prohibition_of_the_ssh_connections
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
prohibition_of_the_ssh_connections [2018/07/11 11:34] – akuzmuk | prohibition_of_the_ssh_connections [2022/01/16 03:32] (current) – ↷ Links adapted because of a move operation 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{ network: | ||
====== Forbid SSH connections ====== | ====== Forbid SSH connections ====== | ||
+ | |||
To provide additional security for WebHMI in critical systems, we recommend block incoming SSH connections. In this case nobody will be able to log into the system via SSH protocol. In real-world scenarios you do not need this access. It is needed for remote diagnostics and repair by manufacturer. | To provide additional security for WebHMI in critical systems, we recommend block incoming SSH connections. In this case nobody will be able to log into the system via SSH protocol. In real-world scenarios you do not need this access. It is needed for remote diagnostics and repair by manufacturer. | ||
To do this go to **Network Settings**, then open the **System -> Administration** page and click the **Delete** button in the **Dropbear Instance** section. Then click **Save and Apply** button. | To do this go to **Network Settings**, then open the **System -> Administration** page and click the **Delete** button in the **Dropbear Instance** section. Then click **Save and Apply** button. | ||
- | {{ :: | + | {{ network: |
prohibition_of_the_ssh_connections.txt · Last modified: 2022/01/16 03:32 by 127.0.0.1