![Nortel SMC 2450 Implementation Manual Download Page 155](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451155.webp)
Secure UNIStim deployment
Page 155 of 260
Secure Multimedia Controller
Implementation Guide
phones must be transitioned to the new key fingerprint within a bounded
period of time. Within five minutes of a key update, the SMC automatically
updates the private key for IP phones currently connected to the device;
however, additional phones that may be offline at the time of the transition,
this update occurs at a later time, after they re-establish connectivity.
Because of the possibility of delayed private key updating, Nortel
recommends that the primary and secondary keys co-exist for the length of
time equal to the maximum session timeout plus the master key timeout. The
phones using session caching do not touch the key when they reconnect and,
therefore, are not updated). They will, however, have their fingerprints
replaced when they change their session keys.
Licensing
The SMC requires a license to support the total number of Secure UNIStim
users. Without a license key, the SMC supports 50 Secure UNIStim users;
however, you can purchase licenses 250, 500, 1000, 3000, and 5000
simultaneous users. There is no license limitation on non-secure UNIStim
users or other traffic that traverses the SMC.
Using the MAC address of the first Ethernet port, licensing is defined
separately for each SMC. In a HA configuration, a license is required for each
SMC. Licenses are not cumulative; a 3000-user license applied to an SMC
that has a 1000-user license allows for 3000 users.
You can apply purchased licenses to the system using either the BBI or the
CLI:
•
In the BBI, navigate to the
Cluster > Host > License
page.
WARNING
When the license is exceeded and the policy does not
require security, additional phones are allowed through
insecurely. If the policy requires security, the license
prevents any additional phones from connecting
insecurely.
Summary of Contents for SMC 2450
Page 2: ......
Page 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Page 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Page 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Page 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Page 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Page 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Page 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Page 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Page 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Page 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Page 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Page 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Page 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Page 261: ......