Security Management Fundamentals Release: 6.0 Document Revision: 03.08

Total Page:16

File Type:pdf, Size:1020Kb

Security Management Fundamentals Release: 6.0 Document Revision: 03.08 Nortel Communication Server 1000 Security Management Fundamentals Release: 6.0 Document Revision: 03.08 www.nortel.com .NN43001-604 Nortel Communication Server 1000 Release: 6.0 Publication: NN43001-604 Document release date: 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners. 3 . Contents New in this release 11 Other changes 11 Revision history 11 How to get help 15 Getting help from the Nortel Web site 15 Getting help over the telephone from a Nortel Solutions Center 15 Getting help from a specialist by using an Express Routing Code 16 Getting help through a Nortel distributor or reseller 16 Introduction 17 Purpose 17 Navigation 18 Other security information 18 About this document 19 Subject 19 Intended audience 20 Terminology conventions 20 Fundamentals of system security management 21 System security overview 23 General signaling security overview 23 Key management concepts 23 Public-key certificate concepts 25 Platform security overview 28 Unified Communications Management security services 28 Unified Communications Management security server roles 29 Security Domain Manager concepts 30 Linux security hardening 31 Internal communications security overview 36 ISSS/IPsec 36 Secure File Transfer Protocol concepts 38 Port access restrictions concepts 40 Linux Master Firewall Control 41 Media and signaling security overview 42 Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 03.08 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. 4 Media Security concepts 42 TLS security for SIP trunks concepts 44 UNIStim signaling encryption with DTLS 44 NRS SIP Proxy 44 User and password management concepts 45 OAM overview 45 Access control management 47 System upgrade password conversion 48 Global password settings 48 Role management in Unified Communications Management 49 Security administration concepts 49 SSH and secure remote access 49 Customizable logon banner 49 Recommended security practices 51 Recommendations for OAM security 51 Recommended password management practices 52 Upgrading user names from an earlier release 52 Recommendations to protect confidentiality 53 ISSS/IPsec recommendations 53 Preshared keys, SSH keys, and Secure FTP Token recommendations 53 TLS security for SIP trunks recommendations 54 Media Security recommendations 54 Recommendations for security administration 54 Shell Access Control 54 Certificates 55 Security code for Mobile Extensions 55 Single sign-on cookie domain 55 Certificate management 56 Upgrade from an earlier release 56 Recommendations to protect UNIStim IP Phones 57 UNIStim with DTLS recommendations 57 Prevent GARP spoof attacks 57 Enable layer 2 authentication for IP Phones 58 Sign files 58 Security interactions 58 Co-resident CP PM Call and Signaling Server 59 ISSS and Element Manager on VxWorks signaling server 59 ISSS and Element Manager on UCM 60 ISSS and Geographic Redundancy 60 ISSS and AML 61 ISSS and Port Access Restrictions and Linux firewall 61 ISSS and other protocols 62 Media Security and call forwarding 62 Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 03.08 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. 5 Media Security and SIP phones 62 Media Security Always and CallPilot mailboxes on systems without MGC daughterboards or MC32S 63 SIP TLS security policy interaction with Failsafe NRS 63 SIP TLS interaction with SMC 2450 64 Recommendations for upgrading to Communication Server 1000 Release 6.0 from a previous release 64 Prerequisites 64 Migrate existing CS 1000 Release 5.x user accounts to CS 1000 Release 6.0 66 Prerequisites 66 ISSS 69 ISSS overview 69 Unified Communications Management IPsec ISSS management interface page 71 IPsec configuration 74 Prerequisites 74 Configure ISSS for a new installation 74 Configure default IPsec settings 76 Add a new manual IPsec target 78 Edit an existing manual IPsec target 79 Enable or disable IPsec for a target 80 Delete a manual target 81 Customize IPsec for a Call Server target 82 Activate IPsec configuration settings 84 Synchronize IPsec configuration settings 85 Configure ISSS when a new element joins the security domain 86 Other ISSS configuration and maintenance procedures 87 Maintenance on Linux servers 87 Manual ISSS configuration on each device 90 Certificate Management 95 Prepare the system for certificate management 95 CA management 96 Private CA Configuration 96 Add a CA to an endpoint 99 Change the trust status of an endpoint 101 Delete a CA 102 Certificate creation and management 103 Certificate information 105 Add a UCM server certificate to the Web browser 106 Create a certificate for Web SSL signed by the private CA 107 Create a certificate for Web SSL signed by a trusted third-party CA 112 Create a self-signed certificate for Web SSL 117 Create a certificate for SIP TLS signed by the private CA 123 Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 03.08 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. 