10.1 Security Features
Your TE30 provides a variety of security features, including protocol anti-attack measures and
authentication on debug users, web interface users, and web requests.
Debug User Authentication
l
To debug your TE30, you must log in with the required user name and password in Telnet
or Secure Shell (SSH) mode.
Telnet clients use plaintext to communicate with the TE30. By default, the Telnet login
function is disabled. For details about how to enable this function, see
SSH clients use ciphertext to communicate with the TE30. When the SSH login function
is enabled, a maximum of three concurrent SSH logins are allowed. For details about how
to enable the SSH login function, see
10.2.3 Supporting Remote Logins
recommended for users who want to perform debugging.
l
The administrator user name and password for debugging are both
debug
. You cannot
change this user name.
l
Available debug module services vary depending on user levels.
Web Interface User Authentication
l
Only users with authenticated passwords can log in to the TE30 web interface.
l
To ensure security, configure the TE30 to use HTTPS to transmit the user name and
password to the server during login authentication.
Web Request Authentication
l
When a user requests to access a specified web page or submits a servlet request, the TE30
checks whether the user's session identifier is valid and the user is authorized to perform
the operation.
l
The server implements the final authentication on the user.
l
The server verifies user-generated data. Before transmitting this data to clients, the server
encodes it using HyperText Markup Language (HTML) to prevent malicious code and
cross-site scripting attacks.
l
Web security software is used to scan the web server and applications to ensure that no
high-risk vulnerability exists.
Protocol Anti-Attack Measures
l
The communication port matrix is provided in the product documentation. Do not enable
the services and ports not mentioned in the communication port matrix.
The communication port matrix contains the following information: available ports,
transport layer protocols used by the ports, network elements (NEs) that use the ports to
communicate with peer NEs, application layer protocols used by ports and description of
the services at the application layer, information about whether services at the application
layer can be disabled, authentication modes adopted by the ports, and port functions, such
as control traffic and data traffic.
HUAWEI TE30 Videoconferencing Endpoint
User Guide
10 Security
Issue 01 (2013-03-27)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
86