Zixi Security Best Practices
The following documentation describes Zixi’s security features and mechanisms, while providing instructions on how to set them up. In addition, the document provides best practices on how to setup a secure environment.
The document contains explanations and instructions on the following subjects:
- Password protection
- Using HTTPS/SSL connections
- Using DTLS encryption
- Using fixed-key encryption
- Firewall settings
- Remote SSH connections
For additional details on the setup and configuration of the Zixi software components, refer to the online documentation.
Search this documentation
Additional References
If running on AWS, it is advised that you follow the AWS best practices guidelines found here: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-best-practices.html
Securely Connect to Linux Instances Running in a Private Amazon VPC
Securing OpenSSH
Examples to securing your SSH tunnel in AWS or when running on-premise with OpenSSH:
https://wiki.centos.org/HowTos/Network/SecuringSSH?highlight=%28securing%29