Grandstream Networks GXV3370 Security Manual page 3

Ip multimedia phone for android
Hide thumbs Also See for GXV3370:
Table of Contents

Advertisement

Figure 1: Web UI Access Settings................................................................................................................. 4
Figure 2: GXV3370 Web UI Login................................................................................................................. 5
Figure 3: GXV3370 Admin Password Change .............................................................................................. 5
Figure 4: Admin (left) and User (right) Web Access ...................................................................................... 6
Figure 5: SSH Access on GXV3370 ............................................................................................................. 7
Figure 6: Limit Access to Advanced Settings and Apps on LCD................................................................... 8
Figure 7: Cust File Provision Page ............................................................................................................... 9
Figure 8: Configure TLS as SIP Transport .................................................................................................. 10
Figure 9: SIP TLS Settings on GXV3370 .................................................................................................... 11
Figure 10: Additional SIP TLS Settings ....................................................................................................... 11
Figure 11: Settings to Block Anonymous Call ............................................................................................. 12
Figure 12: Settings to Block Unwanted Calls .............................................................................................. 13
Figure 13: SRTP Settings ........................................................................................................................... 14
®
Settings ................................................................................................................... 15
for Secure Network Access ..................................................................................... 15
®
Figure 16: 802.1X Settings.......................................................................................................................... 16
Figure 17: 802.1X for GXV3370 Deployment ............................................................................................. 16
Figure 18: GXV3370 PC Port Mode ............................................................................................................ 17
Figure 19: GXV3370 Config File Provisioning ............................................................................................ 18
Figure 20: Validate Certification Chain ........................................................................................................ 19
Figure 21: Certificate Management ............................................................................................................. 19
Figure 22: GXV3370 Firmware Upgrade Configuration .............................................................................. 20
Figure 23: Validate Certification Chain ........................................................................................................ 20
Figure 24: Certification Management .......................................................................................................... 21
Figure 25: TR-069 Connection Settings Page ............................................................................................ 21
Figure 26: FTP Service On ......................................................................................................................... 22
Figure 27: Access Device through ADB ...................................................................................................... 22
Figure 28: GXV3370 LDAP Settings ........................................................................................................... 23
Figure 29: Syslog Protocol .......................................................................................................................... 24
Table of Figures
GXV3370 Security Guide
P a g e
|
2

Advertisement

Table of Contents
loading

Table of Contents