summarized in the UCR document, these security features must be supported by the setup. These
features were tested by JITC.
Avaya Aura
®
Communication Manager 6.3.6 and later support the JITC security compliance mode.
In the JITC security compliance mode, Communication Manager and the deskphones
communicate using the certified algorithms of Federal Information Processing Standards 140-2.
Supported features
The following features are supported in the JITC security compliance mode:
• Random number generator PRNG [SP 800-90] DRBG using CTR DRBG (AES-256), with
deviation function enabled
• H.323 signaling over TLS or Annex-H
• SRTP using 1-sertp-aescm128-hmac80 cipher suite
• Image, settings files, or certificates download over HTTP or HTTPS
• Backup and restore configuration files
• PKCS12 file generated in FIPS mode
• OCSP
• LLDP
• SNMPv2c
• Syslog
• Call center environment including Agent Greeting files
The following features are not supported in the JITC security compliance mode:
• SSH server
• IPsec VPN tunnels
• Visiting users
• SLA Monitor
• Push server
• WML browser
• SSO
• 802.1x EAP-TLS
• SCEP
Note:
H.323 signaling over TLS is supported in both FIPS and non-FIPS mode.
Related links
on page 49
JITC security compliance mode configuration
Administering your phone
May 2018
Installing and Administering Avaya J169/J179 IP Phone H.323
54