Device security
2.6
Security configuration
33
UM Security BRS-2A
Release
8.7
05/2022
Excluding a protocol from all management access IP restrictions while the protocol itself is enabled
leads to unrestricted management access for the respective protocol.
2.6.15
Configure a dedicated HTTPS certificate
In the state of delivery, the device contains a self-signed HTTPS certificate.
You have the option of:
Replacing the existing HTTPS certificate with a new, self-signed HTTPS certificate on the
device
Loading a dedicated HTTPS certificate onto the device
Note:
When you create new, self-signed HTTPS certificate on the device, use the HTTPS
certificate fingerprint algorithm
sha256
(delivery state:
sha256
).
If you have an established public key infrastructure (PKI), then loading a dedicated HTTPS
certificate onto the device is generally considered more secure and also more convenient.
Choose the option that meets your needs. For details, refer to the user manual "Configuration",
appendix chapter "HTTPS certificate".
2.6.16
Configure a dedicated SSH host key pair
In the state of delivery, the device contains a self-signed SSH host key pair.
You have the option of:
Replacing the existing SSH host key pair with a new, self-signed SSH host key pair on the
device
Loading a dedicated SSH host key pair onto the device
Note:
When you create a new, self-signed SSH host key pair on the device, use the SSH host key
fingerprint algorithm
sha256
(delivery state:
sha256
).
If you have control over the entropy used for key generation, then loading a dedicated SSH host
key onto the device is probably more secure.
If you have an established PKI, then loading an SSH host key signed by a Certification Authority
onto the device is generally considered more secure and also more convenient.
Choose the option that meets your needs. For details, refer to the user manual "Configuration",
appendix chapter "Preparing access via SSH".
2.6.17
Configure a dedicated user account login policy
Note:
Hirschmann assumes that, when reading this section, you have already created a dedicated
user account login policy
(see on page 19 “Plan a dedicated user account login policy”)
.
The login policy applies to the following user interfaces and access protocols:
The Command Line Interface (CLI) using SSH or Telnet
The Graphical User Interface (GUI) using HTTPS or HTTP
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......