Cisco Systems CTSMX30055K9 manual Security settings

Page 51

Cisco TelePresence MX Series

Administrator guide

Table of contents

Introduction

The Security settings

Web interface

Advanced settings

Appendices

 

51

 

 

Security Audit Logging Mode

Describes where the audit logs are recorded or transmitted.

Security Audit Server Address

Enter the external/global IP-address to the audit syslog server. IPv6 is not supported. NOTE: Requires a restart of the system for any change to take effect.

Requires user role: AUDIT

Value space: <S: 0, 64>

Format: String with a maximum of 64 characters.

Example: Security Audit Server Address: ""

Security Audit Server Port

Enter the port of the syslog server that the system shall send its audit logs to. The default port is 514.

NOTE: Requires a restart of the system for any change to take effect.

Requires user role: AUDIT

Value space: <0..65535>

Range: Select a value from 0 to 65535.

Example: Security Audit Server Port: 514

Security Audit OnError Action

Describes what actions will be taken if connection to the syslog server is lost. This setting is only relevant if Security Audit Logging Mode is set to ExternalSecure.

NOTE: Requires a restart of the system for any change to take effect.

Requires user role: AUDIT

Value space: <Halt/Ignore>

Halt: If a halt condition is detected the unit is rebooted and only the auditor is allowed to operate the unit until the halt condition has passed. When the halt condition has passed the audit logs are re-spooled to the external server. Halt conditions are: A network breach (no physical link), no external syslog server running (or wrong server address or port), TLS authentication failed (if in use), local backup (re-spooling) log full.

Ignore: The system will continue its normal operation, and rotate internal logs when full. When connection is restored it will again send its audit logs to the syslog server.

Example: Security Audit OnError Action: Ignore

NOTE: Requires a restart of the system for any change to take effect.

Requires user role: AUDIT

Value space: <Off/Internal/External/ExternalSecure>

Off: No audit logging is performed.

Internal: The system records the audit logs to internal logs, and rotates logs when they are full.

External: The system sends the audit logs to an external audit syslog server. The external server must support TCP.

ExternalSecure: The system sends encrypted audit logs to an external audit server that is verified by a certificate in the Audit CA list. The Audit CA list file must be uploaded to the codec using the web interface. The common_name parameter of a certificate in the CA list must match the IP address of the syslog server.

Example: Security Audit Logging Mode: Off

Security Session ShowLastLogon

When logging in to the system using SSH or Telnet you will see the UserId, time and date of the last session that did a successful login.

Requires user role: ADMIN

Value space: <Off/On>

On: Set to On to enable the possibility to show information about the last session.

Off: Set to Off to disable the possibility to show information about the last session.

Example: Security Session ShowLastLogon: Off

Security Session InactivityTimeout

Determines how long the system will accept inactivity from the user before he is automatically logged out.

Requires user role: ADMIN

Value space: <0..10000>

Range: Select a value from 0 to 10000 seconds. 0 means that inactivity will not enforce automatically logout.

Example: Security Session InactivityTimeout: 0

D14850.02 MX Series Administrator Guide (TC5.0) 2011 NOVEMBER © 2011 Cisco Systems, Inc. All rights reserved.

