Firewall Configuration Rules
Firewall Configuration Rules
For every group, except where noted, the following Firewall Rules must be applied to each device.
Exception Group: Exempt Modems, CTI GK Test Modem
Open a Target group (Example: Control Group - Active)
Navigate to Network Settings > Firewall Rules
There is a RULE Set Name called "CTI FIREWALL ACCESS RULES.
The drop-down box setting should be "Preserve the firewall rules on devices that receive no rule sets (Default)
Click on the rule name to see its configuration
The following setting should be:
Firewall Rule Set: Enable
Device Selection: All Balance and Max Devices (There should be no Tags identified)
Firewall Rule Tab
Outbound Rules - Default
Inbound rules - All are Enabled and show the allowable Source IPs that can connect to a modem. If the IP is not in the list, a connection attempt should fail.
Internal Network Firewall Rules - Set to Default
Intrusion Detection and DoS Prevention - set Enable to UNCHECKED
Local Service Firewall Rules - Set to Default
Firmware Policy
Firmware Policy
We aim to keep all communicating devices on the same version of FW. This is bets accomplished by setting the Organizational Firmware Policy by:
Organization Settings > Firmware Policy
HW Version 3 set to 8.5.4 build 5407 (as of 3/1/26)
HW Version 4 set to 8.5.4 build 5407 (as of 3/1/26)
HW Version 1 set to 8.3.0 build 5256 (as of 1/1/25)
Reboot Policy
Reboot Policy
Best practices indicate that modems should be rebooted periodically. We aim to reboot every communicating device each day during the morning hours.
Reboot schedules are set via:
Target Group > Settings > Device System Management
The following reboot schedules are configured:
As of March 2026
0-Clients - 3:15AM
Atlantis - 3:00AM
Control Group - Active - 2:15AM
Control Group - WIP - 2:30AM
EQS SIM Swap SN - 2:00AM
EquipSoluitons - 3:45AM
General Device List II - 2:45AM
Seasonal Summer - 4:00AM
Seasonal Winter - 4:00AM
Example:


