Example of eserver setup network topology – Innotech eServer User Manual

Page 22

Advertising
background image

eServer Setup and Site Installation Instructions

Page 22

© Mass Electronics Pty Ltd 2009

Edition 5.0 dated 07/01/2014

Figure 2-1:  Example of eServer Setup Network Topology

2-2.2.3 Security Information

Both iComm and eServer are resistant to denial of service attacks from unauthenticated clients,

and both support 32-bit encryption with initial login challenge/response authentication. If a client's

login name and password is not authenticated immediately by eServer or iComm, the connection is

terminated.

Both servers have been tested for buffer overrun attacks, and both servers have an audit trail of

connection attempts. It is not possible, even with a custom-written rogue program that manages

proper authentication, for any program to connect to either of these servers and execute a file

or download unauthorised data from the server. Neither of these programs currently contains

functionality to allow file downloads, server-side execution, or any kind of interactive login.

 

To setup access over the internet, you will need to open Ports 80, 1433, 20000 and 20001 through the

Firewall to transmit and receive data. Then accept incoming connections, and Port Forward from the

external static IP address, to the internal static IP address of the computer running the iComm Server

and eServer software.  You will be able to see who has logged in via the audit trails, even from an

eServer Client computer.

From the eServer Client computer, only ports 80, 1433, 20000 and 20001 need to be open for an

outgoing connection.

2-2.3 Setup of a Dedicated Site Computer with ADSL Connection

2-2.3.1 Overview

This section provides detailed information for configuring a site computer with a dedicated ADSL

connection for running the eServer software. Refer to Figure 2-1 for an example eServer setup

network topology.

Advertising