Network and firewall policies, Enabling and disabling the usb ports – Grass Valley K2 Media Client System Guide v.3.3 User Manual
Page 148

148
K2 Media Client System Guide
June 9, 2009
Chapter 6 Administering and maintaining the K2 system
program while the K2 is being used to record or play video to air. The anti-virus
package executing on the PC can be scheduled to scan the system drives of multiple
K2 Systems.
The following strategies are recommended for virus scanning:
• Run the scanning software on a dedicated PC that connects to the K2 system via a
network mount. Do not run scanning software locally on the K2 Media Client.
• Connect to the K2 Media Client via 100BaseT network. This constrains the
bandwidth and system resources consumed, so as to not interfere with media
operations. Do not connect and scan via Gigabit Ethernet.
• Grass Valley does not support the running of anti-virus programs on a K2 System
itself at the same time the system is being used to record or play video to air.
With these recommended strategies, you should be able to scan the K2 Media Client
without interrupting media access.
Network and firewall policies
The following protection policies are recommended:
• Where possible, the K2 system should be run in a closed and protected
environment without network access to the corporate IS environment or the outside
world.
• If the K2 system must operate in a larger network, Grass Valley recommends that
access be through a gateway or firewall to provide anti-virus protection. The
firewall should allow incoming HTTP (TCP ports 80 and 280) connections for
client and configuration connections to the K2 system inside the private network.
• If operating with an Aurora Browse system, ports should allow incoming packets
so requests to the Proxy NAS can be properly processed. The port that needs to be
open is port 445 for TCP and UDP for Windows and SAMBA shares. If your site’s
policies require that these port numbers change, contact Grass Valley support for
assistance.
• Access to the K2 system should be controlled in order to limit the likelihood of
malicious or unintended introduction of viruses.
• The front and rear USB ports of the K2 system should normally be disabled; they
should only be used by Windows administrators. (If the K2 Media Client has USB
RS-422 cards, be careful not to disable the RS-422 USB.) For more information,
see
“Enabling and disabling the USB ports” on page 148
.
Enabling and disabling the USB ports
Grass Valley recommends that the front and rear USB ports be disabled. This protects
the K2 Media Client from exposure to unauthorized files. If the K2 Media Client has
USB RS-422 cards, do not disable the RS-422 USB. The following illustration shows
which USB ports should be disabled in Windows Device Manager.