Mitel 6800 Series SIP Phone Release 4.2.0 Administrator Guide
6-24
•
The private key uses AES-128 to encrypt the private key file.
•
Switch Supplicant Mode - The switch supports the following 2 modes:
•
Single supplicant
- This mode enables the port once any machine connected to this
port is authenticated. For security reasons, the IP phone has the option to disable the
pass-through port.
•
Multiple supplicants
- Using this mode, the switch can support multiple clients con-
nected to same port. The switch distinguishes between the clients based on their MAC
address.
•
Factory default and recovery mode deletes all certificates and private keys, and sets the
EAP type to
disabled
.
You can configure the 802.1x feature on the IP phone using the configuration files, the IP Phone
UI, or the Mitel Web UI.
CONFIGURING THE 802.1X PROTOCOL USING THE CONFIGURATION
FILES
You use the following parameters to configure the 802.1x Protocol on your phone using the
configuration files.
For EAP-MD5 use:
•
eap type
•
identity
•
md5 password
•
pc port passthrough enabled
For EAP-TLS use:
•
eap type
•
identity
•
802.1x root and intermediate certificates
(use 1 root and 0 or 1 intermediate certificates)
•
802.1x local certificate
(use 1 local certificate)
•
802.1x private key
(1 private key that corresponds to local certificate)
•
802.1x trusted certificates
(0 or more trusted certificates (a maximum of 2)
Note:
If configuring 802.1x using the IP Phone UI, the certificates and private keys must
already be configured and stored on the phone. Use the configuration files or the Mitel
Web UI to load certificates and private keys.
Summary of Contents for 6867i Premium
Page 1: ...Mitel 6800 Series SIP Phones 58014473 REV00 RELEASE 4 2 0 ADMINISTRATOR GUIDE ...
Page 21: ...Chapter 1 OVERVIEW ...
Page 52: ...Chapter 2 CONFIGURATION INTERFACE METHODS ...
Page 71: ...Chapter 3 ADMINISTRATOR OPTIONS ...
Page 154: ...Chapter 4 CONFIGURING NETWORK AND SESSION INITIATION PROTOCOL SIP FEATURES ...
Page 262: ...Chapter 5 CONFIGURING OPERATIONAL FEATURES ...
Page 579: ...Chapter 6 CONFIGURING ADVANCED OPERATIONAL FEATURES ...
Page 654: ...Chapter 7 ENCRYPTED FILES ON THE IP PHONE ...
Page 660: ...Chapter 8 UPGRADING THE FIRMWARE ...
Page 669: ...Chapter 9 TROUBLESHOOTING ...
Page 699: ...Appendix A CONFIGURATION PARAMETERS ...
Page 1003: ...Appendix B CONFIGURING THE IP PHONE AT THE ASTERISK IP PBX ...
Page 1007: ...Appendix C SAMPLE CONFIGURATION FILES ...
Page 1023: ...Appendix D SAMPLE BLF SOFTKEY SETTINGS ...
Page 1027: ...Appendix E SAMPLE MULTIPLE PROXY SERVER CONFIGURATION ...
Page 1042: ......