Security Features: Difference between revisions
No edit summary |
|||
| Line 3: | Line 3: | ||
In the table below you can find all the security features supported by Teltonika's devices. | In the table below you can find all the security features supported by Teltonika's devices. | ||
{| class="wikitable" | |||
|+ | |||
|- | |||
! Category !! Feature !! Default !! Purpose/Description | |||
|- | |||
| rowspan="5" | '''DDoS Protection''' || SYN Flood Protection || On || Blocks excessive SYN requests to prevent resource exhaustion. | |||
|- | |||
| Ping Flood Protection || Off || Mitigates ICMP (Ping) flood attacks. | |||
|- | |||
| SSH Attack Prevention || Off || Blocks excessive SSH requests. | |||
|- | |||
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests. | |||
|- | |||
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests. | |||
|- | |||
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands. | |||
|- | |||
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access. | |||
|- | |||
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts. | |||
|- | |||
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set. | |||
|- | |||
| SYN-RST Attack || Off || Prevents abrupt TCP session resets. | |||
|- | |||
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set. | |||
|- | |||
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls. | |||
|- | |||
| NULL Flags Attack || Off || Blocks TCP packets with no flags set. | |||
|- | |||
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTP Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTPS Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| CLI Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN. | |||
|- | |||
| HTTP Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| HTTPS Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| CLI Access || On || Allows local command-line configuration over LAN. | |||
|- | |||
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password. | |||
|- | |||
| Default Admin Password || On || Default password is present on the device label. | |||
|- | |||
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced. | |||
|- | |||
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding. | |||
|- | |||
| UART Interface || Admin password || Requires password to prevent unauthorized physical access. | |||
|} | |||
==Security recommendations== | ==Security recommendations== | ||
| Line 259: | Line 177: | ||
==RUTxxx series security features== | ==RUTxxx series security features== | ||
In the table below you can find all the security features supported by Teltonika's '''RUTxxx''' devices. | In the table below you can find all the security features supported by Teltonika's '''RUTxxx''' series devices. | ||
{| class="wikitable" | {| class="wikitable" | ||
| Line 323: | Line 241: | ||
|} | |} | ||
== | ==RUTXxxx series security features== | ||
In the table below you can find all the security features supported by Teltonika's '''RUTXxxx''' series devices. | |||
{| class="wikitable" | |||
|+ | |||
|- | |||
! Category !! Feature !! Default !! Purpose/Description | |||
|- | |||
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion. | |||
|- | |||
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks. | |||
|- | |||
| SSH Attack Prevention || Off || Blocks excessive SSH requests. | |||
|- | |||
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests. | |||
|- | |||
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests. | |||
|- | |||
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands. | |||
|- | |||
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access. | |||
|- | |||
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts. | |||
|- | |||
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set. | |||
|- | |||
| SYN-RST Attack || Off || Prevents abrupt TCP session resets. | |||
|- | |||
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set. | |||
|- | |||
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls. | |||
|- | |||
| NULL Flags Attack || Off || Blocks TCP packets with no flags set. | |||
|- | |||
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords and appropriate firewall rules. | |||
|- | |||
| HTTP Access || Off || Disabled by default; unencrypted traffic, avoid usage. | |||
|- | |||
| HTTPS Access || Off || Disabled by default; use only with strong passwords and appropriate firewall rules. | |||
|- | |||
| CLI Access || Off || Disabled by default; use only with strong passwords and appropriate firewall rules. | |||
|- | |||
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN. | |||
|- | |||
| HTTP Access || On || Allows local WebUI configuration over LAN. Unencrypted traffic, avoid usage. | |||
|- | |||
| HTTPS Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| CLI Access || On || Allows local command-line configuration over LAN. | |||
|- | |||
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password. | |||
|- | |||
| Default Admin Password || On || Default password is present on the device label. | |||
|- | |||
