Chapter 1
Introduction
Feature
VRRPv2 and VRRPv3
PIM-SM
Firewall
OSPF
BGP
RIP v1/v2
IS-IS
Traffic Prioritization
VPN
IPSec
Virtualization
a
Formerly 802.1s
For information about installing and viewing the contents of feature keys, refer to
Feature
Keys".
Section 1.3
Security Recommendations
To prevent unauthorized access to the device, note the following security recommendations:
Authentication
CAUTION!
Accessibility hazard – risk of data loss. Do not misplace the passwords for the device. If both the
maintenance and boot passwords are misplaced, the device must be returned to Siemens Canada Ltd.
for repair. This service is not covered under warranty. Depending on the action that must be taken to
regain access to the device, data may be lost.
• Replace the default passwords for all user accounts, access modes (e.g. maintenance mode) and processes
(where applicable) before the device is deployed.
• Use strong passwords. Avoid weak passwords such as password1, 123456789, abcdefgh, etc. For more
information about creating strong passwords, refer to the password requirements in
Passwords and
Passphrases".
• Make sure passwords are protected and not shared with unauthorized personnel.
• Do not re-use passwords across different user names and systems, or after they expire.
• Record passwords in a safe, secure, off-line location for future retrieval should they be misplaced.
• When RADIUS authentication is done remotely, make sure all communications are within the security perimeter
or on a secure channel.
6
Layer 2 Standard
Layer 3 Standard
Edition (L2STD)
Edition (L3STD)
û
û
û
û
û
û
û
û
û
û
ü
Feature Key
Layer 3 Security
Edition (L3SEC)
ü
ü
ü
ü
ü
ü
ü
ü
û
û
ü
Section 3.13, "Managing
Section 4.10, "Managing
Security Recommendations
RUGGEDCOM ROX II
CLI User Guide
ü
ü
ü
ü
ü
ü
ü
ü
ü
ü
ü