© 2018 Johnson Controls 1

41
© 2018 Johnson Controls 1

Transcript of © 2018 Johnson Controls 1

Page 1: © 2018 Johnson Controls 1

© 2018 Johnson Controls 1

Page 2: © 2018 Johnson Controls 1
Page 3: © 2018 Johnson Controls 1
Page 4: © 2018 Johnson Controls 1
Page 5: © 2018 Johnson Controls 1
Page 6: © 2018 Johnson Controls 1
Page 7: © 2018 Johnson Controls 1
Page 8: © 2018 Johnson Controls 1
Page 9: © 2018 Johnson Controls 1
Page 10: © 2018 Johnson Controls 1
Page 11: © 2018 Johnson Controls 1
Page 12: © 2018 Johnson Controls 1
Page 13: © 2018 Johnson Controls 1
Page 14: © 2018 Johnson Controls 1

NOTE: The full list is also provided in the Illustra port

document located on the Cyber Protection website.

NOTE: A red radio button indicates the enabled protocol is insecure and

an alternative method of communication should be used.

Page 15: © 2018 Johnson Controls 1

NOTE: Services not required for normal operation or integration should not be enabled.

Page 16: © 2018 Johnson Controls 1
Page 17: © 2018 Johnson Controls 1

NOTE: The camera only accepts .pem format certificates.

The certificate must have the server certificate and private key combined, and the

private key must NOT be password protected.

Page 18: © 2018 Johnson Controls 1
Page 19: © 2018 Johnson Controls 1
Page 20: © 2018 Johnson Controls 1
Page 21: © 2018 Johnson Controls 1
Page 22: © 2018 Johnson Controls 1
Page 23: © 2018 Johnson Controls 1
Page 24: © 2018 Johnson Controls 1
Page 25: © 2018 Johnson Controls 1

NOTE: The authentication type should be SHA and if encryption is required, AES is

the recommended method. Please note that MD5 and DES are determined to be

deprecated and should not be used for any secure communications.

Page 26: © 2018 Johnson Controls 1
Page 27: © 2018 Johnson Controls 1
Page 28: © 2018 Johnson Controls 1
Page 29: © 2018 Johnson Controls 1
Page 30: © 2018 Johnson Controls 1
Page 31: © 2018 Johnson Controls 1

NOTE: It is important to only allow the user to perform the functions that are

required for day-to-day operation.

Auditing of a user responsibility should be performed on a regular basis to prevent

privilege creep.

Page 32: © 2018 Johnson Controls 1
Page 36: © 2018 Johnson Controls 1
Page 37: © 2018 Johnson Controls 1
Page 38: © 2018 Johnson Controls 1
Page 39: © 2018 Johnson Controls 1
Page 40: © 2018 Johnson Controls 1
Page 41: © 2018 Johnson Controls 1