HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Size: px
Start display at page:

Download "HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD."

Transcription

1 V100R011 Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

2 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China i

3 About This Document About This Document Overview This document introduces security maintenance operations of HUAWEI 9000 HD Videoconferencing Endpoint (endpoint for short). Related Documents Document Title Describes... Document Location HUAWEI 9000 HD Videoconferencing Terminal Admin Guide HUAWEI 9000 HD Videoconferencing Endpoint Command Reference HUAWEI 9000 HD Videoconferencing Endpoint Communication Matrix Configuration, management, and troubleshooting of the endpoint. Functions, parameters, formats, usage guidelines, and examples of all endpoint commands. Ports, protocols, IP addresses, and authentication modes for the communication of the endpoint. Website: Choose SUPPORT > Product Support > UC&C > Video Terminal > ViewPoint 9030 Website: Website: Intended Audience This document is intended for: Technical support engineers Maintenance engineers ii

4 About This Document Symbol Conventions The symbols that may be found in this document are defined as follows: Symbol Description Alerts you to a high risk hazard that could, if not avoided, result in serious injury or death. Alerts you to a medium or low risk hazard that could, if not avoided, result in moderate or minor injury. Alerts you to a potentially hazardous situation that could, if not avoided, result in equipment damage, data loss, performance deterioration, or unanticipated results. Provides a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement important points in the main text. iii

5 Contents Contents About This Document... ii 1 Overview Purpose of What is Layered Application Layer Account List Administrator Password Web Management Account Touch panel Account Serial Port Account SSH and Telnet Login Upgrade Password Network Diagnostics Tool Account Bootrom Password Administrator Account Restoring Normal and Bootrom Systems to Default Settings SiteCall Security Enabling the H.235 Encryption Web User Management Logging In to the Web Interface Changing the Password Web Access Control SSH Access Control User Login Checking Whether Telnet Login is enabled Viewing Logs Enabling and Disabling FTPS Configuring an FTPS Server Site Monitoring and Management Enabling the Site Monitoring and Management Function Taking Picture Upgrading Using the Bootrom iv

6 Contents Preparing for the Upgrade Performing an Upgrade Bootrom Operations Verifying a Digital Signature Working Environment Requirements Verifying FileIntergrityVerify.exe Verifying the Signature System Layer Security Network Layer Security Management Layer Security Principles of System Account Management Permission Management Auditing Principles Password Maintenance Recommendations Logs Maintenance Recommendations Checking Logs Regularly Backing up logs regularly Security Evaluation Recommendations Backup Recommendations Defects Feedback Recommendations Emergency-Response Mechanism Appendix v

7 1 Overview 1 Overview 1.1 Purpose of Now application systems face severe security threats. Once problems occur, business might be disturbed, profits reduced, or even systems break down. Users must build up and maintain the application system security from different layers, and discover and solve potential threats in advance. Besides, considering the endless emergence of safety threats, a mere dependence on technology can hardly ensure the application system security. Users must build up a safety management system based on security maintenance suggestions and problems they found during the use of the endpoint to ensure a smooth and safe operation of the endpoint. 1.2 What is Layered Application Layer System Layer Network Layer According to the target and purpose of security maintenance, maintenance personnel must safeguard the service system from different layers. Security maintenance from the application layer is to protect the endpoint and its web management system so that they can provide services to users with a smooth operation. Security maintenance from the system layer is to ensure a smooth operation of the operating system, which can support the operation of application software. Security maintenance from the network layer is to ensure that network devices, such as the switch, router, and firewall, function properly and that security strategies are implemented at the network layer. 1

8 1 Overview Management Layer Security maintenance from the management layer is to strengthen people's management and avoid threats. Maintenance from the management layer involves the maintenance operations at all preceding layers. 2

