Security Settings System Security
Polycom, Inc. 49
The following table describes the options in the Security Settings page. Caution
We recommend always using the High security setting unless you have a specific
and compelling need to allow one of the insecure capabilities.
We recommend the new Maximum security setting only for those environments
where the most stringent security protocols must be adhered to.
Enabling Maximum security is irreversible and has significant consequences
(see “The Consequences of Enabling Maximum Security Mode” on page 54). Don’t
choose this setting unless you know what you’re doing and are prepared for the
consequences.
Note
All clusters in a supercluster must have the same security settings. Before
attempting to join a supercluster, make sure the cluster’s security settings match
those of the other members of the supercluster. You can’t change a cluster’s
security settings while it’s part of a supercluster.
Table 3-5 Fields on the Security Settings page
Field Description
Maximum security An extremely high security mode suitable for use where
very strict security requirements apply.
Once this mode is enabled, it’s no longer possible to
reduce the security level. See caution above.
High security Recommended setting for normal operation.
Custom security Lets you enable one or more of the unsecured methods
of network access listed below it.
Allow Linux console
access Enables the Linux user root to log into the system using
SSH. This direct Linux access isn’t needed for normal
operation, routine maintenance, or even
troubleshooting, all of which can be done through the
administrative GUI.
In extreme circumstances, this option might enable
expert Polycom Global Services personnel to more fully
understand the state of a troubled system or correct
problems. Enable this option only when asked to do so
by Polycom Global Services.