Destination Port Source Port Use UDP or TCP?
RTCPMONPORT The next higher
port number if the
port used for RTP
is even, or the
next lower port
number if the port
used for RTP is
odd
RTCP packets transmitted to
an RTCP monitor
UDP
1719 An unused port
number in the
range from 49300
to 49309
H.323 RAS messages UDP
A port number specified in the SLA
discovery message
Any unused port
number
Transmitted SLA registration
messages
TCP
Determined by SNMP mgmt app 161 Transmitted SNMP messages UDP
Determined by the SSH client or
the client Operating system
22 Transmitted SSH messages TCP
Security
For information about toll fraud, see the respective call server documents on the
Avaya Support
website. The 9600 Series IP Deskphones cannot guarantee resistance to all Denial of Service
(DoS) attacks. However, checks and protections are in-built to resist such attacks while
maintaining appropriate service to legitimate users.
All 9600 Series IP Deskphones that have WML Web applications support Transport Layer Security
(TLS). The deskphone uses TLS to establish a secure connection to a HTTP server, in which the
upgrade and settings file can reside. The 9600 Series IP Deskphones support TLS 1.2 cipher
suites. You can configure the TLS_VERSION parameter to use either TLS 1.2 only, or use older
TLS versions as well.
The following list of applications and processes use TLS 1.2:
• WML browser using HTTPS
• H.323 signaling over TLS
• SLA mon agent
• IPSec VPN with certificate based authentication
• 802.1x EAP-TLS
• Single Sign On (SSON)
• Configuration files download using HTTPS
• Backup/restore using HTTPS
• Debug report generation using HTTPS
• OCSP over HTTPS
Network requirements
March 2018 Administering Avaya 9608/9608G/9611G/9621G/9641G/9641GS IP Deskphones H.
323 35
Comments on this document? infodev@avaya.com