The Crimson runtime web server is designed to be accessed from a secure network, such a might be found on the shop floor or within an organization. Some applications may demand access from outside such a network, and occasionally via a publicly accessible IP address. If such access is enabled, it is vital that Crimson’s security features are used to prevent unauthorized access to the device. Specifically, authentication should be enabled, and secure passwords employed; TLS mode should be left selected to ensure that data is encrypted; and ideally server access should be limited to trusted IP addresses, either via Crimson’s own settings or via the router used to implement public access. Better still, exposing the web server via a publicly accessible IP address should be shunned altogether, and either a VPN or Remote Access solution employed to ensure that only trusted actors have access to the device: Leaving any device open to the Internet, even via just one port, is an invitation to mischief, and at very least a denial-of-service attack.
Disclaimer
It is the customer's responsibility to review the advice provided herein and its applicability to the system. Red Lion makes no representation about specific knowledge of the customer's system or the specific performance of the system. Red Lion is not responsible for any damage to equipment or connected systems. The use of this document is at your own risk. Red Lion standard product warranty applies.
Red Lion Technical Support
If you have any questions or trouble contact Red Lion Technical Support by clicking here or calling 1-877-432-9908.
For more information: http://www.redlion.net/support/policies-statements/warranty-statement