EasyManua.ls Logo

Avaya 9600 Series - Dropping;Muting Parties; Holding a Conference Call; Exiting a Conference

Avaya 9600 Series
65 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
IKE Internet Key Exchange Protocol, RFC 2409, which is now replaced by
IKEv2 in RFC 4306.
IPsec A security mechanism for IP that provides encryption, integrity assurance,
and authentication of data. Applies only to IPv4.
ISAKMP Internet Security Association and Key Management Protocol, RFC 2408,
ISAKMP has been replaced by IKEv2 in RFC 4306. ISAKMP defines the
procedures for authenticating a communicating peer, creation and
management of Security Associations (SA), key generation techniques, and
threat mitigation. Example: Denial of service and Replay Attacks. ISAKMP
defines two phases of negotiation. During Phase 1 negotiation, two entities
establish an ISAKMP SA, which is used to protect Phase 2 negotiations
establish SAs for other protocols.
Refresh/Rekey Use IKE to create a new SA with a new SPI.
RSA Rivest-Shamir-Adleman: A highly secure asymmetric cryptography method
developed by RSA Security, Inc. that uses a public and private key pair.
The private key is kept secret by the owner and the public key is published,
usually in a digital certificate. Data is encrypted using the public key of the
recipient, which can only be decrypted by the private key of the recipient.
RSA is very computation intensive, thus it is often used to encrypt a
symmetric session key that is then used by a less computationally-intensive
algorithm to encrypt protocol data during a “session”
. You can also use
RSA for authentication by creating a digital signature, for which the private
key of the sender is used for encryption, and the public key of the sender' is
used for decryption.
RTP Real-time Transport Protocol. Provides end-to-end services for real-time
data such as voice over IP.
SA Security Association, a security protocol, for example, IPSEC, TLS, and a
specific set of parameters that completely define the services and
mechanism necessary to protect security at that security protocol location.
These parameters can include algorithm identifiers, modes, cryptographic
keys, etc. The SA is referred to by its associated security protocol, for
example, ISAKMP SA, ESP SA, and TLS SA.
SCEP Simple Certificate Enrollment Protocol, used to obtain a unique digital
certificate.
SDP Session Description Protocol. A well-defined format for conveying sufficient
information to discover and participate in a multimedia session.
Signaling Channel
Encryption
Encryption of the signaling protocol exchanged between the IP telephone
and the call server. Signaling channel encryption provides additional
security to the security provided by media channel encryption.
IKE
March 2015 VPN Setup Guide for 9600 Series IP Telephones 61
Comments? infodev@avaya.com

Table of Contents

Other manuals for Avaya 9600 Series

Related product manuals