Certificate Management - Avaya J100 Series Installing And Administering

Third-party call control setup
Hide thumbs Also See for J100 Series:
Table of Contents

Advertisement

Security configurations
Security event logging
Logs are maintained for the following events:
• Successful and failed logins, username lockouts, and registration and authorization attempts
by users and administrators.
• Change in roles.
• Firewall configuration changes.
• Modification or access to critical data, applications, and files.
Private Key storage
The phone stores the private key in PKCS#12 and PEM file formats. The phone sends the device
identity certificate and a private key along with the encrypted password to the WPA supplicants.
MD5 passwords are sent to the WPA supplicants securely.
Temporary Data
The phone deletes any temporary storage data from the program, variables, cache, main memory,
registers, and stack.
IP information
The phone enables the user with ADMIN privileges to see the IP information on the phone screen.
The parameter PROVIDE_NETWORKINFO_SCREEN controls the display information.
OpenSSH/OpenSSL version
The phone displays the version of OpenSSL and OpenSSH on the VIEW screen in the ADMIN
menu. To see this information, set the parameter DISPLAY_SSL_VERSION to 1.
SSH Fingerprint
The phone displays the SSH fingerprint to manually verify that an SSH connection is established
with the correct phone.
Time synchronization
The phone synchronizes the time with the configured NTP servers in intervals. Use the parameter
SNTP_SYNC_INTERVAL to check the time interval for synchronization. The range is 60 to 2880
minutes, and the default is 1440 minutes.

Certificate management

Certificates are used to establish secure communication between network entities. Server or
mutual authentication can be used to establish a secure connection between a client and server.
The client always validates the certificate of the server and maintains a trust store to support this
validation. If the server additionally requires mutual authentication, it requests an identity
certificate from the client. The identity certificate must be provided and validated by the server to
establish mutual authentication. Server must validate the identity certificate to establish a secure
connection..
August 2018
Installing and Administering Avaya J100 series IP Phones in third-party call control
setup
Comments on this document? infodev@avaya.com
88

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

J139J129J169J179Jbm24

Table of Contents