EasyManua.ls Logo

Poly P014 User Manual

Poly P014
137 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #55 background imageLoading...
Page #55 background image
Disable USB Ports
You can configure your G7500 and Studio X series system so no one can use its USB ports.
Note: You can’t completely turn off the USB-C port; it still provides power.
If you disable the system’s USB ports, you can’t use the system as an external camera, microphone, and speaker accessory
(i.e., Poly Device Mode).
Task
1 In the system web interface, go to Security > Access.
2 Select Disable All USB Ports.
Detecting Intrusions
When the G7500 and Studio X series system detects a possible network intrusion, it logs an entry to the security log.
The Enable Network Intrusion Detection System (NIDS) setting controls the logging behavior. The security log prefix
identifies the type of packet detected, as shown in the following table:
Prefix Packet Type
SECURITY: NIDS/unknown_tcp Packet that attempts to connect or probe a closed TCP port
SECURITY: NIDS/unknown_udp Packet that probes a closed UDP port
SECURITY: NIDS/invalid_tcp TCP packet in an invalid state
SECURITY: NIDS/invalid_icmp ICMP or ICMPv6 packet in an invalid state
SECURITY: NIDS/unknown Packet with an unknown protocol number in the IP header
SECURITY: NIDS/flood Stream of ICMP or ICMPv6 ping requests or TCP connections to
an opened TCP port
Following the message prefix, the security log entry includes the time stamp and the IP, TCP, UDP, ICMP, or ICMPv6
headers. For example, the following security log entry shows an unknown_udp intrusion:
2009-05-08 21:32:52 WARNING kernel: SECURITY: NIDS/unknown_udp IN=eth0 OUT=
MAC=00:e0:db:08:9a:ff:00:19:aa:da:11:c3:08:00 SRC=172.18.1.80 DST=172.18.1.170 LEN=28
TOS=0x00 PREC=0x00 TTL=63 ID=22458 PROTO=UDP SPT=1450 DPT=7788 LEN=8
PKI Certificates
If your organization uses a public key infrastructure (PKI) for securing network connections, Poly recommends that you
have a strong understanding of certificate management and how it applies to your
G7500 and Studio X series system.
PKI certificates authenticate secure network connections to and from the G7500 and Studio X series system. The system
uses standard PKI techniques to configure and manage certificates and certificate signing requests (CSRs). ANSI X.509
standards regulate the certificate characteristics.
Your system can generate CSRs to send to a certificate authority (CA), a trusted entity that validates and officially issues,
or signs, PKI certificates. Your system uses those certificates for client and server authentication.
If your system is in an environment without PKI, you don’t need a CA-signed certificate; the system comes with a self-
signed certificate for its TLS connections. When you deploy PKI, however, self-signed certificates aren’t trusted and you
must use CA-signed certificates.
Here are some examples of how you use PKI certificates:
55

Table of Contents

Questions and Answers:

Poly P014 Specifications

General IconGeneral
BrandPoly
ModelP014
CategoryConference System
LanguageEnglish

Summary

Getting Started

Administrator Features and Capabilities

Highlights features and capabilities available to system administrators.

Setting Up the System

Completing Initial System Setup

Guides through the final steps of system setup after initial configuration.

Complete Setup with the System Web Interface

Steps to complete system setup using the system web interface.

Configuring Network Settings

Configuring Wired LAN Settings

Sets up wired LAN properties for the system.

Securing the System

Managing System Access

Configures system access, including local and external authentication.

Local Accounts

Manages local user accounts and password policies for system access.

Enable External Authentication

Enables authentication using an external directory service like Active Directory.

PKI Certificates

Manages PKI certificates for securing network connections.

Create a Certificate Signing Request

Generates a Certificate Signing Request (CSR) for system trust.

Configuring Call Settings

Configure Call Settings

Specifies how the system handles and manages calls.

Configuring Video and Camera Settings

Configure General Camera Settings

Configures general settings for connected cameras.

Video Codec Capabilities

Details supported video codec capabilities like H.265 and H.264.

H.265 High Efficiency Video Coding

Explains H.265 video coding and its resolutions and frame rates.

H.264 Advanced Video Coding

Explains H.264 video coding and its resolutions and frame rates.

System Maintenance

Updating Software

Provides methods for updating system software.

Updating Software in the System Web Interface

Manually updates or sets up automatic software updates via web interface.

Reset System Settings

Resets system configuration settings to their default values.

Factory Restore the System

Performs a factory restore to erase all data and reset to factory firmware.

Troubleshooting

Logs

Information and management of system logs for troubleshooting.

Consolidated System and Peripheral Device Logs

Accesses consolidated event information for the system and connected devices.

Related product manuals