![Nortel SMC 2450 Implementation Manual Download Page 141](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451141.webp)
Secure UNIStim deployment
Page 141 of 260
Secure Multimedia Controller
Implementation Guide
Configure the IP phones for security
Procedure 38
Configuring the IP Phone 2001, IP Phone 2002, or IP Phone 2004 for security
1
Choose one of the following:
•
For the IP Phone 2001, IP Phone 2002, or IP Phone 2004 Internet
Telephones, turn on or reboot the i200x Internet Telephone and then
press the four soft tabs at the bottom of the screen, once each from
left to right, to enter the configuration menu.
•
For the IP Phone 2007 Internet Telephone, click the Setting button
on the left corner of the screen and then select Network Configuration
2
Press the
OK
softkey to bypass many entries until the first Action Byte
prompt appears.
3
Change the action byte from 1 (insecure) to 6 (secure).
4
Set the RSA public key fingerprint using the 16-byte fingerprint
corresponding to the public/private key pair stored on the SMC.
Note:
The Fingerprint prompt (S1 PK) is only presented if the action byte
is 6.
The RSA public key fingerprint is retrieved from the Web UI or CLI and is
associated with the primary key of the server. It consists of sixteen
hexadecimal digits (0 - 9 and a - f). You must manually enter the RSA
public key fingerprint into the IP phone. An example 16-character
fingerprint is: 8a166e6cc08be496. Key in the numerals (0 - 9) using the
phone keypad. Key in the letters using the convention of the pound key
(#) plus the corresponding number. For example, #1 = a and #6 = f.
5
If the IP client can register to an alternate server (S2 IP), change the
action byte and key fingerprint as required for S2.
6
Press the
Apply and Reset
button.
End of Procedure
Summary of Contents for SMC 2450
Page 2: ......
Page 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Page 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Page 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Page 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Page 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Page 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Page 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Page 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Page 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Page 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Page 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Page 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Page 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Page 261: ......