Grass Valley K2 System Guide v.9.0 User Manual

Page 8

Advertising
background image

Chapter 6: Managing stand-alone K2 systems with SiteConfig.........................................141

About managing stand-alone K2 clients with SiteConfig......................................................................142
SiteConfig and stand-alone K2 clients checklist...................................................................................142
System requirements for SiteConfig host PC.......................................................................................143
About installing SiteConfig....................................................................................................................144
Installing/upgrading SiteConfig.............................................................................................................144
Creating a system description for stand-alone K2 clients.....................................................................146
Creating the control network for stand-alone K2 clients ......................................................................147
Creating the FTP/streaming network for stand-alone K2 clients (optional)...........................................149
Adding a group.....................................................................................................................................150
Adding stand-alone K2 clients to the system description.....................................................................151
Modifying stand-alone K2 client unassigned (unmanaged) interfaces..................................................151
Discovering devices with SiteConfig.....................................................................................................153
Assigning discovered devices...............................................................................................................154
Modifying stand-alone K2 client managed network interfaces..............................................................155
Adding a control point PC placeholder device to the system description.............................................161
Assigning the control point PC..............................................................................................................162
Making the host name the same as the device name...........................................................................162
Pinging devices from the PC that hosts SiteConfig..............................................................................163
About hosts files and SiteConfig...........................................................................................................163
Generating host tables using SiteConfig...............................................................................................164
Configuring deployment groups............................................................................................................165
About deploying software for stand-alone K2 clients............................................................................166

Chapter 7: Managing K2 system software............................................................................167

About K2 system software....................................................................................................................168

Software components installed.........................................................................................................168

Installing Control Point software...........................................................................................................169
Installing K2 software............................................................................................................................170
Pre-installed software...........................................................................................................................170
Backup and recovery strategies............................................................................................................170

Chapter 8: Administering and maintaining the K2 system.................................................173

Licensing...............................................................................................................................................174

Software version licenses..................................................................................................................174
Licensable options............................................................................................................................174

Configuring K2 security........................................................................................................................174

Overview of K2 security features.......................................................................................................174
Example: Setting up user access to bins .........................................................................................175
Example: Setting up user access to channels ..................................................................................176
Passwords and security on Grass Valley systems............................................................................177
Configuring media access security for K2 bins.................................................................................177
AppCenter operations and media access security ...........................................................................179
FTP and media access security .......................................................................................................179
K2 SANs and media access security ...............................................................................................179
Protocol control of channels and media access security .................................................................180
About channel access security..........................................................................................................180

K2 and STRATUS security considerations...........................................................................................182
Understanding virus and security policies............................................................................................183

Windows operating system update policy.........................................................................................183
Embedded Security modes and policies...........................................................................................183
Grass Valley anti-virus scan policy....................................................................................................184
Network and firewall policies.............................................................................................................185

About tri-level sync................................................................................................................................185

8

K2 System Guide

06 November 2012

Contents

Advertising
This manual is related to the following products: