Specifications
Copyright © 2009, 2010, 2011 Black Box Network Services
724-746-5500 | blackbox.com 128
iCOMPEL Digital Signage - User Guide (V8.1.1)
It is desirable to change the SSH port to a different number to make it more difficult for an attack to succeed. It may also be
desirable to have an alternate port available.
The standard port for SSH access is 22. You can specify a maximum of two ports to accept SSH connections.
WARNING: If you change the SSH port number, then you should make a note of it and keep it safe.
Master password
The Master iCOMPEL password is required for SSH access to the deeper levels of the iCOMPEL. This is not the same
password used to access the web pages of the iCOMPEL. It may be desirable to change this password, but you must
know the existing password to do so.
LDAP
See LDAP settings
LDAP Expert
This option is only visible if you have set the User Interface Policy to Expert on the UI Options page.
Expert users may use these fields to enter LDAP XML Settings and Passwords.
Firewall Status
See Firewall status
LDAP Tests
See LDAP Tests
9.3.6.1 Firewall status
This page shows information about the firewall on the iCOMPEL.
Understanding this information requires a good working knowledge of IP networking and network security.
The Chain PLAYER-INPUT section details the rules governing connections made to the iCOMPEL on various protocols.
The IP address from which a connection is made is checked against the Chain PLAYER-INPUT-ADDRESSES rule set.
Any connections made from an IP address that is not allowed by the security settings are dropped.
All connections from allowed addresses are passed through to the Chain PLAYER-INPUT-PORTS rule set.
The IP port to which a connection is made is checked against the Chain PLAYER-INPUT-PORTS rule set.
Any connections made to a port that is not allowed by the security settings are dropped.
The Pkts (Packets) and Bytes columns shows the volume of traffic that is accepted or rejected by each rule.
An unusually high number of Pkts on a "DROP" line indicate a possible attack on the iCOMPEL.
9.3.6.2 LDAP settings
The iCOMPEL's (iCOMPEL) security model allows users that have been authenticated to use features of the iCOMPEL
according to assigned permissions.
In LDAP the iCOMPEL considers a user to have permission if an LDAP filter matches entries in the directory.
Typically a LDAP filter will check that a user is a member of a group.
Configuration
The Enable LDAP checkbox allows must be enabled for the iCOMPEL to use LDAP.
128
115
128
131