1. Authentication

Default settings permit access to the router without authentication. However, it is not possible to commission the router without configuring an authentication. Activating a profile (a configuration) is only possible, if one of the following conditions is met:

  • A user has been added

  • Authentication at the HTTPS web server with client certificates is activated and a CA certificate is stored for this

  • Authentication against a RADIUS server is activated

The following options for access and authentication are available:

Access/authentication User name/password Certificate RADIUS

Graphic user interface

REST interface (REST API)

CLI (command line)

Remote Management

2. User management

No user is added in default settings. It is possible to add several users with full (read/write) or limited (read, status) rights. In addition, it is possible to implement user management on a RADIUS server. These users will then have respective access to web interface, REST interface and command line (CLI).

User group Rights

Read/Write

Settings can be read and modified

Read

Settings can only be read

Status

Only status information can be viewed

3. Protected access options to the router

Access to the router is possible via the following interfaces:

  • Graphic user interface (web interface)
    Only access via HTTPS (encrypted) is possible in default settings. Starting with icom OS version 5.2, a redesigned user interface is available in addition to the classic web interface. Access to the classic web interface can be deactivated from version 6.1. Access via HTTP (not encrypted, not recommended) is deactivated. An auto logout function provides for an automated logout on inactivity (default setting 15 minutes).

  • REST interface
    Only access via HTTPS (encrypted) is possible in default settings. Access via HTTP (not encrypted, not recommended) is deactivated.

  • Command line (CLI)
    In default settings, no access to the command line is permitted. Access via Telnet (not encrypted, not recommended) and SSH (encrypted) must be activated explicitly.

4. Protection against brute force attacks

Following an unsuccessful login attempt to the web interface of the router, the next login attempt will be delayed by three seconds.

5. Automatic update of firmware and configuration

The automatic update is not activated in default settings. Optionally, the user can provide the router with updated firmware and new configurations using an auto update: server and respond quickly in case of urgent IT security risks. It is recommended to keep the firmware always up-to-date using this function. INSYS icom offers a simple solution for updating the firmware of your routers with Router Management.

6. Signing firmware and configuration files

The router will check uploaded firmware files and only install firmware signed by INSYS. This Configuration Guide demonstrates how sign and encrypt your update packets to avoid that compromised packets are uploaded to the router.

7. Segmenting into several local IP networks

The router allows to set up different local networks that are separated from each other or provided with precise communication rules in order to separate remote access options from the application network for example.

8. Redundant WAN connections

The router allows to set up router WAN connections using WAN chains. Several WAN chains with different WAN connections (Ethernet, DSL, cellular radio) can be created; those WAN connections will continuously be checked. In case a connection will be lost, another WAN connection will be established automatically to ensure an anew availability of the router.

9. Virtual Private Networks (VPNs)

The router permits to set up virtual private network, so-called VPNs These are encrypted connections via data networks. Objective is the tap- and tamper-proof communication between VPN partners from different local networks (LANs) via insecure or public networks (Internet). They use encryption and authentication for connection establishment and transmit data encrypted. The assignment of permissions causes closed user groups. VPN connections are possible via OpenVPN, IPsec, GRE and DMVPN. Information regarding secure VPN connections are available in the IT-Grundschutz-Kompendium (basic IT protection compendium) of the BSI.

INSYS icom offers an own VPN service with the icom Connectivity Suite that provides a simple and secure connection of your devices - also in China.

10. Individual selection of trusted CA certificates

The router permits the individual selection of CA certificates for verifying the certificate of the remote terminal for the:

  • SMTP server for e-mail dispatch

  • server of the remote management platform

  • server for automated updates

The following options are available for selecting the trusted CA certificates:

  • trust all CA certificates of the pre-installed CA bundle of cURL and all CA certificates manually installed on the router

  • trust all CA certificates of the pre-installed CA bundle of cURL

  • trust all CA certificates manually installed on the router

  • trust a single CA certificate manually installed on the router

11. IP filters (Firewall)

IP filter permit to block unwanted data communication. This follows the white list principle, i.e. all connections are blocked unless they are explicitly permitted here. To allow communication, permitted data packets must be explicitly specified using filter rules. The exception rules can be specified very detailed and permit only certain data packets broken down to packet direction, IP version, protocol, incoming/outgoing interface, source IP address, source port:, destination IP address and destination port. In default settings, the IP filters for IPv4 are deactivated and the IP filters for IPv6 are activated) The IPv4 filters must also be activated for a secure operation. Then, the IP filters will block all data packets that are not permitted explicitly.

