HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.
|
|
- Kory Fisher
- 8 years ago
- Views:
Transcription
1 V100R011 Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.
2 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China i
3 About This Document About This Document Overview This document introduces security maintenance operations of HUAWEI 9000 HD Videoconferencing Endpoint (endpoint for short). Related Documents Document Title Describes... Document Location HUAWEI 9000 HD Videoconferencing Terminal Admin Guide HUAWEI 9000 HD Videoconferencing Endpoint Command Reference HUAWEI 9000 HD Videoconferencing Endpoint Communication Matrix Configuration, management, and troubleshooting of the endpoint. Functions, parameters, formats, usage guidelines, and examples of all endpoint commands. Ports, protocols, IP addresses, and authentication modes for the communication of the endpoint. Website: Choose SUPPORT > Product Support > UC&C > Video Terminal > ViewPoint 9030 Website: Website: Intended Audience This document is intended for: Technical support engineers Maintenance engineers ii
4 About This Document Symbol Conventions The symbols that may be found in this document are defined as follows: Symbol Description Alerts you to a high risk hazard that could, if not avoided, result in serious injury or death. Alerts you to a medium or low risk hazard that could, if not avoided, result in moderate or minor injury. Alerts you to a potentially hazardous situation that could, if not avoided, result in equipment damage, data loss, performance deterioration, or unanticipated results. Provides a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement important points in the main text. iii
5 Contents Contents About This Document... ii 1 Overview Purpose of What is Layered Application Layer Account List Administrator Password Web Management Account Touch panel Account Serial Port Account SSH and Telnet Login Upgrade Password Network Diagnostics Tool Account Bootrom Password Administrator Account Restoring Normal and Bootrom Systems to Default Settings SiteCall Security Enabling the H.235 Encryption Web User Management Logging In to the Web Interface Changing the Password Web Access Control SSH Access Control User Login Checking Whether Telnet Login is enabled Viewing Logs Enabling and Disabling FTPS Configuring an FTPS Server Site Monitoring and Management Enabling the Site Monitoring and Management Function Taking Picture Upgrading Using the Bootrom iv
6 Contents Preparing for the Upgrade Performing an Upgrade Bootrom Operations Verifying a Digital Signature Working Environment Requirements Verifying FileIntergrityVerify.exe Verifying the Signature System Layer Security Network Layer Security Management Layer Security Principles of System Account Management Permission Management Auditing Principles Password Maintenance Recommendations Logs Maintenance Recommendations Checking Logs Regularly Backing up logs regularly Security Evaluation Recommendations Backup Recommendations Defects Feedback Recommendations Emergency-Response Mechanism Appendix v
7 1 Overview 1 Overview 1.1 Purpose of Now application systems face severe security threats. Once problems occur, business might be disturbed, profits reduced, or even systems break down. Users must build up and maintain the application system security from different layers, and discover and solve potential threats in advance. Besides, considering the endless emergence of safety threats, a mere dependence on technology can hardly ensure the application system security. Users must build up a safety management system based on security maintenance suggestions and problems they found during the use of the endpoint to ensure a smooth and safe operation of the endpoint. 1.2 What is Layered Application Layer System Layer Network Layer According to the target and purpose of security maintenance, maintenance personnel must safeguard the service system from different layers. Security maintenance from the application layer is to protect the endpoint and its web management system so that they can provide services to users with a smooth operation. Security maintenance from the system layer is to ensure a smooth operation of the operating system, which can support the operation of application software. Security maintenance from the network layer is to ensure that network devices, such as the switch, router, and firewall, function properly and that security strategies are implemented at the network layer. 1
8 1 Overview Management Layer Security maintenance from the management layer is to strengthen people's management and avoid threats. Maintenance from the management layer involves the maintenance operations at all preceding layers. 2
9 2.1 Application Layer Account List Administrator Password If an administrator password is set for the user interface controlled by the remote control, common users must enter this password to access the Settings, Utilities, Diagnostics, Customize Option Bar screens. The administrator password is left blank by default. If no administrator password is set, common users have access to all functions; therefore, you are advised to set the administrator password immediately after the endpoint starts for the first time. To set the administrator password, choose Settings > Security > Password Web Management Account The endpoint supports a maximum of three users to log in to the web interface concurrently. Users are categorized and assigned with different permissions as described in Table 2-1. Table 2-1 Web management account Account Name Default Password Description Remarks admin admin This account is the default account with the highest permission and cannot be deleted. For account levels, see section 2.6 "Web Access Control." To ensure account security, you are advised to change the password after the first login. For details about how to change the password, see section "Changing the Password." Touch panel Account You can log in to the endpoint from the touch panel to initiate and control the conference. Table 2-2 describes the touch panel account. 3
10 Table 2-2 Touch panel account Account Name Default Password Description Remarks api api The account is used to log in to the endpoint to initiate and control the conference on the conference control interface. To ensure account security, you are advised to change the password after the first login. For details about how to change the password, see section "Changing the Password." Serial Port Account You can log in to the endpoint using its COM1 and COM2 serial ports from a computer to debug or troubleshoot the endpoint. Table 2-3 describes the serial port account. Table 2-3 Serial port account Account Name Default Password Description Remarks DEBUG SHELL viewpoint9000 Log in to the endpoint using serial points from a computer to debug and troubleshoot the endpoint. Specifies the COM1 serial port account. To ensure account security, you are advised to change the password after the first login. To change the password: On the interface controlled by the remote control, choose Settings > Security > Telnet Login. On the web interface, choose System Settings > Network > Security and Service. DEBUG TELNET viewpoint9000 Specifies COM2 serial port account. To ensure account security, you are advised to change the password after the first login. To change the password: On the interface controlled by the remote control, choose Settings > Security > Telnet Login. On the web interface, choose System Settings > Network > Security and Service. Baud rates of COM1 and COM2 are 9600 Baud. 4
11 2.1.5 SSH and Telnet Login The endpoint supports the Telnet login and Security Shell (SSH) login. Telnet is an insecure protocol and enabled by default. SSH is a cybersecurity protocol for remote access using the encryption and authentication mechanism in an insecure cyber environment. During SSH login, all user data are encrypted. To ensure the security, you are advised to use the SSH login. You can log in to the endpoint through port 23 using the unencrypted Telnet. Telnet is enabled by default and the Telnet login permission configuration is provided on the web interface and remote control interface. You can log in to the endpoint through port 22 using the encrypted SSH. SSH is enabled by default and the Telnet login permission configuration is provided on the web interface and remote control interface. SSH and Telnet Login to the Normal System The normal system supports the SSH and Telnet login. The accounts and default passwords for the SSH and Telnet logins are the same and described in Table 2-4. Table 2-4 SSH and Telnet login accounts Account Name Default Password Description Remarks debug debug Administrator account with the highest permission for system debugging admin admin Common user account with a permission level lower than the administrator account for test test testviewpoint Special account for debugging with a permission level lower than the administrator account for debugging You can change the account name and password for other SSH client users when you log in to the endpoint using the administrator account. - This is a special account and not for common users. apiuser By default, the password is left blank. Touch panel account with a permission level lower than the administrator account for debugging This is a special account and not for common users. user user Common user account with a permission level lower than the administrator account for debugging - Telnet Login to the Bootrom System The bootrom system supports the Telnet login. Table 2-5 describes the Telnet login accounts. 5
12 Table 2-5 Telnet login accounts Account Name Default Password Description Remarks debug debug Administrator account for debugging with the highest permission admin 903X_admin Common user account with a permission level lower than the administrator account for debugging user user Common user account with a permission level lower than the administrator account for debugging You can change the user name and password for other users when you log in to the endpoint using the administrator account. - - To ensure account security, you are advised to change the password after the first login. For details about how to use the debugging commands to change the password and debug, see the HUAWEI 9000 HD Videoconferencing Endpoint Command Reference Upgrade Password To upgrade the endpoint, you need the upgrade password listed in Table 2-6. Table 2-6 Upgrade password Account Name Default Password Description Remarks None viewpoint9000 or api This password is required to upgrade the endpoint. Touch panel password can also be used as the upgrade password. The default password is api. The upgrade password changes with the Touch panel password. To ensure account security, you are advised to change the password after the first login. To change the password: On the interface controlled by the remote control, choose Settings > Security > Telnet Login. On the web interface, choose System Settings > Network > Security and Service. 6
13 2.1.7 Network Diagnostics Tool Account You can use the network diagnostics tool to troubleshoot the endpoint. Table 2-7 describes the network diagnostics tool account. Table 2-7 Network diagnostics tool account Account Name Default Password Description Remarks admin admin This account is used to use the network diagnostics tool to troubleshoot the endpoint. The account and password are the same as those used to log in to the web interface of the endpoint Bootrom Password After the bootrom system starts, you must enter the password to log in to the system. You can access the bootrom system only through serial ports. The default password for the bootrom system is hwviewpoint. To ensure account security, you are advised to change the password after the first login. For details about how to change the password, see the HUAWEI 9000 HD Videoconferencing Endpoint Command Reference. After logging in to the bootrom system, you can: Boot from flash Boot from network Enter equipment test Set the MAC address Get the MAC address Show boot line Use last set parameters to boot Reboot Show Event Detail Record (EDR) information Administrator Account The administrator needs to enter the account name and password listed in Table 2-8 to log in to the endpoint. Table 2-8 Administrator account Account Name Default Password Description Remarks v3user Manage the endpoint using a computer. For example, you can configure endpoint settings, query the endpoint status, and restart and upgrade the endpoint. - 7
14 2.2 Restoring Normal and Bootrom Systems to Default Settings Normal System If you forget the passwords of the normal or bootrom system, restore the system (including the passwords) to its default settings. Set the dual in-line package (DIP) switches to Norm and restart the endpoint. When the restart is complete, toggle the No.1 DIP switch six times within 10 seconds. Figure 2-1 shows the DIP switches. Figure 2-1 ViewPoint 9030, VP9035A, ViewPoint 9039S, or VP9039A DIP switch Bootrom System Set the DIP switches to Load and restart the endpoint. When the restart is complete, toggle the No.1 DIP switch six times within 10 seconds. Figure 2-1 shows the DIP switches. 2.3 SiteCall Security The endpoint uses HTTPS (Hypertext Transfer Protocol Secure) mode to upload the multipoint conference information and supports Transmission Control Protocol (TCP) mode when a multipoint conference is initiated. If HTTPS mode is disabled, the endpoint uses the insecure TCP mode. You are advised to use HTTPS mode for better communication security. If HTTPS mode is enabled, you are advised to enable Multipoint conference authentication. Enable HTTPS mode and Multipoint conference authentication. On the interface controlled by the remote control, choose Settings > Network > IP > H.323 and enable HTTPS mode and Multipoint conference authentication. On the web interface, choose System Settings > Protocol > H.323/SIP Settings and enable HTTPS mode and Multipoint conference authentication. 8
15 2.4 Enabling the H.235 Encryption Background Procedure The H.235 encryption is about encrypting the media streams using a negotiated encryption algorithm and key. The media streams can be decrypted using the same algorithm and key. Therefore, unauthorized users cannot access the media streams. An IP network is not a quality-guaranteed or secure network. Encrypting the media streams can better secure video communications. Both parties in communications must support the encryption function. H.235 encryption is disabled by default. You are advised to enable it. Step 1 Choose Settings > Security > Encryption Policy, you can then set H.235 encryption to: Disable: No media streams are encrypted. Enable: Media streams are encrypted. If this option is selected, the endpoint can attend only encrypted conferences. Maximum interconnectivity: The call setup is the prerequisite for encryption or not. Step 2 Select Save to enable the settings to take effect. ----End 2.5 Web User Management The web interface of the endpoint supports two types of users: administrators and common users. Administrators: Administrators have all permissions to the web interface. Administrators can change common users' accounts and passwords. Common users: They have some permissions on the web interface and can configure only personal settings but not system settings Logging In to the Web Interface Step 1 Open a browser on the computer. In the address box, enter the IP address, such as Step 2 Press Enter. The interface shown in Figure 2-2 is displayed. If the security certificate is invalid, click Continue to this website to resume the login. 9
16 Figure 2-2 Login page Step 3 Enter the user name and password. Select a language. Step 4 Click Log In. ----End To ensure account security, you are advised to change the password after the first login Changing the Password On the web interface, you can change the passwords to the web management account, common user accounts, and Touch panel accounts. Step 1 Log in to the web interface and choose System Settings > Personal. Step 2 Click the Personal tab and change the password. Step 3 Click Save. ----End 2.6 Web Access Control The endpoint adopts HTTPS mode, which is the secure version of HTTP. Following are methods to control the web access: Support the user to submit the log out application. When you have logged in to the web interface, you can click Exit in the upper right. The login interface is displayed. Set the maximum number of users that can log in to the system concurrently. A maximum of three users can log in to the web interface simultaneously. The endpoint supports SSL encryption. 10
