![Nortel SMC 2450 Скачать руководство пользователя страница 43](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451043.webp)
Description
Page 43 of 260
Secure Multimedia Controller
Implementation Guide
Dynamic Host Configuration Protocol
The IP phones can use a static IP address or use full or partial Dynamic Host
Configuration Protocol (DHCP) to acquire its own IP address and the IP
address of the Terminal Proxy Server (TPS) in CS 1000 setups. The TPS
represents the server side of the UNIStim protocol. DHCP can also provide
the UNIStim IP phone with a security-enabled Action Byte, which forces the
IP phone to initiate the UNIStim connection using the secure handshake.
Note:
Phase 2 IP phones can have more than one fingerprint stored at a
time.
Automatic client fingerprint update
If a client runs firmware that supports secure UNIStim but does not have a
primary key fingerprint, the SMC can automatically update the fingerprint to
the client.
Master key
The master key is generated by the UNIStim IP
phone, encrypted with the server's public key,
and returned to the server. The master key is
stored on both the UNIStim IP phone and server.
It is used to create two unique session keys: one
for encryption, and one for authentication.
Session keys
All secure UNIStim packets are encrypted with
one session key and authenticated with a
second. Each session key is derived
independently on the UNIStim IP phone and
server using the master key along with
parameters passed during connection initiation.
Because session keys are used for every packet
sent, Nortel recommends you regenerate the
session keys periodically.
Table 1
RSA key types
Key
Description
Содержание SMC 2450
Страница 2: ......
Страница 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Страница 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Страница 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Страница 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Страница 27: ...Description Page 27 of 260 Secure Multimedia Controller Implementation Guide Figure 1 Basic subnet mappings...
Страница 51: ...Description Page 51 of 260 Secure Multimedia Controller Implementation Guide Figure 7 SMC campus redundancy...
Страница 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Страница 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Страница 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Страница 126: ...Page 126 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006 Figure 22 Sample policy page...
Страница 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Страница 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Страница 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Страница 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Страница 228: ...Page 228 of 260 Appendix C Regulatory information 553 3001 225 Standard 1 00 May 2006 DenAn regulatory notice for Japan...
Страница 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Страница 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Страница 261: ......