342
V6100 and V7122 User Guide
Must = the call is terminated. Incoming calls that don’t include encryption information are
rejected.
Prefer = an unencrypted call is established. Incoming calls that don’t include encryption
information are accepted.
To enable SRTP set the parameter EnableMediaSecurity to 1 (described in
Security
Parameters
).
When SRTP is used the channel capacity is reduced (see the parameter
EnableMediaSecurity).
The gateway only supports the AES 128 in CM mode cipher suite.
Figure 120
Example of crypto Attributes Usage
a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:PsKb5X0YLuSvNrImEh/dAe
a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:IsPtLc6XVzRuMqHlDnEiAd
RADIUS Login Authentication
Users can enhance the security and capabilities of logging to the gateway’s Web and Telnet
embedded servers by using a Remote Authentication Dial-In User Service (RADIUS) to store
numerous usernames, passwords and access level attributes (Web only), allowing multiple
user management on a centralized platform. RADIUS (RFC 2865) is a standard
authentication protocol that defines a method for contacting a predefined server and verifying
a given name and password pair against a remote database, in a secure manner.
When accessing the Web and Telnet servers, users must provide a valid username and
password. When RADIUS authentication isn’t used, the username and password are
authenticated with the Embedded Web Server’s usernames and passwords of the primary or
secondary accounts (see
User Accounts
) or with the Telnet server’s username and
password stored internally in the gateway’s memory. When RADIUS authentication is used,
the gateway doesn’t store the username and password but simply forwards them to the pre-
configured RADIUS server for authentication (acceptance or rejection). The internal Web /
Telnet passwords can be used as a fallback mechanism in case the RADIUS server doesn’t
respond (configured by the parameter BehaviorUponRadiusTimeout). Note that when
RADIUS authentication is performed, the Web / Telnet servers are blocked until a response
is received (with a timeout of 5 seconds).
RADIUS authentication requires HTTP basic authentication, meaning the username and
password are transmitted in clear text over the network. Therefore, users are recommended
to set the parameter ‘HttpsOnly = 1’ to force the use of HTTPS, since the transport is
encrypted.
Содержание TP-1610
Страница 28: ...28 V6100 and V7122 User Guide Reader s Notes ...
Страница 48: ...48 V6100 and V7122 User Guide Reader s Notes ...
Страница 72: ...72 V6100 and V7122 User Guide Reader s Notes ...
Страница 80: ...80 V6100 and V7122 User Guide Reader s Notes ...
Страница 151: ...V6100 and V7122 User Guide 151 Figure 83 Log off Prompt 2 Click OK in the prompt the Web session is logged off ...
Страница 152: ...152 V6100 and V7122 User Guide Reader s Notes ...
Страница 262: ...262 V6100 and V7122 User Guide Reader s Notes ...
Страница 284: ...284 V6100 and V7122 User Guide Reader s Notes ...
Страница 291: ...V6100 and V7122 User Guide 291 Figure 95 V7122 Startup Process ...
Страница 324: ...324 V6100 and V7122 User Guide Reader s Notes ...
Страница 354: ...354 V6100 and V7122 User Guide Reader s Notes ...
Страница 374: ...374 V6100 and V7122 User Guide Reader s Notes ...
Страница 382: ...382 V6100 and V7122 User Guide Figure 130 Example of a User Information File Reader s Notes ...
Страница 392: ...392 V6100 and V7122 User Guide Reader s Notes ...
Страница 409: ...V6100 and V7122 User Guide 409 Reader s Notes ...
Страница 413: ...V6100 and V7122 User Guide 413 Reader s Notes ...
Страница 425: ...V6100 and V7122 User Guide 425 Figure 145 UDP2File Utility Reader s Notes ...
Страница 431: ...V6100 and V7122 User Guide 431 Reader s Notes ...
Страница 447: ...V6100 and V7122 User Guide 447 Reader s Notes ...
Страница 449: ...V6100 and V7122 User Guide 449 Figure 146 Connection Module CM Figure 147 OSN Server Figure 148 Hard Drive Module HDMX ...
Страница 483: ...V6100 and V7122 User Guide 483 Reader s Notes ...