Http Proxy; Security - General Settings - Black Box iCompel ICOMP-ICC User Manual

Content commander
Table of Contents

Advertisement

9.2.5 HTTP Proxy

Use the HTTP Proxy page to set up proxy server access if the iCC needs to use one to access Internet resources. Check
with your network administrator to see if a proxy is needed.
To use a proxy for accessing an Internet resource, you must perform both of the following actions:
Set up the HTTP proxy by completing the information on the Add HTTP Proxy tab.
l
Specify that the iCC must use a HTTP proxy when you setup individual Internet resources (for example, a newsfeed).
l
After you have configured the HTTP proxy, specify that the iCC uses it on the relevant setup page:
Newsfeed – Setup for the individual newsfeed on the Media > Newsfeeds page.
l
Reporting – Setup on the Setup > System > Reporting page.
l
Software update – Setup on the Setup > Maintenance & Troubleshooting > Software Update page (Settings tab).
l
The iCC does not transfer a proxy configuration in a channel.
Note: Newsfeeds do not support use of Microsoft
allow Digest authentication. You must restart the iCC when you make any changes to the HTTP proxies.
To configure the HTTP proxy, complete the following information then click the
Server Address
Enter the IP address of the proxy server.
Server Port
Enter the port the iCC needs to connect to on the proxy server (default is 3128).
Username
If the proxy server requires authentication, enter the username.
Password
If the proxy server requires authentication, enter the password.
Use this proxy for
Check the box for each resource the iCC needs to use the proxy for.
9.2.6 Security – General Settings
Use the Security options to configure the iCC firewall and other security services and to monitor firewall activity.
Caution: The iCC comes ready-prepared with default firewall and other security service settings to protect against
unauthorized access. Do not change the security settings unless you have a good working knowledge of IP networking
and network security. Incorrect configuration can block all access to the iCC.
The iCC firewall protects it against unwanted and potentially malicious traffic. However, the iCC also needs to accept your
login and allow necessary communications. To allow and protect such access, the iCC supports a variety of secure services:
VPN – Virtual Private Network. Allows the iCC to communicate over an encrypted path through firewalls.
l
HTTP/HTTPS – Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. By default, the iCC uses HTTP with
l
Digest authentication, which encrypts passwords. HTTPS is more secure because it also encrypts content.
FTP – File Transfer Protocol. FTP access is controlled by password. Passwords are not encrypted. Use FTP for copying
l
over backups and software updates.
SSH – Secure Shell. Only used to access the iCC operating system for occasional support and maintenance purposes.
l
Access is by the master password.
iCOMPEL Content Commander User Guide
®
NTLM authentication. We recommend changing the Windows proxy to
button:
137

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents