![Mitel 6800 Series Скачать руководство пользователя страница 613](http://html.mh-extra.com/html/mitel/6800-series/6800-series_administrators-manual_1807020613.webp)
Advanced Operational Features
6-24
5.
Enter the certificate file names and the private key file name in the appropriate fields.
The Root and Intermediate Certificate files contain one root certificate and zero or more
intermediate certificates which must be placed in order of certificate signing with root cer-
tificate being the first in the file. If the local certificate is signed by some well known certificate
authority, then that authority provides the user with the Root and Intermediate Certificate
files (most likely just CA root certificate).
The Trusted Certificate files define a list of trusted certificates. The phone’s trusted list must
contain the CA root certificates for all the servers it is connecting to. For example, if the
phone is connecting to server A which has a certificate signed by CA1, and server B, which
has a certificate signed by CA2, the phone must have CA1 root certificate and CS2 root
certificate in its Trusted Certificate file.
6.
Click
Save Settings
to save your changes.
802.1X SUPPORT
The IP phones support the IEEE 802.1x protocol. The 802.1x protocol is a standard for passing
Extensible Authentication Protocol (EAP) over a wired or wireless Local Area Network (LAN).
The 802.1x protocol on the IP phone facilitates media-level access control, and offers the
capability to permit or deny network connectivity, control LAN access, and apply traffic policy,
based on user or endpoint identity. This feature supports both the EAP-MD5 and EAP-TLS
protocols.
If 802.1x on the phone is enabled, a “
802.1x Authenticating...
” message displays during startup
of the phone.
If the 802.1x failed to authenticate with the server, the phone continues its normal startup
process using DHCP. However, the network port on the phone may or may not be disabled,
depending on the switch configuration.
CERTIFICATES AND PRIVATE KEY INFORMATION
•
If the certificates and private key are NOT stored in the phone, 802.1x authentication is
disabled.
•
If the certificates and private key ARE stored in the phone, the phone uses them during the
authentication process
•
If the phone uses EAP-TLS for successful authentication, the phone downloads the latest
certificates and private key files, and then reboots.
Notes:
1.
If configuring TLS, you must specify the files for Root and Intermediate
Certificates, the Local Certificate, the Private Key, and the Trusted Certificates
in order for the phone to receive calls.
2.
If configuring Persistent TLS, you must specify the Trusted Certificates (which
contains the trusted certificate list). All other certificates and the Private Key are
optional.
3.
The certificate files and Private Key file names must use the format “.pem”.
4.
To create custom certificate files and private key files to use on your IP phone,
contact Mitel Technical Support.
Содержание 6800 Series
Страница 1: ...Mitel 6800 Series SIP Phones 58014473 REV02 RELEASE 4 2 0 SERVICE PACK 2 ADMINISTRATOR GUIDE ...
Страница 22: ...Chapter 1 OVERVIEW ...
Страница 53: ...Chapter 2 CONFIGURATION INTERFACE METHODS ...
Страница 72: ...Chapter 3 ADMINISTRATOR OPTIONS ...
Страница 154: ...Chapter 4 CONFIGURING NETWORK AND SESSION INITIATION PROTOCOL SIP FEATURES ...
Страница 264: ...Chapter 5 CONFIGURING OPERATIONAL FEATURES ...
Страница 590: ...Chapter 6 CONFIGURING ADVANCED OPERATIONAL FEATURES ...
Страница 698: ...Chapter 7 ENCRYPTED FILES ON THE IP PHONE ...
Страница 704: ...Chapter 8 UPGRADING THE FIRMWARE ...
Страница 713: ...Chapter 9 TROUBLESHOOTING ...
Страница 743: ...Appendix A CONFIGURATION PARAMETERS ...
Страница 1065: ...Appendix B CONFIGURING THE IP PHONE AT THE ASTERISK IP PBX ...
Страница 1069: ...Appendix C SAMPLE CONFIGURATION FILES ...
Страница 1085: ...Appendix D SAMPLE BLF SOFTKEY SETTINGS ...
Страница 1090: ...Appendix E SAMPLE MULTIPLE PROXY SERVER CONFIGURATION ...
Страница 1094: ...Appendix F CERTIFICATE SUPPORT ...
Страница 1113: ......