Mitel 6800 Series SIP Phone Release 4.2.0 SP2 Administrator Guide
6-25
•
The private key uses AES-128 to encrypt the private key file.
•
Switch Supplicant Mode - The switch supports the following 2 modes:
•
Single supplicant
- This mode enables the port once any machine connected to this
port is authenticated. For security reasons, the IP phone has the option to disable the
pass-through port.
•
Multiple supplicants
- Using this mode, the switch can support multiple clients con-
nected to same port. The switch distinguishes between the clients based on their MAC
address.
•
Factory default and recovery mode deletes all certificates and private keys, and sets the
EAP type to
disabled
.
You can configure the 802.1x feature on the IP phone using the configuration files, the IP Phone
UI, or the Mitel Web UI.
CONFIGURING THE 802.1X PROTOCOL USING THE CONFIGURATION
FILES
You use the following parameters to configure the 802.1x Protocol on your phone using the
configuration files.
For EAP-MD5 use:
•
eap type
•
identity
•
md5 password
•
pc port passthrough enabled
For EAP-TLS use:
•
eap type
•
identity
•
802.1x root and intermediate certificates
(use 1 root and 0 or 1 intermediate certificates)
•
802.1x local certificate
(use 1 local certificate)
•
802.1x private key
(1 private key that corresponds to local certificate)
•
802.1x trusted certificates
(0 or more trusted certificates (a maximum of 2)
Note:
If configuring 802.1x using the IP Phone UI, the certificates and private keys must
already be configured and stored on the phone. Use the configuration files or the Mitel
Web UI to load certificates and private keys.
Содержание 6800 Series
Страница 1: ...Mitel 6800 Series SIP Phones 58014473 REV02 RELEASE 4 2 0 SERVICE PACK 2 ADMINISTRATOR GUIDE ...
Страница 22: ...Chapter 1 OVERVIEW ...
Страница 53: ...Chapter 2 CONFIGURATION INTERFACE METHODS ...
Страница 72: ...Chapter 3 ADMINISTRATOR OPTIONS ...
Страница 154: ...Chapter 4 CONFIGURING NETWORK AND SESSION INITIATION PROTOCOL SIP FEATURES ...
Страница 264: ...Chapter 5 CONFIGURING OPERATIONAL FEATURES ...
Страница 590: ...Chapter 6 CONFIGURING ADVANCED OPERATIONAL FEATURES ...
Страница 698: ...Chapter 7 ENCRYPTED FILES ON THE IP PHONE ...
Страница 704: ...Chapter 8 UPGRADING THE FIRMWARE ...
Страница 713: ...Chapter 9 TROUBLESHOOTING ...
Страница 743: ...Appendix A CONFIGURATION PARAMETERS ...
Страница 1065: ...Appendix B CONFIGURING THE IP PHONE AT THE ASTERISK IP PBX ...
Страница 1069: ...Appendix C SAMPLE CONFIGURATION FILES ...
Страница 1085: ...Appendix D SAMPLE BLF SOFTKEY SETTINGS ...
Страница 1090: ...Appendix E SAMPLE MULTIPLE PROXY SERVER CONFIGURATION ...
Страница 1094: ...Appendix F CERTIFICATE SUPPORT ...
Страница 1113: ......