![Nortel SMC 2450 Implementation Manual Download Page 143](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451143.webp)
Secure UNIStim deployment
Page 143 of 260
Secure Multimedia Controller
Implementation Guide
3
To change values in the menu, scroll up or down the menu items using
the left and right arrow button.
Note:
If you just want to see the configuration, you can scroll up and
down using the up and down arrows on the phone.
4
To change the action byte from 1 (insecure) to 6 (secure), press the Enter
key, enter 6, and then press the Enter key again.
5
Set the RSA public key fingerprint using the 16-byte fingerprint
corresponding to the public/private key pair stored on the SMC.
The RSA public key fingerprint is retrieved from the Web UI or CLI and is
associated with the primary key of the server. It consists of sixteen
hexadecimal digits (0 - 9 and a - f). You must manually enter the RSA
public key fingerprint into the IP phone. An example 16-character
fingerprint is: 8a166e6cc08be496. Key in the numerals (0 - 9) using the
phone keypad. Key in the letters using the convention of the pound key
(#) plus the corresponding number. For example, #1 = a and #6 = f.
6
If the IP client can register to an alternate server (S2 IP), change the
action byte and key fingerprint as required for S2.
7
Press the
Apply and Reset
button.
End of Procedure
Note:
If you used automatic fingerprint update and the phones have
default configuration value for fingerprint as ffffffffff and action byte 1 and
you want to check whether correct fingerprint was written to the phones
by the SMC, you have to enter the network configuration.
For the i2002, i2004 IP phones, you must change the action byte to 6 and
then go to the fingerprint menu item. For 1140e, 1120e and i2007, you
can look at the fingerprint by scrolling down the configuration menu.
Automatic fingerprint update
For IP phones running in insecure mode with default security settings, the
SMC can automatically update/populate the public key fingerprint on the
Summary of Contents for SMC 2450
Page 2: ......
Page 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Page 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Page 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Page 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Page 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Page 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Page 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Page 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Page 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Page 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Page 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Page 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Page 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Page 261: ......