
342
V6100 and V7122 User Guide
Must = the call is terminated. Incoming calls that don’t include encryption information are
rejected.
Prefer = an unencrypted call is established. Incoming calls that don’t include encryption
information are accepted.
To enable SRTP set the parameter EnableMediaSecurity to 1 (described in
Security
Parameters
).
When SRTP is used the channel capacity is reduced (see the parameter
EnableMediaSecurity).
The gateway only supports the AES 128 in CM mode cipher suite.
Figure 120
Example of crypto Attributes Usage
a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:PsKb5X0YLuSvNrImEh/dAe
a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:IsPtLc6XVzRuMqHlDnEiAd
RADIUS Login Authentication
Users can enhance the security and capabilities of logging to the gateway’s Web and Telnet
embedded servers by using a Remote Authentication Dial-In User Service (RADIUS) to store
numerous usernames, passwords and access level attributes (Web only), allowing multiple
user management on a centralized platform. RADIUS (RFC 2865) is a standard
authentication protocol that defines a method for contacting a predefined server and verifying
a given name and password pair against a remote database, in a secure manner.
When accessing the Web and Telnet servers, users must provide a valid username and
password. When RADIUS authentication isn’t used, the username and password are
authenticated with the Embedded Web Server’s usernames and passwords of the primary or
secondary accounts (see
User Accounts
) or with the Telnet server’s username and
password stored internally in the gateway’s memory. When RADIUS authentication is used,
the gateway doesn’t store the username and password but simply forwards them to the pre-
configured RADIUS server for authentication (acceptance or rejection). The internal Web /
Telnet passwords can be used as a fallback mechanism in case the RADIUS server doesn’t
respond (configured by the parameter BehaviorUponRadiusTimeout). Note that when
RADIUS authentication is performed, the Web / Telnet servers are blocked until a response
is received (with a timeout of 5 seconds).
RADIUS authentication requires HTTP basic authentication, meaning the username and
password are transmitted in clear text over the network. Therefore, users are recommended
to set the parameter ‘HttpsOnly = 1’ to force the use of HTTPS, since the transport is
encrypted.
Summary of Contents for TP-1610
Page 28: ...28 V6100 and V7122 User Guide Reader s Notes ...
Page 48: ...48 V6100 and V7122 User Guide Reader s Notes ...
Page 72: ...72 V6100 and V7122 User Guide Reader s Notes ...
Page 80: ...80 V6100 and V7122 User Guide Reader s Notes ...
Page 152: ...152 V6100 and V7122 User Guide Reader s Notes ...
Page 262: ...262 V6100 and V7122 User Guide Reader s Notes ...
Page 284: ...284 V6100 and V7122 User Guide Reader s Notes ...
Page 291: ...V6100 and V7122 User Guide 291 Figure 95 V7122 Startup Process ...
Page 324: ...324 V6100 and V7122 User Guide Reader s Notes ...
Page 354: ...354 V6100 and V7122 User Guide Reader s Notes ...
Page 374: ...374 V6100 and V7122 User Guide Reader s Notes ...
Page 382: ...382 V6100 and V7122 User Guide Figure 130 Example of a User Information File Reader s Notes ...
Page 392: ...392 V6100 and V7122 User Guide Reader s Notes ...
Page 409: ...V6100 and V7122 User Guide 409 Reader s Notes ...
Page 413: ...V6100 and V7122 User Guide 413 Reader s Notes ...
Page 425: ...V6100 and V7122 User Guide 425 Figure 145 UDP2File Utility Reader s Notes ...
Page 431: ...V6100 and V7122 User Guide 431 Reader s Notes ...
Page 447: ...V6100 and V7122 User Guide 447 Reader s Notes ...
Page 483: ...V6100 and V7122 User Guide 483 Reader s Notes ...