9 2.1 Application Layer Account List Administrator Password If an administrator password is set for the user interface controlled by the remote control, common users must enter this password to access the Settings, Utilities, Diagnostics, Customize Option Bar screens. The administrator password is left blank by default. If no administrator password is set, common users have access to all functions; therefore, you are advised to set the administrator password immediately after the endpoint starts for the first time. To set the administrator password, choose Settings > Security > Password Web Management Account The endpoint supports a maximum of three users to log in to the web interface concurrently. Users are categorized and assigned with different permissions as described in Table 2-1. Table 2-1 Web management account Account Name Default Password Description Remarks admin admin This account is the default account with the highest permission and cannot be deleted. For account levels, see section 2.6 "Web Access Control." To ensure account security, you are advised to change the password after the first login. For details about how to change the password, see section "Changing the Password." Touch panel Account You can log in to the endpoint from the touch panel to initiate and control the conference. Table 2-2 describes the touch panel account. 3

10 Table 2-2 Touch panel account Account Name Default Password Description Remarks api api The account is used to log in to the endpoint to initiate and control the conference on the conference control interface. To ensure account security, you are advised to change the password after the first login. For details about how to change the password, see section "Changing the Password." Serial Port Account You can log in to the endpoint using its COM1 and COM2 serial ports from a computer to debug or troubleshoot the endpoint. Table 2-3 describes the serial port account. Table 2-3 Serial port account Account Name Default Password Description Remarks DEBUG SHELL viewpoint9000 Log in to the endpoint using serial points from a computer to debug and troubleshoot the endpoint. Specifies the COM1 serial port account. To ensure account security, you are advised to change the password after the first login. To change the password: On the interface controlled by the remote control, choose Settings > Security > Telnet Login. On the web interface, choose System Settings > Network > Security and Service. DEBUG TELNET viewpoint9000 Specifies COM2 serial port account. To ensure account security, you are advised to change the password after the first login. To change the password: On the interface controlled by the remote control, choose Settings > Security > Telnet Login. On the web interface, choose System Settings > Network > Security and Service. Baud rates of COM1 and COM2 are 9600 Baud. 4

11 2.1.5 SSH and Telnet Login The endpoint supports the Telnet login and Security Shell (SSH) login. Telnet is an insecure protocol and enabled by default. SSH is a cybersecurity protocol for remote access using the encryption and authentication mechanism in an insecure cyber environment. During SSH login, all user data are encrypted. To ensure the security, you are advised to use the SSH login. You can log in to the endpoint through port 23 using the unencrypted Telnet. Telnet is enabled by default and the Telnet login permission configuration is provided on the web interface and remote control interface. You can log in to the endpoint through port 22 using the encrypted SSH. SSH is enabled by default and the Telnet login permission configuration is provided on the web interface and remote control interface. SSH and Telnet Login to the Normal System The normal system supports the SSH and Telnet login. The accounts and default passwords for the SSH and Telnet logins are the same and described in Table 2-4. Table 2-4 SSH and Telnet login accounts Account Name Default Password Description Remarks debug debug Administrator account with the highest permission for system debugging admin admin Common user account with a permission level lower than the administrator account for test test testviewpoint Special account for debugging with a permission level lower than the administrator account for debugging You can change the account name and password for other SSH client users when you log in to the endpoint using the administrator account. - This is a special account and not for common users. apiuser By default, the password is left blank. Touch panel account with a permission level lower than the administrator account for debugging This is a special account and not for common users. user user Common user account with a permission level lower than the administrator account for debugging - Telnet Login to the Bootrom System The bootrom system supports the Telnet login. Table 2-5 describes the Telnet login accounts. 5

