
Advanced Operational Features
6-24
5.
Enter the certificate file names and the private key file name in the appropriate fields.
The Root and Intermediate Certificate files contain one root certificate and zero or more
intermediate certificates which must be placed in order of certificate signing with root cer-
tificate being the first in the file. If the local certificate is signed by some well known certificate
authority, then that authority provides the user with the Root and Intermediate Certificate
files (most likely just CA root certificate).
The Trusted Certificate files define a list of trusted certificates. The phone’s trusted list must
contain the CA root certificates for all the servers it is connecting to. For example, if the
phone is connecting to server A which has a certificate signed by CA1, and server B, which
has a certificate signed by CA2, the phone must have CA1 root certificate and CS2 root
certificate in its Trusted Certificate file.
6.
Click
Save Settings
to save your changes.
802.1X SUPPORT
The IP phones support the IEEE 802.1x protocol. The 802.1x protocol is a standard for passing
Extensible Authentication Protocol (EAP) over a wired or wireless Local Area Network (LAN).
The 802.1x protocol on the IP phone facilitates media-level access control, and offers the
capability to permit or deny network connectivity, control LAN access, and apply traffic policy,
based on user or endpoint identity. This feature supports both the EAP-MD5 and EAP-TLS
protocols.
If 802.1x on the phone is enabled, a “
802.1x Authenticating...
” message displays during startup
of the phone.
If the 802.1x failed to authenticate with the server, the phone continues its normal startup
process using DHCP. However, the network port on the phone may or may not be disabled,
depending on the switch configuration.
CERTIFICATES AND PRIVATE KEY INFORMATION
•
If the certificates and private key are NOT stored in the phone, 802.1x authentication is
disabled.
•
If the certificates and private key ARE stored in the phone, the phone uses them during the
authentication process
•
If the phone uses EAP-TLS for successful authentication, the phone downloads the latest
certificates and private key files, and then reboots.
Notes:
1.
If configuring TLS, you must specify the files for Root and Intermediate
Certificates, the Local Certificate, the Private Key, and the Trusted Certificates
in order for the phone to receive calls.
2.
If configuring Persistent TLS, you must specify the Trusted Certificates (which
contains the trusted certificate list). All other certificates and the Private Key are
optional.
3.
The certificate files and Private Key file names must use the format “.pem”.
4.
To create custom certificate files and private key files to use on your IP phone,
contact Mitel Technical Support.
Summary of Contents for 6800 Series
Page 1: ...Mitel 6800 Series SIP Phones 58014473 REV02 RELEASE 4 2 0 SERVICE PACK 2 ADMINISTRATOR GUIDE ...
Page 22: ...Chapter 1 OVERVIEW ...
Page 53: ...Chapter 2 CONFIGURATION INTERFACE METHODS ...
Page 72: ...Chapter 3 ADMINISTRATOR OPTIONS ...
Page 154: ...Chapter 4 CONFIGURING NETWORK AND SESSION INITIATION PROTOCOL SIP FEATURES ...
Page 264: ...Chapter 5 CONFIGURING OPERATIONAL FEATURES ...
Page 590: ...Chapter 6 CONFIGURING ADVANCED OPERATIONAL FEATURES ...
Page 698: ...Chapter 7 ENCRYPTED FILES ON THE IP PHONE ...
Page 704: ...Chapter 8 UPGRADING THE FIRMWARE ...
Page 713: ...Chapter 9 TROUBLESHOOTING ...
Page 743: ...Appendix A CONFIGURATION PARAMETERS ...
Page 1065: ...Appendix B CONFIGURING THE IP PHONE AT THE ASTERISK IP PBX ...
Page 1069: ...Appendix C SAMPLE CONFIGURATION FILES ...
Page 1085: ...Appendix D SAMPLE BLF SOFTKEY SETTINGS ...
Page 1090: ...Appendix E SAMPLE MULTIPLE PROXY SERVER CONFIGURATION ...
Page 1094: ...Appendix F CERTIFICATE SUPPORT ...
Page 1113: ......