Category     

Cradlepoint Enterprise Cloud Manager (ECM) FAQ

« Go Back

Information

 
Content

Cradlepoint Enterprise Cloud Manager (ECM) FAQ


Quick Links

Summary

Frequently Asked Questions

Related Articles


Summary

This article provides some commonly asked questions and the answers to those questions regarding Enterprise Cloud Manager.

Frequently Asked Questions

What is Cradlepoint Enterprise Cloud Manager?

Enterprise Cloud Manager is Cradlepoint’s next generation network management solution. Rapidly deploy and dynamically manage networks at geographically distributed locations with Enterprise Cloud Manager, Cradlepoint’s next generation application platform. Improve productivity, reduce costs, and enhance the intelligence of your network and business operations.

How do I access Cradlepoint Enterprise Cloud Manager?

You can access Cradlepoint Enterprise Cloud Manager (ECM) by going to cradlepointecm.com.

Do new users receive a unique password?

When a new account is set up, the Account Administrator will receive an email from Cradlepoint with a unique link to take them to a page to create a new password for their account.

When the Account Administrator sets up a new user account, the user will receive an email with a unique link that upon selecting will take them to a page to create a new password for their account.

How strong are ECM passwords and how long do they last?

The following are the password requirements:

  • Password minimum length (default = 8)
  • Require one or more CAPITALIZED letters in the password (default = yes)
  • Require one or more numbers in the password (default = yes)

The administrator can set a session timeout (default = 120 minutes) for each user under the User Settings.

When an ECM account password is lost, how is it reset?

The user navigates to the “Request New Password” page via the "Forgot Password" link on the ECM central login page where an email address is entered. If the email address entered matches an email address associated with an ECM user, an email with a unique link is sent to the user. Upon receiving the email, the user clicks on the link that will take them to a page to select a new password for their account. If the email address entered does not match any account email addresses, a message will be displayed noting the email address isn’t recognized.

Cradlepoint support personnel do not have access to ECM user passwords and thus cannot provide any passwords over the phone.

How are passwords stored within the ECM Servers?

All passwords are stored in encrypted form using the NIST/FIPS Secure Hash Standard known as SHA-2. SHA-2 is a set of cryptographic hash functions designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. Our user passwords encryption uses the PBKDF2 algorithm with a SHA-256 hash.

Is User Data stored within the Cradlepoint devices?

No user data is stored on the Cradlepoint devices.

As a System Integrator, can I have multiple primary accounts that I can use to see and manage my customers' devices?

Yes, with ECM you can have multiple subaccounts for your customers. Your Account Administrator can manage all accounts, while creating other administrators to manage separate subaccounts (customers).

How many levels of user account privileges does ECM support?

Note: A guide for creating users can be found here for Legacy accounts and here for SSO account.  Please click here to see how to tell the difference between Legacy accounts and SSO accounts.

ECM supports three levels of user access privileges for a customer.

  • User - Users have full access to the account they are in.
  • User Administrator - Same access as users except they can create/edit other users.
  • Administrator – has full access to all accounts and sub-accounts and can create accounts and user permissions at any level within the account hierarchy. Only the Administrator can create accounts or user permissions.
  • Full Access User – has access to resources within their account and any sub-accounts below their account. The Full Access User cannot create new accounts or users.
  • Read-Only User – has read-only access for their account and any sub-account(s) below their account.
  • Diagnostics User – Same access as read only user, but with additional ability to reboot the router.

How does a router register and communicate with ECM?

An embedded ECM management agent exists on the device to communicate with ECM. A device-initiated protocol, designed for the variable characteristics of 3G/4G network connections, is used for support of devices with dynamic IP addresses located behind a firewall.

There are two ways a router registers with ECM:

  1. Local at the Cradlepoint Router: At the time of the initial registration using the routers local management UI, a user provides ECM username and password and the device securely attaches to ECM and shows up in the ECM Devices list.
  2. Cradlepoint Operations Registration for Customer: Using a list of router serial numbers or MAC addresses, an authorized Cradlepoint ECM admin creates a registration in a user’s account. The device checks in to see if it is managed by ECM. If it is, the device provides status and remains connected to ECM. If it is not, it checks in on a regular basis in case it is added later.

