Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In order to protect the  Image Added system, it is recommended that the machines within the Control Zone and Execution Zone are placed behind firewalls. For further information how this setup is done, see Communications through Firewalls in 4. Network Security in the System Administration Guide.

The internal protocol RCP and HTTP are used for communication between pico instances in in Image Added. It is recommended that both RCP and HTTP are encrypted with TLS, with or without authentication. For further information about how to set up encryption, see 4.2 RCP Encryption and 4.3 HTTP Encryption in 4. Network Security in the System Administrator's Guide.

...

Note
titleNote!

The cookies used by both web interfaces have the HttpOnly and Secure flags set.

The HTTP TRACE command is not allowed by the web interfaces in in Image Added.

Pico instances such as EC/ECSAs and SCs can be started remotely from the Platform Container via SSH. Remote access is disabled by default but can be enabled via the mzsh commando topo. For further information about enabling remote access to Execution Containers, see 2.2 Remote Access to Containers in the System Administrator's Guide.