Using secure reader connections (Basic) - The protocols used to communicate with readers must be secured because the communication with a reader can be listened to and manipulated by an attacker. - Security Center 5.12

Security Center Hardening Guide 5.12

Product
Security Center
Content type
Guides > Administrator guides
Version
5.12
ft:locale
en-US
Last updated
2024-12-17

The protocols used to communicate with readers must be secured because the communication with a reader can be listened to and manipulated by an attacker.

What you should know

Some communication protocols are more secure than others. Follow the recommendations to ensure your reader connections are secure:
  • Avoid using the Wiegand protocol.
  • Use the OSDP v2 protocol with the secure channel mode enabled.
  • Use the SSCP v2 protocol with STid readers.
NOTE: The reader must be online for the connection settings to be taken into account in the security score.

Procedure

  1. From the Config Tool homepage, open the Access control task, and click the Roles and units view.
  2. From the entity browser, select an access control unit.
  3. If you are using Mercury controllers, click the Peripherals tab, then expand the Mercury controllers and downstream panels.
  4. If you are using any other type of interface modules, click the Hardware tab, then click the tabs for your integrations.
  5. Change the reader settings to follow the recommendations, if applicable.
    Not all interface module and reader combinations support secure connections.
    The following reader connections are not secure:
    • Wiegand readers.
    • Clock and Data readers.
    • OSDP readers that have not been enabled for secure pairing.
    • OSDP readers that use a default key.
  6. Click Apply.