Grass Valley K2 System Guide v.9.0 User Manual
Page 8
About managing stand-alone K2 clients with SiteConfig......................................................................142
SiteConfig and stand-alone K2 clients checklist...................................................................................142
System requirements for SiteConfig host PC.......................................................................................143
About installing SiteConfig....................................................................................................................144
Installing/upgrading SiteConfig.............................................................................................................144
Creating a system description for stand-alone K2 clients.....................................................................146
Creating the control network for stand-alone K2 clients ......................................................................147
Creating the FTP/streaming network for stand-alone K2 clients (optional)...........................................149
Adding a group.....................................................................................................................................150
Adding stand-alone K2 clients to the system description.....................................................................151
Modifying stand-alone K2 client unassigned (unmanaged) interfaces..................................................151
Discovering devices with SiteConfig.....................................................................................................153
Assigning discovered devices...............................................................................................................154
Modifying stand-alone K2 client managed network interfaces..............................................................155
Adding a control point PC placeholder device to the system description.............................................161
Assigning the control point PC..............................................................................................................162
Making the host name the same as the device name...........................................................................162
Pinging devices from the PC that hosts SiteConfig..............................................................................163
About hosts files and SiteConfig...........................................................................................................163
Generating host tables using SiteConfig...............................................................................................164
Configuring deployment groups............................................................................................................165
About deploying software for stand-alone K2 clients............................................................................166
Installing Control Point software...........................................................................................................169
Installing K2 software............................................................................................................................170
Pre-installed software...........................................................................................................................170
Backup and recovery strategies............................................................................................................170
Overview of K2 security features.......................................................................................................174
Example: Setting up user access to bins .........................................................................................175
Example: Setting up user access to channels ..................................................................................176
Passwords and security on Grass Valley systems............................................................................177
Configuring media access security for K2 bins.................................................................................177
AppCenter operations and media access security ...........................................................................179
FTP and media access security .......................................................................................................179
K2 SANs and media access security ...............................................................................................179
Protocol control of channels and media access security .................................................................180
About channel access security..........................................................................................................180
K2 and STRATUS security considerations...........................................................................................182
Understanding virus and security policies............................................................................................183
Windows operating system update policy.........................................................................................183
Embedded Security modes and policies...........................................................................................183
Grass Valley anti-virus scan policy....................................................................................................184
Network and firewall policies.............................................................................................................185
8
K2 System Guide
06 November 2012
Contents