• IPsec VPN tunnels
• Visiting users
• SLA Monitor
• Push server
• USB profile
• WML browser
• SSO
• 802.1x EAP-TLS
• SCEP
Note:
H.323 signaling over TLS is supported in both FIPS and non-FIPS mode.
Related links
JITC security compliance mode configuration on page 20
JITC security compliance mode configuration
You must configure the deskphone to work in the security mode in which the UCR requirements to
the JITC test cases are complied. In the 46xxsettings file, set the parameters to the values
specified in the table below.
Parameter
Value Description
FIPS_ENABLED 1 Use cryptographic algorithms
using embedded FIPS 140-2-
validated cryptographic module.
PROCSTAT 0 Enables local CRAFT procedure.
PROCPSWD Obtained from Communication
Manager, DHCP server, or file
server
Restricts the use of the default
administration password of the
deskphone. The value can be set
on Communication Manager,
DHCP server, or file server.
Note:
Obtaining PROCPSWD
through Communication
Manager is the most secure
method. Setting
PROCPSWD using HTTPS
is secure only if mutual
certificate authentication is
done.
PKCS12URL URL of the PKCS #12 file The PKCS #12 file contains an
identity certificate for the
Table continues…
Administration overview and requirements
March 2018 Administering Avaya 9608/9608G/9611G/9621G/9641G/9641GS IP Deskphones H.
323 20
Comments on this document? infodev@avaya.com