Best Practices for Managing Client Networks
Network Security and Equipment Protection Best Practices
Overview
This document outlines critical best practices for securing network assets and protecting equipment when managing client networks. Following these guidelines helps ensure network security and hardware longevity.
Network Access Security
VPN Access Requirements
- All LAN asset access must be connected to from client VPN
- Direct port forwarding from the public internet to LAN is strongly discouraged
- Refer to the Client VPN User Guide for setup instructions on:
- Windows
- OS X
- Android
- iOS
Exception Management
If port forwarding is absolutely necessary:
- Maintain rigorous security patch management
- Monitor end-of-life announcements
- Conduct regular CVE database vulnerability checks
- Document all exceptions and maintain a review schedule
Equipment Protection Guidelines
Surge Protection Requirements
All equipment must be protected with surge protectors, particularly in regions prone to thunderstorms. This includes:
- Electrical adapters
- Ethernet cables
- Coaxial lines
Recommended Surge Protection Specifications
Select protectors that offer equipment insurance coverage
- Use commercial-grade surge protection for power supplies
- Install dedicated Ethernet surge protection devices
- Implement coaxial line protection where applicable
Additional Resources
Documentation Access
Essential documentation can be found in the Support section at uplevelsystems.com, including: - Configuration Guides
- Frequently Asked Support Questions
- Product Data Sheets
Support Resources
For additional assistance:
- Contact technical support for specific inquiries
- Email: support @ uplevelsystems.com
- Phone: 971-317:3001
- Uplevel Knowledge Base
Regular Maintenance
Best Practices Schedule
- Monthly security patch review
- Quarterly vulnerability assessment
- Semi-annual surge protection equipment inspection
- Annual security policy review
Security Policy Enforcement
Compliance Requirements
- Document all network access methods
- Maintain logs of security exceptions
- Regular review of access policies
- Update security documentation as needed
Deploying Uplevel Hardware
Prepare To Deploy
We advise first completing our
Deployment Checklist while getting ready to deploy our gear. By doing so, installation downtime can be cut down and any pitfalls on the client network can be avoided.
Related Articles
Client VPN - ( L2TP-IPSEC, SSTP, SSL)
Login to your Uplevel Portal From your Customer's Configuration Page choose VPN Click the Checkbox next to Enable VPN Choose Click here to add a VPN user Enter Username, Password, and the Security Group the User is a Member of SoftEther VPN Client ...
Domain Controller (Active Directory) Setup
Introduction There aren't any guidelines or instructions on the functioning of the Uplevel Domain Controller because it acts essentially identically to a conventional Microsoft Domain Controller from the standpoint of workstations. Microsoft offers a ...
Configuring Security Groups (VLANs)
Configuration: To create a new Security Group ensure to chedck the “Enable Multiple Groups” checkbox located at the bottom left of the Portal > Overview Page. The button will appear. Clicking the Add Group button will present you with the following ...
Client VPN - OpenVPN with TOTP MFA
Our legacy Client VPN Setup Article is located here for all Operating Systems Client VPN is an add-on, flat rate, paid feature. We do not charge per account created. MSP's are able to create 1 management Client VPN account per customer at no charge. ...
Security Groups - InterVLAN Routing
Summary Your Uplevel Gateway's firewall implements firewall rules that govern traffic flow between security groups (VLANs / subnets) on the LAN. Devices in Guest are completely isolated and can only reach the Internet Devices in Boss can reach all ...