Remote SSH Access Off Disabled by default; use only with strong passwords.
HTTP Access Off Disabled by default; use only with strong passwords.
HTTPS Access Off Disabled by default; use only with strong passwords.
CLI Access Off Disabled by default; use only with strong passwords.
Access Control – Local SSH Access On Allows local configuration over LAN.
HTTP Access On Allows local WebUI configuration over LAN.
HTTPS Access On Allows local WebUI configuration over LAN.
CLI Access On Allows local command-line configuration over LAN.
Login Protection SSH Login Attempts On Blocks IP after 10 failed attempts (default).
WebUI Login Attempts On Blocks IP after 10 failed attempts (default).
Configuration Security SMS Utilities Admin password SMS commands require admin password.
Default Admin Password On Default password is present on the device label.
Certificates Root CA Preloaded Default root certificate included; can be replaced.
Other Protections UPnP Not installed / Off Disabled to prevent unauthorized port forwarding.
UART Interface Admin password Requires password to prevent unauthorized physical access.

TRBxxx series security features

In the table below you can find all the security features supported by Teltonika's TRBxxx series devices.

Category Feature Default Purpose/Description
DDoS Protection SYN Attack Protection On Blocks excessive SYN requests to prevent resource exhaustion.
Ping Attack Protection Off Mitigates ICMP (Ping) flood attacks.
SSH Attack Prevention Off Blocks excessive SSH requests.
HTTP Attack Prevention Off Blocks excessive HTTP requests.
HTTPS Attack Prevention Off Blocks excessive HTTPS requests.
Custom Configuration Custom Rules Empty Allows adding custom firewall rules via iptables commands.
DMZ Off Allows separating LAN-side network into separate zones with heavily restricted access.
Port Scan & TCP Attack Protection Port Scan Prevention Off Detects and blocks port scanning attempts.
SYN-FIN Attack Off Blocks packets with both SYN and FIN flags set.
SYN-RST Attack Off Prevents abrupt TCP session resets.
X-Mas Attack Off Blocks TCP packets with multiple unusual flags set.
FIN Scan Off Blocks FIN packets used to bypass firewalls.
NULL Flags Attack Off Blocks TCP packets with no flags set.
Access Control – Remote SSH Access Off Disabled by default; use only with strong passwords.
HTTP Access Off Disabled by default; use only with strong passwords.
HTTPS Access Off Disabled by default; use only with strong passwords.
CLI Access Off Disabled by default; use only with strong passwords.
Access Control – Local SSH Access On Allows local configuration over LAN.
HTTP Access On Allows local WebUI configuration over LAN.
HTTPS Access On Allows local WebUI configuration over LAN.
CLI Access On Allows local command-line configuration over LAN.
Login Protection SSH Login Attempts On Blocks IP after 10 failed attempts (default).
WebUI Login Attempts On Blocks IP after 10 failed attempts (default).
Configuration Security SMS Utilities Admin password SMS commands require admin password.
Default Admin Password On Default password is present on the device label.
Certificates Root CA Preloaded Default root certificate included; can be replaced.
Other Protections UPnP Not installed / Off Disabled to prevent unauthorized port forwarding.
UART Interface Admin password Requires password to prevent unauthorized physical access.

TSWxxx series security features

In the table below you can find all the security features supported by Teltonika's TSWxxx series devices.

Category Feature Default Purpose/Description
DDoS Protection SYN Attack Protection On Blocks excessive SYN requests to prevent resource exhaustion.
Ping Attack Protection Off Mitigates ICMP (Ping) flood attacks.
SSH Attack Prevention Off Blocks excessive SSH requests.
HTTP Attack Prevention Off Blocks excessive HTTP requests.
HTTPS Attack Prevention Off Blocks excessive HTTPS requests.
Custom Configuration Custom Rules Empty Allows adding custom firewall rules via iptables commands.
DMZ Off Allows separating LAN-side network into separate zones with heavily restricted access.
Port Scan & TCP Attack Protection Port Scan Prevention Off Detects and blocks port scanning attempts.
SYN-FIN Attack Off Blocks packets with both SYN and FIN flags set.
SYN-RST Attack Off Prevents abrupt TCP session resets.
X-Mas Attack Off Blocks TCP packets with multiple unusual flags set.
FIN Scan Off Blocks FIN packets used to bypass firewalls.
NULL Flags Attack Off Blocks TCP packets with no flags set.
Access Control – Remote SSH Access Off Disabled by default; use only with strong passwords.
HTTP Access Off Disabled by default; use only with strong passwords.
HTTPS Access Off Disabled by default; use only with strong passwords.
CLI Access Off Disabled by default; use only with strong passwords.
Access Control – Local SSH Access On Allows local configuration over LAN.
HTTP Access On Allows local WebUI configuration over LAN.
HTTPS Access On Allows local WebUI configuration over LAN.
CLI Access On Allows local command-line configuration over LAN.
Login Protection SSH Login Attempts On Blocks IP after 10 failed attempts (default).
WebUI Login Attempts On Blocks IP after 10 failed attempts (default).
Configuration Security SMS Utilities Admin password SMS commands require admin password.
Default Admin Password On Default password is present on the device label.
Certificates Root CA Preloaded Default root certificate included; can be replaced.
Other Protections UPnP Not installed / Off Disabled to prevent unauthorized port forwarding.
UART Interface Admin password Requires password to prevent unauthorized physical access.