Skip to content

Security Diagrams

There are several access points to our architecture:

  1. The Teltonika router may be access from the network-provider's portal, as well as over the VPN via SSH.
  2. The Dell may be access via SSH though the teltonika router using the local network. Additionally, a user with physical access to the terminal may use the root credentials to log-in.
  3. The virtual machine may be access via port-forwarding from the dell, an emulated serial console via QEMU, a VPN connection, or through a tunnel.
  4. Individual applications and services may be accessed via HTTPs over the internet and are password protected.

Access Methods

Diagram of access methods