User's Manual
NAT firewall traversal................................................................................................................................
193
Three-port switch and VLAN functionality.................................................................................................
195
802.1x (EAP) Port-based network access control....................................................................................
197
802.1ab Link Layer Discovery Protocol....................................................................................................
198
PC Client Softphone interworking.............................................................................................................
203
Multi-Level Precedence and Preemption..................................................................................................
207
SIP Domain DNS Lookup feature.............................................................................................................
213
How DNS lookup works....................................................................................................................
213
Server Profiles...........................................................................................................................................
214
Chapter 12: IP Deskphone restrictions.............................................................................
219
Service package restrictions.....................................................................................................................
219
Chapter 13: Security...........................................................................................................
221
SIP over TLS.............................................................................................................................................
221
Connection persistence.............................................................................................................................
221
SSH and secure file transfer.....................................................................................................................
222
TCP/TLS operation overview....................................................................................................................
223
SRTP.........................................................................................................................................................
237
Last successful or unsuccessful logon......................................................................................................
239
Enhanced administrative password security.............................................................................................
243
Chapter 14: Audio codecs..................................................................................................
245
Codec preference through the Device Configuration file..........................................................................
246
Codec preference selection on the IP Deskphone....................................................................................
248
Codecs preferences on the IP Deskphone...............................................................................................
248
Chapter 15: Certificate-based authentication...................................................................
251
Certificate-based authentication...............................................................................................................
251
Trusted Root certificate.............................................................................................................................
252
Trusted root certificate installation....................................................................................................
253
Device certificate installation process.......................................................................................................
254
Installing a device certificate using PKCS12.............................................................................................
255
Certificate Trust List..................................................................................................................................
256
Installing a Certified Trust List..........................................................................................................
258
Certificate Trust List events..............................................................................................................
259
Certificate administration...........................................................................................................................
259
CRL screen......................................................................................................................................
265
Security Policy...........................................................................................................................................
266
Security policy parameters...............................................................................................................
267
Installing a Security Policy file..........................................................................................................
270
Security policy logs and diagnostics.................................................................................................
271
EAP Authentication...................................................................................................................................
272
EAP Re-authentication..............................................................................................................................
275
EAP events...............................................................................................................................................
275
Provisioning configuration files download through HTTPS.......................................................................
275
Server authentication................................................................................................................................
276
Mutual Authentication................................................................................................................................
276
Security and error logs..............................................................................................................................
277
Diagnostic events.............................................................................................................................
278
Fault management behavior.............................................................................................................
279
SIP Software for Avaya 1100 Series IP Deskphones-Administration November 2012 5