Polycom 1500 Server User Manual


  Open as PDF
of 1124
 
RealPresence Collaboration Server (RMX) 1500/2000/4000 Administrator’s Guide
21-66 Polycom, Inc.
Information Collector
Standard Security Mode
The Information Collector comprehensively attains all information from all the MCU
internal entities for data analysis. That data, stored in a central repository, is logged from the
following system components:
The data collected is saved into a single compressed file containing all the information from
each system component in its relative format (.txt, .xml, etc...). In case the disk is
malfunctioning, the file will be written to the RAM (involves only a small amount of
information where the RAM size is 1/2 a gigabyte). The zipped file (info.tgz) can be opened
with the following applications: WinRAR and WinZip. The entire zipped file is then sent to
Polycom’s Network Systems Division for analysis and troubleshooting.
Ultra Secure Mode
The Information Collector logs information from the Collaboration Server’s Network Intrusion
Detection System (NIDS), saving it into a compressed disk file. (If the disk malfunctions, the
file is written to RAM.) The zipped file (info.tgz) can be opened with either WinRAR or
WinZip. The entire zipped file can be sent to Polycom for analysis.
Network Intrusion Detection System (NIDS)
The Collaboration Server system uses iptables for access control. For each different kind of
packet processing, there is a table containing chained rules for the treatment of packets.
Every network packet arriving at or leaving from the Collaboration Server must pass the
rules applicable to it.
Depending on the nature of the suspect packets, the rules may reject, drop, or limit their
arrival rate (dropping the rest).
The Collaboration Server maintains a log that includes all unpermitted access attempts
blocked by the fire wall.
Unpermitted access includes:
Access to ports which are not opened on the Collaboration Server.
Invalid access to open ports.
System Log Files Full faults
•CDR •Apache logs
OS (Core dumps, CFG - DNS, DHCP,
NTP, kernal state, event logs
CFG directory (without IVR)
Signaling Trace files (H.323 & SIP) Cards info: HW version, state and status
Central Signaling logs SW version number
Processes internal state and statistics