17 The endpoint supports the switchover between HTTPS and HTTP. Enable SSL encryption for secure communication using HTTPS. After SSL encryption is enabled, HTTPS is enabled. By default, SSL encryption is enabled on the system. 2.7 SSH Access Control User Login During remote access and data transmission, SSH commands can be run to create an encrypted channel between the application layer and client. Following uses PuTTY as an example to describe the SSH access control methods. Step 1 Run PuTTY on your computer. The PuTTY Configuration dialog box shown in Figure 2-3 is displayed. Figure 2-3 PuTTY Configuration Step 2 In Host Name (or IP address), enter the IP address, such as Step 3 Select SSH for Protocol. Use the default value for Port. Step 4 Click Open. 11
18 The login interface is displayed. Step 5 Enter the user name and password and run the commands. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Command Reference. ----End The administrator name and password for both Telnet and SSH logins are debug Checking Whether Telnet Login is enabled By default, Telnet Login is enabled. You can disable it from the user interface controlled by the remote control or the web interface. To enable or disable Telnet Login from the user interface controlled by the remote control: Choose Settings > Security. Check whether Telnet Login is selected. To enable or disable Telnet Login from the web interface: Choose System Settings > Network. Click the Security and Service tab and check whether Allow is selected for Telnet Login. Telnet is an insecure communications protocol. You are advised to disable Telnet Login. 2.8 Viewing Logs Logs record all non-query events during the endpoint running, such as user operations commands. Logs can be exported from the web interface. Step 1 Log in to the web interface and choose Maintenance > Logs. Step 2 On the Logs page, click Export. Step 3 Click Save in the displayed dialog box. Step 4 Choose the folder to save the logs and click Save. Step 5 Open the exported logs using the Internet Explorer. ----End 2.9 Enabling and Disabling FTPS The endpoint supports the switchover between File Transfer Protocol over SSL (FTPS) and File Transfer Protocol (FTP). To ensure communications security, enable SSL encryption. After SSL encryption is enabled, FTPS is enabled. Run the following commands to enable or disable FTPS. main cpu->ui config set Security.IsUseFtpsInDownload 12
19 IsUseFtpsInDownload(1) :0 1 refers to enable the function. 0 refers to disable the function Configuring an FTPS Server FTPS is an extension of the commonly used FTP to support the SSL. The FTPS server ensures the security of the endpoint network address book. Following uses the FileZilla server as an example to describe how to configure an FTPS server. Step 1 Set the IP address of the computer on which the FileZilla server is to be installed. Ensure that the IP addresses of the computer and endpoint are in the same network segment. Step 2 Run the FileZilla_Server-0_9_41.exe on the computer. Step 3 Double-click Figure 2-4. to launch the FTPS server. Click OK in the displayed dialog box shown in Figure 2-4 Connect to Server Step 4 Choose Edit > Settings. The dialog box shown in Figure 2-5 is displayed. 13
20 Figure 2-5 Server settings Step 5 Click SSL/TLS settings in the left column and select Enable FTP over SSL/TLS support(ftps), click Browse to import the certificate, and click OK. If no certificate is available, click Generate new certificate. Step 6 Choose Edit > Users. The dialog box shown in Figure 2-6 is displayed. Figure 2-6 Adding a user Step 7 Click Add to add a user. Select Enable account and Password and enter the password. 14
21 Step 8 Choose Shared folders > Add and set the directory for the software to be used for upgrade in the dialog box shown in Figure 2-7. Figure 2-7 Setting the directory for the software to be upgraded Step 9 Click OK. ----End After the FTPS server configuration is complete, configure the network address book. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Administrator Guide Site Monitoring and Management This function involves privacy protection. Ensure that its use complies with local laws and regulations. To ensure the conference security and protect its privacy, this site monitoring and management function is disabled by default. You can enable it from the user interface controlled by the remote control Enabling the Site Monitoring and Management Function Taking Picture To enable the site monitoring and management function: On the user interface controlled by the remote control, choose Settings > Security > Web Login and enable Video Control. After the site monitoring and management function is enabled, you can capture and view local and remote videos and presentations on the web interface. Step 1 On the web interface, choose Device Control > Video Control. 15
