Avaya 1600 Series Manual Do Utilizador

Página de 142
Network Requirements
30 Avaya 1600 Series IP Deskphones Administrator Guide
 
Security
For information about toll fraud, see the DEFINITY
®
, Avaya Aura Communication Manager, or 
Avaya Aura Communication Manager Branch documents on the Avaya support Web site. The 
1600 Series IP Telephones cannot guarantee resistance to all Denial of Service attacks. 
However, there are checks and protections to resist such attacks while maintaining appropriate 
service to legitimate users.
You also have a variety of optional capabilities to restrict or remove how crucial network 
information is displayed or used. These capabilities are covered in more detail in 
.
Support signaling channel encryption while registering, and when registered, with 
appropriately administered Avaya Media Servers. 
Note:
Note:
Signaling and audio are not encrypted when unnamed registration is effective.
Restricting the response of the 1600 Series IP Telephones to SNMP queries to only IP 
addresses on a list you specify.
Specifying an SNMP community string for all SNMP messages the telephone sends.
Restricting dialpad access to Local Administration Procedures, such as specifying IP 
addresses, with a password.
Removing dialpad access to most Local Administration Procedures.
Restricting the end user’s ability to use a telephone Options application to view network 
data.
As of Release 1.1, three existing security-related parameters can be administered on the call 
server and downloaded with encrypted signaling, in addition to unencrypted HTTP or encrypted 
HTTPS. Those parameters are SNMP community string, SNMP Source IP Addresses, and 
Craft Access Code (PROCPSWD).
Registration and Authentication
The Avaya Media Server supports using the extension and password to register and 
authenticate 1600 Series IP Telephones. For more information, see the current version of your 
call server administration manual.