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced. | |||
|- | |||
| rowspan="3" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding. | |||
|- | |||
| UART Interface || Admin password || Requires password to prevent unauthorized physical access. | |||
|- | |||
| TPM || On || Enabled by default. Securely stores cryptographic keys and other sensitive data. | |||
|} | |||
==RUTMxxx series security features== | |||
In the table below you can find all the security features supported by Teltonika's ''' | In the table below you can find all the security features supported by Teltonika's '''RUTMxxx''' series devices. | ||
{| class="wikitable" | |||
|+ | |||
|- | |||
! Category !! Feature !! Default !! Purpose/Description | |||
|- | |||
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion. | |||
|- | |||
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks. | |||
|- | |||
| SSH Attack Prevention || Off || Blocks excessive SSH requests. | |||
|- | |||
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests. | |||
|- | |||
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests. | |||
|- | |||
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands. | |||
|- | |||
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access. | |||
|- | |||
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts. | |||
|- | |||
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set. | |||
|- | |||
| SYN-RST Attack || Off || Prevents abrupt TCP session resets. | |||
|- | |||
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set. | |||
|- | |||
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls. | |||
|- | |||
| NULL Flags Attack || Off || Blocks TCP packets with no flags set. | |||
|- | |||
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTP Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTPS Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| CLI Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN. | |||
|- | |||
| HTTP Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| HTTPS Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| CLI Access || On || Allows local command-line configuration over LAN. | |||
|- | |||
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password. | |||
|- | |||
| Default Admin Password || On || Default password is present on the device label. | |||
|- | |||
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced. | |||
|- | |||
| rowspan="3" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding. | |||
|- | |||
| UART Interface || Admin password || Requires password to prevent unauthorized physical access. | |||
|- | |||
| TPM || On || Enabled by default. Securely stores cryptographic keys and other sensitive data. | |||
|} | |||
== RUTCxxx series security features == | |||
{| class="wikitable" | |||
|+ | |||
|- | |||
! Category !! Feature !! Default !! Purpose/Description | |||
|- | |||
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion. | |||
|- | |||
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks. | |||
|- | |||
| SSH Attack Prevention || Off || Blocks excessive SSH requests. | |||
|- | |||
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests. | |||
|- | |||
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests. | |||
|- | |||
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands. | |||
|- | |||
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access. | |||
|- | |||
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts. | |||
|- | |||
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set. | |||
|- | |||
| SYN-RST Attack || Off || Prevents abrupt TCP session resets. | |||
|- | |||
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set. | |||
|- | |||
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls. | |||
|- | |||
| NULL Flags Attack || Off || Blocks TCP packets with no flags set. | |||
|- | |||
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTP Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTPS Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| CLI Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN. | |||
|- | |||
| HTTP Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| HTTPS Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| CLI Access || On || Allows local command-line configuration over LAN. | |||
|- | |||
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password. | |||
|- | |||
| Default Admin Password || On || Default password is present on the device label. | |||
|- | |||
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced. | |||
|- | |||
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding. | |||
|- | |||
| UART Interface || Admin password || Requires password to prevent unauthorized physical access. | |||
|} | |||
==TRBxxx series security features== | |||
In the table below you can find all the security features supported by Teltonika's '''TRBxxx''' series devices. | |||
== | {| class="wikitable" | ||
|+ | |||
|- | |||
! Category !! Feature !! Default !! Purpose/Description | |||
|- | |||
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion. | |||
|- | |||
