Security Features - Huawei TE30 User Manual

Videoconferencing endpoint
Hide thumbs Also See for TE30:
Table of Contents

Advertisement

HUAWEI TE30 Videoconferencing Endpoint
User Guide

10.1 Security Features

Your TE30 provides a variety of security features, including protocol anti-attack measures and
authentication on debug users, web interface users, and web requests.
Debug User Authentication
l
l
l
Web Interface User Authentication
l
l
Web Request Authentication
l
l
l
l
Protocol Anti-Attack Measures
l
Issue 01 (2013-03-27)
To debug your TE30, you must log in with the required user name and password in Telnet
or Secure Shell (SSH) mode.
Telnet clients use plaintext to communicate with the TE30. By default, the Telnet login
function is disabled. For details about how to enable this function, see
Remote
Logins.
SSH clients use ciphertext to communicate with the TE30. When the SSH login function
is enabled, a maximum of three concurrent SSH logins are allowed. For details about how
to enable the SSH login function, see
recommended for users who want to perform debugging.
The administrator user name and password for debugging are both debug. You cannot
change this user name.
Available debug module services vary depending on user levels.
Only users with authenticated passwords can log in to the TE30 web interface.
To ensure security, configure the TE30 to use HTTPS to transmit the user name and
password to the server during login authentication.
When a user requests to access a specified web page or submits a servlet request, the TE30
checks whether the user's session identifier is valid and the user is authorized to perform
the operation.
The server implements the final authentication on the user.
The server verifies user-generated data. Before transmitting this data to clients, the server
encodes it using HyperText Markup Language (HTML) to prevent malicious code and
cross-site scripting attacks.
Web security software is used to scan the web server and applications to ensure that no
high-risk vulnerability exists.
The communication port matrix is provided in the product documentation. Do not enable
the services and ports not mentioned in the communication port matrix.
The communication port matrix contains the following information: available ports,
transport layer protocols used by the ports, network elements (NEs) that use the ports to
communicate with peer NEs, application layer protocols used by ports and description of
the services at the application layer, information about whether services at the application
layer can be disabled, authentication modes adopted by the ports, and port functions, such
as control traffic and data traffic.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
10.2.3 Supporting Remote
10 Security
10.2.3 Supporting
Logins. SSH logins are
86

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

V100r001

Table of Contents