User's Manual
Avaya Branch Gateway Manager 10.0 Page 79
15-601011 Issue 29r (Friday, November 02, 2012)B5800 Branch Gateway
Security Mode: Editing Security Settings
Service
Method
Port Used
Default
Port
Service
Security
Level
Changing its setting will affect applications
other than just the DECT R4. The default
Service Security Level is Secure +
Unsecure, meaning both http and https
can be used.
· Unsecure = HTTP port 80 available.
This is used for phone files, embedded
file manager, system file upgrade, one-X
Portal directory services, DECT R4
provisioning, IPO softphone
provisioning.
· Secure = HTTPS port 443 available.
This can be used for DECT R4
provisioning, IPO softphone
provisioning.
Secure
–
443
· When changing the base port, exercise caution that the selected port and those offset from it do not conflict with
any ports already in use by other applications.
· Maximum Service Users: Default = 64.
This is a fixed value for indication purposes only. This value is the maximum number of service users that can be
stored in a system's security settings.
· Maximum Rights Groups: Default = 32.
This is a fixed value for indication purposes only. This value is the maximum number of Rights Groups that can be
stored in a system's security settings.
· System Discovery
System discovery is the processes used by applications to locate and list available systems. The Avaya Branch Gateway
can be disabled from responding to this process if required. If this is done, access to the Avaya Branch Gateway
requires its specific IP address to be used.
· TCP Discovery Active: Default = On.
Selecting TCP Discovery Active allows the system to respond to those requests.
· UDP Discovery Active: Default = On.
Selecting UDP Discovery Active allows the system to respond to those requests.
· Security:
These settings cover the per-system security aspects, primarily TLS settings.
· Session ID Cache: Default = 10 hours, Range 0 to 100 hours.
This sets how long a TLS session ID is retained by the system. If retained, the session ID may be used to quickly
restart TLS communications between the system and a re-connecting application. When set to 0, no caching takes
place and each TLS connection must be renegotiated.
· HTTP Challenge Timeout (Seconds): Default = 10.
For HTTP/HTTPS connection attempts, this field sets the timeout for connection validation responses.
· RFC2617 Session Cache (Minutes): Default = 10.
For HTTP/HTTPS sessions, this field sets the allowed duration for successful logins as per RFC2617.
· HTTP Ports: Release 6.2+.
· HTTP Port: Default = 80.
· HTTPS Port: Default = 443.
· Web Services Port: Default =8443.