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks. | |||
|- | |||
| SSH Attack Prevention || Off || Blocks excessive SSH requests. | |||
|- | |||
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests. | |||
|- | |||
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests. | |||
|- | |||
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands. | |||
|- | |||
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access. | |||
|- | |||
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts. | |||
|- | |||
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set. | |||
|- | |||
| SYN-RST Attack || Off || Prevents abrupt TCP session resets. | |||
|- | |||
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set. | |||
|- | |||
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls. | |||
|- | |||
| NULL Flags Attack || Off || Blocks TCP packets with no flags set. | |||
|- | |||
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTP Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTPS Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| CLI Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN. | |||
|- | |||
| HTTP Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| HTTPS Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| CLI Access || On || Allows local command-line configuration over LAN. | |||
|- | |||
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password. | |||
|- | |||
| Default Admin Password || On || Default password is present on the device label. | |||
|- | |||
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced. | |||
|- | |||
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding. | |||
|- | |||
| UART Interface || Admin password || Requires password to prevent unauthorized physical access. | |||
|} | |||
== TSWxxx series security features == | |||
In the table below you can find all the security features supported by Teltonika's '''TSWxxx''' series devices. | |||
== | {| class="wikitable" | ||
|+ | |||
|- | |||
! Category !! Feature !! Default !! Purpose/Description | |||
|- | |||
| rowspan="5" | '''DDoS Protection''' || SYN Attack Protection || On || Blocks excessive SYN requests to prevent resource exhaustion. | |||
|- | |||
| Ping Attack Protection || Off || Mitigates ICMP (Ping) flood attacks. | |||
|- | |||
| SSH Attack Prevention || Off || Blocks excessive SSH requests. | |||
|- | |||
| HTTP Attack Prevention || Off || Blocks excessive HTTP requests. | |||
|- | |||
| HTTPS Attack Prevention || Off || Blocks excessive HTTPS requests. | |||
|- | |||
| rowspan="2" | '''Custom Configuration''' || Custom Rules || Empty || Allows adding custom firewall rules via iptables commands. | |||
|- | |||
| DMZ || Off || Allows separating LAN-side network into separate zones with heavily restricted access. | |||
|- | |||
| rowspan="6" | '''Port Scan & TCP Attack Protection''' || Port Scan Prevention || Off || Detects and blocks port scanning attempts. | |||
|- | |||
| SYN-FIN Attack || Off || Blocks packets with both SYN and FIN flags set. | |||
|- | |||
| SYN-RST Attack || Off || Prevents abrupt TCP session resets. | |||
|- | |||
| X-Mas Attack || Off || Blocks TCP packets with multiple unusual flags set. | |||
|- | |||
| FIN Scan || Off || Blocks FIN packets used to bypass firewalls. | |||
|- | |||
| NULL Flags Attack || Off || Blocks TCP packets with no flags set. | |||
|- | |||
| rowspan="4" | '''Access Control – Remote''' || SSH Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTP Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| HTTPS Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| CLI Access || Off || Disabled by default; use only with strong passwords. | |||
|- | |||
| rowspan="4" | '''Access Control – Local''' || SSH Access || On || Allows local configuration over LAN. | |||
|- | |||
| HTTP Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| HTTPS Access || On || Allows local WebUI configuration over LAN. | |||
|- | |||
| CLI Access || On || Allows local command-line configuration over LAN. | |||
|- | |||
| rowspan="2" | '''Login Protection''' || SSH Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| WebUI Login Attempts || On || Blocks IP after 10 failed attempts (default). | |||
|- | |||
| rowspan="2" | '''Configuration Security''' || SMS Utilities || Admin password || SMS commands require admin password. | |||
|- | |||
| Default Admin Password || On || Default password is present on the device label. | |||
|- | |||
| '''Certificates''' || Root CA || Preloaded || Default root certificate included; can be replaced. | |||
|- | |||
| rowspan="2" | '''Other Protections''' || UPnP || Not installed / Off || Disabled to prevent unauthorized port forwarding. | |||
|- | |||
| UART Interface || Admin password || Requires password to prevent unauthorized physical access. | |||
|} | |||
==Active services== | ==Active services== | ||
Revision as of 14:01, 18 August 2025
Main Page > FAQ > Security > Security FeaturesSecurity features
In the table below you can find all the security features supported by Teltonika's devices.