12 Table 2-5 Telnet login accounts Account Name Default Password Description Remarks debug debug Administrator account for debugging with the highest permission admin 903X_admin Common user account with a permission level lower than the administrator account for debugging user user Common user account with a permission level lower than the administrator account for debugging You can change the user name and password for other users when you log in to the endpoint using the administrator account. - - To ensure account security, you are advised to change the password after the first login. For details about how to use the debugging commands to change the password and debug, see the HUAWEI 9000 HD Videoconferencing Endpoint Command Reference Upgrade Password To upgrade the endpoint, you need the upgrade password listed in Table 2-6. Table 2-6 Upgrade password Account Name Default Password Description Remarks None viewpoint9000 or api This password is required to upgrade the endpoint. Touch panel password can also be used as the upgrade password. The default password is api. The upgrade password changes with the Touch panel password. To ensure account security, you are advised to change the password after the first login. To change the password: On the interface controlled by the remote control, choose Settings > Security > Telnet Login. On the web interface, choose System Settings > Network > Security and Service. 6

13 2.1.7 Network Diagnostics Tool Account You can use the network diagnostics tool to troubleshoot the endpoint. Table 2-7 describes the network diagnostics tool account. Table 2-7 Network diagnostics tool account Account Name Default Password Description Remarks admin admin This account is used to use the network diagnostics tool to troubleshoot the endpoint. The account and password are the same as those used to log in to the web interface of the endpoint Bootrom Password After the bootrom system starts, you must enter the password to log in to the system. You can access the bootrom system only through serial ports. The default password for the bootrom system is hwviewpoint. To ensure account security, you are advised to change the password after the first login. For details about how to change the password, see the HUAWEI 9000 HD Videoconferencing Endpoint Command Reference. After logging in to the bootrom system, you can: Boot from flash Boot from network Enter equipment test Set the MAC address Get the MAC address Show boot line Use last set parameters to boot Reboot Show Event Detail Record (EDR) information Administrator Account The administrator needs to enter the account name and password listed in Table 2-8 to log in to the endpoint. Table 2-8 Administrator account Account Name Default Password Description Remarks v3user Manage the endpoint using a computer. For example, you can configure endpoint settings, query the endpoint status, and restart and upgrade the endpoint. - 7

14 2.2 Restoring Normal and Bootrom Systems to Default Settings Normal System If you forget the passwords of the normal or bootrom system, restore the system (including the passwords) to its default settings. Set the dual in-line package (DIP) switches to Norm and restart the endpoint. When the restart is complete, toggle the No.1 DIP switch six times within 10 seconds. Figure 2-1 shows the DIP switches. Figure 2-1 ViewPoint 9030, VP9035A, ViewPoint 9039S, or VP9039A DIP switch Bootrom System Set the DIP switches to Load and restart the endpoint. When the restart is complete, toggle the No.1 DIP switch six times within 10 seconds. Figure 2-1 shows the DIP switches. 2.3 SiteCall Security The endpoint uses HTTPS (Hypertext Transfer Protocol Secure) mode to upload the multipoint conference information and supports Transmission Control Protocol (TCP) mode when a multipoint conference is initiated. If HTTPS mode is disabled, the endpoint uses the insecure TCP mode. You are advised to use HTTPS mode for better communication security. If HTTPS mode is enabled, you are advised to enable Multipoint conference authentication. Enable HTTPS mode and Multipoint conference authentication. On the interface controlled by the remote control, choose Settings > Network > IP > H.323 and enable HTTPS mode and Multipoint conference authentication. On the web interface, choose System Settings > Protocol > H.323/SIP Settings and enable HTTPS mode and Multipoint conference authentication. 8

15 2.4 Enabling the H.235 Encryption Background Procedure The H.235 encryption is about encrypting the media streams using a negotiated encryption algorithm and key. The media streams can be decrypted using the same algorithm and key. Therefore, unauthorized users cannot access the media streams. An IP network is not a quality-guaranteed or secure network. Encrypting the media streams can better secure video communications. Both parties in communications must support the encryption function. H.235 encryption is disabled by default. You are advised to enable it. Step 1 Choose Settings > Security > Encryption Policy, you can then set H.235 encryption to: Disable: No media streams are encrypted. Enable: Media streams are encrypted. If this option is selected, the endpoint can attend only encrypted conferences. Maximum interconnectivity: The call setup is the prerequisite for encryption or not. Step 2 Select Save to enable the settings to take effect. ----End 2.5 Web User Management The web interface of the endpoint supports two types of users: administrators and common users. Administrators: Administrators have all permissions to the web interface. Administrators can change common users' accounts and passwords. Common users: They have some permissions on the web interface and can configure only personal settings but not system settings Logging In to the Web Interface Step 1 Open a browser on the computer. In the address box, enter the IP address, such as Step 2 Press Enter. The interface shown in Figure 2-2 is displayed. If the security certificate is invalid, click Continue to this website to resume the login. 9

