EasyManuals Logo

2N IP series User Manual

2N IP series
282 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #106 background imageLoading...
Page #106 background image
Configuration manual for 2N IP intercoms
106 / 282
To pair a user with a mobile device, use the user's page in the intercom phone book. Physically,
you can pair a user locally using the USB Bluetooth module connected to your PC or remotely
using an integrated Bluetooth module. The results of both the pairing methods are the same.
The following data is transmitted to a mobile device for pairing:
Location identifier
Location encryption key
User Auth ID
Encryption Key for Pairing
An encryption key other than that used for communication after pairing is used in the pairing
mode for security reasons. This key is generated automatically upon the intercom first launch
and can be re-generated any time later.
Encryption Key Administration
The intercom can keep up to 4 valid encryption keys: 1 primary and up to 3 secondary ones. A
mobile device can use any of the 4 keys for communication encryption. The encryption keys are
fully controlled by the system administrator. It is recommended that the encryption keys should
be periodically updated for security reasons, especially in the event of a mobile device loss or
intercom configuration leak.
The primary key can be re-generated any time. Thus, the original primary key becomes the first
secondary key, the first secondary key becomes the second secondary key and so on. Secondary
keys can be deleted any time.
When a key is deleted, the 2NMobile Keyusers that still use this key will not be able to
authenticate themselves unless they have updated the encryption keys in their mobile devices
before deletion. The mobile device keys are updated at every use of the 2NMobile
Keyapplication.
Note
The encryption keys are generated automatically upon the intercom first launch
and saved into the intercom configuration file. We recommend you to re-generate
the encryption keys manually before the first use to enhance security.

Other manuals for 2N IP series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the 2N IP series and is the answer not in the manual?

2N IP series Specifications

General IconGeneral
CategoryIntercom System
Network Interface10/100 Mbps Ethernet
ConnectivityEthernet
IntegrationSIP
Ingress ProtectionIP54
Operating Voltage12V DC
Audio CodecG.711
Supported ProtocolsSIP, RTSP, HTTP, HTTPS
Supported LanguagesMultiple

Related product manuals