Skip to content
Customers frequently seek information and recommendations from Safran about hardening security, including general guidelines about available network security features, jamming and spoofing deterrence, bug fixes, and networking-related issues.

Sometimes they’re in search of specific practices for time servers and clients. Sometimes, because SecureSync®/9483 is part of critical infrastructure, they may not fully understand all the issues related to timing, such as GNSS jamming/spoofing, NTP vulnerability or the various types of network attacks.

Generally speaking, the correct answers are specific to each networking infrastructure and each customer’s policies. However, there are some general guidelines to follow to harden security on your SecureSync®/9483, and this document should help. It covers the following areas and explains how to use each to prevent cyberattacks:

  • Authentication and authorization
  • HTTPS and SSL
  • SSH
  • SCP
  • SFTP with public/private support

This document also consolidate the recommendations from various product manuals into one handy location. They identify each security feature, shows default settings and offers recommendations about whether you should choose to enable it.

To make it easier, we’ve also provided links to the online manuals for each protocol — so configuration help is just a click away.

Supporting Material

TECH TIP: SECURESYNC 1200 SECURITY HARDENING RECOMMENDATIONS

Related Posts

Network Visibility: Security Applications of Network TAPs, Brokers and Bypass Switches

Network Visibility: Security Applications of Network TAPs, Brokers and Bypass Switches

Security starts with awareness, but what happens when critical traffic slips through unnoticed? For security teams and network administrators alike,…
Why Cheap Standalone Clocks Cost You More: The Case for Synchronized & PoE Clocks

Why Cheap Standalone Clocks Cost You More: The Case for Synchronized & PoE Clocks

Accurate and synchronized timekeeping is crucial for maintaining operational efficiency in any organization. While inexpensive standalone clocks might seem appealing…
Profitap Cloud TAP: Unlocking Full Network Visibility in Kubernetes Environments

Profitap Cloud TAP: Unlocking Full Network Visibility in Kubernetes Environments

Achieving comprehensive visibility into network traffic across diverse environments is a critical challenge for IT teams. Profitap‘s Cloud TAP emerges…
AI-Generated Threats - Why your NDR can’t keep up and how to fix it with CySight CEO Rafi Sabel

AI-Generated Threats - Why your NDR can’t keep up and how to fix it with CySight CEO Rafi Sabel

In today’s rapidly evolving cyber threat landscape, the emergence of AI-generated attacks has posed significant challenges to traditional Network Detection…
Supplier Spotlight: Our EU Based Partners

Supplier Spotlight: Our EU Based Partners

At Telnet Networks, we take pride in operating a global partner ecosystem that brings together some of the most forward-thinking…