
Table of Contents Cybersecurity Good Practices Handbook
2 HA032968 Issue 1
Firewalls and FTP or TFTP.............................................................................. 34
FTP Vulnerabilities..................................................................................... 34
FTP Risk Mitigation.................................................................................... 34
Firewalls and Telnet ......................................................................................... 35
Telnet Vulnerabilities.................................................................................. 35
Telnet Risk Mitigation................................................................................. 35
Firewalls and Simple Mail Transfer Protocol (SMTP) and Post Office Protocol
(POP3)............................................................................................................. 35
SMTP and POP3 Vulnerabilities................................................................ 36
SMTP and POP3 Risk Mitigation............................................................... 36
Firewalls and Simple Network Management Protocol (SNMP)........................ 36
SNMP Vulnerabilities ................................................................................. 37
SNMP Risk Mitigation................................................................................ 37
Firewalls and Network Address Translation (NAT)........................................... 38
NAT Vulnerabilities..................................................................................... 38
ConneXium Industrial Firewall NAT Features............................................ 38
NAT Configuration Recommendation......................................................... 39
System Access Control ................................................................ 40
External Authentication with RADIUS .............................................................. 40
RADIUS Authentication Vulnerabilities....................................................... 41
RADIUS Authentication Guidelines............................................................ 42
Remote Access Control with RAS or VPN ....................................................... 42
Remote Access Server (RAS).................................................................... 42
VPN............................................................................................................ 43
ConneXium Industrial Firewall VPN Features............................................ 45
Remote Access Vulnerabilities................................................................... 45
Remote Access Guidelines........................................................................ 45
Access for Remote Control.............................................................................. 46
WiFi Remote Control Vulnerabilities .......................................................... 47
NIST Wireless Guidelines.......................................................................... 47
ConneXium Wireless Access Point Security Features............................... 49
Wireless Remote Control Risk Mitigation with ETG302x........................... 50
Internal Access for Service or Vendor Personnel............................................. 51
Device Hardening ........................................................................ 53
Password Management ................................................................................... 54
Password Management Guidelines........................................................... 54
Device Access Control..................................................................................... 54
Access Control Guidelines......................................................................... 54
Hardening ConneXium Ethernet Managed Switches....................................... 55
SNMP......................................................................................................... 55
Telnet and Web Access.............................................................................. 55
Ethernet Switch Configurator Software Protection..................................... 56
Ethernet Switch Port Access...................................................................... 56
Hardening Vijeo Citect SCADA Systems ......................................................... 56
Hardening Vijeo Historian ................................................................................ 58
Hardening Ampla.............................................................................................. 59
Hardening OPC Factory Server (OFS) ............................................................ 59
Device Hardening for Legacy Devices............................................................. 59
Industrial PCs for Enhanced Security .............................................................. 60
Hardening Engineering Workstations............................................................... 60
Patch Management.......................................................................................... 60
Monitoring and Maintenance ........................................................ 62
Monitoring ........................................................................................................ 62
Log File Monitoring .................................................................................... 62
SNMP......................................................................................................... 62
Intrusion Detection Systems ...................................................................... 62
Maintenance..................................................................................................... 63
Network Security Architecture Example ....................................... 64
Security Architecture Overview........................................................................ 64