Zixi Security Best Practices

The following documentation describes Zixi’s security features and mechanisms, while providing instructions on how to set them up. In addition, the document provides best practices on how to setup a secure environment.

The document contains explanations and instructions on the following subjects:

  • Password protection
  • Using HTTPS/SSL connections
  • Using DTLS encryption
  • Using fixed-key encryption
  • Firewall settings
  • Remote SSH connections

For additional details on the setup and configuration of the Zixi software components, refer to the online documentation.




PDF Version


Search this documentation

Additional References

If running on AWS, it is advised that you follow the AWS best practices guidelines found here:  http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-best-practices.html

Securely Connect to Linux Instances Running in a Private Amazon VPC

https://aws.amazon.com/blogs/security/securely-connect-to-linux-instances-running-in-a-private-amazon-vpc/

Securing OpenSSH

Examples to securing your SSH tunnel in AWS or when running on-premise with OpenSSH:

https://wiki.centos.org/HowTos/Network/SecuringSSH?highlight=%28securing%29