User`s manual
Table Of Contents
- Mediant 2000 & TP-1610 & TP-260/UNI SIP User’s Manual Version 5.0
- Table of Contents
- List of Figures
- List of Tables
- Notices
- 1. Overview
- 2. Physical Description
- 3. Installation
- 4. Getting Started
- 5. Web Management
- Computer Requirements
- Protection and Security Mechanisms
- Accessing the Embedded Web Server
- Getting Acquainted with the Web Interface
- Protocol Management
- Advanced Configuration
- Status & Diagnostic
- Software Update Menu
- Maintenance
- Logging Off the Embedded Web Server
- 6. Gateway's ini File Configuration
- Secured ini File
- Modifying an ini File
- The ini File Content
- The ini File Structure
- The ini File Example
- Networking Parameters
- System Parameters
- Web and Telnet Parameters
- Security Parameters
- RADIUS Parameters
- SNMP Parameters
- SIP Configuration Parameters
- Voice Mail Parameters
- ISDN and CAS Interworking-Related Parameters
- Number Manipulation and Routing Parameters
- E1/T1 Configuration Parameters
- Channel Parameters
- Configuration Files Parameters
- 7. Using BootP / DHCP
- 8. Telephony Capabilities
- Working with Supplementary Services
- Configuring the DTMF Transport Types
- Fax & Modem Transport Modes
- Event Notification using X-Detect Header
- ThroughPacket™
- Dynamic Jitter Buffer Operation
- Configuring the Gateway’s Alternative Routing (based on Conn
- Call Detail Report
- Supported RADIUS Attributes
- Trunk to Trunk Routing Example
- Proxy or Registrar Registration Example
- SIP Call Flow Example
- SIP Authentication Example
- 9. Networking Capabilities
- 10. Advanced PSTN Configuration
- 11. Advanced System Capabilities
- 12. Special Applications
- 13. Security
- 14. Diagnostics
- 15. SNMP-Based Management
- SNMP Standards and Objects
- Carrier Grade Alarm System
- Cold Start Trap
- Third-Party Performance Monitoring Measurements
- TrunkPack-VoP Series Supported MIBs
- Traps
- SNMP Interface Details
- SNMP Manager Backward Compatibility
- Dual Module Interface
- SNMP NAT Traversal
- SNMP Administrative State Control
- AudioCodes’ Element Management System
- 16. Configuration Files
- Appendix A. Selected Technical Specifications
- Appendix B. Supplied SIP Software Kit
- Appendix C. SIP Compliance Tables
- Appendix D. The BootP/TFTP Configuration Utility
- Appendix E. RTP/RTCP Payload Types and Port Allocation
- Appendix F. RTP Control Protocol Extended Reports (RTCP-XR)
- Appendix G. Accessory Programs and Tools
- Appendix H. Release Reason Mapping
- Appendix I. SNMP Traps
- Appendix J. Installation and Configuration of Apache HTTP Server
- Appendix K. Regulatory Information

Mediant 2000 & TP-1610 & TP-260
SIP User's Manual 146 Document #: LTRT-68805
Table 6-4: Security Parameter (continues on pages 145 to 146)
ini File Field Name
Web Parameter Name
Valid Range and Description
HTTPSRequireClientCertific
ate
Requires client certificates for HTTPS connection. The client certificate must be
preloaded to the gateway, and its matching private key must be installed on the
managing PC. Time and date must be correctly set on the gateway, for the
client certificate to be verified.
0 = Client certificates are not required (default).
1 = Client certificates are required.
HTTPSRootFileName
Defines the name of the HTTPS trusted root certificate file to be loaded via
TFTP. The file must be in base64-encoded PEM (Privacy Enhanced Mail)
format.
The valid range is a 47-character string.
Note: This parameter is only relevant when the gateway is loaded via
BootP/TFTP. For information on loading this file via the Embedded Web Server,
refer to the Security section in the User’s Manual.
HTTPSPkeyFileName
[Security Settings >
Certificates]
Defines the name of a private key file (in unencrypted PEM format) to be loaded
from the TFTP server.
HTTPSCertFileName
Defines the name of the HTTPS server certificate file to be loaded via TFTP.
The file must be in base64-encoded PEM format.
The valid range is a 47-character string.
Note: This parameter is only relevant when the gateway is loaded via
BootP/TFTP. For information on loading this file via the Embedded Web Server,
refer to the Security section in the User’s Manual.
Internal Firewall Parameters
AccessList_Source_IP
[Source IP]
IP address (or DNS name) of source network, or a specific host.
AccessList_Net_Mask
[Mask]
IP network mask. 255.255.255.255 for a single host or the appropriate value for
the source IP addresses.
The IP address of the sender of the incoming packet is bitwise ANDed with this
mask and then compared to the field ‘Source IP’.
AccessList_Start_Port
AccessList_End_Port
[Local Port Range]
The destination UDP/TCP ports (on this device) to which packets are sent.
The valid range is 0 to 65535.
Note: When the protocol type isn’t TCP or UDP, the entire range must be
provided.
AccessList_Protocol
[Protocol]
The protocol type (e.g., UDP, TCP, ICMP, ESP or ‘Any’), or the IANA protocol
number (in the range of 0 (Any) to 255).
Note: The protocol field also accepts the abbreviated strings ‘SIP’, ‘MGCP’,
‘MEGACO’ and ‘HTTP’. Specifying these strings implies selection of the TCP or
UDP protocols, and the appropriate port numbers as defined on the device.
AccessList_Packet_Size
[Packet Size]
Maximum allowed packet size.
The valid range is 0 to 65535.
Note: When filtering fragmented IP packets, the Packet Size field relates to the
overall (reassembled) packet size, not to the size of each fragment.
AccessList_Byte_Rate
[Byte Rate]
Expected traffic rate (bytes per second).
AccessList_Byte_Burst
[Burst Bytes]
Tolerance of traffic rate limit (number of bytes)
AccessList_Allow_Type
[Action Upon Match]
Action upon match (allow or block)
AccessList_MatchCount
[Match Count]
A read-only field that provides the number of packets accepted / rejected by a
specific rule.