No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Maintenance Guide

TE10 Videoconferencing Endpoint V600R019C00

Describes how to maintain and troubleshoot the Videoconferencing Endpoint.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Common Measures Against Attacks

Common Measures Against Attacks

The system can defend against up to 200 common attacks. The measures defending against these attacks are described in this section.

  • Deploy firewall devices on the network where the endpoint is located.
  • Disable protocols that may impose attacks, such as Telnet and SSH. By default, Telnet and SSH are disabled.

    To prevent devices from attacks, it is recommended Telnet and SSH be disabled. To disable Telnet and SSH, on the endpoint web interface, choose System Settings > Security > SSH/Telnet and set both SSH and Telnet login to Do not allow.

  • If the endpoint is deployed on a public network, power off the endpoint when it is not in use.
  • Add frequently-used IP addresses or IP address segments to the whitelist. This approach helps defend against potential network threats, such as flood attack and slow HTTP attack. For details, see System Connection Whitelist.
  • Periodically back up system configuration files to restore the system if an exception occurs. For details, see Backup and Restoration.
  • Check device alarms every day and clear unnecessary alarms in time to ensure proper running of the system. For details, see Checking Alarms.
  • Periodically check and back up logs and find error information from them. For details, see Viewing Logs.
Translation
Download
Updated: 2019-06-15

Document ID: EDOC1100044668

Views: 15190

Downloads: 17

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next