Zum Hauptinhalt springen
Version: 5.32

Cybersecurity management

Not yet reviewed

The content in this section is currently under review.

What you'll find here

  • Cybersecurity recommendations
  • How to set new passwords
  • How to configure password strength requirements
  • How to recover your passwords
  • How to permanently deactivate access to the 𝐿𝑒𝑔𝒶𝒸𝓎 Dashboard and set the latest Dashboard version as the default
  • List of open ports

What is cybersecurity?

Cybersecurity refers to the practice of protecting computers, servers, networks, and data from malicious attacks or unauthorized access. It involves implementing measures such as firewalls, antivirus software, encryption, and secure authentication methods to ensure the confidentiality, integrity, and availability of digital information. With the increasing frequency and sophistication of cyber threats, individuals and organizations must stay vigilant and regularly update their security protocols to mitigate risks and prevent potential breaches.

Best practices

info

These are just a few examples of Cybersecurity best practices and it's important to note that different organizations and individuals may have specific needs and requirements based on their unique circumstances.

  • Install and regularly update firewalls, and other security software on all your devices
  • Regularly backup important data and store it in a secure location offline
  • Keep operating systems, software, and firmware up to date with the latest security patches and updates
  • Educate yourself and your employees about cybersecurity awareness and the importance of safe online practices
  • Implement access controls by giving users only the privileges necessary to perform their job functions
  • Have options for password recovery set up

Managing passwords

Password security is crucial in protecting your online accounts. The password should be changed during commissioning.
Change passwords regularly (every 3 to 6 months) to minimize risks.

Setting the Manufacturer password

  1. Login to the Legacy Dashboard as a Manufacturer. See here for the default credentials if this is your first time logging in

  2. Apply the following configuration:

ScopeLocation in Legacy DashboardFieldValue
ManufacturerManufacturer > Manufacturer PasswordManufacturer Password (enter the current password to confirm)existing login password
Manufacturer > Manufacturer PasswordManufacturer Passwordnew password you want to set
  1. At the bottom of the window, click , then click to apply the changes
Info for Master-Slave setups

Apply the steps above on both the master and slave Charge Controller separately.

Password safety options for the Operator login

Manufacturers can manage Operators' password safety through the following settings:

ScopeLocation in Legacy DashboardFieldValueInfo
ManufacturerManufacturer > Manufacturer PasswordEnforce Password changeonForce change of Operator password on the next login attempt
Manufacturer > Manufacturer PasswordEnforce strong login passwordsonThe following requirements must be fulfilled:
  • lower case letters
  • upper case letter
  • digits
  • special characters

Password recovery and PUK settings

There are two ways to ensure a password recovery is possible for the Operator:

Set a Reset Password PUK

Using the PUK, Operators can issue a password reset.

  1. Login to the Legacy Dashboard as a Manufacturer
  2. Under Manufacturer set a Reset Password PUK
  3. At the bottom of the window, click , then click to apply the changes

Provide the Operator with a Master RFID card

Coming soon

We are currently preparing this section.

Dashboard security

On some Charge Controllers, the Legacy Dashboard is activated by default.
As a Manufacturer, before handing Charging Stations over to Operators, we recommend fully disabling the Legacy Dashboard or at least setting the Dashboard as the new default.

Besides generally improve cybersecurity, the non-legacy Dashboard enforces communication over HTTPS for all services.

Dashboard selection options

  1. Apply the following configuration:

ScopeLocation in Legacy DashboardFieldValueInfo
OperatorOperator > Web InterfaceWeb Interface1.0 (legacy)Sets the Legacy Dashboard as the default
2.0Sets the Dashboard as the default. The Legacy Dashboard is still available
2.0 onlySets the Dashboard as the default and disables access to the Legacy Dashboard.
Attention: this cannot be undone
  1. At the bottom of the window, click , then click to apply the changes

Enabling HTTPS

  1. Login to the Dashbard as an Operator
  2. Under SYSTEM > HTTPS set Enable HTTPS to On
  3. At the bottom of the window, click , then click to apply the changes

Kann ein Manufacturer als default HTTPS für Operators einrichten?

caution

Because there is no way to validate the IP address of each charge controller, by entering the Dashboard you will get a security warning by your browser. You can ignore the warning and proceed to the dashboard.

Handling the HTTPS certificates

What's the point of certificates in our context? (closed networks)

HTTPS certificates, also known as SSL/TLS certificates, are crucial for securing online communications. They provide a trusted means of verifying a website's identity, encrypting data transmission, and protecting users from potential cyber threats. These certificates are issued by trusted Certificate Authorities (CAs) and play a vital role in building trust between websites and their visitors.

To verify your Controller through HTTPS:

  1. Login to the Dashboard as an Operator
  2. Under SYSTEM > Certificate Handling click on HTTPS Certificates
  3. Click on the Download button on the right side. The controller provides you with an HTTPS key
  4. Let the HTTPS Certificate be verified by an IT specialist
  5. Upload the verified Certificate onto your controller.
  6. At the bottom of the window, click , then click to apply the changes

Default port forwarding

See here for the list of ports that are forwarded by default.

Deleting private data

  1. Login to the Dashboard as an Operator
  2. Under SYSTEM > System Maintenance click