Huawei VPT300 Product Overview page 16

Intelligent camera
Table of Contents

Advertisement

VPT300 Intelligent Camera
Product Overview
The Android operating system that the VPT300 has installed has been hardened and does not
allow any third-party applications.
Network Layer Security
The VPT300 IP address is configured by the administrator using command lines. It must be
deployed on the private network and completely isolated from the public network.
Protocol Anti-Attack Measures
The communication port matrix is provided in the product documentation. Only services and
ports mentioned in the communication port matrix can be enabled.
The communication port matrix contains the following information:
l
l
l
l
l
l
l
Robustness testing tools are used to scan protocols to ensure that there are no high-risk
vulnerabilities.
Protection of Sensitive Data
To prevent sensitive data from being disclosed, the VPT300 checks the complexity of the
default password and user-defined passwords. A password is displayed as dots (.) or asterisks
(*) when entered in the password input box, and entered passwords cannot be copied.
Sensitive data such as passwords and other encrypted contexts is displayed as asterisks (*) in
logs.
No proprietary encryption algorithms are used.
System Management and Maintenance Security
Software packages (including patch packages) are released after being scanned by at least one
type of mainstream antivirus software with no alarms generated. In special cases, an
explanation is provided for alarms.
Scanning records (including antivirus software name and version, virus library version,
scanning time, and scanning results) are archived and released with the software package
(including patch packages) to customers.
All account access operations and system abnormalities are logged.
Issue 02 (2017-04-10)
Open ports
Transport layer protocols used by the ports
Network elements (NEs) that use the ports to communicate with peer NEs
Application layer protocols used by the ports and description of the services at the
application layer
Whether services at the application layer can be disabled
Authentication modes adopted by the ports
Port functions (such as data traffic control)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
5 Features
11

Advertisement

Table of Contents
loading

This manual is also suitable for:

V500r003c10

Table of Contents