
HUAWEI Board
Copyright © Huawei Technologies Co., Ltd.
5.13 Content Sharing ........................................................................................................................................................ 22
5.14 OAM......................................................................................................................................................................... 23
5.14.1 Quick Setup ........................................................................................................................................................... 23
5.14.2 Connection to eSight.............................................................................................................................................. 23
5.15 Remote Video Monitoring ........................................................................................................................................ 24
5.16 APIs for Third-Party Integration ............................................................................................................................... 24
6 Security and Reliability .............................................................................................................26
6.1 Operating System Security ......................................................................................................................................... 26
6.2 Network Layer Security.............................................................................................................................................. 26
6.3 Firewall Technology (NAT)........................................................................................................................................ 26
6.4 Traversal Between Public and Private Networks ........................................................................................................ 27
6.5 Email Security ............................................................................................................................................................ 27
6.6 Web Request Authentication....................................................................................................................................... 27
6.7 Protocol Anti-Attack Measures................................................................................................................................... 27
6.8 Protection of Sensitive Data ....................................................................................................................................... 28
6.9 Protection of AI Voice Commands.............................................................................................................................. 28
6.10 System Management and Maintenance Security ...................................................................................................... 28
6.11 Security Design......................................................................................................................................................... 28
6.12 Disaster Recovery..................................................................................................................................................... 29
7 Operations and Maintenance....................................................................................................30
7.1 UIs .............................................................................................................................................................................. 30
7.1.1 Touchscreen ............................................................................................................................................................. 30
7.1.2 Touch ....................................................................................................................................................................... 31
7.1.3 AirPresence Mobile/PC Client................................................................................................................................. 32
7.1.4 Web Interface........................................................................................................................................................... 34
7.2 Maintenance and Upgrade .......................................................................................................................................... 35
7.2.1 Log Management ..................................................................................................................................................... 35
7.2.2 System Diagnostics.................................................................................................................................................. 35
7.2.3 Inspection................................................................................................................................................................. 36
7.2.4 Upgrade ................................................................................................................................................................... 37
7.3 CHR Data Collection.................................................................................................................................................. 37
8 Technical Specifications ............................................................................................................38
8.1 Physical Specifications ............................................................................................................................................... 38
8.2 Performance Specifications ........................................................................................................................................ 40
8.3 Ports and Protocols ..................................................................................................................................................... 42
8.4 Standards Compliance ................................................................................................................................................ 43
A Glossary .......................................................................................................................................45