Secure your LiV Pi

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
Report Content as Inappropriate

Secure your LiV Pi

This post was updated on .
Your LiV unit is probably connected to your home router.
Just like any other computers/devices that you are using at home, you should be concerned about protecting your LiV device from viruses and malicious intruders.

Your home router should be your first line of defense, so you probably have a firewall up and running on it. WiFi networks are inherently insecure, so if your router has a WiFi access point on it, you should assume that a malicious user can easily get your WiFi password and connect to your network. It is a good idea to only allow connections to your router from known MAC addresses (i.e. your devices).

After you assembled and setup your LiV Pi you should:
1) change the SSH password on your LiV Pi, close dedicated SSH port 22 or simply disable SSH service/daemon
2) change password for Tight VNC server installed on LiV Pi, close default VNC port 5800/5900 or disable VNC service
3) if you are using Jabber/XMPP to connect to LiV Pi, open port 5222 on your home router, otherwise you can close this port on the home router
4) LiV runs a web server and provides access to JSON APIs on port 5000. If you want to access these from outside your LAN, you should open port 5000 on your home router and do the port forwarding settings described on our website.