6 Create a certificate for SIP TLS signed by a public CA 128 Create a request for a third-party CA certificate for SIP TLS when upgrading the system 133 Create a self-signed certificate for SIP TLS 140 Process a pending certificate response 144 Delete a pending certificate request 146 Create a certificate renew request for the current certificate 148 Export the current self-signed certificate 151 Export the current certificate and its private key 153 Import a certificate and its private key from a file 156 Assign an existing certificate 159 Replace the current certificate 161 Remove the current certificate 163 Revoke a certificate 165 Download the Certificate Revocation List (CRL) Details 166 SIP security 169 About TLS security for SIP trunks 169 SIP Lines 171 SIP TLS configuration overview 171 View SIP TLS configuration 174 Job aid: config.ini 174 TLS security for SIP trunks configuration using Element Manager 175 Configuring SIP TLS security policy 176 SIP TLS Certificate management 181 SIP TLS maintenance using CLI 181 Media Security 183 About Media Security 183 UNIStim with DTLS encryption 185 DTLS and IP Phone registration 186 Security levels 187 DTLS configuration options 188 UNIStim DTLS overlay commands 189 Configure UNIStim DTLS using Element Manager 190 Update UNIStim DTLS using Element Manager 193 View UNISTIM DTLS details using Element Manager 194 Key sharing 196 Protecting the media stream using SRTP PSK 196 Protecting the media stream using SRTP USK 196 Media Security configuration using Element Manager 196 System-wide Media Security configuration 196 VTRK Class of Service configuration 199 Media Security configuration using overlays 201 System-wide Media Security configuration 201 Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 03.08 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. 7 Class of Service configuration 202 VTRK Class of Service configuration 204 Media Security configuration information 205 Media Security configuration information available using overlays 205 Media Security information available using an IP Phone 207 SIP Route information available using overlays 208 User and password management 209 Roles and permissions 210 Inheritance of UCM role-based permissions for Element type of CS 1000 211 Permission templates 211 Account types and roles 212 Account synchronization 212 Customer passwords 212 User and password management using overlays 214 User management 214 Password management 224 Global password settings configuration 226 Password reset 228 Multi-user login configuration using overlays 231 History File configuration using overlays 233 Password management for stand-alone Signaling Server 233 User and password management using Element Manager 234 Add a user 234 Edit an existing user 239 Synchronize a changed password 241 Edit global password settings 242 Security administration 247 Control access to the system 247 System administration port security 248 Switchroom security 248 Network facilities security 249 Add or remove elements from the UCM security domain 249 VxWorks systems and devices 251 Co-resident Call Server and Signaling Server systems 252 Join a Co-resident Signaling Server to the UCM security domain using Base Manager 253 Redundant systems 266 Move an element from one UCM security domain to another 267 Moving a Linux member element to another UCM security domain 267 Moving a single VxWorks element to another UCM security domain 268 Moving all VxWorks elements on a Call Server to another UCM security domain 269 Authentication methods 269 Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 03.08 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. 8 Central authentication 270 Secure UserID and password authentication with a system security token 271 Regenerate the Secure FTP Token 272 Refresh system keys 272 Control access to system Application Processors 273 Configure Secure File Transfer Protocol 274 sFTP configuration
Recommended publications
  • Nortel IP Phone 1120E Technical Specifications
    Technical Specification Nortel IP Phone 1120E Intermediate-level IP Phone brings innovative features and flexibility to desktop communications to desktop communications The award-winning Nortel IP Phone enables the presentation of converged Key features and benefits 1120E with Gigabit Ethernet unveils voice and data applications, leveraging include: an exciting array of innovative commu- its integrated high-resolution graphical, > Multi-line IP Phone supports four line/programmable feature keys, 14 nication features and capabilities with eight-level grayscale display. Navigation fixed keys and four context-sensitive the intermediate-level desktop IP Phone. of applications is very flexible, with soft-label keys Ideally suited for office workers and support of standard USB mice and > High-resolution, backlit, graphical, administrative personnel, the four-line keyboards powered from the phone’s eight-level grayscale, pixel-based display, combined with a flexible five- Nortel IP Phone 1120E supports stan- integrated USB port. With robust and position adjustable footstand place- dards-based Session Initiation Protocol tightly linked communications features ment, optimizes viewing in varied (SIP), delivering choice to customers in from Nortel Communication Servers, lighting conditions > Advanced collaborative communica- deployment options with support on the Nortel IP Phone 1120E positions tions support with graphical presence either Nortel or third-party Communica- customers to meet both today’s and notification and secure instant tion Servers.
