![Nortel SMC 2450 Implementation Manual Download Page 124](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451124.webp)
Page 124 of 260
Secure UNIStim deployment
553-3001-225
Standard 1.00
May 2006
By default, the SMC keeps all IP client in an insecure mode. This allows the
administrator to control the Secure Unistim roll-out so that licences are not
exceeded.
When the SMC is first installed, three standard policies are created:
•
insecure: does not try to upgrade phones to Secure UNIStim or push the
key fingerprints to the IP phones.
•
secure: tries to upgrade IP phones that are not configured for security to
Secure UNIStim and push the key fingerprint of the primary key to the
IP phone. Any IP phones that do not support security are allowed to
access the signaling server using normal UNIStim.
•
maxsecure: this policy works the same as secure, except that IP phones
that cannot be upgraded to security are denied access to the signaling
server.
The default rule in the SMC maps a network called voip_users to a nonsecure
Policy. The Client Rules can be viewed in the Web UI at:
Multimedia
Security > UNIStim Security > Client > Rules.
Security policy example
In this example, the Finance Network requires a high level of security (the
secure policy), while Sales requires less security (the nonsecure policy).
IMPORTANT!
To add enhanced security for all IP phones protected by a given policy,
client security is required. UNIStim phones with firmware that does not
support security, such as the IP Softphone 2050 and the WLAN
handsets 2210 and 2211, needs a policy that does not require UNIStim
security. See “Security policy example” on
page 124
for an example of
how security policies work.
For these phones, set the policy to
Required Security = false
. These
unsupported IP phones are then allowed to pass through as unsecure,
even though the SMC tries to upgrade them. For more information about
unsupported IP phone firmware, see “IP client firmware management”
on
page 151
.
Summary of Contents for SMC 2450
Page 2: ......
Page 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Page 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Page 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Page 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Page 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Page 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Page 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Page 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Page 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Page 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Page 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Page 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Page 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Page 261: ......