![Nortel SMC 2450 Скачать руководство пользователя страница 124](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451124.webp)
Page 124 of 260
Secure UNIStim deployment
553-3001-225
Standard 1.00
May 2006
By default, the SMC keeps all IP client in an insecure mode. This allows the
administrator to control the Secure Unistim roll-out so that licences are not
exceeded.
When the SMC is first installed, three standard policies are created:
•
insecure: does not try to upgrade phones to Secure UNIStim or push the
key fingerprints to the IP phones.
•
secure: tries to upgrade IP phones that are not configured for security to
Secure UNIStim and push the key fingerprint of the primary key to the
IP phone. Any IP phones that do not support security are allowed to
access the signaling server using normal UNIStim.
•
maxsecure: this policy works the same as secure, except that IP phones
that cannot be upgraded to security are denied access to the signaling
server.
The default rule in the SMC maps a network called voip_users to a nonsecure
Policy. The Client Rules can be viewed in the Web UI at:
Multimedia
Security > UNIStim Security > Client > Rules.
Security policy example
In this example, the Finance Network requires a high level of security (the
secure policy), while Sales requires less security (the nonsecure policy).
IMPORTANT!
To add enhanced security for all IP phones protected by a given policy,
client security is required. UNIStim phones with firmware that does not
support security, such as the IP Softphone 2050 and the WLAN
handsets 2210 and 2211, needs a policy that does not require UNIStim
security. See “Security policy example” on
page 124
for an example of
how security policies work.
For these phones, set the policy to
Required Security = false
. These
unsupported IP phones are then allowed to pass through as unsecure,
even though the SMC tries to upgrade them. For more information about
unsupported IP phone firmware, see “IP client firmware management”
on
page 151
.
Содержание SMC 2450
Страница 2: ......
Страница 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Страница 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Страница 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Страница 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Страница 27: ...Description Page 27 of 260 Secure Multimedia Controller Implementation Guide Figure 1 Basic subnet mappings...
Страница 51: ...Description Page 51 of 260 Secure Multimedia Controller Implementation Guide Figure 7 SMC campus redundancy...
Страница 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Страница 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Страница 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Страница 126: ...Page 126 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006 Figure 22 Sample policy page...
Страница 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Страница 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Страница 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Страница 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Страница 228: ...Page 228 of 260 Appendix C Regulatory information 553 3001 225 Standard 1 00 May 2006 DenAn regulatory notice for Japan...
Страница 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Страница 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Страница 261: ......