| Category | Feature | Default | Purpose/Description |
|---|---|---|---|
| DDoS Protection | SYN Flood Protection | On | Blocks excessive SYN requests to prevent resource exhaustion. |
| Ping Flood Protection | Off | Mitigates ICMP (Ping) flood attacks. | |
| SSH Attack Prevention | Off | Blocks excessive SSH requests. | |
| HTTP Attack Prevention | Off | Blocks excessive HTTP requests. | |
| HTTPS Attack Prevention | Off | Blocks excessive HTTPS requests. | |
| Custom Configuration | Custom Rules | Empty | Allows adding custom firewall rules via iptables commands. |
| DMZ | Off | Allows separating LAN-side network into separate zones with heavily restricted access. | |
| Port Scan & TCP Attack Protection | Port Scan Prevention | Off | Detects and blocks port scanning attempts. |
| SYN-FIN Attack | Off | Blocks packets with both SYN and FIN flags set. | |
| SYN-RST Attack | Off | Prevents abrupt TCP session resets. | |
| X-Mas Attack | Off | Blocks TCP packets with multiple unusual flags set. | |
| FIN Scan | Off | Blocks FIN packets used to bypass firewalls. | |
| NULL Flags Attack | Off | Blocks TCP packets with no flags set. | |
| Access Control – Remote | SSH Access | Off | Disabled by default; use only with strong passwords. |
| HTTP Access | Off | Disabled by default; use only with strong passwords. | |
| HTTPS Access | Off | Disabled by default; use only with strong passwords. | |
| CLI Access | Off | Disabled by default; use only with strong passwords. | |
| Access Control – Local | SSH Access | On | Allows local configuration over LAN. |
| HTTP Access | On | Allows local WebUI configuration over LAN. | |
| HTTPS Access | On | Allows local WebUI configuration over LAN. | |
| CLI Access | On | Allows local command-line configuration over LAN. | |
| Login Protection | SSH Login Attempts | On | Blocks IP after 10 failed attempts (default). |
| WebUI Login Attempts | On | Blocks IP after 10 failed attempts (default). | |
| Configuration Security | SMS Utilities | Admin password | SMS commands require admin password. |
| Default Admin Password | On | Default password is present on the device label. | |
| Certificates | Root CA | Preloaded | Default root certificate included; can be replaced. |
| Other Protections | UPnP | Not installed / Off | Disabled to prevent unauthorized port forwarding. |
| UART Interface | Admin password | Requires password to prevent unauthorized physical access. |
Security recommendations
Security features will not help if you won't use them properly, below you can find a table with recommendations.
| Topic | Recommendation | Comment |
|---|---|---|
| SSH access | Use a different port than 22 | 22 is the default port used by SSH protocol. You should not use the default port as it is easy to guess and more vulnerable to brute-force attacks. |
| Use strong passwords and passphrases | Most of the servers security are compromised because of the weak passwords. They use easy to guess passwords like the brand name of the device or some universal password like 123456 or Admin123. Weak password is more likely to be cracked by brute-force attacks. You should be using a very strong password or passphrase to log in your SSH server. | |
| Firewall | Block traffic by default | Start blocking all traffic by default and only allow specific traffic to identified services. This approach provides quality control over the traffic and decreases the possibility of a breach. This behavior can be achieved by configuring the last rule in an access control list to deny all traffic. |
| Reviewing firewall rules | Networks are constantly changing by gaining new users and new devices. New services and new applications are being accessed which means new firewall rules will need to be added. The old firewall rules will need to be reviewed and deleted if necessary. | |
| VPN | Always use VPN if you have the possibility | Encrypted traffic is more secure than unencrypted traffic. Unencrypted traffic can be easily sniffed or even altered by malicious 3rd party. |
| WiFi AP | Use WPA2-PSK (AES) encryption | This is the most secure option. It uses WPA2, the latest Wi-Fi encryption standard, and the latest AES encryption protocol |
| Use WiFi AP strong key (password/passphrase) | "If malicious 3rd party is able to capture encrypted 4-way handshake, with strong password, decryption time can increase up to n years. | |
| Separate clients | Separate clients also known as wireless client isolation is a security feature that prevents wireless clients from communicating with one another. This feature adds additional level of security to limit attacks and threats between devices connected to the wireless networks. | |
| WiFi Hotspot | Setting up a guest network for visitors | By setting up a guest Wi-Fi. A guest Wi-Fi network is essentially a separate access point on your router with separate IP pool. For example with guest network malware that somehow ended up on a guest’s smartphone will not be able to get into your main business LAN |
| Hotspot configuration | Setup data bandwidth limit. In that case malicious 3rd party will be unable to drain all your bandwidth. Use session time limit. In that case malicious 3rd party will be unable to drain your mobile data limit | |
| WiFi SSID | Don't broadcast your router details | Service set identifier (SSID) should be changed. Default name will broadcast your device model. |
| DNS server | Don't use your Internet Service Providers (ISP) default Domain Name System (DNS) | There may come a time when the DNS servers used by your ISP come under attack, by a distributed denial-of-service (DDoS) attack, for example, or someone changing the DNS to effect a cloned banking fraud. |
| Password | Always use only strong passwords | Strong password requirements:
|
| Firmware update | Keep firmware up to date | With new firmware comes a lot of improvements:
|
| Secure firmware update | Always update firmware from official website | Always update firmware downloaded from our official page or use firmware over the air (FOTA). |
| RMS | Use RMS for remote access to the router | Disable remote access to your public IP and use RMS for remote management instead. You can find more details about RMS here: https://teltonika-networks.com/product/rms/ |
| Unused features | Turn off router features you don’t use that could pose a security risk | This would include remote access, Universal Plug and Play (UPnP), etc... |
| Common sense | Always use common sense while configuring any network device | - |
RUTxxx series security features
In the table below you can find all the security features supported by Teltonika's RUTxxx series devices.