The device connection and communication uses secure, signed key technologies: SSL over TCP.

How do you support Private Networks (cellular or wired)?

ECM can support a customer’s Private Network (3G/4G or wired networks). For device management, ECM uses a full-duplex, asynchronous SSL protocol to manage the Cradlepoint routers over a single TCP connection (port 8001).

Support for Private Networks can be achieve by either of the following:

  • Customers create a firewall rule to allow ECM management SSL traffic routed over the Internet to the Cradlepoint cloud datacenter (single TCP connection – port 8001).
  • Extend the customer’s private network over VPN or private circuit to the Cradlepoint cloud datacenter firewall.
User-added image

Why does ECM require devices to sync with a time server?

ECM uses standard TLS-based encryption along with a proper signed certificate in our servers. This system has date range restrictions – devices must have a valid clock time in the 21st century – but the routers boot up at Unix epoch 0 (January 1, 1970). The TLS client thinks the certificate is invalid without a time sync.

Why is ECM saying that my device is offline when it's passing data?

If ECM reports that a device is offline, either 1) the device doesn't have an active WAN connection, or 2) it has lost connection to ECM.

If the device has an active WAN connection but ECM is reporting that it is offline, then it has (temporarily?) lost its connection to ECM. This could happen for one of the following reasons:

  1. A user has suspended the connection via the router administration pages.
    • Note: A guide for the suspended state can be found here
  2. The router has not yet checked in after an ECM maintenance window. This will be for a maximum of 45 minutes: it is dependent on the state of the router's Session Retry Timer when the ECM maintenance window ended.

How much data does being connected to Enterprise Cloud Manager consume?

Recent data shows that the average data usage is approximately 5–10 MB per router per month. This reflects what we expect to see in "typical" scenarios when routers have mostly default settings. Many settings could affect this amount, including generating lots of alerts, exporting lots of logs, and especially editing the connection pulse interval (default 120 seconds). A significantly faster connection pulse (e.g., 10 seconds) could increase data usage to 50 or even 100 MB per router per month, whereas a significantly slower pulse (e.g., 900 seconds) could decrease data usage to less than 1 MB per router per month (but runs the risk of slowing down the connection so much that the connection is broken and needs to reestablish itself, which uses additional data).

There are many variables that affect data usage and therefore Cradlepoint does not guarantee that a router will use any particular amount of data. These numbers are only provided to give a rough estimate of the amount of data usage you should expect based on data from other routers in the field.

Do you have an API (application program interface) for ECM?

Note: An overview for the ECM APIv2 can be found here

Yes, an open RESTful XML/JSON API is available for ECM (see our API documentation). The ECM API is accessed via HTTPS to the XML/JSON RESTful interface. The ECM API is much more powerful and extensible than the previous WiPipe Central API, so any development done using the WiPipe Central system API will have to be modified to work with the new ECM API.

How do you integrate with Network Management Systems?

Enterprise Cloud Manager can be integrated with any Network Management System via the Enterprise Cloud Manager API. The ECM API is accessed via HTTPS to the XML/JSON RESTful interface. We have customers doing this today using the WiPipe Central API.

What level of redundancy and reliability features do the Enterprise Cloud Manager Servers have?

Enterprise Cloud Manager servers are located within a physically secured area at a Tier IV datacenter that is SAS70 (SSAE Type II) certified. Only Rackspace authorized personnel have access to the secured area. Redundancy of the system includes the following:

Datacenter Redundancy and Reliability:

  • 24x7x365 onsite staff
  • Servers located in multiple availability zones
    • Each availability zone is designed as an independent failure zone. This means that availability zones are physically separated within a typical metropolitan region and are located in lower risk flood plains (specific flood zone categorization varies by region)
    • In addition to utilizing discrete uninterruptable power supply (UPS) and onsite backup generators, they are each fed via different grids from independent utilities to further reduce single points of failure
    • Availability zones are all redundantly connected to multiple tier-1 transit providers

Server and Software Redundancy:

  • Redundant load balanced architecture
  • Redundant load balanced application servers
  • Redundant database servers located in isolated private networks
  • Full nightly backups
  • AWS SLA for services provided

Does Cradlepoint perform vulnerability assessment of the ECM servers?

