This shows you the differences between two versions of the page.
right_ont_configuration [2018/01/22 13:53] admin created |
right_ont_configuration [2018/01/22 13:54] admin |
||
---|---|---|---|
Line 1: | Line 1: | ||
This section is derived from good practice guide of security. | This section is derived from good practice guide of security. | ||
- | * Each ONT/ONU need be identified by identification + unique long and random password. | + | * Each ONT/ONU need be identified by identification + **unique long and random password**. |
- | * If you keep a common password or password based on identification, a customer can use another id to login into your network | + | * If you keep a common password or password based on identification, a **customer can use another id** to login into your network |
- | * A customer can control totally their ONT/ONU, mean it can change their GPON SN, PPP login/pass, GPON mac address... | + | * **A customer can control totally their ONT/ONU**, mean it can change their GPON SN, PPP login/pass, GPON mac address... |
- | * Any limitation into ONT/ONU can be bypassed (as put bridge and access directly to the sub network) | + | * **Any limitation into ONT/ONU can be bypassed** (as put bridge and access directly to the sub network) |
* Put a random password to the wifi and web admin panel, to protect the user device | * Put a random password to the wifi and web admin panel, to protect the user device | ||
- | * Protect the sub network from wrong mac address and IP access, based if possible on unique couple id/password | + | * **Protect the sub network** from wrong mac address and IP access, based if possible on unique couple id/password |