Spectralink 84-Series Series Wireless Telephones Administration Guide
1725-86984-000_P.docx
September 2016
233
Parameter
Permitted Values
Default
reg.x.server.y.failOver.onlySignalWithRegistered
0 or 1
1
When set to
1
, and the reRegisterOn and failRegistrationOn parameters are enabled, no signaling is accepted from
or sent to a server that has failed until failback is attempted or failover occurs. If the handset attempts to send
signaling associated with an existing call via an unregistered server (for example, to resume or hold a call), the call
will end. No SIP messages will be sent to the unregistered server. When set to
0
, and the reRegisterOn and
failRegistrationOn parameters are enabled, signaling will be accepted from and sent to a server that has failed
(even though fail
back hasn’t been attempted or failover hasn’t occurred).
reg.x.server.y.failOver.reRegisterOn
0 or 1
0
This parameter overrules the
voIpProt.server.x.failOver.reRegisterOn
. When set to
1
, the handset will
attempt to register with (or via, for the outbound proxy scenario), the secondary server. If the registration succeeds
(a 200 OK response with valid expires), signaling will proceed with the secondary server. When set to
0
, the
handset
won’t attempt to register with the secondary server, since the handset will assume that the primary and
secondary servers share registration information.
reg.x.tcpFastFailover
0 or 1
0
If 1, failover occurs based on the values of
reg.x.server.y.retryMaxCount
or
voIpProt.server.x.retryTimeOut
.
Supporting 802.1X Authentication
IEEE 802.1X is a port-based Network Access Control (PNAC). It provides an authentication
mechanism to devices trying to attach to a local area network (LAN) or a wireless local area
network (WLAN). IEEE 802.1X is based on the Extensible Authentication Protocol (EAP).
Spectralink handsets support standard IEEE 802.1X authentication.
RADIUS server using the AP as the authenticator for the Spectralink 84-Series handsets.
Figure 10-1: A Typical 802.1X Network Configuration
Spectralink handsets support the following EAP authentication methods:
EAP-PEAPv0/MSCHAPv2 (requires CA certificates)