Cradlepoint uses a PCI Approved Scanning Vendor (ASV) service for external penetration testing of the ECM servers. Scans are run at minimum monthly, with remediation reports provided to management. Corrective actions are implemented based upon severity of potential threats.

What are the security measures for the Enterprise Cloud Manager Servers?

Enterprise Cloud Manager servers are located within the AWS global infrastructure which is designed and managed according to security best practices as well as a variety of security compliance standards, including: Datacenter Security Best Practices:

  • SOC 1/SSAE 16/ISAE 3402 ( formerl y SAS 70)
  • SOC 2
  • SOC 3
  • FISMA, DIACAP, and FedRAMP
  • DOD CSM Levels 1-5
  • PCI DSS Level 1
  • ISO 27001
  • ITAR
  • FIPS 140-2
  • MTCS Level 3

Datacenter Access Control:

Enterprise Cloud Manager servers are housed in AWS's highly secure data centers, which utilize state-of-the art electronic surveillance and multi-factor access control systems.

  • Data centers are staffed 24x7x365 by trained security guards and physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means
  • Authorized staff must pass two-factor authentication a minimum of two times to access data center floors
  • All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff
  • All personnel must be screened when leaving areas that contain customer data

Hardware and Software Security:

  • Use of AWS Virtual Private Cloud (VPC) for increased security Network traffic between AWS Regions, Availability Zones and individual datacenters travels over private network segments by default. These private network segments are fully isolated from the public Internet and not routable externally
  • Automated security scanning for potential vulnerabilities
  • Patch Management: Patches are applied quarterly, unless a high vulnerability issue is identified whereupon the process is expedited
  • Event and Log Management:
    • All URL traffic is logged. These logs are kept for 90 calendar days for review by network security management
    • Automated logs track and log changes, including backups of this data

Differences Between Series 2 and Series 3 Support in Enterprise Cloud Manager?

Cradlepoint is adding Enterprise Cloud Manager (ECM) support for Series 2 devices. The functionality available to Series 2 devices in ECM is on par with the functionality available in WiPipe Central (WPC). The stream protocol that connects Enterprise Cloud Manager to the router works exclusively with the technology available in Series 3 devices. Together, Series 3 devices connected to ECM represent breakthrough technology in real-time router information with the lightest possible cellular data usage. We recommend customers upgrade to Series 3 devices whenever possible to experience the real-time nature of this breakthrough technology.

For customers unable to upgrade at this time, Series 2 devices will be supported in Enterprise Cloud Manager, but with a similar latency to that experienced in WiPipe Central.

Series 2 devices need to have firmware version 2.0 or higher to work with Enterprise Cloud Manager.

NOTE: For a breakdown of which devices are in Series 2 and in Series 3 and their projected ECM compatibility, see the ECM Compatibility List in this article.

Key Differences
  • Interval settings (e.g., heartbeat, logs) have an assigned time that is not configurable in ECM.
  • A device status that has recently changed will experience a delay before being updated in ECM.
  • When editing a device configuration, users will see configuration pages that look like those from WiPipe Central.
  • Some of the column selection options are different.
Interval Settings
SettingDescription / UsageECM ConfigurationSystem-Wide Interval Setting
HeartbeatHow frequently a device sends its ‘heartbeat’ to ECM to indicate whether it's still onlineNot configurable via ECM5 minutes
Heartbeat TimeoutBased on the number of allowed missed heartbeats before a device's status switches from online to offlineNot configurable via ECM~15 minutes
LogsSetting that indicates whether a device sends logs to ECM, and how frequentlyCan enable/disable through ECM, but interval is fixed1 hour or 200 messages
Usage ReportsSetting that indicates whether a device sends usage reports to ECM, and how frequentlyCan enable/disable through ECM, but interval is fixed1 hour
Sync IntervalHow often a device should check with ECM to verify its managed status, session configuration values, and firmware and configuration versionsNot configurable via ECM15 minutes

 

 


Related Articles/Links


Published Date: 09/02/2016

This article not have what you need?  Not find what you were looking for?  Think this article can be improved?  Please let us know at suggestions@cradlepoint.com
 


 
Knowledge Home | Product