No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Maintenance Guide

TE30, TE40, TE50, TE60, and TX50 Videoconferencing Endpoint V600R006C10

This document guides the operator to maintain the device

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Common Measures Against Attacks

Common Measures Against Attacks

The system can defend against up to 200 common attacks. The measures defending against these attacks are described in this section.

  • Deploy firewall devices on the network where the endpoint is located.
  • Disable protocols that may impose attacks, such as Telnet and SSH. By default, Telnet and SSH are disabled.

    To prevent devices from attacks, you are advised to disable Telnet and SSH. To disable Telnet and SSH, on the endpoint web interface, choose System Settings > Security > SSH/Telnet and set both SSH and Telnet login to Do not allow.

  • If the endpoint is deployed on a public network, power off the endpoint when it is not in use.
  • Add frequently-used IP addresses or IP address segments to the whitelist. This approach helps defend against potential network threats, such as flood attack and slow HTTP attack. For details, see System Connection Whitelist.
  • Regularly back up system configuration files to restore the system if an exception occurs. For details, see Backing Up and Restoring Settings.
  • Check device alarms every day and clear unnecessary alarms in time to ensure proper running of the system. For details, see Checking Alarms.
  • Regularly check and back up logs and find error information from them. For details, see Viewing Logs.
Updated: 2019-01-31

Document ID: EDOC1000184611

Views: 35538

Downloads: 180

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next