| Category | Feature | Default | Purpose/Description |
|---|---|---|---|
| DDoS Protection | SYN Attack Protection | On | Blocks excessive SYN requests to prevent resource exhaustion. |
| Ping Attack Protection | Off | Mitigates ICMP (Ping) flood attacks. | |
| SSH Attack Prevention | Off | Blocks excessive SSH requests. | |
| HTTP Attack Prevention | Off | Blocks excessive HTTP requests. | |
| HTTPS Attack Prevention | Off | Blocks excessive HTTPS requests. | |
| Custom Configuration | Custom Rules | Empty | Allows adding custom firewall rules via iptables commands. |
| DMZ | Off | Allows separating LAN-side network into separate zones with heavily restricted access. | |
| Port Scan & TCP Attack Protection | Port Scan Prevention | Off | Detects and blocks port scanning attempts. |
| SYN-FIN Attack | Off | Blocks packets with both SYN and FIN flags set. | |
| SYN-RST Attack | Off | Prevents abrupt TCP session resets. | |
| X-Mas Attack | Off | Blocks TCP packets with multiple unusual flags set. | |
| FIN Scan | Off | Blocks FIN packets used to bypass firewalls. | |
| NULL Flags Attack | Off | Blocks TCP packets with no flags set. | |
| Access Control – Remote | SSH Access | Off | Disabled by default; use only with strong passwords. |
| HTTP Access | Off | Disabled by default; use only with strong passwords. | |
| HTTPS Access | Off | Disabled by default; use only with strong passwords. | |
| CLI Access | Off | Disabled by default; use only with strong passwords. | |
| Access Control – Local | SSH Access | On | Allows local configuration over LAN. |
| HTTP Access | On | Allows local WebUI configuration over LAN. | |
| HTTPS Access | On | Allows local WebUI configuration over LAN. | |
| CLI Access | On | Allows local command-line configuration over LAN. | |
| Login Protection | SSH Login Attempts | On | Blocks IP after 10 failed attempts (default). |
| WebUI Login Attempts | On | Blocks IP after 10 failed attempts (default). | |
| Configuration Security | SMS Utilities | Admin password | SMS commands require admin password. |
| Default Admin Password | On | Default password is present on the device label. | |
| Certificates | Root CA | Preloaded | Default root certificate included; can be replaced. |
| Other Protections | UPnP | Not installed / Off | Disabled to prevent unauthorized port forwarding. |
| UART Interface | Admin password | Requires password to prevent unauthorized physical access. |
RUTXxxx series security features
In the table below you can find all the security features supported by Teltonika's RUTXxxx series devices.
