No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


HUAWEI Bar 500 V600R019C00 Maintenance Guide

Describes how to maintain, and troubleshoot the Videoconferencing Endpoint.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Common Measures Against Attacks

Common Measures Against Attacks

The system can defend against up to 200 common attacks. The measures defending against these attacks are described in this section.

  • Deploy firewall devices on the network where the endpoint is located.
  • Disable protocols that may impose attacks, such as Telnet and SSH. By default, Telnet and SSH are disabled.

    To prevent devices from attacks, it is recommended Telnet and SSH be disabled. To disable Telnet and SSH, on the endpoint web interface, choose System Settings > Security > SSH/Telnet and set both SSH and Telnet to Do not allow.

  • If the endpoint is deployed on a public network, power off the endpoint when it is not in use.
  • Add frequently-used IP addresses or IP address segments to the whitelist. This approach helps defend against potential network threats, such as flood attack and slow HTTP attack. For details, see System Connection Whitelist.
  • Periodically back up system configuration files to restore the system if an exception occurs. For details, see Backup and Restoration.
  • Check device alarms every day and clear unnecessary alarms in time to ensure proper running of the system. For details, see Checking Alarms.
  • Periodically check and back up logs and find error information from them. For details, see Viewing Logs.
Updated: 2019-06-25

Document ID: EDOC1100054964

Views: 8933

Downloads: 9

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next