22 On the Video Control interface, appears on the endpoint display to indicate that the video monitoring and management function is enabled. Step 2 Select the source you want capture of and click Capture. Step 3 In the displayed interface, right-click the picture. Step 4 From the displayed shortcut menu, choose Save Picture As to save the picture. ----End 2.12 Upgrading Using the Bootrom If you fail to upgrade the software locally, you can use the bootrom system Preparing for the Upgrade Before the upgrade, note the following prerequisites: Save the software package for upgrading on the computer. Connect the computer to the endpoint through a crossover cable or a switch Performing an Upgrade Step 1 Set the IP address of the computer to a static IP address, such as , and then set the subnet mask to Step 2 Turn the switch on the rear panel of the endpoint to Load. When you are using the HUAWEI VP9030, HUAWEI VP9035A, HUAWEI VP9036S, HUAWEI VP9039S, or HUAWEI VP9039A, you can turn both switches to Load (the IP address of the endpoint remains unchanged) or turn switch 1 to Load (the IP address of the endpoint changes to When you are using the HUAWEI VP9033, HUAWEI VP9035, HUAWEI VP9036, or HUAWEI VP9039, turn switch 1 to Load. The IP address of the endpoint changes to After you turn the switch to a different position, the IP address of the endpoint may change. Ensure that the IP addresses of the computer and endpoint are in the same network segment. Step 3 Restart the endpoint. Step 4 Log in to the endpoint using Telnet and run the main enableupg 1 command to enable the bootrom system upgrade function. By default, the upgrade function is disabled. Step 5 Extract the upgrade software from the compressed file on the computer. Step 6 Run UpgradeTool.exe to display the upgrade window. Step 7 Choose all files and click Browser to find the.dat files. Step 8 Enter the IP address of the endpoint, such as Then click Upgrade. 16
23 Step 9 In the displayed dialog box, click OK to start the upgrade. Step 10 When the upgrade is complete, log in to the endpoint using Telnet and run the main enableupg 0 command to disable the bootrom system upgrade function. Step 11 Turn the switch on the rear panel of the endpoint to Norm. Step 12 Restart the endpoint. ----End 2.13 Bootrom Operations Step 1 Use a serial cable to connect the serial port on the computer to the COM1 serial port on the endpoint. Step 2 Power on the endpoint and press Ctrl+C for three times after the information shown in Figure 2-8 is displayed. The system prompts you to enter the password. Figure 2-8 Starting the system Step 3 Enter the password to the bootrom system. The information shown in Figure 2-9 is displayed. Figure 2-9 Selecting a step 17
24 Step 4 Enter a number after Please input your choice. The system performs the operation. ----End 2.14 Verifying a Digital Signature To ensure the integrity of software received by Huawei customers, all software or software packages must be digitally signed. Any change to the software or software package after signature will invalidate the signature. Customers can check whether software or software package has been altered during delivery by verifying the digital signature. Following lists the software to be verified using the digital signature. ShowTool.exe UpgradeTool.exe Network Diagnostician.exe Address Book Editor (TIP).xls Address Book Editor.xls FileIntergrityVerify.exe is a digital signature verification tool provided for Huawei technical support engineers and enterprise customers. Huawei technical support engineers can get the verification tool from the UC&C Security Competence Center of Enterprise BG Working Environment Requirements FileIntergrityVerify.exe works in the following environment: Operating system: Window Vista, Windows Server 2008, or later Libeay32.dll (provided with FileIntergrityVerify.exe) Verifying FileIntergrityVerify.exe Step 1 Right-click the FileIntergrityVerify.exe icon. Step 2 From the displayed shortcut menu, choose Properties and click Digital Signatures. Step 3 Select a signature for Signature list and click Details. The dialog box shown in Figure 2-10 is displayed. 18
25 Figure 2-10 Digital Signature Details Step 4 Click View Certificate. Check the information about Issued to, Issued by, Valid from...to... from the dialog box shown in Figure If the certificate is changed, the digital signature tool may have been changed. In this case, you cannot use the existing tool for verification and must get a secure signature tool from the UC&C Security Competence Center of Enterprise BG. 19
26 Figure 2-11 Certificate ----End Verifying the Signature Step 1 Save the signature file (.sign file) and the software (to be verified) in the same folder. Step 2 Double-click the FileIntergrityVerify.exe icon to run the digital signature verification tool. Step 3 Select the file to be verified as shown in Figure
27 Figure 2-12 Selecting a file Step 4 Click Verify. Figure 2-13 indicates that the verification succeeds. Figure 2-13 Verification success ----End 21
28 3 System Layer Security 3 System Layer Security Security maintenance from the system layer is to ensure a smooth operation of the operating system, which can support the operation of application software. The endpoint uses the embedded operating system VxWorks, which is more secure and immune to viruses than Windows or Linux. 22
29 4 Network Layer Security 4 Network Layer Security Figure 4-1 shows the endpoint security networking diagram. Figure 4-1 Endpoint networking diagram HD endpoint Private network HD endpoint Public network HD videoconferencing endpoint HD videoconferencing endpoint HD videoconferencing endpoint 23
30 4 Network Layer Security Over the network: The endpoint is connected to the Multipoint Control Unit (MCU) through the private network, which connects to different networks through different ports. The endpoints in the private or public network can join the conference even if you do not change H.323 protocol or the firewall settings (such as opening the port). 24