    [Show full text]
  • Avaya Session Border Controller for Enterprise Overview and Specification
    Avaya Session Border Controller for Enterprise Overview and Specification Release 7.2.2.2 Issue 8 April 2019 © 2017-2019, Avaya Inc. YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Notice SERVICE. While reasonable efforts have been made to ensure that the Licenses information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED “Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA such modifications, additions, or deletions were performed by or on AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA the express behalf of Avaya.
    [Show full text]
  • Configuring 9600 Series SIP Telephones with Avaya Auratm Session Manager Release 6.0 and Avaya Auratm Communication Manager Evolution Server Release 6.0 – Issue 1.0
    Avaya Solution Interoperability Test Lab Configuring 9600 Series SIP Telephones with Avaya AuraTM Session Manager Release 6.0 and Avaya AuraTM Communication Manager Evolution Server Release 6.0 – Issue 1.0 Abstract These Application Notes describe the configuration of 9600 Series SIP Telephones with Avaya AuraTM Session Manager Release 6.0 supported by Avaya AuraTM Communication Manager Evolution Server Release 6.0. Avaya AuraTM Session Manager provides SIP proxy/routing functionality, routing SIP sessions across a TCP/IP network with centralized routing policies and registrations for SIP endpoints. Avaya AuraTM Communication Manager Evolution Server serves as an Evolution Server within the Avaya Aura™ Session Manager architecture and supports the SIP endpoints registered to Avaya AuraTM Session Manager. These Application Notes provide information for the setup, configuration, and verification of the call flows tested on this solution. DJH Reviewed: Solution Interoperability Lab Application Notes 1 of 51 SPOC 10/1/2010 ©2010 Avaya Inc. All Rights Reserved. SM6_CM-ES_R6 Table of Contents: 1. Introduction ............................................................................................................. 4 2. Equipment and Software Validated......................................................................... 5 3. Configure Avaya AuraTM Communication Manager ................................................ 6 3.1. Verify System Capacities and Licensing ................................................................. 6 3.1.1.
    [Show full text]
  • HST-3000 Handheld Services Tester Infineon ADSL2+/VDSL2 SIM
    COMMUNICATIONS TEST & MEASUREMENT SOLUTIONS HST-3000 Handheld Services Tester Infineon ADSL2+/VDSL2 SIM Benefits • Saves money and reduces repeat faults with Triple-Play services testing that supports ADSL1, ADSL2, ADSL2+, VDSL2 (VDSL2 up to 30a profiles) with one module • Provides BPT, Hlog, and QLN graphing, simplifying isolation of bridged taps, noise, and pair balance problems • Emulates both modems (ATU-R/VTU-R) and DSLAMs (ATU-C/ VTU-C) to test both directions of the span • Interoperates with the widest range of chipset manufacturers, such as Broadcom, Infineon, and Ikanos, reducing the costs of carrying multiple test modules • Enables data and services layer testing via PPPoE, PPPoA, IPoE, FTP throughput, web browser, VoIP, and IP Video, making it the right tool for Triple-Play testing • Choose an optional wideband copper pair module that tests up to 30 MHz for VDSL2 Qualifying a very high speed Digital Subscriber Line (VDSL) service that can transport high definition television (HDTV) and triple-play services requires more than a simple Go/No-Go tester. One lightweight, robust, battery-operated JDSU HST-3000 tester equipped with the Infineon Technologies ADSL/VDSL2 module offers more capability than any other handheld tester on the market. This tester gives both technicians and telco engineers the confidence and the necessary power to complete the job, and get it done right. With one tool, they can test and troubleshoot asynchronous DSL (ADSL)/VDSL2 circuits by emulating either the customer modem (ATU-R/VTU-R mode) or the DSL access multiplexer (DSLAM) (ATU-C/VTU-C mode). Designed for the outside plant, the Infineon service interface module (SIM) also supports legacy ADSL1, ADSL2, ADSL2+, VDSL1, and VDSL2, making it easy and efficient for technicians to switch between testing technologies without having to swap modules.
