
6
Security and Reliability
6.1 Operating System Security
Security maintenance for the system layer ensures that the operating system runs
smoothly and also supports stable services at the application layer. The Touch uses
a customized Android operating system, which delivers enhanced security and
immunity to viruses.
6.2 Network Layer Security
The network layer security policies for the CloudVC on-premises network are as
follows:
●
The RoomPresence, SMC, and MCU are deployed in the trusted zone, isolated
from the Demilitarized Zone (DMZ) and the untrusted zone. Furthermore,
firewalls are deployed for security domain division and access control.
●
Terminals (such as TE Desktop and TE Mobile) in the untrusted zone
communicate with NEs in the trusted zone through the Switch Center (SC) in
the DMZ.
6.3 Firewall Technology (NAT)
The firewall protects your IP network by separating the internal and external
network communication data. Using Network Address Translation (NAT)
technology and signaling exchange between public network protocols and private
network protocols, the firewall enables participants on local area networks (LANs)
in different places to make use of video conferences. With NAT, a device on a LAN
is allocated a dedicated internal IP address that uniquely identifies the device on
the LAN, and the device uses an external IP address to communicate with external
devices. Through NAT mapping, multiple internal IP addresses are mapped to one
external IP address. NAT mapping not only reduces the number of IP addresses
that are needed for users on a private network to access the Internet, but also
enhances the security of the private network.
HUAWEI RoomPresence 65T
Product Overview
6 Security and Reliability
Issue 03 (2020-08-25)
Copyright © Huawei Technologies Co., Ltd.
23