16 Figure 2-2 Login page Step 3 Enter the user name and password. Select a language. Step 4 Click Log In. ----End To ensure account security, you are advised to change the password after the first login Changing the Password On the web interface, you can change the passwords to the web management account, common user accounts, and Touch panel accounts. Step 1 Log in to the web interface and choose System Settings > Personal. Step 2 Click the Personal tab and change the password. Step 3 Click Save. ----End 2.6 Web Access Control The endpoint adopts HTTPS mode, which is the secure version of HTTP. Following are methods to control the web access: Support the user to submit the log out application. When you have logged in to the web interface, you can click Exit in the upper right. The login interface is displayed. Set the maximum number of users that can log in to the system concurrently. A maximum of three users can log in to the web interface simultaneously. The endpoint supports SSL encryption. 10

17 The endpoint supports the switchover between HTTPS and HTTP. Enable SSL encryption for secure communication using HTTPS. After SSL encryption is enabled, HTTPS is enabled. By default, SSL encryption is enabled on the system. 2.7 SSH Access Control User Login During remote access and data transmission, SSH commands can be run to create an encrypted channel between the application layer and client. Following uses PuTTY as an example to describe the SSH access control methods. Step 1 Run PuTTY on your computer. The PuTTY Configuration dialog box shown in Figure 2-3 is displayed. Figure 2-3 PuTTY Configuration Step 2 In Host Name (or IP address), enter the IP address, such as Step 3 Select SSH for Protocol. Use the default value for Port. Step 4 Click Open. 11

18 The login interface is displayed. Step 5 Enter the user name and password and run the commands. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Command Reference. ----End The administrator name and password for both Telnet and SSH logins are debug Checking Whether Telnet Login is enabled By default, Telnet Login is enabled. You can disable it from the user interface controlled by the remote control or the web interface. To enable or disable Telnet Login from the user interface controlled by the remote control: Choose Settings > Security. Check whether Telnet Login is selected. To enable or disable Telnet Login from the web interface: Choose System Settings > Network. Click the Security and Service tab and check whether Allow is selected for Telnet Login. Telnet is an insecure communications protocol. You are advised to disable Telnet Login. 2.8 Viewing Logs Logs record all non-query events during the endpoint running, such as user operations commands. Logs can be exported from the web interface. Step 1 Log in to the web interface and choose Maintenance > Logs. Step 2 On the Logs page, click Export. Step 3 Click Save in the displayed dialog box. Step 4 Choose the folder to save the logs and click Save. Step 5 Open the exported logs using the Internet Explorer. ----End 2.9 Enabling and Disabling FTPS The endpoint supports the switchover between File Transfer Protocol over SSL (FTPS) and File Transfer Protocol (FTP). To ensure communications security, enable SSL encryption. After SSL encryption is enabled, FTPS is enabled. Run the following commands to enable or disable FTPS. main cpu->ui config set Security.IsUseFtpsInDownload 12

19 IsUseFtpsInDownload(1) :0 1 refers to enable the function. 0 refers to disable the function Configuring an FTPS Server FTPS is an extension of the commonly used FTP to support the SSL. The FTPS server ensures the security of the endpoint network address book. Following uses the FileZilla server as an example to describe how to configure an FTPS server. Step 1 Set the IP address of the computer on which the FileZilla server is to be installed. Ensure that the IP addresses of the computer and endpoint are in the same network segment. Step 2 Run the FileZilla_Server-0_9_41.exe on the computer. Step 3 Double-click Figure 2-4. to launch the FTPS server. Click OK in the displayed dialog box shown in Figure 2-4 Connect to Server Step 4 Choose Edit > Settings. The dialog box shown in Figure 2-5 is displayed. 13