12. MAC filters

In default settings, the MAC filters are deactivated. Activated MAC filters block the IP connections to other devices in the Ethernet following the white list principle, i.e. all connections are blocked unless they are explicitly permitted here. MAC filter rules apply to both, IPv4 and IPv6 traffic. In order to permit communication, the MAC address of the device that is permitted to communicate must be specified. It must be taken into account here, that the actually unique MAC address of a device can also be modified with moderate effort (depending on the device). This makes it possible that a different device may penetrate the MAC filters if the permitted MAC address has been assigned to it.

13. Monitoring and message dispatch upon certain events

For an early detection of possible IT security risks, messages can be dispatched via e-mail, SMS, SNMP trap or MCIP, if a certain (IT security-relevant) event occurs. Examples for such an event contain:

  • Configuration has been changed The configuration has been changed or activated.

  • Link of an Ethernet port has been changed: The link condition has changed, i.e. a device has been disconnected (or switched off) or a third-party device has been connected.

  • System has been restarted: Both, a hardware reset (e.g. power failure) and a software reset (e.g. reset via web interface) are assessed as a restart.

  • Login attempt detected: A successful or failed login attempt at the web interface or CLI has been detected.

14. Logging

The router logs all events in connection with its operation. These can also be transmitted to a syslog server for regular external evaluation and monitoring of security-relevant events.

15. Volatile profile mode

The volatile profile mode enables a router to always go into operation in a defined initial state after a restart and to receive its specific configuration via an update server or router management. In this mode, all changes to the configuration (including profiles and ASCII configuration files) are lost when the router is restarted and the router restarts in the state it was in when it was changed to volatile mode. This means that, if configured accordingly, all cryptographic material will be lost if the router is disconnected from the power supply, as it is only stored in volatile memory. Cryptographic secrets will then only be uploaded from the server to the router during operation. There are only secrets for Bootstrap on the device.

16. Certificate manager

The certificate manager is a central site for administrating the various certificates and keys that are used for authentication and encryption of connections. It permits the regular update of certificates and keys and the protection of the certificate structure through CRL lists (certificate revocation lists).

EST (Enrolment over Secure Transport) is a protocol for the simple and more scalable enrolment and renewal of certificates and the retrieval of certificate revocation lists (CRLs) in large-scale network environments with PKI (public key infrastructure). The required certificates and certificate revocation lists are obtained and renewed automatically with this. The necessary private key is generated by the device itself and remains on it.

17. Safe decommissioning

Safe decommissioning permits to delete all data on the device, not only the allocation table as is the case when resetting to default settings. This will also delete the complete firmware from the router. Only a rudimentary rescue system will remain on the router, which can be accessed via the address http://192.68.1.1 and enables the router to be restored.

18. Router functions in default settings

All router functions relevant to IT security are listed here again with their settings in delivery condition (default settings).

18.1. Router functions in default settings

Function port

Access to web/REST interface via HTTPS

443

Access to classic web interface via HTTPS

443

Automatic session timeout after 15 minutes

DNS relay

53

DHCP server for IPv4 in IP net 1

67, 68

IP filter (Firewall) for IPv6

SLAAC

Network segmenting - Port 1: configuration network; the other ports are assigned to different deactivated networks depending on the router type

18.2. Functions deactivated in default settings

Function port

Authentication via user

Authentication via RADIUS- server

Access to web/REST interface via HTTP

80

Client authentication via certificate

Access to command line (CLI) via Telnet

23

Access to command line (CLI) via SSH

22

Debug access via SSH

22

Server for auto update

443

Dynamic DNS

53

VLAN

DHCP client

67, 68

DHCP server for IPv4 in IP net 2-5 as wel as for IPv6

67, 68

DHCP relay

67, 68

IPv6 Router Advertiser

NTP server

123

MCIP server

SNMP agent

RSTP

IP filter (Firewall) for IPv4

MAC filter

Dynamic routing

VPN connections

WAN connections

EST (Enrolment over Secure Transport)

Exclusive acceptance of signed update packages

The information does not claim completeness and correctness since the functions are subject to changes from time to time.