XIO USER MANUAL | 2106424MNAB | 121
6.5 Network Diagnostic Tools
Network communications diagnostic tools are available on the Network Diagnostic tools tab from PCCU.
This tab provides the ability to run the well-known PING and Traceroute network utilities. These two
utilities are used to determine packet delay and routes between the XIO and a host or another device.
Running PING and Traceroute require that Ethernet Interfaces are
enabled, active, and configured with correct IP parameters. Be sure to configure the
appropriate interfaces on the Networkin
g tab before running these commands. Click Help
from the Network Diagnostic Tools tab for additional parameter details and for interpreting
results.
To run diagnostics:
7 Configure security (recommended)
To secure access to the XIO, review the security features implemented.
7.1 Access points
Totalflow user interfaces and host products support connection with the XIO through several types of
communication ports, protocols, and services. These are points of entry that could be subject to
inexperienced, unauthorized or malicious access through a point-to-point connection or a network
connection. Physical access to the ports must be controlled to protect local and remote access. Enable on-
board security or enforce authentication before establishing a connection with any of the ports.
This section lists the communication ports, services, protocols, and the open Transmission Control Protocol
(TCP) ports that must be considered when securing devices.
7.2 Communication interfaces
The table below lists the default communication ports available in the XIO with standard configuration.
These ports are pre-configured from the factory. When enabled, these ports are ready for use, but are not
secured.
Unprotected ports make the full functionality of the device available to any user. Configure security
passcode or role-based authentication to prevent unauthorized access.
Table 7-1: Default communication ports on the XIO
communication
ports, default names
state
protocol
Security feature available
Totalflow/USB
(Read-only)
Bi-Level Security code authentication or Role-
base Authentication (Role-base Authentication,
RBAC)
Totalflow/TCP
(Read-only)
Bi-Level Security code authentication or Role-
base Authentication (Role-base Authentication,
RBAC)
TF – Remote
(Configurable)
Bi-Level Security code authentication or Role-
base Authentication (Role-base Authentication,
RBAC)