20 Figure 2-5 Server settings Step 5 Click SSL/TLS settings in the left column and select Enable FTP over SSL/TLS support(ftps), click Browse to import the certificate, and click OK. If no certificate is available, click Generate new certificate. Step 6 Choose Edit > Users. The dialog box shown in Figure 2-6 is displayed. Figure 2-6 Adding a user Step 7 Click Add to add a user. Select Enable account and Password and enter the password. 14

21 Step 8 Choose Shared folders > Add and set the directory for the software to be used for upgrade in the dialog box shown in Figure 2-7. Figure 2-7 Setting the directory for the software to be upgraded Step 9 Click OK. ----End After the FTPS server configuration is complete, configure the network address book. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Administrator Guide Site Monitoring and Management This function involves privacy protection. Ensure that its use complies with local laws and regulations. To ensure the conference security and protect its privacy, this site monitoring and management function is disabled by default. You can enable it from the user interface controlled by the remote control Enabling the Site Monitoring and Management Function Taking Picture To enable the site monitoring and management function: On the user interface controlled by the remote control, choose Settings > Security > Web Login and enable Video Control. After the site monitoring and management function is enabled, you can capture and view local and remote videos and presentations on the web interface. Step 1 On the web interface, choose Device Control > Video Control. 15

22 On the Video Control interface, appears on the endpoint display to indicate that the video monitoring and management function is enabled. Step 2 Select the source you want capture of and click Capture. Step 3 In the displayed interface, right-click the picture. Step 4 From the displayed shortcut menu, choose Save Picture As to save the picture. ----End 2.12 Upgrading Using the Bootrom If you fail to upgrade the software locally, you can use the bootrom system Preparing for the Upgrade Before the upgrade, note the following prerequisites: Save the software package for upgrading on the computer. Connect the computer to the endpoint through a crossover cable or a switch Performing an Upgrade Step 1 Set the IP address of the computer to a static IP address, such as , and then set the subnet mask to Step 2 Turn the switch on the rear panel of the endpoint to Load. When you are using the HUAWEI VP9030, HUAWEI VP9035A, HUAWEI VP9036S, HUAWEI VP9039S, or HUAWEI VP9039A, you can turn both switches to Load (the IP address of the endpoint remains unchanged) or turn switch 1 to Load (the IP address of the endpoint changes to When you are using the HUAWEI VP9033, HUAWEI VP9035, HUAWEI VP9036, or HUAWEI VP9039, turn switch 1 to Load. The IP address of the endpoint changes to After you turn the switch to a different position, the IP address of the endpoint may change. Ensure that the IP addresses of the computer and endpoint are in the same network segment. Step 3 Restart the endpoint. Step 4 Log in to the endpoint using Telnet and run the main enableupg 1 command to enable the bootrom system upgrade function. By default, the upgrade function is disabled. Step 5 Extract the upgrade software from the compressed file on the computer. Step 6 Run UpgradeTool.exe to display the upgrade window. Step 7 Choose all files and click Browser to find the.dat files. Step 8 Enter the IP address of the endpoint, such as Then click Upgrade. 16

23 Step 9 In the displayed dialog box, click OK to start the upgrade. Step 10 When the upgrade is complete, log in to the endpoint using Telnet and run the main enableupg 0 command to disable the bootrom system upgrade function. Step 11 Turn the switch on the rear panel of the endpoint to Norm. Step 12 Restart the endpoint. ----End 2.13 Bootrom Operations Step 1 Use a serial cable to connect the serial port on the computer to the COM1 serial port on the endpoint. Step 2 Power on the endpoint and press Ctrl+C for three times after the information shown in Figure 2-8 is displayed. The system prompts you to enter the password. Figure 2-8 Starting the system Step 3 Enter the password to the bootrom system. The information shown in Figure 2-9 is displayed. Figure 2-9 Selecting a step 17

