Security Hardening
Activate/deactivate SSH access
Access control devices support SSH connections, allowing the Control iD team to perform diagnostics and remote technical support when needed. This feature facilitates maintenance and problem resolution without requiring physical intervention on the device.
By default, SSH is enabled to ensure that support can be provided whenever necessary. However, there are situations where administrators may choose to disable it, especially when there is a need to reduce the system's attack surface.
Keeping this service active can pose a security risk if credentials are compromised or vulnerabilities are exploited. In some organizations, security policies require restrictions on remote access, following regulatory guidelines or internal standards, which may make disabling SSH necessary.
Additionally, in environments where there are concerns about unauthorized access, such as locations with multiple administrators or employees who have access to the local network where the device is connected, disabling SSH can serve as an additional protection measure.
In order to activate or deactive the SSH access, one must use the same endpoint for modifying configurations, altering the ssh_enabled parameter listed in the configuration parameters.
Once deactived, the SSH access can be once again activated at any moment.
POST /set_configuration.fcgi
Parameters
- The parameter will be a JSON Object that contains the ssh_enabled* parameter and (optionally) other parameters.
- ssh_enabled = 0 deactivates the SSH access
- ssh_enabled = 1 activates the SSH access
Response
- The response will be a JSON Object corresponding to the modified setting parameters.
Request example
Enables the beep sound and deactivates the SSH access.
$.ajax({
url: "/set_configuration.fcgi?session=" + session,
type: 'POST',
contentType: 'application/json',
data: JSON.stringify({
general: {"beep_enabled": "1", "ssh_enabled": "0"}
})
});
Available network resources
On the table below, there is information about every network, IP and remote access resource from the devices.
Resource | Enabled by default | Default port | Description |
---|---|---|---|
HTTP | ✔️ | 80 | Used for the embedded Web Server interface |
HTTPS/SSL | ✖️ | 443 | Secure protocol for accessing the web interface via encryption |
NTP | ✖️ | 123 | Protocol used for network-based time synchronization |
RTSP | ✖️ | 554 | Protocol for real-time audio and video streaming |
ONVIF | ✖️ | 8000 | Standard for interoperability of video surveillance devices |
SIP | ✖️ | 5060 | Protocol used for signaling in VoIP communication. Enables SIP calls |
DNS | ✔️ | 53 | System for translating domain names into IP addresses |
DHCP | ✖️ | 67/68 | Protocol for automatic IP configuration on the network |
SNMP | ✖️ | 161/162 | Protocol for monitoring and managing devices in a network |
SSH | ✔️ | 22 | Used for secure remote access to the device |