Best Practices for Managing Client Networks

Best Practices for Managing Client Networks

Network Security and Equipment Protection Best Practices

Overview

This document outlines critical best practices for securing network assets and protecting equipment when managing client networks. Following these guidelines helps ensure network security and hardware longevity.

Network Access Security

 VPN Access Requirements

  1. All LAN asset access must be connected to from client VPN
  2. Direct port forwarding from the public internet to LAN is strongly discouraged
  3. Refer to the Client VPN User Guide for setup instructions on:
    1.   Windows
    2.   OS X
    3.   Android
    4.   iOS

Exception Management

If port forwarding is absolutely necessary:
  1. Maintain rigorous security patch management
  2. Monitor end-of-life announcements
  3. Conduct regular CVE database vulnerability checks
  4. Document all exceptions and maintain a review schedule

Equipment Protection Guidelines

Surge Protection Requirements

All equipment must be protected with surge protectors, particularly in regions prone to thunderstorms. This includes:
  1. Electrical adapters
  2. Ethernet cables
  3. Coaxial lines
Select protectors that offer equipment insurance coverage
  1. Use commercial-grade surge protection for power supplies
  2. Install dedicated Ethernet surge protection devices
  3. Implement coaxial line protection where applicable

Additional Resources

Documentation Access

Essential documentation can be found in the Support section at uplevelsystems.com, including:
  1. Configuration Guides
  2. Frequently Asked Support Questions
  3. Product Data Sheets

Support Resources

For additional assistance:
  1. Contact technical support for specific inquiries
    1. Email: support @ uplevelsystems.com
    2. Phone: 971-317:3001
    3. Uplevel Knowledge Base

Regular Maintenance

Best Practices Schedule

  1. Monthly security patch review
  2. Quarterly vulnerability assessment
  3. Semi-annual surge protection equipment inspection
  4. Annual security policy review

Security Policy Enforcement

Compliance Requirements

  1. Document all network access methods
  2. Maintain logs of security exceptions
  3. Regular review of access policies
  4. Update security documentation as needed

Deploying Uplevel Hardware

Prepare To Deploy

We advise first completing our Deployment Checklist while getting ready to deploy our gear. By doing so, installation downtime can be cut down and any pitfalls on the client network can be avoided.

    • Related Articles

    • Client VPN - ( L2TP-IPSEC, SSTP, SSL)

      Login to your Uplevel Portal From your Customer's Configuration Page choose VPN Click the Checkbox next to Enable VPN Choose Click here to add a VPN user Enter Username, Password, and the Security Group the User is a Member of SoftEther VPN Client ...
    • Domain Controller (Active Directory) Setup

      Introduction There aren't any guidelines or instructions on the functioning of the Uplevel Domain Controller because it acts essentially identically to a conventional Microsoft Domain Controller from the standpoint of workstations. Microsoft offers a ...
    • Configuring Security Groups (VLANs)

      Configuration: To create a new Security Group ensure to chedck the “Enable Multiple Groups” checkbox located at the bottom left of the Portal > Overview Page. The button will appear. Clicking the Add Group button will present you with the following ...
    • Client VPN - OpenVPN with TOTP MFA

      Our legacy Client VPN Setup Article is located here for all Operating Systems Client VPN is an add-on, flat rate, paid feature. We do not charge per account created. MSP's are able to create 1 management Client VPN account per customer at no charge. ...
    • Security Groups - InterVLAN Routing

      Summary Your Uplevel Gateway's firewall implements firewall rules that govern traffic flow between security groups (VLANs / subnets) on the LAN. Devices in Guest are completely isolated and can only reach the Internet Devices in Boss can reach all ...