Engineering Guidelines
344
IP phones and the 3300 ICP are protected from eavesdropping. Using secure MiNET also
protects the 3300 ICP from unauthorized control packets.
Secure MiNET uses a predefined algorithm to encode the signalling messages. Negotiation of
the encryption method is not needed, so this provides a simpler and faster method to establish
secure connections with third party applications. Some SIP phones may also use TLS, which
is an updated and more open version of the SSL standard. Because the encryption algorithms
for SSL and TLS are not predefined as with secure MiNET, the end points must negotiate the
security at the time of each connection, and performance may be impacted somewhat. When
evaluating the performance of SIP phones with the SET in MCD 6.0, the default connection
will be TLS, which should reflect the actual negotiated selection in most cases. The user of the
tool may also select UDP or TCP if it is known that those will be used in the particular installation.
Performance adjustments for use with SIP-TLS phones is highlighted in the earlier performance
section “SIP Phones and use of TLS (SIP-TLS)” on page 46.
In addition to Secure MiNET, a standard encryption method that uses SSL is also available on
certain end devices. SSL is used to negotiate which encryption method to use at the endpoints.
This standard allows interaction with third party applications.
The SSL security protocol provides data encryption, server authentication message integrity,
and optional client authentication for a TCP/IP connection. SSL will prevent unauthorized
access to administrative functions. SSL encrypts all traffic on the link to prevent sniffing of
usernames and passwords.
The IP Phones will determine which secure method to use, first trying SSL, then secure MiNET
and then, if neither of these is supported, the call will go unsecured.
The ICP uses multiple IP ports to differentiate these protocols (6800, 6801, 6802) as defined
in the IP port information. If the relevant port is blocked with a firewall or a router, for instance,
the negotiation may fail and a connection may not be established.
IP Networking communication between ICP controllers and gateways only use SSL or no
encryption. MiNET encryption is not supported.
VOICE STREAMING TO EXTERNAL GATEWAY PSTN CONNECTION
In voice streaming to an external gateway PSTN connection, the voice path is established
between the IP Phone and the IP/TDM Gateway. This might be the local ICP, or another unit
dedicated to this function and connected via IP Networking. There is no difference in the
connection path between secure and non-secure call establishment. Connections will be
established as secure where possible.
VOICE STREAMING TO TDM CONNECTIONS
Where an ICP has a number of TDM connected devices, calls to these devices will be via local
IP/TDM gateway. Encryption applies to the packet part of the connection, and so the IP path
to the gateway will be secure, where possible. The connection on the TDM side will continue,
as it always has, to use a dedicated connection to the end device.
VOICE STREAMING TO INTERNAL VOICE MAIL, RECORD-A-CALL AND
CONFERENCE
Where there are internal features like voice mail, Record-a-Call or conference at the ICP, these
are considered TDM devices. Encryption applies to the packet part of the connection, so the
Содержание MiVOICE BUSINESS
Страница 1: ...Mitel MiVoice Business RELEASE 7 2 ENGINEERING GUIDELINES ...
Страница 15: ...Chapter 1 ABOUT THIS DOCUMENT ...
Страница 16: ......
Страница 22: ...Engineering Guidelines 8 ...
Страница 23: ...Chapter 2 SYSTEM OVERVIEW ...
Страница 24: ......
Страница 28: ...Engineering Guidelines 14 ...
Страница 29: ...Chapter 3 TYPICAL CONFIGURATIONS ...
Страница 30: ......
Страница 73: ...Chapter 4 PHONES AND VOICE APPLICATIONS ...
Страница 74: ......
Страница 95: ...Phones and Voice Applications 81 Figure 9 ICP Connection Paths and Limitations ...
Страница 100: ...Engineering Guidelines 86 ...
Страница 101: ...Chapter 5 POWER ...
Страница 102: ......
Страница 128: ...Engineering Guidelines 114 ...
Страница 129: ...Chapter 6 PERFORMANCE ...
Страница 130: ......
Страница 135: ...Chapter 7 APPLICATIONS ...
Страница 136: ......
Страница 142: ...Engineering Guidelines 128 ...
Страница 143: ...Chapter 8 EMERGENCY SERVICES ...
Страница 144: ......
Страница 151: ...Chapter 9 IP NETWORKING ...
Страница 152: ......
Страница 167: ...Chapter 10 LICENSING ...
Страница 168: ......
Страница 183: ...Chapter 11 BANDWIDTH CODECS AND COMPRESSION ...
Страница 184: ......
Страница 209: ...Chapter 12 NETWORK CONFIGURATION CONCEPTS ...
Страница 210: ......
Страница 244: ...Engineering Guidelines 230 ...
Страница 245: ...Chapter 13 NETWORK CONFIGURATION SPECIFICS ...
Страница 246: ......
Страница 309: ...Appendix A CAT 3 WIRING ...
Страница 310: ......
Страница 315: ...CAT 3 Wiring 301 Figure 55 CX MX MXe AX and LX Minimum Cable Standard ...
Страница 316: ...Engineering Guidelines 302 ...
Страница 317: ...Appendix B INSTALLATION EXAMPLES ...
Страница 318: ......
Страница 335: ...Appendix C LLDP AND LLDP MED CONFIGURATION EXAMPLES ...
Страница 336: ......
Страница 347: ...Appendix D VOIP AND VLANS ...
Страница 348: ......
Страница 353: ...Appendix E VOIP SECURITY ...
Страница 354: ......
Страница 381: ... ...