www.cisco.com

Image 51
Contents MX300 MX200 Cisco TelePresence MX SeriesCisco TelePresence MX Series Table of contentsIntroduction Intellectual property rights Products covered in this guide User documentationCisco contacts SoftwareSoftware download New features and improvements What’s new­in this versionSoftware release notes Other enhancements Advanced configuration menu changesCisco TelePresence MX Series at a glance Features and benefitsCisco TelePresence MX Series Web interface Sign out Starting the web interfaceConnect to the video system SignEnter passwords Changing the system/codec passwordClick your user name Open the Change Password dialog box Set the new passwordOpen sub-pages Interactive menuMenu availability and user roles Main menuSystem information System information Login informationLog files XML files Advanced configuration Changing system settingsSearch functionality Selecting a wallpaper Select a wallpaperUpload a custom wallpaper file Enter the text message An active sign in banner Sign in bannerAddress input field Sharing contentsPlacing calls Calling someoneControlling and monitoring a call Select a layout Local layout controlEnabling the live snapshot feature Taking snapshotsMain source Display area Take live snapshots Upgrading the system software Certificate management Uploading the trusted CA certificates listUploading the SSL certificate Upload the audit certificate list Enable secure audit loggingAudit certificate list About audit loggingAbout user roles User administrationDefault user account Security modeDeleting a user account Creating a new user accountEditing user details Deactivating a user accountRestarting the system Advanced settings Find the IP address of your system Open the web interface Overview of the advanced settingsNetworkServices SSH AllowPublicKey Cisco TelePresence MX Series Audio settings Cameras settings Conference settings Conference 1..1 DefaultCall Protocol Conference 1..1 MicUnmuteOnDisconnect ModeConference 1..1 DoNotDisturb Mode Conference 1..1 Encryption ModeConference 1..1 IncomingMultisiteCall Mode Conference 1..1 VideoBandwidth ModeConference 1..1 PacketLossResilience Mode Conference 1..1 VideoBandwidth MainChannel WeightH323 settings H323 Profile 1..1 H323Alias E164 H323 Profile 1..1 CallSetup ModeH323 Profile 1..1 Gatekeeper Discovery H323 Profile 1..1 Gatekeeper AddressNetwork settings Network 1..1 IPv6 Assignment Network 1..1 QoS ModeNetwork 1..1 QoS Diffserv Signalling Network 1..1 IPv6 GatewayNetwork 1..1 IEEE8021X TlsVerify Network 1..1 IEEE8021X ModeNetwork 1..1 IEEE8021X Password Network 1..1 QoS Diffserv VideoNetwork 1..1 IEEE8021X Eap Ttls Network 1..1 TrafficControl ModeNetwork 1..1 RemoteAccess Allow Network 1..1 IEEE8021X Eap Md5NetworkServices settings NetworkServices Https VerifyServerCertificate NetworkServices Http ModeNetworkServices Https Ocsp Mode NetworkServices Https ModeNetworkServices Snmp SystemContact NetworkServices NTP AddressNetworkServices SIP Mode NetworkServices Snmp CommunityNamePhonebook settings Provisioning settings RTP settings Security settings SIP settings SerialPort settingsSIP Profile 1..1 Proxy 1..4 Address SIP Profile 1..1 DefaultTransportSIP Profile 1..1 TlsVerify SIP Profile 1..1 OutboundStandby settings SystemUnit settings Time DateFormat Time settingsTime TimeFormat Time ZoneVideo settings UserInterface settingsVideo Input Source 1..2 OptimalDefinition Threshold60fps Video Input Source 1..2 CameraControl ModeVideo Input Source 1..2 CameraControl CameraId Video Input Source 1..2 OptimalDefinition ProfileVideo ControlPanel Brightness Video DefaultPresentationSourceVideo Input Source 1..2 Quality Video Input DVI 1 TypeVideo Layout RemoteLayoutFamily Video OSD ModeVideo OSD LoginRequired Video Layout LocalLayoutFamilyVideo Output LCD 1 Brightness Video Output LCD 1 ResolutionVideo AllowWebSnapshots Video Output LCD 1 MonitorRoleExperimental CapsetReduction Experimental settingsVideo WallPaper Experimental CapsetFilterExperimental Conference 1..1 ReceiverBasedDownspeeding Experimental CTMSSupport ModeExperimental NetworkServices UPnP Mode Experimental NetworkServices UPnP TimeoutExample Experimental SystemUnit CrashReporting URI Experimental SystemUnit CrashReporting ModeExample Experimental SystemUnit CrashReporting Mode Off Experimental SystemUnit CrashReporting URIAppendices Setting the system password Setting the Administrator settings menu passwordSetting a root password Cisco VCS provisioning Downloading the provisioning configuration templateOptimal definition for systems supporting 1080p Optimal definition profilesClearPath Packet loss resilience DVI-I Technical specification for MX300/MX200SIP Web interface Advanced settings Document categories User documentation on the Cisco web site
Related manuals
Manual 2 pages 49.92 Kb

CTSMX30055K9 specifications

Cisco Systems has long been recognized as a leader in networking and communication technologies, and the Cisco TelePresence MX300 (CTSMX30055K9) exemplifies the company’s commitment to fostering exceptional video collaboration solutions. The MX300 is particularly designed for medium-sized meeting rooms, making it an ideal choice for enterprises looking to enhance their videoconferencing capabilities.

One of the standout features of the Cisco MX300 is its remarkable video experience. With support for up to 1080p high-definition video at 30 frames per second, users can enjoy crisp and clear visual quality during meetings. This resolution ensures that participants feel as though they are in the same room, regardless of their physical location. The MX300 also includes advanced video processing technology, which helps optimize picture quality even in varying bandwidth conditions.

In terms of audio, the MX300 is equipped with Cisco's intelligent audio technology. It utilizes multiple microphones and smart processing to ensure that all voices in the room are captured clearly, eliminating unwanted background noise. This results in a natural conversational experience, allowing for seamless interactions among participants.

Another significant characteristic of the MX300 is its user-friendly interface. The device comes with a simple remote control and touchscreen capabilities that make it easy for users to initiate calls, share content, and manage meetings. Integration with Cisco's Webex platform further enhances its usability, allowing users to join meetings with just one click.

The MX300 is known for its flexibility and scalability. It can be easily integrated into an existing IT infrastructure, supporting various endpoints and devices, which contributes to a more cohesive video collaboration experience. Additionally, it features interoperability with other video conferencing systems, ensuring that organizations can connect with partners and clients regardless of their technology stack.

Security is another strong suit of the Cisco MX300. The device incorporates robust security protocols, including encryption and secure access controls, safeguarding sensitive information shared during meetings. This emphasis on security is critical for organizations seeking to maintain compliance and protect their data.

Overall, the Cisco TelePresence MX300 (CTSMX30055K9) is a powerful solution for medium-sized meeting rooms, offering high-definition video, intelligent audio processing, and a user-friendly interface. With its flexibility, scalability, and strong security features, the MX300 stands out as an ideal choice for organizations committed to effective communication and collaboration. By enhancing the quality of virtual meetings, Cisco's MX300 continues to play a vital role in transforming the workplace into an environment where ideas can be shared effortlessly, fostering innovation and productivity.