Руководство По Обслуживанию для Cisco Cisco TelePresence MX700
D14850.04 MX Series Administrator Guide TC6.0, JANUARY 2013.
www.cisco.com — Copyright © 2011–2013 Cisco Systems, Inc. All rights reserved.
76
Cisco TelePresence MX Series
Administrator Guide
Security settings
Security Audit Logging Mode
Determine where to record or transmit the audit logs. When using the External or
ExternalSecure modes, you also must enter the address and port number for the audit server in
the Security Audit Server Address and Security Audit Server Port settings.
NOTE: Restart the system for any change to this setting to take effect.
NOTE: Restart the system for any change to this setting to take effect.
Requires user role: AUDIT
Value space: <Off/Internal/External/ExternalSecure>
Value space: <Off/Internal/External/ExternalSecure>
Off: No audit logging is performed.
Internal: The system records the audit logs to internal logs, and rotates logs when they are
Internal: The system records the audit logs to internal logs, and rotates logs when they are
full.
External: The system sends the audit logs to an external audit server (syslog server). The
External: The system sends the audit logs to an external audit server (syslog server). The
audit server must support TCP.
ExternalSecure: The system sends encrypted audit logs to an external audit server (syslog
ExternalSecure: The system sends encrypted audit logs to an external audit server (syslog
server) that is verified by a certificate in the Audit CA list. The Audit CA list file must be
uploaded to the codec using the web interface. The common_name parameter of a
certificate in the CA list must match the IP address of the audit server.
Example:
Security Audit Logging Mode: Off
Security Audit Server Address
Enter the IP-address of the audit server. Only valid IPv4 or IPv6 address formats are accepted.
Host names are not supported. This setting is only relevant when Security Audit Logging Mode
is set to External or ExternalSecure.
NOTE: Restart the system for any change to this setting to take effect.
NOTE: Restart the system for any change to this setting to take effect.
Requires user role: AUDIT
Value space: <S: 0, 64>
Value space: <S: 0, 64>
Format: Valid IPv4 or IPv6 address formats.
Example:
Security Audit Server Address: ""
Security Audit Server Port
Enter the port of the audit server that the system shall send its audit logs to. The default port
is 514. This setting is only relevant when Security Audit Logging Mode is set to External or
ExternalSecure.
NOTE: Restart the system for any change to this setting to take effect.
NOTE: Restart the system for any change to this setting to take effect.
Requires user role: AUDIT
Value space: <0..65535>
Value space: <0..65535>
Range: Select a value from 0 to 65535.
Example:
Security Audit Server Port: 514
Security Audit OnError Action
Determine what happens when the connection to the audit server is lost. This setting is only
relevant when Security Audit Logging Mode is set to ExternalSecure.
NOTE: Restart the system for any change to this setting to take effect.
NOTE: Restart the system for any change to this setting to take effect.
Requires user role: AUDIT
Value space: <Halt/Ignore>
Value space: <Halt/Ignore>
Halt: If a halt condition is detected the system is rebooted and only the auditor is allowed
to operate the unit until the halt condition has passed. When the halt condition has passed
the audit logs are re-spooled to the audit server. Halt conditions are: A network breach
(no physical link), no audit server running (or wrong audit server address or port), TLS
authentication failed (if in use), local backup (re-spooling) log full.
Ignore: The system will continue its normal operation, and rotate internal logs when full.
Ignore: The system will continue its normal operation, and rotate internal logs when full.
When the connection is restored it will again send its audit logs to the audit server.
Example:
Security Audit OnError Action: Ignore
Contents
Introduction
System settings
Setting passwords
Appendices
Web interface
System settings