04.01.2015 Views

CR1000 Manual - Campbell Scientific

CR1000 Manual - Campbell Scientific

CR1000 Manual - Campbell Scientific

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Section 5. System Overview<br />

LoggerNet:<br />

• All datalogger functions and data are easily accessed via RS-232 and Ethernet<br />

using <strong>Campbell</strong> <strong>Scientific</strong> datalogger support software.<br />

• Cora command find-logger-security-code.<br />

Telnet:<br />

• Watch IP traffic in detail. IP traffic can reveal potentially sensitive<br />

information such as FTP login usernames and passwords, and server<br />

connection details including IP addresses and port numbers.<br />

• Watch serial traffic with other dataloggers and devices A Modbus capable<br />

power meter is an example.<br />

• View data in the Public and Status tables.<br />

• View the datalogger program, which may contain sensitive intellectual<br />

property, security codes, usernames, passwords, connection information, and<br />

detailed or revealing code comments.<br />

FTP:<br />

• Send and change datalogger programs.<br />

• Send data that have been written to a file.<br />

HTTP:<br />

• Send datalogger programs.<br />

• View table data.<br />

• Get historical records or other files present on the datalogger drive spaces.<br />

• More access is given when a .csipasswd is in place (so make sure users with<br />

administrative rights have strong log-in credentials)<br />

5.1.10.2 Pass-code Lockout<br />

Pass-code lockouts (historically known simply as "security codes") are the oldest<br />

method of securing a <strong>Campbell</strong> <strong>Scientific</strong> datalogger. Pass-code lockouts can<br />

effectively lock out innocent tinkering and discourage wannabe hackers on non-IP<br />

based telecommunications links. However, any serious hacker with physical<br />

access to the datalogger or to the telecommunications hardware can, with only<br />

minimal trouble, overcome the five-digit pass-codes blocking access. Systems<br />

that can be adequately secured with pass-code lockouts are probably limited to:<br />

• private, non-IP radio networks<br />

• direct links (hardwire RS-232, short-haul, multidrop, fiber optic)<br />

• non-IP satellite<br />

• land-line, non-IP based telephone, where the telephone number is not<br />

published.<br />

• cellular phone wherein IP has been disabled, providing a strictly serial<br />

connection.<br />

72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!