24 Step 4 Enter a number after Please input your choice. The system performs the operation. ----End 2.14 Verifying a Digital Signature To ensure the integrity of software received by Huawei customers, all software or software packages must be digitally signed. Any change to the software or software package after signature will invalidate the signature. Customers can check whether software or software package has been altered during delivery by verifying the digital signature. Following lists the software to be verified using the digital signature. ShowTool.exe UpgradeTool.exe Network Diagnostician.exe Address Book Editor (TIP).xls Address Book Editor.xls FileIntergrityVerify.exe is a digital signature verification tool provided for Huawei technical support engineers and enterprise customers. Huawei technical support engineers can get the verification tool from the UC&C Security Competence Center of Enterprise BG Working Environment Requirements FileIntergrityVerify.exe works in the following environment: Operating system: Window Vista, Windows Server 2008, or later Libeay32.dll (provided with FileIntergrityVerify.exe) Verifying FileIntergrityVerify.exe Step 1 Right-click the FileIntergrityVerify.exe icon. Step 2 From the displayed shortcut menu, choose Properties and click Digital Signatures. Step 3 Select a signature for Signature list and click Details. The dialog box shown in Figure 2-10 is displayed. 18

25 Figure 2-10 Digital Signature Details Step 4 Click View Certificate. Check the information about Issued to, Issued by, Valid from...to... from the dialog box shown in Figure If the certificate is changed, the digital signature tool may have been changed. In this case, you cannot use the existing tool for verification and must get a secure signature tool from the UC&C Security Competence Center of Enterprise BG. 19

26 Figure 2-11 Certificate ----End Verifying the Signature Step 1 Save the signature file (.sign file) and the software (to be verified) in the same folder. Step 2 Double-click the FileIntergrityVerify.exe icon to run the digital signature verification tool. Step 3 Select the file to be verified as shown in Figure

27 Figure 2-12 Selecting a file Step 4 Click Verify. Figure 2-13 indicates that the verification succeeds. Figure 2-13 Verification success ----End 21

28 3 System Layer Security 3 System Layer Security Security maintenance from the system layer is to ensure a smooth operation of the operating system, which can support the operation of application software. The endpoint uses the embedded operating system VxWorks, which is more secure and immune to viruses than Windows or Linux. 22

29 4 Network Layer Security 4 Network Layer Security Figure 4-1 shows the endpoint security networking diagram. Figure 4-1 Endpoint networking diagram HD endpoint Private network HD endpoint Public network HD videoconferencing endpoint HD videoconferencing endpoint HD videoconferencing endpoint 23

30 4 Network Layer Security Over the network: The endpoint is connected to the Multipoint Control Unit (MCU) through the private network, which connects to different networks through different ports. The endpoints in the private or public network can join the conference even if you do not change H.323 protocol or the firewall settings (such as opening the port). 24

31 5 Management Layer Security 5 Management Layer Security This chapter describes some management recommendations on users' daily security maintenance and can be referred to when users set the rules on security management. 5.1 Principles of System Account Management Manage the accounts strictly. Control the permissions of accounts of different levels. Only users of higher levels can change the passwords for users of lower levels Permission Management Minimize permissions to the system service and permissions of accounts. Strictly control the operation authorization on the web interface Auditing Principles Use logs and other feasible methods to monitor operations on the endpoint. Audit the failed access to the system's important resources. Audit the successful access to the system's important resources. Audit the failed and successful access control strategy modification. 5.2 Password Maintenance Recommendations User identity authentication is a must for accessing the application system. Configure the user account, password, and validity period as required. Following are recommendations on password maintenance: Keep system administrators' accounts and passwords secret. Encrypt the password before its transmission. Remind the user to change the password before handing over the system. 25

