Security

8. Security

This page controls access to the SLZB‑OS web interface and the TCP “socket” that exposes the Zigbee coordinator to Z2M/ZHA. The options below are listed exactly as they appear.


image.png

8.1 Web‑server when socket is connected

What it does: Controls whether the SLZB‑OS web UI remains available while the coordinator’s TCP socket is actively in use by Zigbee2MQTT or ZHA.

Recommendation:
For maximum security on production systems, choose Disable. Use Enable while commissioning or troubleshooting.


8.2 Web server authentication

What it does: Enables login protection for the SLZB‑OS web interface.

Recommendation:
Keep this enabled and use a strong password.


8.3 IP whitelist for socket

What it does: Restricts which client can connect to the Zigbee TCP socket (the bridge used by Z2M/ZHA).

Recommendation:
Enable this and set Allowed IP to the host that runs Z2M/ZHA (e.g., your Home Assistant server).


8.4 Fallback Wi‑Fi AP password

What it does: Protects the fallback Wi‑Fi access point (brought up by the device in recovery/initial setup scenarios).

Recommendation:
Enable this to prevent unauthorized local access during recovery.


8.5 Save & Operational Notes

 


Revision #1
Created 14 August 2025 20:28:01 by Support3
Updated 14 August 2025 20:30:15 by Support3