    [Show full text]
  • NICC ND 1035 V2.1.1 (2016-02) NICC Document
    NICC ND 1035 V2.1.1 (2016-02) NICC Document SIP Network to Network Interface Signalling NICC Standards Limited Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636 Registered in England and Wales under number 6613589 2 NICC ND 1035 V2.1.1 (2016 -02) NOTICE OF COPYRIGHT AND LIABILITY © 2016 NICC Standards Limited The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be that printing on NICC printers of the PDF version kept on a specific network drive within the NICC. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other NICC documents is available at: http://www.niccstandards.org.uk/publications/ If you find errors in the present document, please send your comments to: mailto:[email protected] Copyright All right, title and interest in this document are owned by NICC Standards Limited (“NICC”) and/or the contributors to the document (unless otherwise indicated that copyright is owned or shared with a third party). Such title and interest is protected by United Kingdom copyright laws and international treaty provisions. The contents of the document are believed to be accurate at the time of publishing, but no representation or warranty is given as to their accuracy, completeness or correctness.
    [Show full text]
  • Security Management Fundamentals
    Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 . Document status: Standard Document version: 01.46 Document date: 31 October 2007 Copyright © 2008, Nortel Networks All Rights Reserved. LEGAL NOTICE While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Sourced in Canada Nortel, the Nortel Logo, the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks. Entrust is a trademark of Entrust, Inc. Verisign and Thawte are trademarks of Verisign, Inc. VxWorks is a trademark of Wind River Systems, Inc. All other trademarks are the property of their respective owners. 3 Revision History October 2007 Standard 01.46 This document is up-issued to support Communication Server 1000 (CS 1000) Release 5.0, and to reflect changes in technical content related to password reset procedures. October 2007 Standard 01.42 This document is up-issued to support CS 1000 Release 5.0, and to reflect changes in technical content related to Intrasystem Signaling Security Solution (ISSS) configuration. September 2007 Standard 01.34 This document is up-issued to support CS 1000 Release 5.0, and to reflect changes in technical content related primarily to ISSS configuration. June 2007 Standard 01.13 This document is up-issued to support CS 1000 Release 5.0, and to reflect changes in technical content, including changes to information about SIP TLS and ISSS configuration.
