1.1.4 Data Security
In order to use the Control Box safely and correctly, the Security Requirements below must be observed.
Failure to do so may result in:
•
Loss, leakage, falsification or theft of user information.
•
Illegal use of the Control Box by a third party.
•
Interference or suspension of service caused by a third party.
What is User Information?
User Information is defined as:
1.
Information stored on the Storage Memory Card:
System data and error data.
2.
Information sent from the Control Box to a PC:
System data.
Requirements
1.
The Storage Memory Card contains software for all the processes of the Control Box and all the
customer data. Therefore, do not allow unauthorised access to prevent data leakage.
2.
Always make backups of data stored on the Storage Memory Card. For details, consult your dealer.
3.
To prevent illegal access from the Internet, activate a Firewall.
4.
To avoid unauthorised access and possible abuse of the Control Box, we strongly recommend:
a.
Keeping the password secret.
b.
Selecting a complex, random password that cannot be easily guessed.
c.
Changing your password regularly.
5.
Perform the following when sending the Control Box for repair or handing it over to a third party.
a.
Make a backup of data stored on the Storage Memory Card.
b.
Using a formatter, format the Storage Memory Card so that information cannot be retrieved from
it.
6.
To prevent data leakage, render the Storage Memory Card physically unusable before disposal.
7.
When user information is sent from the Control Box to a PC, the confidentiality of that information
becomes the responsibility of the customer. Before disposing of the PC, ensure that data cannot be
retrieved from it by formatting the hard disk and/or rendering it physically unusable.
1.1.5 Before Operating the Telephones
Supported Telephones
You can use KX-HDV series SIP phones with the Control Box.
Registration for your SIP Phone
Your SIP phone must be registered with the Control Box and assigned an extension number before initial
use, through system programming. To confirm the extension number, follow the instructions for your phone.
Feature Numbers
To use certain features, you need to enter specified feature numbers (and an additional parameter, if
required).
1.1.4 Data Security
Operating Manual
13
Summary of Contents for VL-VN1800
Page 4: ...Introduction 4 Operating Manual ...
Page 6: ...Table of Contents 6 Operating Manual ...
Page 42: ...Note 42 Operating Manual ...
Page 43: ...Note Operating Manual 43 ...