31 5 Management Layer Security 5 Management Layer Security This chapter describes some management recommendations on users' daily security maintenance and can be referred to when users set the rules on security management. 5.1 Principles of System Account Management Manage the accounts strictly. Control the permissions of accounts of different levels. Only users of higher levels can change the passwords for users of lower levels Permission Management Minimize permissions to the system service and permissions of accounts. Strictly control the operation authorization on the web interface Auditing Principles Use logs and other feasible methods to monitor operations on the endpoint. Audit the failed access to the system's important resources. Audit the successful access to the system's important resources. Audit the failed and successful access control strategy modification. 5.2 Password Maintenance Recommendations User identity authentication is a must for accessing the application system. Configure the user account, password, and validity period as required. Following are recommendations on password maintenance: Keep system administrators' accounts and passwords secret. Encrypt the password before its transmission. Remind the user to change the password before handing over the system. 25
32 5 Management Layer Security 5.3 Logs Maintenance Recommendations Use logs to identify suspicious activities. The system must record the operations, such as system parameter settings, and tariff configuration and release, in the logs. Reinforce the system to protect the logs Checking Logs Regularly Check the system logs, applications logs, and security logs regularly and report to the department of a higher level once abnormal logs are found. Ask the local representative office for help if the issues cannot be located or resolved Backing up logs regularly Back up logs regularly by exporting them manually and store the logs on devices, such as the disc, tape, or compact disc. The system supports a maximum of 10,000 logs. Once the number of logs exceeds 10,000, new logs will replace the old ones. In this case, users must back up timely. 5.4 Security Evaluation Recommendations You are advised to look for a qualified organization to evaluate the system security and contact Huawei technical support engineers when problems occur during the evaluation. 5.5 Backup Recommendations Back up the logs for security maintenance: Before daily security maintenance. Before and after troubleshooting. Before patches installation. Before the system upgrading. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Administrator Guide. 5.6 Defects Feedback Recommendations You are advised to give feedback to Huawei once an accident happens when the endpoint is used. Huawei will take the following actions accordingly. If an accident happens, Huawei technical support engineers will support customers remotely or on site to reduce the impact on the system and improve the report on the accident treatment. If no accident happens, Huawei technical support engineers record defects in to the database and send to the R&D team. Once the R&D team prescribes a solution, the technical support engineers will analyze the solution's possible impact on the site operations and provide a final solution. 26
33 5 Management Layer Security 5.7 Emergency-Response Mechanism Users must set up an emergency-response mechanism to minimize the loss, solve security issues, and restore the operation once an accident happens. Users can also report security issues to Huawei by 27
34 6 Appendix 6 Appendix The communication matrix is used to check the firewall strategy. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Communications Matrix. 28
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationPlesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationHG658c Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.
HG658c Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658c Home Gateway V100R001 User Guide Issue 01 Date 2012-10-19 Part Number 202537 Huawei Technologies Co., Ltd. provides customers with comprehensive
More informationXStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
More informationUSER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationSymantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
More informationHow To Set Up A Thermal Cycler With Veritilink Remote Management Software
Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting
More informationHUAWEI HG533 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI HG533 Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HUAWEI HG533 Home Gateway V100R001 User Guide 202466_02 Huawei Technologies Co., Ltd. provides customers with comprehensive technical
More informationChanging Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationRemote Management Reference
www.novell.com/documentation Remote Management Reference ZENworks 11 Support Pack 2 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationAllworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
More informationH3C SSL VPN RADIUS Authentication Configuration Example
H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by
More informationSophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationStruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
More informationDocument Exchange Server 2.5
KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.
