19.08.2013 Views

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Information Collector<br />

Standard Security Mode<br />

Ultra Secure Mode<br />

Chapter 20-<strong>RMX</strong> Administration and Utilities<br />

The Information Collector comprehensively attains all information from all the MCU<br />

internal entities for data analysis. That data, stored in a central repository, is logged from the<br />

following system components:<br />

• System Log Files • Full faults<br />

• CDR • Apache logs<br />

• OS (Core dumps, CFG - DNS, DHCP,<br />

NTP, kernal state, event logs<br />

• CFG directory (without IVR)<br />

• Signaling Trace files (H.323 & SIP) • Cards info: HW version, state and status<br />

• Central Signaling logs • SW version number<br />

• Processes internal state and statistics<br />

The data collected is saved into a single compressed file containing all the information from<br />

each system component in its relative format (.txt, .xml, etc...). In case the disk is<br />

malfunctioning, the file will be written to the RAM (involves only a small amount of<br />

information where the RAM size is 1/2 a gigabyte). The zipped file (info.tgz) can be opened<br />

with the following applications: WinRAR and WinZip. The entire zipped file is then sent to<br />

<strong>Polycom</strong>’s Network Systems Division for analysis and troubleshooting.<br />

The Information Collector logs information from the <strong>RMX</strong>’s Network Intrusion Detection System<br />

(NIDS), saving it into a compressed disk file. (If the disk malfunctions, the file is written to<br />

RAM.) The zipped file (info.tgz) can be opened with either WinRAR or WinZip. The entire<br />

zipped file can be sent to <strong>Polycom</strong> for analysis.)<br />

Network Intrusion Detection System (NIDS)<br />

The <strong>RMX</strong> system uses iptables for access control. For each different kind of packet<br />

processing, there is a table containing chained rules for the treatment of packets. Every<br />

network packet arriving at or leaving from the <strong>RMX</strong> must pass the rules applicable to it.<br />

Depending on the nature of the suspect packets, the rules may reject, drop, or limit their<br />

arrival rate (dropping the rest)<br />

The <strong>RMX</strong> maintains a log that includes all unpermitted access attempts blocked by the fire<br />

wall.<br />

Unpermitted access includes:<br />

• Access to ports which are not opened on the <strong>RMX</strong><br />

• Invalid access to open ports.<br />

Using the Information Collector<br />

When the Information Collector is used the following steps are performed:<br />

• Step 1: Creating the Information Collector file.<br />

• Step 2: Saving the Information Collector file.<br />

<strong>Polycom</strong>, Inc. 20-55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!