User's Guide

HUAWEI TE30 Videoconferencing Endpoint
User Guide
10 Security
Issue 01 (2013-03-27)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
77
10 Security
About This Chapter
Your TE30 provides security features and configuration.
10.1 Security Features
Your TE30 provides a variety of security features, including protocol anti-attack measures and
authentication for debug users, web interface users, and web requests.
10.1 Security Features
Your TE30 provides a variety of security features, including protocol anti-attack measures and
authentication for debug users, web interface users, and web requests.
Debug User Authentication
Your TE30 allows the login with a user name and password using Telnet or Secure Shell
(SSH) for debugging.
Telnet clients use plaintext to communicate with the TE30. By default, the Telnet login
function is disabled. To enable this function, see 10.2.3 Allowing Remote Login.
SSH clients use ciphertext to communicate with the TE30. When the SSH login function
is enabled, a maximum of three concurrent SSH logins are allowed. For details, see
10.2.3 Allowing Remote Login. SSH logins are recommended for users performing
debugging.
The administrator user name and password for a debug user are both debug. You cannot
change the user name.
The available debug module services depend on the user level.
Web Interface User Authentication
Only users with authenticated passwords can log in to the endpoint web interface.
Configure the endpoint to use the HTTPS to transmit the user name and password to the
server during login authentication.