User's Manual
TCP/TLS operation overview....................................................................................................................
203
SRTP.........................................................................................................................................................
216
Last successful or unsuccessful logon......................................................................................................
219
Enhanced administrative password security.............................................................................................
222
Chapter 14: Audio codecs..................................................................................................
225
Codec preference through Device Configuration......................................................................................
226
Codec preference selection on the IP Deskphone....................................................................................
228
Codecs preferences on the IP Deskphone...............................................................................................
228
Chapter 15: Certificate-based authentication...................................................................
231
Certificate-based authentication...............................................................................................................
231
Trusted Root certificate.............................................................................................................................
232
Trusted root certificate installation............................................................................................................
233
Device certificate installation process.......................................................................................................
234
Installing a device certificate using PKCS12.............................................................................................
235
Certificate Trust List..................................................................................................................................
236
Installing a Certified Trust List...................................................................................................................
238
Certificate Trust List events.......................................................................................................................
239
Certificate Administration..........................................................................................................................
239
Security Policy...........................................................................................................................................
245
Security policy parameters........................................................................................................................
246
Installing a Security Policy file...................................................................................................................
249
Security policy logs and diagnostics.........................................................................................................
250
EAP Authentication...................................................................................................................................
251
EAP Re-authentication..............................................................................................................................
254
EAP events...............................................................................................................................................
254
Provisioning configuration files download through HTTPS.......................................................................
254
Server authentication................................................................................................................................
255
Mutual Authentication................................................................................................................................
255
Security and error logs..............................................................................................................................
256
Diagnostic events......................................................................................................................................
257
Fault management behavior.....................................................................................................................
258
Creating a signing certificate.....................................................................................................................
259
File signing................................................................................................................................................
259
Signing scripts...........................................................................................................................................
260
Chapter 16: Licensing.........................................................................................................
263
Licensing framework.................................................................................................................................
264
Characteristics of the licensing framework................................................................................................
265
License file download................................................................................................................................
265
[LICENSING] section................................................................................................................................
267
License information for the IP Deskphone................................................................................................
268
Licensable Features..................................................................................................................................
269
Node-locked license mode........................................................................................................................
271
Invalid or no license file.............................................................................................................................
274
Evaluation period......................................................................................................................................
275
Alarms.......................................................................................................................................................
276
Licensing expiry threshold warning...........................................................................................................
279
Licensed features......................................................................................................................................
279
SIP Software for Avaya 1100 Series IP Deskphones-Administration November 2012 5