32 5 Management Layer Security 5.3 Logs Maintenance Recommendations Use logs to identify suspicious activities. The system must record the operations, such as system parameter settings, and tariff configuration and release, in the logs. Reinforce the system to protect the logs Checking Logs Regularly Check the system logs, applications logs, and security logs regularly and report to the department of a higher level once abnormal logs are found. Ask the local representative office for help if the issues cannot be located or resolved Backing up logs regularly Back up logs regularly by exporting them manually and store the logs on devices, such as the disc, tape, or compact disc. The system supports a maximum of 10,000 logs. Once the number of logs exceeds 10,000, new logs will replace the old ones. In this case, users must back up timely. 5.4 Security Evaluation Recommendations You are advised to look for a qualified organization to evaluate the system security and contact Huawei technical support engineers when problems occur during the evaluation. 5.5 Backup Recommendations Back up the logs for security maintenance: Before daily security maintenance. Before and after troubleshooting. Before patches installation. Before the system upgrading. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Administrator Guide. 5.6 Defects Feedback Recommendations You are advised to give feedback to Huawei once an accident happens when the endpoint is used. Huawei will take the following actions accordingly. If an accident happens, Huawei technical support engineers will support customers remotely or on site to reduce the impact on the system and improve the report on the accident treatment. If no accident happens, Huawei technical support engineers record defects in to the database and send to the R&D team. Once the R&D team prescribes a solution, the technical support engineers will analyze the solution's possible impact on the site operations and provide a final solution. 26

33 5 Management Layer Security 5.7 Emergency-Response Mechanism Users must set up an emergency-response mechanism to minimize the loss, solve security issues, and restore the operation once an accident happens. Users can also report security issues to Huawei by 27

34 6 Appendix 6 Appendix The communication matrix is used to check the firewall strategy. For details, see the HUAWEI 9000 HD Videoconferencing Endpoint Communications Matrix. 28

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

HG658c Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

HG658c Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658c Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658c Home Gateway V100R001 User Guide Issue 01 Date 2012-10-19 Part Number 202537 Huawei Technologies Co., Ltd. provides customers with comprehensive

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

How To Set Up A Thermal Cycler With Veritilink Remote Management Software

How To Set Up A Thermal Cycler With Veritilink Remote Management Software Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting

More information

HUAWEI HG533 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI HG533 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD. HUAWEI HG533 Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HUAWEI HG533 Home Gateway V100R001 User Guide 202466_02 Huawei Technologies Co., Ltd. provides customers with comprehensive technical

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Remote Management Reference

Remote Management Reference www.novell.com/documentation Remote Management Reference ZENworks 11 Support Pack 2 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Allworx Installation Course

Allworx Installation Course VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The

More information

H3C SSL VPN RADIUS Authentication Configuration Example

H3C SSL VPN RADIUS Authentication Configuration Example H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

Document Exchange Server 2.5

Document Exchange Server 2.5 KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.

More information

SSL Enforcer Documentation

SSL Enforcer Documentation SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,

More information

Camera Management Tool User Manual

Camera Management Tool User Manual Network Camera Camera Management Tool User Manual The Operation Guide should be read before using the network camera. ENGLISH Introduction This manual describes how to configure and operate Camera Management

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

DocuPrint C3290 FS Features Setup Guide

DocuPrint C3290 FS Features Setup Guide DocuPrint C3290 FS Features Setup Guide Adobe and PostScript are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, ColorSync, EtherTalk, Macintosh, and

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

SANGFOR SSL VPN. Quick Start Guide

SANGFOR SSL VPN. Quick Start Guide SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

1 Getting Started. Before you can connect to a network

1 Getting Started. Before you can connect to a network 1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote

More information

OfficeServ Link. User Guide. Version 2.1 June 2005

OfficeServ Link. User Guide. Version 2.1 June 2005 OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Sysax Multi Server User manual

Sysax Multi Server User manual Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...

