![Nortel SMC 2450 Скачать руководство пользователя страница 133](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451133.webp)
Secure UNIStim deployment
Page 133 of 260
Secure Multimedia Controller
Implementation Guide
By default, the voip_users network matches all subnets so all traffic
flowing through the SMC is insecure. To segment out a particular network
for security, you must perform the following steps:
a.
Add a network for the subnet(s) you want to secure. Networks are
added in the Web UI at the
Multimedia Security > Networks
page.
b.
Create a rule by associating the network to a policy. Rules are
applied in order of display and since the default rule matches all
networks, it is always called if it is first in the list. You will need to
re-order the Rule list to place the new more restrictive Rule first.
14
Extract the private key to a secure location.
a.
Navigate to the
Multimedia Security > UNIStim Security > Private
Keys
page
.
b.
Select the key to display.
c.
Click
Display Private Key/Public Key/Fingerprint
.
d.
Click
Private Key
.
You are prompted to specify a password. The password is optional
but recommended since this key is critical for communication with all
Secure UNIStim phones proxied by the SMC. This password is
required when the key is imported back into the SMC.
e.
Specify a password.
f.
Cut and paste the key into a file for storage.
15
Click
Apply
.
IMPORTANT!
Maintain the private key in a safe location. It may be needed for another
SMC install.
Содержание SMC 2450
Страница 2: ......
Страница 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Страница 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Страница 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Страница 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Страница 27: ...Description Page 27 of 260 Secure Multimedia Controller Implementation Guide Figure 1 Basic subnet mappings...
Страница 51: ...Description Page 51 of 260 Secure Multimedia Controller Implementation Guide Figure 7 SMC campus redundancy...
Страница 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Страница 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Страница 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Страница 126: ...Page 126 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006 Figure 22 Sample policy page...
Страница 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Страница 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Страница 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Страница 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Страница 228: ...Page 228 of 260 Appendix C Regulatory information 553 3001 225 Standard 1 00 May 2006 DenAn regulatory notice for Japan...
Страница 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Страница 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Страница 261: ......