    [Show full text]
  • NBAR2 Standard Protocol Pack 1.0
    NBAR2 Standard Protocol Pack 1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2013 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 1 CHAPTER 2 BGP 3 BITTORRENT 6 CITRIX 7 DHCP 8 DIRECTCONNECT 9 DNS 10 EDONKEY 11 EGP 12 EIGRP 13 EXCHANGE 14 FASTTRACK 15 FINGER 16 FTP 17 GNUTELLA 18 GOPHER 19 GRE 20 H323 21 HTTP 22 ICMP 23 IMAP 24 IPINIP 25 IPV6-ICMP 26 IRC 27 KAZAA2 28 KERBEROS 29 L2TP 30 NBAR2 Standard Protocol Pack 1.0 iii Contents LDAP 31 MGCP 32 NETBIOS 33 NETSHOW 34 NFS 35 NNTP 36 NOTES 37 NTP 38 OSPF 39 POP3 40 PPTP 41 PRINTER 42 RIP 43 RTCP 44 RTP 45 RTSP 46 SAP 47 SECURE-FTP 48 SECURE-HTTP 49 SECURE-IMAP 50 SECURE-IRC 51 SECURE-LDAP 52 SECURE-NNTP 53 SECURE-POP3 54 SECURE-TELNET 55 SIP 56 SKINNY 57 SKYPE 58 SMTP 59 SNMP 60 SOCKS 61 SQLNET 62 SQLSERVER 63 SSH 64 STREAMWORK 65 NBAR2 Standard Protocol Pack 1.0 iv Contents SUNRPC 66 SYSLOG 67 TELNET 68 TFTP 69 VDOLIVE 70 WINMX 71 NBAR2 Standard Protocol Pack 1.0 v Contents NBAR2 Standard Protocol Pack 1.0 vi CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 NBAR2 Standard Protocol Pack Overview The Network Based Application Recognition (NBAR2) Standard Protocol Pack 1.0 is provided as the base protocol pack with an unlicensed Cisco image on a device.
    [Show full text]
  • Application Notes for Configuring Avaya IX Messaging Version 10.8 with Avaya Communication Server 1000 Release 7.6.7 and Avaya Aura® Session Manager Release 7.1.2+
    Avaya Solution & Interoperability Test Lab Application Notes for Configuring Avaya IX Messaging Version 10.8 with Avaya Communication Server 1000 Release 7.6.7 and Avaya Aura® Session Manager Release 7.1.2+ Abstract These Application Notes describe the procedure for configuring Avaya IX Messaging 10.8 to interoperate with the Avaya Communication Server 1000 Release 7.6.7 and Avaya Aura® Session Manager Release 7.1.2+. The IX Messaging voice server connects to the Avaya Communication Server 1000 through a SIP Trunk connection and provides unified communications features such as the greetings menu, user mailbox services, wake up services and transfer functions. Information in these Application Notes has been obtained through DevConnect compliance testing and additional technical discussions. Testing was conducted via the DevConnect Program at the Avaya Solution and Interoperability Test Lab. RS; Reviewed: Solution & Interoperability Test Lab Application Notes 1 of 30 SPOC Oct. 16, 2019 ©2018-2019 Avaya Inc. All Rights Reserved. IX Messaging10CS1K 1. Introduction These Application Notes describe the procedure for configuring Avaya IX Messaging 10.8 (IX Messaging) to interoperate with Avaya Communication Server 1000 R7.6.7 and Avaya Aura® Session Manager R7.1.2+. The objective of this compliance testing is to verify that IX Messaging connects to the CS1000 via SIP trunks and provides unified communication services such as greetings, messaging and transfer functions. 2. General Test Approach and Test Results The general test approach was to place calls to the Avaya IX Messaging voice server and verify that the user can: • Establish calls between IX Messaging and the CS1000E end points.
    [Show full text]
  • SIP Software for Avaya 1100 Series IP Deskphones-Administration
    SIP Software for Avaya 1100 Series IP Deskphones-Administration SIP 4.0 NN43170-600, Standard 02.09 November 2012 © 2012 Avaya Inc. Copyright All Rights Reserved. Except where expressly stated otherwise, no use should be made of materials on this site, the Documentation, Software, or hardware Notice provided by Avaya. All content on this site, the documentation and the Product provided by Avaya including the selection, arrangement and While reasonable efforts have been made to ensure that the design of the content is owned either by Avaya or its licensors and is information in this document is complete and accurate at the time of protected by copyright and other intellectual property laws including the printing, Avaya assumes no liability for any errors. Avaya reserves the sui generis rights relating to the protection of databases. You may not right to make changes and corrections to the information in this modify, copy, reproduce, republish, upload, post, transmit or distribute document without the obligation to notify any person or organization of in any way any content, in whole or in part, including any code and such changes. software unless expressly authorized by Avaya. Unauthorized reproduction, transmission, dissemination, storage, and or use without Documentation disclaimer the express written consent of Avaya can be a criminal, as well as a “Documentation” means information published by Avaya in varying civil offense under the applicable law. mediums which may include product information, operating instructions Third Party Components and performance specifications that Avaya generally makes available to users of its products. Documentation does not include marketing “Third Party Components” mean certain software programs or portions materials.
