TE20 Videoconferencing Endpoint
Administrator Guide
8.1.1 Desktop Icons .......................................................................................................................................................... 66
8.1.2 Shortcut Bar Icons ................................................................................................................................................... 66
9 Routine Maintenance ................................................................................................................. 68
9.1 Maintenance Items ...................................................................................................................................................... 68
9.2 Checking the Indicator Status ..................................................................................................................................... 69
9.4 Checking the Cleanliness ............................................................................................................................................ 70
9.6 Checking Alarms ........................................................................................................................................................ 71
9.7 Checking the System Status ........................................................................................................................................ 71
9.9 Backup and Restoration .............................................................................................................................................. 73
9.10 Restoring Factory Settings ........................................................................................................................................ 74
10 Security Maintenance ............................................................................................................... 76
10.1 Overview .................................................................................................................................................................. 76
10.2 Application Layer Security ....................................................................................................................................... 77
10.2.3 Configuring Encryption ......................................................................................................................................... 87
10.2.4 Web Management Users ........................................................................................................................................ 87
10.2.5 Web Access Control ............................................................................................................................................... 88
10.2.6 SSH Access Control ............................................................................................................................................... 89
10.2.7 Viewing Logs ......................................................................................................................................................... 90
10.2.8 Enabling FTPS ....................................................................................................................................................... 91
10.2.9 Configuring an FTPS Server .................................................................................................................................. 91
10.2.10 Managing Certificates .......................................................................................................................................... 94
10.3 System Layer Security .............................................................................................................................................. 97
10.4 Network Layer Security ............................................................................................................................................ 97
10.5 Management Layer Security ..................................................................................................................................... 98
10.5.6 Backup Suggestions ............................................................................................................................................. 100
Issue 01 (2016-09-01)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
vi