VBrick 9000 Admin Manual page 42

Hide thumbs Also See for 9000:
Table of Contents

Advertisement

Field
H.264 Tunneling Port
Generate HTTPS/SSH
Security Keys
HTTPS/SSH
Security Keys Status
Note: If you are working with a Presenter encoder, your interface or functionality may
differ slightly for this section with the ability to disable Presenter Mode access. See the
topic on Disable Presenter Mode Access from the Login Screen if you need more
information.
Improving Security
You can improve security by (1) blocking unauthorized attempts to login and access a device
and (2) by reducing exposure to malicious software attacks. The most common vulnerability
is related to user accounts and passwords. After a successful installation, you should
immediately change the default passwords. Many attacks come from within an organization
and this helps to minimize the risk. The VBAdmin login is generally secure since it utilizes
encryption techniques to hide usernames and passwords from network spyware.
Malicious software sometimes covertly attaches itself to unsuspecting devices. These
programs are generally designed to compromise personal information or to create system
havoc. Since the VBrick encoder uses an industrial-grade, embedded operating system, it is
less susceptible to malicious software and unlikely to be a target of programs designed to
attack PC-based systems like Microsoft, Linux, and others. However, you can still take
additional steps to minimize risk. VBrick tries to make installation as simple and quick
installation and many features are automatically enabled by default even though you may not
need them. You can selectively disable unneeded features to reduce vulnerability. Another
common problem is Denial of Service (DoS) attacks. A DoS sends floods of packets to an
unsuspecting remote system in an attempt to disrupt or stop normal operation. These
unsuspecting remote systems are typically discovered using ICMP or Ping. It is standard
industry practice to block all ICMP and Ping requests from off-net foreign hosts. This is
typically done in a centralized location using router/firewall technology which is more
successful and cost effective than resolving the issue at each host.
Security Feature
SSH
SSH-2
34
Description
Sets the port to be used to serve tunneled H.264 HTTP streams.
Default is 8080 but if you are streaming HTTP directly from a
VBrick via the Internet, it is common practice to change this to 80
and to set the VBAdmin server port to something other than 80.
The security keys used internally by HTTPS and SSH are
factory-generated and should be replaced only if security is an
issue. Note: Key generation is CPU-intensive and should only be
performed when the encoder is idle. It will take 3–5 minutes if the
encoder is idle (or much longer if the encoder is in use).
– The existing security keys are valid.
Valid Keys
Generating Keys
Reboot Required
will take effect after a reboot.
Support Level
v1.2
v2.x
– New security keys are being generated.
– New security keys have been generated and
© 2015 VBrick Systems, Inc.

Hide quick links:

Advertisement

Table of Contents
loading

Related Products for VBrick 9000

Table of Contents