EasyManuals Logo
Home>Poly>Conference System>Studio X30

Poly Studio X30 Administrator's Guide

Poly Studio X30
156 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #70 background imageLoading...
Page #70 background image
Prefix Packet Type
SECURITY: NIDS/invalid_icmp ICMP or ICMPv6 packet in an invalid state
SECURITY: NIDS/unknown Packet with an unknown protocol number in the IP header
SECURITY: NIDS/flood Stream of ICMP or ICMPv6 ping requests or TCP connections to an opened TCP port
Following the message prefix, the security log entry includes the time stamp and the IP, TCP, UDP,
ICMP, or ICMPv6 headers. For example, the following security log entry shows an unknown_udp
intrusion:
2009-05-08 21:32:52 WARNING kernel: SECURITY: NIDS/unknown_udp IN=eth0
OUT= MAC=00:e0:db:08:9a:ff:00:19:aa:da:11:c3:08:00 SRC=172.18.1.80
DST=172.18.1.170 LEN=28 TOS=0x00 PREC=0x00 TTL=63 ID=22458 PROTO=UDP
SPT=1450 DPT=7788 LEN=8
PKI Certificates
If your organization uses a public key infrastructure (PKI) for securing network connections, Poly
recommends that you have a strong understanding of certificate management and how it applies to
your G7500 and Studio X series system.
PKI certificates authenticate secure network connections to and from the G7500 and Studio X
series system. The system uses standard PKI techniques to configure and manage certificates and
certificate signing requests (CSRs). ANSI X.509 standards regulate the certificate characteristics.
Your system can generate CSRs to send to a certificate authority (CA), a trusted entity that validates
and officially issues, or signs, PKI certificates. Your system uses those certificates for client and
server authentication.
If your system is in an environment without PKI, you don’t need a CA-signed certificate; the system
comes with a self-signed certificate for its TLS connections. When you deploy PKI, however, self-
signed certificates aren’t trusted and you must use CA-signed certificates.
Root certificates installed on your system automatically transfer to a paired TC10 or TC8 device. If
you delete root certificates from the system, they’re automatically deleted from the TC10 or TC8.
System certificates are unique to each system and don’t transfer to paired devices.
Here are some examples of how you use PKI certificates:
If your environment uses the 802.1X authentication framework for wired connections, create a
CSR and install the resulting CA-signed certificate on your system so it’s trusted on the network.
If you want to navigate with a browser over a secure connection to your system web interface,
create a CSR and install the resulting CA certificate chain on your system to replace its factory-
installed certificate, which isn’t trusted.
Provisioning your system using Poly Clariti Manager in a secure environment.
NOTE: Your system must have a Host Name in this situation.
PKI Certificates
59

Table of Contents

Other manuals for Poly Studio X30

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Poly Studio X30 and is the answer not in the manual?

Poly Studio X30 Specifications

General IconGeneral
BrandPoly
ModelStudio X30
CategoryConference System
LanguageEnglish

Related product manuals