![Nortel SMC 2450 Скачать руководство пользователя страница 142](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451142.webp)
Page 142 of 260
Secure UNIStim deployment
553-3001-225
Standard 1.00
May 2006
Procedure 39
Configuring the IP Phone 1140e and IP Phone 1120e for security
1
If configuring the first time, power on the phone.
2
Press the four soft tabs at the bottom of the screen, once each from left
to right, to enter the configuration menu.
Note:
If phone is already powered on, press the services or global button
twice in quick succession and then select option 3, which is the Network
Configuration Menu.
IMPORTANT!
For Phase 2 IP Phone 2001/IP Phone 2002/IP Phone 2004 phones, you
can set the RSA public key fingerprint after the action byte is set to 6 for
either the S1 or S2 servers. The key fingerprints, however, are not tied to
either of the S1 or S2 servers even though it may appear this way during
the configuration. Instead, the two allowed fingerprints are treated as a
pool of fingerprints; either one can authenticate S1 or S2
WARNING
The automatic update feature is available for IP phones
that do not have security set. After the RSA public key
fingerprint or the action byte is set, the initial key
automatic update directed by the SMC no longer works.
Automatic update is different than the fingerprint update
in that the automatic update occurs when the back-end
SMC changes its primary key to a secondary key. In
fingerprint update, the current fingerprint on the phone,
which corresponds to the secondary key, is overwritten
with the new fingerprint of the primary key.
If the IP phones have an old fingerprint but you want to
use the automatic update feature, you must manually set
the public key fingerprint to “ffffffffffffffff” when you
configure the IP phones for security. See “Configure the
IP phones for security” on
page 141
.
Содержание SMC 2450
Страница 2: ......
Страница 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Страница 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Страница 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Страница 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Страница 27: ...Description Page 27 of 260 Secure Multimedia Controller Implementation Guide Figure 1 Basic subnet mappings...
Страница 51: ...Description Page 51 of 260 Secure Multimedia Controller Implementation Guide Figure 7 SMC campus redundancy...
Страница 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Страница 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Страница 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Страница 126: ...Page 126 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006 Figure 22 Sample policy page...
Страница 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Страница 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Страница 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Страница 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Страница 228: ...Page 228 of 260 Appendix C Regulatory information 553 3001 225 Standard 1 00 May 2006 DenAn regulatory notice for Japan...
Страница 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Страница 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Страница 261: ......