Cisco Systems Linksys PAP2 Manual De Usuario

Descargar
Página de 117
 
 
 
 
ADAPTER unit is shipped from the factory, it contains a default common Profile and is considered 
Unprovisioned. To save costs and expedite delivery, however, it is very desirable that an 
e PHONE 
from the provisioning server is very scalable and flexible. Using this provisioning method, a 
TER units can be provisioned simultaneously and updated 
domain name of the provisioning server to contact, 
and b) a
specific su
the subsc
need to p
enter this
audio in
for the 
shipped to
In addition
e PHONE ADAPTER allows an interactive 
mode o
(accesse
menu to c
may be 
subscrib
A third m
 
tegral web server via a browser on a PC.  The subscriber has the option to set and adjust 
a an easy-to-use, password protected graphical user interface.  This 
ht be preferred by administrators who wish to access the PHONE 
stitutional LAN or by the residential subscriber who is a “power 
Unprovisioned unit can be shipped directly from the factory to the subscriber’s location without any 
preprocessing by the Service Provider.  
The PHONE ADAPTER contacts the Service Provider’s provisioning server via the IP network or 
Internet when it is plugged into the subscriber’s home or business Local Area Network (LAN) – 
assuming the provisioning server is reachable from the subscriber’s home network – to pull the 
designated profile to be installed in that particular PHONE ADAPTER unit. Furthermore, th
ADAPTER unit will periodically contact the provisioning server to download an updated profile. The 
protocol for downloading the configuration profile can be “clear text” TFTP or HTTP data or it can be 
encrypted TFTP, HTTP or HTTPS data if security is required.  Security will be discussed in more 
details in a later section. 
This type of autonomous remote provisioning, where the individual PHONE ADAPTER unit pulls the 
profile 
large number of PHONE ADAP
periodically.  
However, some basic information must be provided to the PHONE ADAPTER before it can be 
provisioned in this fashion: a) the IP address or 
n ID and/or a password to send to the provisioning server such that it can associate it with a 
bscriber and obtain the corresponding profile. This information can be sent out-of-band to 
riber via secured email or in a letter inside a welcome kit, for example. The subscriber might 
unch in some numbers using a telephone connected to the PHONE ADAPTER in order to 
 information into the unit. The PHONE ADAPTER provides an easy-to-use interface with 
structions to make this initial configuration process as painless as possible. An alternative is 
unit to be provisioned with this basic information by the Service Provider before the unit is 
 the subscriber. 
 to the batch mode of remote provisioning, th
f local provisioning. One way to offer this feature is through the use of an IVR system 
d through an attached telephone set). The user can access a diagnostic or configuration 
heck the status of the device or to change some of the settings. This method of provisioning 
applied by an administrator when the device is at the Service Provider’s office, or by the 
er under the guidance of trained personnel during over-the-phone troubleshooting. 
ethod of entering provisioning information into the PHONE ADAPTER is by way of its
in
configuration parameters vi
method of provisioning mig
ADAPTER over a secure corporate/in
user.” 
1.1.3. Security 
Overview 
Security may be applied at many levels in the context of the PHONE ADAPTER. The following are 
examples of information that should be secured: 
• The configuration profile pulled from the provisioning server – The downloading of the 
profile should be secured since it contains authentication (password/user name ID / 
number) information for accessing subscriber telephony services. It may also contain other 
passwords and/or encryption keys used for a variety of management and service 
operations. 
• The administration password to the PHONE ADAPTER unit – The unit must disallow 
access to administrative functions to unauthorized users. This access can be controlled 
with an administrator password. The administrator password can be one of the parameters 
in the PHONE ADAPTER configuration profile. 
 
© 2004 Linksys Proprietary (See Copyright Notice on Page 2) 
 
 
10