| Category | Feature | Default | Purpose/Description |
|---|---|---|---|
| DDoS Protection | SYN Attack Protection | On | Blocks excessive SYN requests to prevent resource exhaustion. |
| Ping Attack Protection | Off | Mitigates ICMP (Ping) flood attacks. | |
| SSH Attack Prevention | Off | Blocks excessive SSH requests. | |
| HTTP Attack Prevention | Off | Blocks excessive HTTP requests. | |
| HTTPS Attack Prevention | Off | Blocks excessive HTTPS requests. | |
| Custom Configuration | Custom Rules | Empty | Allows adding custom firewall rules via iptables commands. |
| DMZ | Off | Allows separating LAN-side network into separate zones with heavily restricted access. | |
| Port Scan & TCP Attack Protection | Port Scan Prevention | Off | Detects and blocks port scanning attempts. |
| SYN-FIN Attack | Off | Blocks packets with both SYN and FIN flags set. | |
| SYN-RST Attack | Off | Prevents abrupt TCP session resets. | |
| X-Mas Attack | Off | Blocks TCP packets with multiple unusual flags set. | |
| FIN Scan | Off | Blocks FIN packets used to bypass firewalls. | |
| NULL Flags Attack | Off | Blocks TCP packets with no flags set. | |
| Access Control – Remote | SSH Access | Off | Disabled by default; use only with strong passwords and appropriate firewall rules. |
| HTTP Access | Off | Disabled by default; unencrypted traffic, avoid usage. | |
| HTTPS Access | Off | Disabled by default; use only with strong passwords and appropriate firewall rules. | |
| CLI Access | Off | Disabled by default; use only with strong passwords and appropriate firewall rules. | |
| Access Control – Local | SSH Access | On | Allows local configuration over LAN. |
| HTTP Access | On | Allows local WebUI configuration over LAN. Unencrypted traffic, avoid usage. | |
| HTTPS Access | On | Allows local WebUI configuration over LAN. | |
| CLI Access | On | Allows local command-line configuration over LAN. | |
| Login Protection | SSH Login Attempts | On | Blocks IP after 10 failed attempts (default). |
| WebUI Login Attempts | On | Blocks IP after 10 failed attempts (default). | |
| Configuration Security | SMS Utilities | Admin password | SMS commands require admin password. |
| Default Admin Password | On | Default password is present on the device label. | |
| Certificates | Root CA | Preloaded | Default root certificate included; can be replaced. |
| Other Protections | UPnP | Not installed / Off | Disabled to prevent unauthorized port forwarding. |
| UART Interface | Admin password | Requires password to prevent unauthorized physical access. | |
| TPM | On | Enabled by default. Securely stores cryptographic keys and other sensitive data. |
RUTMxxx series security features
In the table below you can find all the security features supported by Teltonika's RUTMxxx series devices.
| Category | Feature | Default | Purpose/Description |
|---|---|---|---|
| DDoS Protection | SYN Attack Protection | On | Blocks excessive SYN requests to prevent resource exhaustion. |
| Ping Attack Protection | Off | Mitigates ICMP (Ping) flood attacks. | |
| SSH Attack Prevention | Off | Blocks excessive SSH requests. | |
| HTTP Attack Prevention | Off | Blocks excessive HTTP requests. | |
| HTTPS Attack Prevention | Off | Blocks excessive HTTPS requests. | |
| Custom Configuration | Custom Rules | Empty | Allows adding custom firewall rules via iptables commands. |
| DMZ | Off | Allows separating LAN-side network into separate zones with heavily restricted access. | |
| Port Scan & TCP Attack Protection | Port Scan Prevention | Off | Detects and blocks port scanning attempts. |
| SYN-FIN Attack | Off | Blocks packets with both SYN and FIN flags set. | |
| SYN-RST Attack | Off | Prevents abrupt TCP session resets. | |
| X-Mas Attack | Off | Blocks TCP packets with multiple unusual flags set. | |
| FIN Scan | Off | Blocks FIN packets used to bypass firewalls. | |
| NULL Flags Attack | Off | Blocks TCP packets with no flags set. | |