More informationSSL Enforcer Documentation
SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,
More informationCamera Management Tool User Manual
Network Camera Camera Management Tool User Manual The Operation Guide should be read before using the network camera. ENGLISH Introduction This manual describes how to configure and operate Camera Management
More informationHow To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
More informationDocuPrint C3290 FS Features Setup Guide
DocuPrint C3290 FS Features Setup Guide Adobe and PostScript are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, ColorSync, EtherTalk, Macintosh, and
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationHow To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationBarracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationInstalling and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationThe SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationAvalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
More informationSANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
More informationAllworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
More informationInstalling Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationPortions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
More informationAvigilon Control Center Server User Guide
Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More information1 Getting Started. Before you can connect to a network
1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote
More informationOfficeServ Link. User Guide. Version 2.1 June 2005
OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This
More informationAudit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationSysax Multi Server User manual
Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...
More informationWhite Paper on Video Wall Display Technology in Videoconferencing HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-2-23
White Paper on Video Wall Display Technology in Videoconferencing Issue 01 Date 2012-2-23 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationDell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationLoad Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
More informationOUTDOOR IR NETWORK CAMERA Series
OUTDOOR IR NETWORK CAMERA Series INSTALLATION GUIDE Please read instructions thoroughly before operation and retain it for future reference. 1. OVERVIEW 1.1 Package Content Network camera Installation
More informationvisionapp Remote Desktop 2010 (vrd 2010)
visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...
More informationGV-Data Capture V3 Series User's Manual
GV-Data Capture V3 Series User's Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. 2006 GeoVision, Inc. All rights
More informationSophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationHow To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
More informationLegal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationIP Phone Configuration and Troubleshooting Guide
IP Phone Configuration and Troubleshooting Guide NetVanta 7000 Series and IP 700 Series Phones Overview The purpose of this guide: Explain the default configuration. Explain how to configure the NetVanta
More informationSIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3
SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationInterworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
More informationImportant Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
More informationVRC 7900/8900 Avalanche Enabler User s Manual
VRC 7900/8900 Avalanche Enabler User s Manual WLE-VRC-20030702-02 Revised 7/2/03 ii Copyright 2003 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationPT500 500Mbps Powerline Adapter. User Guide
PT500 500Mbps Powerline Adapter User Guide PT500 500Mbps Powerline Adapter V100R001 User Guide 202593_04 Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service.
More informationLabelWriter. Print Server. User Guide
LabelWriter Print Server User Guide Copyright 2010 Sanford, L.P. All rights reserved. 08/10 No part of this document or the software may be reproduced or transmitted in any form or by any means or translated
More informationHG659 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.
HG659 Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. Product Overview...................................... 1 Ports and Buttons.................................................. Indicators.........................................................
More informationPlease check www.milestonesys.com for updates to make sure you install the most recent version of our software.
Guide Contents Dear Milestone Customer, With the purchase of Milestone XProtect Central you have chosen a very powerful central monitoring solution, providing instant overview of any number of Milestone
More informationKerio VPN Client. User Guide. Kerio Technologies
Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationSSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
More informationConfiguring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationMultifunctional Broadband Router User Guide. Copyright Statement
Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright
More informationMGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
More informationSuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationConfiguring the WT-4 for ftp (Infrastructure Mode)
Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure
More informationHow To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationRemote Connectivity to XV, XP and epro units running Visual Designer
Intro Remote connectivity is one of the major features of Visual Designer and our new operator interface hardware platforms running that software. The ability to monitor, troubleshoot, edit and administer
More informationConfiguring Devices for Use with Cisco Configuration Professional (CCP) 2.5
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.
More informationNetworking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
More informationVantage RADIUS 50. Quick Start Guide Version 1.0 3/2005
Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)
More informationBlue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationInstallation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide
Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey
More informationStarting a Management Session
Management Software AT-S63 Starting a Management Session AT-S63 Version 2.2.0 for the AT-9400 Layer 2+ Switches AT-S63 Version 3.0.0 for the AT-9400 Basic Layer 3 Switches 613-000817 Rev. A Copyright 2007
More informationQuadro Configuration Console User's Guide. Table of Contents. Table of Contents
Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...
More informationQuick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
More informationSymantec Endpoint Protection Shared Insight Cache User Guide
Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationMobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
More informationSophos Enterprise Console server to server migration guide. Product version: 5.2
Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the
More informationFreshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
More informationNovell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
More information