Engineering Guidelines
342
When the data is encrypted, it is simply replaced with a scrambled version. This is a 1 for 1
transformation, so there are no additional bytes. As a result, the bandwidth is the same for
encrypted or non-encrypted information. This is NOT true for Secure RTP (SRTP) which
appends either 4 or 10 bytes to the voice payload depending on the cipher mode used. See
“Voice streaming security (SRTP)” on page 343.
For the signalling information, there are some additional messages related to setting up the
secure connections. However, these are minimal when compared to the remainder of the
signalling bandwidth, which is already quite low. For voice information the bandwidth remains
the same for both encrypted and unencrypted payloads.
As an analogy, the encryption can be considered as simply another voice CODEC or an
additional process in the voice-streaming path. For voice streaming, G.711 and G.729 CODECs
are often used. The encryption merely makes these secure, so the result is a secure-G.711 and
a secure-G.729 CODEC. The bit rate remains the same, as does the network bandwidth
requirements.
Figure 59: Unsecured vs Secured Connection
SIGNALLING AND MEDIA PATHS
Media and signalling path encryption is supported for all of Mitel's IP phones on the 3300 ICP.
Media path encryption is accomplished with Secure RTP using 128-bit Advanced Encryption
Standard (AES). Encryption is backwards compatible to support both currently shipping
desktops and previously deployed Mitel IP desktops. Mitel provides encryption of the media
path between multiple 3300 ICPs using the Secure Sockets Layer (SSL) protocol. This allows
scalability of applications by configuring 3300 ICPs into clusters or deploying them as part of
a centrally managed but distributed architecture.
The signalling path is generally between the controller and the IP Phone or other end-device.
This path is established as a secure connection. Signalling information is interpreted within the
controller. Where a message needs to be sent to another controller, such as with IP-Networking,
or to another end device, an independent secure connection is used. Thus a call between two
phones on two controllers will require the establishment of three secure signalling channels,
that is, a secure connection at each controller and one between the controllers.
Содержание MiVOICE BUSINESS
Страница 1: ...Mitel MiVoice Business RELEASE 7 2 ENGINEERING GUIDELINES ...
Страница 15: ...Chapter 1 ABOUT THIS DOCUMENT ...
Страница 16: ......
Страница 22: ...Engineering Guidelines 8 ...
Страница 23: ...Chapter 2 SYSTEM OVERVIEW ...
Страница 24: ......
Страница 28: ...Engineering Guidelines 14 ...
Страница 29: ...Chapter 3 TYPICAL CONFIGURATIONS ...
Страница 30: ......
Страница 73: ...Chapter 4 PHONES AND VOICE APPLICATIONS ...
Страница 74: ......
Страница 95: ...Phones and Voice Applications 81 Figure 9 ICP Connection Paths and Limitations ...
Страница 100: ...Engineering Guidelines 86 ...
Страница 101: ...Chapter 5 POWER ...
Страница 102: ......
Страница 128: ...Engineering Guidelines 114 ...
Страница 129: ...Chapter 6 PERFORMANCE ...
Страница 130: ......
Страница 135: ...Chapter 7 APPLICATIONS ...
Страница 136: ......
Страница 142: ...Engineering Guidelines 128 ...
Страница 143: ...Chapter 8 EMERGENCY SERVICES ...
Страница 144: ......
Страница 151: ...Chapter 9 IP NETWORKING ...
Страница 152: ......
Страница 167: ...Chapter 10 LICENSING ...
Страница 168: ......
Страница 183: ...Chapter 11 BANDWIDTH CODECS AND COMPRESSION ...
Страница 184: ......
Страница 209: ...Chapter 12 NETWORK CONFIGURATION CONCEPTS ...
Страница 210: ......
Страница 244: ...Engineering Guidelines 230 ...
Страница 245: ...Chapter 13 NETWORK CONFIGURATION SPECIFICS ...
Страница 246: ......
Страница 309: ...Appendix A CAT 3 WIRING ...
Страница 310: ......
Страница 315: ...CAT 3 Wiring 301 Figure 55 CX MX MXe AX and LX Minimum Cable Standard ...
Страница 316: ...Engineering Guidelines 302 ...
Страница 317: ...Appendix B INSTALLATION EXAMPLES ...
Страница 318: ......
Страница 335: ...Appendix C LLDP AND LLDP MED CONFIGURATION EXAMPLES ...
Страница 336: ......
Страница 347: ...Appendix D VOIP AND VLANS ...
Страница 348: ......
Страница 353: ...Appendix E VOIP SECURITY ...
Страница 354: ......
Страница 381: ... ...