Administrator’s Guide for SIP-T2_Series_T4_Series IP Phones
450
mechanism for devices to connect/link to a LAN or WLAN. The 802.1X authentication
involves three parties: a supplicant, an authenticator and an authentication server. The
supplicant is the IP phone that wishes to attach to the LAN or WLAN. With 802.1X
port-based authentication, the IP phone provides credentials, such as user name and
password, for the authenticator, and then the authenticator forwards the credentials to
the authentication server for verification. If the authentication server determines the
credentials are valid, the IP phone is allowed to access resources located on the
protected side of the network.
IP phones support protocols EAP-MD5, EAP-TLS, EAP-PEAP/MSCHAPv2,
EAP-TTLS/EAP-MSCHAPv2, EAP-PEAP/GTC, EAP-TTLS/EAP-GTC and EAP-FAST for 802.1X
authentication.
For more information on 802.1X authentication, refer to
Yealink 802.1X Authentication
,
available online:
http://www.yealink.com/DocumentDownload.aspx?CateId=142&flag=142.
Procedure
802.1X authentication can be configured using the configuration files or locally.
Configure the 802.1X
authentication.
Parameters:
network.802_1x.mode
network.802_1x.identity
network.802_1x.md5_password
network.802_1x.root_cert_url
network.802_1x.client_cert_url