More information

White Paper on Video Wall Display Technology in Videoconferencing HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-2-23

White Paper on Video Wall Display Technology in Videoconferencing HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-2-23 White Paper on Video Wall Display Technology in Videoconferencing Issue 01 Date 2012-2-23 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Load Balancing. Outlook Web Access. Web Mail Using Equalizer Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems

More information

OUTDOOR IR NETWORK CAMERA Series

OUTDOOR IR NETWORK CAMERA Series OUTDOOR IR NETWORK CAMERA Series INSTALLATION GUIDE Please read instructions thoroughly before operation and retain it for future reference. 1. OVERVIEW 1.1 Package Content Network camera Installation

More information

visionapp Remote Desktop 2010 (vrd 2010)

visionapp Remote Desktop 2010 (vrd 2010) visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...

More information

GV-Data Capture V3 Series User's Manual

GV-Data Capture V3 Series User's Manual GV-Data Capture V3 Series User's Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. 2006 GeoVision, Inc. All rights

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

IP Phone Configuration and Troubleshooting Guide

IP Phone Configuration and Troubleshooting Guide IP Phone Configuration and Troubleshooting Guide NetVanta 7000 Series and IP 700 Series Phones Overview The purpose of this guide: Explain the default configuration. Explain how to configure the NetVanta

More information

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3 SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

VRC 7900/8900 Avalanche Enabler User s Manual

VRC 7900/8900 Avalanche Enabler User s Manual VRC 7900/8900 Avalanche Enabler User s Manual WLE-VRC-20030702-02 Revised 7/2/03 ii Copyright 2003 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

PT500 500Mbps Powerline Adapter. User Guide

PT500 500Mbps Powerline Adapter. User Guide PT500 500Mbps Powerline Adapter User Guide PT500 500Mbps Powerline Adapter V100R001 User Guide 202593_04 Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service.

More information

LabelWriter. Print Server. User Guide

LabelWriter. Print Server. User Guide LabelWriter Print Server User Guide Copyright 2010 Sanford, L.P. All rights reserved. 08/10 No part of this document or the software may be reproduced or transmitted in any form or by any means or translated

More information

HG659 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

HG659 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD. HG659 Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. Product Overview...................................... 1 Ports and Buttons.................................................. Indicators.........................................................

More information

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software.

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software. Guide Contents Dear Milestone Customer, With the purchase of Milestone XProtect Central you have chosen a very powerful central monitoring solution, providing instant overview of any number of Milestone

More information

Kerio VPN Client. User Guide. Kerio Technologies

Kerio VPN Client. User Guide. Kerio Technologies Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Multifunctional Broadband Router User Guide. Copyright Statement

Multifunctional Broadband Router User Guide. Copyright Statement Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Configuring the WT-4 for ftp (Infrastructure Mode)

Configuring the WT-4 for ftp (Infrastructure Mode) Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure

More information

How To Check If Your Router Is Working Properly

How To Check If Your Router Is Working Properly Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Remote Connectivity to XV, XP and epro units running Visual Designer

Remote Connectivity to XV, XP and epro units running Visual Designer Intro Remote connectivity is one of the major features of Visual Designer and our new operator interface hardware platforms running that software. The ability to monitor, troubleshoot, edit and administer

More information

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005 Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)

More information

Blue Coat Security First Steps Transparent Proxy Deployments

Blue Coat Security First Steps Transparent Proxy Deployments Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

Starting a Management Session

Starting a Management Session Management Software AT-S63 Starting a Management Session AT-S63 Version 2.2.0 for the AT-9400 Layer 2+ Switches AT-S63 Version 3.0.0 for the AT-9400 Basic Layer 3 Switches 613-000817 Rev. A Copyright 2007

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.2

Sophos Enterprise Console server to server migration guide. Product version: 5.2 Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Novell Access Manager

Novell Access Manager J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations

More information