Page 138 of 260
Secure UNIStim deployment
553-3001-225
Standard 1.00
May 2006
The following section explains why Secure UNISTIM reregistration can be
delayed and how to speed the process up.
When an insecure IP Client is rebooted, it goes through the following process:
1
The phone communicates to the CSE Node IP address on port 4100.
2
The Node TPS redirects the IP Client to either:
•
the TLAN IP of the same Node TPS
•
another TPS device TLAN address (load balancing process)
3
The IP Client communicates to the TPS TLAN IP at the supplied address
on port 7300
4
After registration completes, the IP client communicates to the same TPS
as step 3 on TLAN IP port 5100
The IP Client is now registered and ready to operate.
Note:
The 4100/7300/5100 port numbers are factory default.
When secure UNIStim is disabled and phones are operating normally, the
phones operate in the final state, as identified in step 4.
When security is enabled, the SMC firewall is designed to do the following
for both secure and insecure IP Clients:
•
recognize that an IP Client is communicating to the CSE Node address
on port 4100. During the configuration of the Secure Unistim feature on
the SMC, the TPS server IP address is provided.
•
watch IP client communications move to the assigned TPS TLAN
address using port 7300
•
watch the IP client finish registration on port 5100
•
track this activity using a firewall-based client table
When secure unistim is enabled on the SMC, the phones are most likely still
in step 4; therefore, the firewall does not get the opportunity to track the IP
client through the registration process.
Содержание SMC 2450
Страница 2: ......
Страница 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Страница 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Страница 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Страница 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Страница 27: ...Description Page 27 of 260 Secure Multimedia Controller Implementation Guide Figure 1 Basic subnet mappings...
Страница 51: ...Description Page 51 of 260 Secure Multimedia Controller Implementation Guide Figure 7 SMC campus redundancy...
Страница 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Страница 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Страница 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Страница 126: ...Page 126 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006 Figure 22 Sample policy page...
Страница 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Страница 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Страница 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Страница 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Страница 228: ...Page 228 of 260 Appendix C Regulatory information 553 3001 225 Standard 1 00 May 2006 DenAn regulatory notice for Japan...
Страница 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Страница 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Страница 261: ......