![background image](http://html.mh-extra.com/html/vbrick/9000-series/9000-series_admin-manual_857502042.webp)
34
© 2015 VBrick Systems, Inc.
Improving Security
You can improve security by (1) blocking unauthorized attempts to login and access a device
and (2) by reducing exposure to malicious software attacks. The most common vulnerability
is related to user accounts and passwords. After a successful installation, you should
immediately change the default passwords. Many attacks come from within an organization
and this helps to minimize the risk. The VBAdmin login is generally secure since it utilizes
encryption techniques to hide usernames and passwords from network spyware.
Malicious software sometimes covertly attaches itself to unsuspecting devices. These
programs are generally designed to compromise personal information or to create system
havoc. Since the VBrick encoder uses an industrial-grade, embedded operating system, it is
less susceptible to malicious software and unlikely to be a target of programs designed to
attack PC-based systems like Microsoft, Linux, and others. However, you can still take
additional steps to minimize risk. VBrick tries to make installation as simple and quick
installation and many features are automatically enabled by default even though you may not
need them. You can selectively disable unneeded features to reduce vulnerability. Another
common problem is Denial of Service (DoS) attacks. A DoS sends floods of packets to an
unsuspecting remote system in an attempt to disrupt or stop normal operation. These
unsuspecting remote systems are typically discovered using ICMP or Ping. It is standard
industry practice to block all ICMP and Ping requests from off-net foreign hosts. This is
typically done in a centralized location using router/firewall technology which is more
successful and cost effective than resolving the issue at each host.
H.264 Tunneling Port
Sets the port to be used to serve tunneled H.264 HTTP streams.
Default is 8080 but if you are streaming HTTP directly from a
VBrick via the Internet, it is common practice to change this to 80
and to set the VBAdmin server port to something other than 80.
Generate HTTPS/SSH
Security Keys
The security keys used internally by HTTPS and SSH are
factory-generated and should be replaced only if security is an
issue. Note: Key generation is CPU-intensive and should only be
performed when the encoder is idle. It will take 3–5 minutes if the
encoder is idle (or much longer if the encoder is in use).
HTTPS/SSH
Security Keys Status
•
Valid Keys
– The existing security keys are valid.
•
Generating Keys
– New security keys are being generated.
•
Reboot Required
– New security keys have been generated and
will take effect after a reboot.
Note:
If you are working with a Presenter encoder, your interface or functionality may
differ slightly for this section with the ability to disable Presenter Mode access. See the
topic on Disable Presenter Mode Access from the Login Screen if you need more
information.
Security Feature
Support Level
SSH
v1.2
SSH-2
v2.x
Field
Description
Содержание 9000 Series
Страница 1: ...VBrick 9000 Encoder Encoder v4 3 Admin Guide August 2015 ...
Страница 118: ...110 2015 VBrick Systems Inc ...
Страница 124: ...116 2015 VBrick Systems Inc ...
Страница 138: ...130 2015 VBrick Systems Inc ...
Страница 146: ...138 2015 VBrick Systems Inc ...
Страница 159: ...Monitor VBrick 9000 Encoder Admin Guide 151 ...
Страница 170: ...162 2015 VBrick Systems Inc ...
Страница 186: ...178 2015 VBrick Systems Inc ...
Страница 190: ...182 2015 VBrick Systems Inc ...
Страница 191: ......
Страница 192: ...VBrick Systems Inc 2121 Cooperative Way Suite 100 Herndon Virginia 20171 ...