    [Show full text]
  • HT801/HT802 Analog Telephone Adaptors Administration Guide
    Grandstream Networks, Inc. HT801/HT802 Analog Telephone Adaptors Administration Guide COPYRIGHT ©2021 Grandstream Networks, Inc. http://www.grandstream.com All rights reserved. Information in this document is subject to change without notice. Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for any purpose without the express written permission of Grandstream Networks, Inc. is not permitted. The latest electronic version of this user manual is available for download here: http://www.grandstream.com/support Grandstream is a registered trademark and Grandstream logo is trademark of Grandstream Networks, Inc. in the United States, Europe and other countries. CAUTION Changes or modifications to this product not expressly approved by Grandstream, or operation of this product in any way other than as detailed by this User Manual, could void your manufacturer warranty. WARNING Please do not use a different power adaptor with your devices as it may cause damage to the products and -void the manufacturer warranty. P a g e | 1 HT801/HT802 Administration Guide Version 1.0.29.8 GNU GPL INFORMATION HT801/HT802 firmware contains third-party software licensed under the GNU General Public License (GPL). Grandstream uses software under the specific terms of the GPL. Please see the GNU General Public License (GPL) for the exact terms and conditions of the license. Grandstream GNU GPL related source code can be downloaded from Grandstream web site from: http://www.grandstream.com/support/faq/gnu-general-public-license/gnu-gpl-information-download P a g e | 2 HT801/HT802 Administration Guide Version 1.0.29.8 Table of Content DOCUMENT PURPOSE ................................................................................................
    [Show full text]
  • Ts 103 389 V1.2.1 (2013-09)
    ETSI TS 103 389 V1.2.1 (2013-09) Technical Specification Railway Telecommunications (RT); Global System for Mobile communications (GSM); Usage of Session Initiation Protocol (SIP) on the Network Switching Subsystem (NSS) to Fixed Terminal Subsystem (FTS) interface for GSM Operation on Railways 2 ETSI TS 103 389 V1.2.1 (2013-09) Reference RTS/RT-00021 Keywords FTS, SIP, GSM-R, NSS, railways ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Avaya 1140E IP Deskphone
    avaya.com Avaya 1140E IP Deskphone Professional-level IP Deskphone supports a new dimension in desktop communications features and application presentation. The award-winning Avaya 1140E IP Deskphone Key Features and with Gigabit Ethernet brings a new dimension in communication features and capabilities Customer Benefits to the professional IP Deskphone. Ideally • Multi-line IP Deskphone supports up to suited for managers and knowledge workers, 12 line/programmable feature keys1, 14 the multi-line Avaya 1140E IP Deskphone fixed keys and four context sensitive soft supports standards-based Session Initiation keys2 Protocol (SIP), delivering choice to customers in deployment options with support on Avaya or • High-resolution, fully-backlit, graphical, third-party Communication Servers. The 1140E eight-level grayscale, 240 x 160 pixel IP Deskphone also enables presentation display with anti-glare screen, combined Avaya 1140E IP Deskphone of converged voice and data applications, with a flexible five-position adjustable leveraging its integrated high-resolution, footstand, optimizes viewing in varied graphical eight-level grayscale pixel-based lighting conditions display. Application navigation is flexible and • Supports Gigabit Ethernet, positioning the phone’s internal switch to accommodate powerful with the 1140E IP Deskphone’s • Advanced collaborative communications growing multimedia intensive PC-based integrated USB port, supporting both standard support with graphical presence applications, thus aligning with USB mice and keyboards. Combined with rich notification and secure instant messaging investment made in the wiring closet telephony feature sets as delivered from Avaya (SIP firmware only)3 Communication Servers, deployment of the • Supports 802.3af standard-based PoE or Avaya 1140E IP Deskphone enhances personal • Four-way navigation cluster with Enter local AC power via a global power supply productivity with delivery of a superior user key provides easy navigation when using experience for both today’s and tomorrow’s features communications needs.
    [Show full text]