Engineering Guidelines
348
AUTHENTICATION PROTOCOL SUPPORT
A number of networks now support a level of access restriction to the network ports. A device
that connects to one of these ports needs to be authenticated as valid before connections can
be established. There are a number of protocols that can do this, including:
•
Cisco VMPS
•
802.1X
The Cisco VMPS is described in “VMPS, CDP, and Location Change Indication (E911)” on
page 251.
Mitel implements phone authentication that requires a unique association of MAC addresses
and IP and user-entered PIN registration numbers. Additionally, desktop software downloads
are encrypted. Mitel also provides 802.1X authentication for desktops, and that supports the
Extensible Authentication Protocol (EAP) using EAP-MD5 challenge authentication to a
RADIUS Server. Users authenticate through the phone interface by entering a username and
password.
DUAL PORT PHONES
A number of Mitel's IP phones are dual port, meaning that there are two ethernet ports on the
phone. One ethernet port is used to connect to the LAN. The other ethernet port can be used
to connect a PC to the network via the phone, this capability is useful in environments where
the phone and the PC need to share a single ethernet connection.
As of MCD 4.1 a COS option is provided that can be used by the System Administrator to
disable the second ethernet port on dual port phones, which in turn will bar unauthorized access
at the second ethernet port. The default condition is for all second ethernet ports to be enabled;
for details on how to set a COS option to disable secondary ethernet ports on IP phones, refer
to the
System Administration Tool Help
for MiVoice Business.
IEEE 802.1X
The IEEE 802.1X standard is similar in operation to VMPS, but uses a RADIUS Server for
authentication. Devices that authenticate through 802.1X require an identification name and
password before being allowed access.
There are a number of protocols that are used to establish the initial connection. Mitel end
devices ("supplicants") support the EAP-MD5 protocol.
If the administrator configures the L2 Switch for port access control, the connected IP Phone
will prompt the user for an account name and password if one has not already been entered
or if the information saved in the phone is invalid. Based on the response,
•
the port may be opened for access
•
the VLAN settings may change
•
the port could be opened to a guest VLAN
•
the port could be shut down.
Содержание MiVOICE BUSINESS
Страница 1: ...Mitel MiVoice Business RELEASE 7 2 ENGINEERING GUIDELINES ...
Страница 15: ...Chapter 1 ABOUT THIS DOCUMENT ...
Страница 16: ......
Страница 22: ...Engineering Guidelines 8 ...
Страница 23: ...Chapter 2 SYSTEM OVERVIEW ...
Страница 24: ......
Страница 28: ...Engineering Guidelines 14 ...
Страница 29: ...Chapter 3 TYPICAL CONFIGURATIONS ...
Страница 30: ......
Страница 73: ...Chapter 4 PHONES AND VOICE APPLICATIONS ...
Страница 74: ......
Страница 95: ...Phones and Voice Applications 81 Figure 9 ICP Connection Paths and Limitations ...
Страница 100: ...Engineering Guidelines 86 ...
Страница 101: ...Chapter 5 POWER ...
Страница 102: ......
Страница 128: ...Engineering Guidelines 114 ...
Страница 129: ...Chapter 6 PERFORMANCE ...
Страница 130: ......
Страница 135: ...Chapter 7 APPLICATIONS ...
Страница 136: ......
Страница 142: ...Engineering Guidelines 128 ...
Страница 143: ...Chapter 8 EMERGENCY SERVICES ...
Страница 144: ......
Страница 151: ...Chapter 9 IP NETWORKING ...
Страница 152: ......
Страница 167: ...Chapter 10 LICENSING ...
Страница 168: ......
Страница 183: ...Chapter 11 BANDWIDTH CODECS AND COMPRESSION ...
Страница 184: ......
Страница 209: ...Chapter 12 NETWORK CONFIGURATION CONCEPTS ...
Страница 210: ......
Страница 244: ...Engineering Guidelines 230 ...
Страница 245: ...Chapter 13 NETWORK CONFIGURATION SPECIFICS ...
Страница 246: ......
Страница 309: ...Appendix A CAT 3 WIRING ...
Страница 310: ......
Страница 315: ...CAT 3 Wiring 301 Figure 55 CX MX MXe AX and LX Minimum Cable Standard ...
Страница 316: ...Engineering Guidelines 302 ...
Страница 317: ...Appendix B INSTALLATION EXAMPLES ...
Страница 318: ......
Страница 335: ...Appendix C LLDP AND LLDP MED CONFIGURATION EXAMPLES ...
Страница 336: ......
Страница 347: ...Appendix D VOIP AND VLANS ...
Страница 348: ......
Страница 353: ...Appendix E VOIP SECURITY ...
Страница 354: ......
Страница 381: ... ...