Device access
Device access allows you to limit administrator and user access to certain services from custom and default zones (LAN, WAN, DMZ, VPN, Wi-Fi).
Local service ACL
The device carries a default ACL (access control list) when connected and powered on for the first time. Details of the default services and ports are given below. Click to enable or disable access to the services from the specified zones.
Admin services:LAN and Wi-Fi zones: HTTPS (TCP port 4444), Telnet (TCP port 23) and SSH (TCP port 22)
WAN zone: HTTPS (TCP port 443), Telnet (TCP port 23) and SSH (TCP port 22)
Authentication services:
LAN and Wi-Fi zones: Client authentication (UDP port 6060), captive portal authentication (TCP port 8090) and RADIUS SSO.
Network services:
LAN, WAN, and Wi-Fi zones: Ping/Ping6 and DNS
Other services:
LAN and Wi-Fi zones: Wireless protection, web proxy and SMTP relay
LAN, WAN, DMZ and Wi-Fi zones: SSL VPN (TCP port 8443)
LAN and WAN zones: User portal and dynamic routing
LAN, DMZ, VPN and Wi-Fi zones: SNMP
Best practices
Administrative services and user portal: We do not recommend allowing access to the web admin console (HTTPS), CLI (SSH), and the user portal from the WAN zone or over the SSL VPN port. If you must give access, we recommend using the best practices listed in the table in this section.
SSL VPN port: By default, all management services use unique ports. SSL VPN is set to TCP port 8443.
Consoles |
Secure access from WAN |
---|---|
Web admin console |
|
CLI console |
|
User portal |
For secure access from external networks, use VPNs and follow these best practices:
|
Secure access based on user accounts:
|
Local service ACL exception rule
You can allow access to the device’s admin services from specified networks/hosts. A list of all the configured rules is displayed.
- If HTTP was enabled in SFOS v15, all HTTP requests are redirected to HTTPS.
- HTTP rules in which the action is set to Drop are deleted.
Default admin password settings
The firewall is shipped with a default super administrator with the username and password set to admin. You can access the web admin console and CLI with these credentials. This administrator is authenticated locally by the device.
- Change the default password as soon as you deploy the device.
- Click Reset to default to restore the factory default password.
From 17.5 MR15, XG Firewall offers stronger password protection for the default super administrator. To benefit from the protection, you must change the password. This is a one-time change.
Public key authentication
Turn on Public key authentication for admin to allow access to the command line interface (CLI) using the SSH key.
Add the list of Authorized keys for admin. Generate these SSH keys using SSH client tools (example: PuTTY).