| Access Control – Remote | SSH Access | Off | Disabled by default; use only with strong passwords. |
| HTTP Access | Off | Disabled by default; use only with strong passwords. | |
| HTTPS Access | Off | Disabled by default; use only with strong passwords. | |
| CLI Access | Off | Disabled by default; use only with strong passwords. | |
| Access Control – Local | SSH Access | On | Allows local configuration over LAN. |
| HTTP Access | On | Allows local WebUI configuration over LAN. | |
| HTTPS Access | On | Allows local WebUI configuration over LAN. | |
| CLI Access | On | Allows local command-line configuration over LAN. | |
| Login Protection | SSH Login Attempts | On | Blocks IP after 10 failed attempts (default). |
| WebUI Login Attempts | On | Blocks IP after 10 failed attempts (default). | |
| Configuration Security | SMS Utilities | Admin password | SMS commands require admin password. |
| Default Admin Password | On | Default password is present on the device label. | |
| Certificates | Root CA | Preloaded | Default root certificate included; can be replaced. |
| Other Protections | UPnP | Not installed / Off | Disabled to prevent unauthorized port forwarding. |
| UART Interface | Admin password | Requires password to prevent unauthorized physical access. | |
| TPM | On | Enabled by default. Securely stores cryptographic keys and other sensitive data. |
RUTCxxx series security features
| Category | Feature | Default | Purpose/Description |
|---|---|---|---|
| DDoS Protection | SYN Attack Protection | On | Blocks excessive SYN requests to prevent resource exhaustion. |
| Ping Attack Protection | Off | Mitigates ICMP (Ping) flood attacks. | |
| SSH Attack Prevention | Off | Blocks excessive SSH requests. | |
| HTTP Attack Prevention | Off | Blocks excessive HTTP requests. | |
| HTTPS Attack Prevention | Off | Blocks excessive HTTPS requests. | |
| Custom Configuration | Custom Rules | Empty | Allows adding custom firewall rules via iptables commands. |
| DMZ | Off | Allows separating LAN-side network into separate zones with heavily restricted access. | |
| Port Scan & TCP Attack Protection | Port Scan Prevention | Off | Detects and blocks port scanning attempts. |
| SYN-FIN Attack | Off | Blocks packets with both SYN and FIN flags set. | |
| SYN-RST Attack | Off | Prevents abrupt TCP session resets. | |
| X-Mas Attack | Off | Blocks TCP packets with multiple unusual flags set. | |
| FIN Scan | Off | Blocks FIN packets used to bypass firewalls. | |
| NULL Flags Attack | Off | Blocks TCP packets with no flags set. | |
| Access Control – Remote | SSH Access | Off | Disabled by default; use only with strong passwords. |
| HTTP Access | Off | Disabled by default; use only with strong passwords. | |
| HTTPS Access | Off | Disabled by default; use only with strong passwords. | |
| CLI Access | Off | Disabled by default; use only with strong passwords. | |
| Access Control – Local | SSH Access | On | Allows local configuration over LAN. |
| HTTP Access | On | Allows local WebUI configuration over LAN. | |
| HTTPS Access | On | Allows local WebUI configuration over LAN. | |
| CLI Access | On | Allows local command-line configuration over LAN. | |
| Login Protection | SSH Login Attempts | On | Blocks IP after 10 failed attempts (default). |
| WebUI Login Attempts | On | Blocks IP after 10 failed attempts (default). | |
| Configuration Security | SMS Utilities | Admin password | SMS commands require admin password. |
| Default Admin Password | On | Default password is present on the device label. | |
| Certificates | Root CA | Preloaded | Default root certificate included; can be replaced. |
| Other Protections | UPnP | Not installed / Off | Disabled to prevent unauthorized port forwarding. |
| UART Interface | Admin password | Requires password to prevent unauthorized physical access. |
TRBxxx series security features
In the table below you can find all the security features supported by Teltonika's TRBxxx series devices.
