EAP-TLS Extensible Authentication Protocol, or EAP, is an authentication
framework frequently used in wireless networks and Point-to-Point
connections. EAP is defined in RFC 3748. EAP-Transport Layer Security
(EAP-TLS), defined in RFC 5216, is an IETF open standard protocol, with
strong security used by wireless vendors. EAP-TLS uses PKI to secure
communication to a RADIUS authentication server or another type of
authentication server.
H.323
H.323 is a TCP/IP-based protocol for VoIP signaling. The H.323 standard
provides a foundation for audio, video, and data communications across
IP-based networks, including the Internet. H.323 is an umbrella
recommendation from the International Telecommunications Union (ITU)
that sets standards for multimedia communications over Local Area
Networks (LANs) that do not provide a guaranteed Quality of Service
(QoS).
HAC
Hearing Aid Compatibility, an Federal Communications Commission
(FCC), part of the United States government Part 68 standard for handset
equalization for interoperability with t-coil enabled hearing aid devices.
IKE Internet Key Exchange Protocol, RFC 2409, which is now replaced by
IKEv2 in RFC 4306.
IPsec A security mechanism for IP that provides encryption, integrity assurance,
and authentication of data. Applies only to IPv4.
LLDP Link Layer Discovery Protocol. All deskphones with an Ethernet interface
support the transmission and reception of LLDP frames on the Ethernet
line interface in accordance with IEEE standard 802.1AB.
MAC Media Access Control, ID of an endpoint.
NAT Network Address Translation, a mechanism by which IP addresses are
mapped from one address space to another, and in which UDP and TCP
port numbers are remapped to allow multiple devices to share the same
IP address without port number conflicts.
PSTN
Public Switched Telephone Network, the network used for traditional
telephony.
Quality of Service Quality of Service (QoS) is used to refer to several mechanisms intended
to improve audio quality over packet-based networks.
RSA Rivest-Shamir-Adleman: A highly secure asymmetric cryptography
method developed by RSA Security, Inc. that uses a public and private
key pair. The private key is kept secret by the owner and the public key is
published, usually in a digital certificate. Data is encrypted using the
public key of the recipient, which can only be decrypted by the private key
of the recipient. RSA is very computation intensive, thus it is often used to
Glossary
March 2018 Administering Avaya 9608/9608G/9611G/9621G/9641G/9641GS IP Deskphones H.
323 158
Comments on this document? infodev@avaya.com