Jump to content

Template:Security guidelines: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 126: Line 126:
       <td>First login</td>
       <td>First login</td>
       <td>On</td>
       <td>On</td>
<td>Default password for Teltonika's devices is admin01 (weak password) but on first login to WebUI - RutOS forcefully requires user to change it. Recommendation is to use strong password or passphrase*</td>
<td>Default password for Teltonika's devices is admin01 (weak password) but on first login to WebUI - RutOS forcefully requires user to change it. It is recommended to use a strong password</td>
     </tr>
     </tr>
    <tr>
      <td>Certificates</td>
       <td></td>
       <td>Root CA</td>
       <td></td>
       <td>Pre-uplouded</td>
<td></td>
<td>Root CA certificate are only needed if you want to use HTTPS for your services. There is a default file already preloaded in this device which will be overwriten by any uploaded file.</td>
     </tr>
     </tr>
    <tr>
      <td>Universal Plug and Play</td>
       <td></td>
       <td>UPnP</td>
       <td></td>
       <td>Not installed / Off</td>
<td></td>
<td>UPnP doesn't require any sort of authentication from the user. Any application running on your computer in LAN  can ask the router to forward a port over UPnP, which is why the malware can abuse UPnP. Recommendation - If you don’t use it when leave it not installed or turned off.</td>
     </tr>
     </tr>
    <tr>
       <td>Universal Asynchronous Receiver – Transmiter</td>
      <td></td>
       <td>UART</td>
      <td></td>
       <td> By router admin password</td>
<td></td>
<td>Many manufacturers are implementing UART interfaces on their devices. If this interface is not password protected, security of the device may be compromised. If malicious 3rd party gains physical access to the device it will have full control of the router via UART interface, this is a reason why our devices have password protected UART interfaces.</td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
       <td rowspan="5"> DDOS Prevention</td>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td rowspan="5"> DDOS Prevention</td>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td rowspan="5"> DDOS Prevention</td>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
      <td></td>
      <td></td>
<td></td>
    </tr>
    <tr>
       <td></td>
       <td></td>
<td></td>
     </tr>
     </tr>
</table>
</table>
0

edits