Access Security is a key part of an overall security system.
Controlling access to the groov EPIC processor can be one part of a total security system that includes other best practices; for example, requiring that authorized users change their passwords every three months or securing the control equipment in a locked cabinet with keys accessible by a limited number of personnel.
The groov EPIC processor provides several features to help you control access, including:
- Two Ethernet network interfaces, which cannot communicate with each other directly. This provides the convenience of connecting to two different networks while also providing a physical boundary between the two networks.
- Firewalls that can be configured with varying degrees of granularity or complexity:
- Control access by enabling or disabling the network interfaces
- Control access by assigning protocols to use specific network interfaces, which can prevents them from transmitting information to other networks
- Create rules that assign specific ports and network interfaces to TCP/UDP, TCP, or UDP protocols
- Create multiple user IDs, each with limited access to specific services or limited scope of access to those services
- Configure SSL and adding certificates
CAUTION: The groov EPIC processor does not provide timeout-based logout. You must implement the important practice of always logging out of any ID that has administrator authority to prevent unauthorized access to the processor.