Specifications

Copyright © 2012 Black Box Network Services. All Rights Reserved.
724-746-5500 | blackbox.com 150
iCOMPEL Digital Signage - User Guide (V9.0.3)
It is desirable to change the SSH port to a different number to make it more difficult for an attack to succeed. It may also be
desirable to have an alternate port available.
The standard port for SSH access is 22. You can specify a maximum of two ports to accept SSH connections.
WARNING: If you change the SSH port number, then you should make a note of it and keep it safe.
Master password
The Master iCOMPEL password is required for SSH access to the deeper levels of the iCOMPEL. This is not the same
password used to access the web pages of the iCOMPEL. It may be desirable to change this password, but you must
know the existing password to do so. Please contact Black Box Technical Support at +1 (724) 746-5500 or info@blackbox.
com for the Master Password.
LDAP
See LDAP settings
LDAP Expert
This option is only visible if you have set the User Interface Policy to Expert on the UI Options page.
Expert users may use these fields to enter LDAP XML Settings and Passwords.
Firewall Status
See Firewall status
LDAP Tests
See LDAP Tests
9.4.6.1 Firewall status
This page shows information about the firewall on the iCOMPEL.
Understanding this information requires a good working knowledge of IP networking and network security.
The Chain PLAYER-INPUT section details the rules governing connections made to the iCOMPEL on various protocols.
The IP address from which a connection is made is checked against the Chain PLAYER-INPUT-ADDRESSES rule set.
Any connections made from an IP address that is not allowed by the security settings are dropped.
All connections from allowed addresses are passed through to the Chain PLAYER-INPUT-PORTS rule set.
The IP port to which a connection is made is checked against the Chain PLAYER-INPUT-PORTS rule set.
Any connections made to a port that is not allowed by the security settings are dropped.
The Pkts (Packets) and Bytes columns shows the volume of traffic that is accepted or rejected by each rule.
An unusually high number of Pkts on a 'DROP' line indicate a possible attack on the iCOMPEL.
9.4.6.2 LDAP settings
The iCOMPEL security model allows users that have been authenticated to use features of the iCOMPEL according to
assigned permissions.
In LDAP the iCOMPEL considers a user to have permission if an LDAP filter matches entries in the directory.
Typically a LDAP filter will check that a user is a member of a group.
150
128
150
153