| Category | Feature | Default | Purpose/Description |
|---|---|---|---|
| DDoS Protection | SYN Attack Protection | On | Blocks excessive SYN requests to prevent resource exhaustion. |
| Ping Attack Protection | Off | Mitigates ICMP (Ping) flood attacks. | |
| SSH Attack Prevention | Off | Blocks excessive SSH requests. | |
| HTTP Attack Prevention | Off | Blocks excessive HTTP requests. | |
| HTTPS Attack Prevention | Off | Blocks excessive HTTPS requests. | |
| Custom Configuration | Custom Rules | Empty | Allows adding custom firewall rules via iptables commands. |
| DMZ | Off | Allows separating LAN-side network into separate zones with heavily restricted access. | |
| Port Scan & TCP Attack Protection | Port Scan Prevention | Off | Detects and blocks port scanning attempts. |
| SYN-FIN Attack | Off | Blocks packets with both SYN and FIN flags set. | |
| SYN-RST Attack | Off | Prevents abrupt TCP session resets. | |
| X-Mas Attack | Off | Blocks TCP packets with multiple unusual flags set. | |
| FIN Scan | Off | Blocks FIN packets used to bypass firewalls. | |
| NULL Flags Attack | Off | Blocks TCP packets with no flags set. | |
| Access Control – Remote | SSH Access | Off | Disabled by default; use only with strong passwords. |
| HTTP Access | Off | Disabled by default; use only with strong passwords. | |
| HTTPS Access | Off | Disabled by default; use only with strong passwords. | |
| CLI Access | Off | Disabled by default; use only with strong passwords. | |
| Access Control – Local | SSH Access | On | Allows local configuration over LAN. |
| HTTP Access | On | Allows local WebUI configuration over LAN. | |
| HTTPS Access | On | Allows local WebUI configuration over LAN. | |
| CLI Access | On | Allows local command-line configuration over LAN. | |
| Login Protection | SSH Login Attempts | On | Blocks IP after 10 failed attempts (default). |
| WebUI Login Attempts | On | Blocks IP after 10 failed attempts (default). | |
| Configuration Security | SMS Utilities | Admin password | SMS commands require admin password. |
| Default Admin Password | On | Default password is present on the device label. | |
| Certificates | Root CA | Preloaded | Default root certificate included; can be replaced. |
| Other Protections | UPnP | Not installed / Off | Disabled to prevent unauthorized port forwarding. |
| UART Interface | Admin password | Requires password to prevent unauthorized physical access. |
TSWxxx series security features
In the table below you can find all the security features supported by Teltonika's TSWxxx series devices.
| Category | Feature | Default | Purpose/Description |
|---|---|---|---|
| DDoS Protection | SYN Attack Protection | On | Blocks excessive SYN requests to prevent resource exhaustion. |
| Ping Attack Protection | Off | Mitigates ICMP (Ping) flood attacks. | |
| SSH Attack Prevention | Off | Blocks excessive SSH requests. | |
| HTTP Attack Prevention | Off | Blocks excessive HTTP requests. | |
| HTTPS Attack Prevention | Off | Blocks excessive HTTPS requests. | |
| Custom Configuration | Custom Rules | Empty | Allows adding custom firewall rules via iptables commands. |
| DMZ | Off | Allows separating LAN-side network into separate zones with heavily restricted access. | |
| Port Scan & TCP Attack Protection | Port Scan Prevention | Off | Detects and blocks port scanning attempts. |
| SYN-FIN Attack | Off | Blocks packets with both SYN and FIN flags set. | |
| SYN-RST Attack | Off | Prevents abrupt TCP session resets. | |
| X-Mas Attack | Off | Blocks TCP packets with multiple unusual flags set. | |
| FIN Scan | Off | Blocks FIN packets used to bypass firewalls. | |
| NULL Flags Attack | Off | Blocks TCP packets with no flags set. | |
| Access Control – Remote | SSH Access | Off | Disabled by default; use only with strong passwords. |
| HTTP Access | Off | Disabled by default; use only with strong passwords. | |
| HTTPS Access | Off | Disabled by default; use only with strong passwords. | |
| CLI Access | Off | Disabled by default; use only with strong passwords. | |
| Access Control – Local | SSH Access | On | Allows local configuration over LAN. |
| HTTP Access | On | Allows local WebUI configuration over LAN. | |
| HTTPS Access | On | Allows local WebUI configuration over LAN. | |
| CLI Access | On | Allows local command-line configuration over LAN. | |
| Login Protection | SSH Login Attempts | On | Blocks IP after 10 failed attempts (default). |
| WebUI Login Attempts | On | Blocks IP after 10 failed attempts (default). | |
| Configuration Security | SMS Utilities | Admin password | SMS commands require admin password. |
| Default Admin Password | On | Default password is present on the device label. | |
| Certificates | Root CA | Preloaded | Default root certificate included; can be replaced. |
| Other Protections | UPnP | Not installed / Off | Disabled to prevent unauthorized port forwarding. |
| UART Interface | Admin password | Requires password to prevent unauthorized physical access. |
Active services
In the table below you can find all the services, which are enabled on default configuration in Teltonika's devices.
| Service | Port | LAN | WAN |
|---|---|---|---|
| SSH | 22 | Open | Closed |
| HTTP | 80 | Open | Closed |
| HTTPS | 443 | Open | Closed |