VoIP Security
349
When a PC is connected to a port, it will be interrogated in the same manner as the phones,
and user input will be required. The same results will likely occur.
Typically, 802.1X will only allow a single device to be authenticated and connected to a port.
This restricts how devices can be connected into the network infrastructure. Where a network
port only supports a single connected device, then, for full authentication, only a phone or a
PC should be connected to this port. If it is required that both a phone and a PC must be
connected, then only the phone should provide authentication. If authentication is provided only
by the PC and the PC isn’t present, the phone may not work.
Not all network access devices place single device restrictions on connected devices. HP
switches allow multiple devices to be connected and authenticated on a single port. With Cisco
switches, where the IP Phone uses the Auxilliary_VLAN setting, both an IP Phone and a
connected PC can operate off the same port.
A PC connected behind a phone may need to authenticate access. Failure to do this correctly
may result in the network port being shut down. This may result in the IP Phone also being
disconnected. Ideally, the PC should be programmed with the necessary information for 802.1X
authentication through the “PC Network Properties.” If not, then it is possible that the PC could
fail the authentication time-out at the port or at subsequent authorization requests. It may also
be necessary to connect the PC to the phone after the phone has authenticated the connection.
An 802.1X port may be configured to request authentication only at startup of the network port
and this may include regular authentication retries.
Because authentication is based on a network port becoming active, it is possible, with some
network switches, that an unauthorized device could be connected behind an IP Phone once
the IP Phone has itself gained access to the port. Therefore, it is recommended that you enable
the re-authentication response to regularly check access to the port and identify such
connections. The default time is often of the order of 3600 seconds.
A phone that supports 802.1X will indicate, during power up, that it is attempting 802.1X
authentication. It is possible to disable 802.1X via a CONFIG application menu under Tools
and Features. This menu also allows you to delete any stored usernames and passwords.
For details on 802.1X, refer to the "802.1X EAP - MD5 Authentication Protocol Support"
Knowledge Base article on Mitel OnLine.
Note:
Some vendors, Hewlet Packard, for example, manufacture switches that support
multiple instances of 802.1X for devices that are connected to the same port. In this case,
you can enable support on both devices without risking access conflicts.
Note:
In some cases, network administrators may be running 802.1X to prevent
unauthorized users from accessing the network. As an example, Ethernet drops in
semi-public spaces such as reception areas would likely be protected with 802.1X.
Use caution if deploying phones that do not support 802.1X in these situations, because
the network administrator will not be able to enable 802.1X on this network port. If the
phone provides a secondary ethernet port, this port will also be unable to provide
authentication support
.
Summary of Contents for MiVOICE BUSINESS
Page 1: ...Mitel MiVoice Business RELEASE 7 2 ENGINEERING GUIDELINES ...
Page 15: ...Chapter 1 ABOUT THIS DOCUMENT ...
Page 16: ......
Page 22: ...Engineering Guidelines 8 ...
Page 23: ...Chapter 2 SYSTEM OVERVIEW ...
Page 24: ......
Page 28: ...Engineering Guidelines 14 ...
Page 29: ...Chapter 3 TYPICAL CONFIGURATIONS ...
Page 30: ......
Page 73: ...Chapter 4 PHONES AND VOICE APPLICATIONS ...
Page 74: ......
Page 95: ...Phones and Voice Applications 81 Figure 9 ICP Connection Paths and Limitations ...
Page 100: ...Engineering Guidelines 86 ...
Page 101: ...Chapter 5 POWER ...
Page 102: ......
Page 128: ...Engineering Guidelines 114 ...
Page 129: ...Chapter 6 PERFORMANCE ...
Page 130: ......
Page 135: ...Chapter 7 APPLICATIONS ...
Page 136: ......
Page 142: ...Engineering Guidelines 128 ...
Page 143: ...Chapter 8 EMERGENCY SERVICES ...
Page 144: ......
Page 151: ...Chapter 9 IP NETWORKING ...
Page 152: ......
Page 167: ...Chapter 10 LICENSING ...
Page 168: ......
Page 183: ...Chapter 11 BANDWIDTH CODECS AND COMPRESSION ...
Page 184: ......
Page 209: ...Chapter 12 NETWORK CONFIGURATION CONCEPTS ...
Page 210: ......
Page 244: ...Engineering Guidelines 230 ...
Page 245: ...Chapter 13 NETWORK CONFIGURATION SPECIFICS ...
Page 246: ......
Page 309: ...Appendix A CAT 3 WIRING ...
Page 310: ......
Page 315: ...CAT 3 Wiring 301 Figure 55 CX MX MXe AX and LX Minimum Cable Standard ...
Page 316: ...Engineering Guidelines 302 ...
Page 317: ...Appendix B INSTALLATION EXAMPLES ...
Page 318: ......
Page 335: ...Appendix C LLDP AND LLDP MED CONFIGURATION EXAMPLES ...
Page 336: ......
Page 347: ...Appendix D VOIP AND VLANS ...
Page 348: ......
Page 353: ...Appendix E VOIP SECURITY ...
Page 354: ......
Page 381: ... ...