Deploying and Configuring Polycom Phones in 802.1X Environments
|
|
|
- Dinah Hamilton
- 10 years ago
- Views:
Transcription
1 Deploying and Configuring Polycom Phones in 802.1X Environments This document provides system administrators with the procedures and reference information needed to successfully deploy and configure Polycom SIP phones in a secure 802.1X environment. You can configure 802.1X authentication on all SoundPoint IP, SoundStation IP, VVX 1500, and SpectraLink 8440 Series phones installed with UC Software version or later on an 802.1X-enabled network. Introduction The 802.1X authentication feature provides authentication services for higher security networks that use 802.1X as the authentication protocol. Polycom SIP phones support seven EAP protocols for 802.1X authentication as listed in the next section. You can configure the 802.1X authentication feature using a central provisioning server, the Polycom Web Configuration Utility, or the phone s keypad interface. For a list of the acronyms used in this document, refer to Defined Acronyms. Supported EAP Authentication Protocols Polycom SIP phones support the authentication protocols listed next. Note that the SpectraLink 8400 Series phones support only the protocols indicated in bold. EAP-TLS EAP-PEAPv0/MSCHAPv2 EAP-PEAPv0/GTC EAP-TTLS/EAP-MSCHAPv2 EAP-TTLS/EAP-GTC EAP-FAST EAP-MD5 EAP Authentication Requirements This section shows you how to authenticate Polycom phones in 802.1X environments using each of the supported EAP protocols. Each authentication protocol has a unique configuration. The parameters you need to configure are listed under each protocol. August Rev.A 1
2 EAP-TLS Device certificate Trusted pool of root/ca certificates EAP-PEAPv0/EAP-MSCHAPv2 or EAP-PEAPv0/EAP-GTC Trusted pool of root/ca certificates Password EAP-TTLS/EAP-MSCHAPv2 or EAP-TTLS/EAP-GTC Trusted pool of root/ca certificates Password EAP-MD5 Password EAP-FAST Password Optional PAC file, provisioned automatically through the network or manually using a PAC file password. Note: Using EAP-FAST Authentication for the First Time The first time you perform EAP-FAST dynamic PAC file provisioning (also known as in-band provisioning), the server will provision the phone with a PAC file and the 802.1X authentication will fail. This will be followed by a successful 802.1X authentication. In some cases, the network switch may impose a delay of about 60 seconds before initiating the 802.1X authentication following a failed authentication attempt. 2
3 Note: Using EAP-FAST Authentication with a Network Switch in MDA Mode If you are using a network switch in MDA mode, be aware of the following: MDA does not enforce the order of device authentication; however, when using an MDAenabled port, Polycom recommends authenticating your voice device before a data device. When a network switch detects a data or voice device on a port, the switch blocks the device s MAC address until authorization succeeds. If authorization fails, there will be a delay, depending on the network switch setup, before the phone can authenticate. Configuring 802.1X Authentication You can configure 802.1X authentication in the following three ways: Configuring 802.1X Using a Central Provisioning Server Configuring 802.1X Using the Polycom Web Configuration Utility Configuring 802.1X Using the Local Phone User Interface Refer to Configuring 802.1X Using a Central Provisioning Server (discussed next) for detailed descriptions of the parameters that apply to all three methods. If you wish to set up more than 10 phones, Polycom recommends using a central provisioning server. If you are provisioning fewer than 10 phones, you can use the Web Configuration Utility or the phone s user interface to configure the parameters listed in Configuring 802.1X Using a Central Provisioning Server. Configuring 802.1X Using a Central Provisioning Server The following sections outline TLS profile configuration and 802.1X setup. Each EAP protocol requires a slightly different configuration: If you are using EAP-TLS, EAP-PEAP, or EAP-TTLS, see Configuring Your TLS Profile and then go to Setting Up. If you are using EAP-FAST or EAP-MD5, go directly to Setting Up. Refer to EAP Authentication Requirements in this document for a list of the parameters that you will need to configure for each authentication protocol. Configuring Your TLS Profile Only EAP-TLS, EAP-PEAP, and EAP-TTLS require a TLS Profile. Configure either TLS Platform Profile 1 or TLS Platform Profile 2 for these authentication protocols. Choose the parameters ending in 1 to configure TLS Platform Profile 1 (for example, device.sec.tls.profile.cacertlist1) or choose the parameters ending in 2 to configure TLS Platform Profile 2 (for example, device.sec.tls.profile.cacertlist2). You must then specify which Platform Profile 3
4 you have configured by setting the device.sec.tls.profile.profileselection.dot1x parameter shown in Table 1: TLS Profile Configuration Parameters to TLS Platform Profile 1 or TLS Platform Profile 2. You can locate the configuration parameters shown in Table 1 in the device.cfg configuration file template located in the Config folder of your UC Software distribution. You can make a copy of device.cfg and edit the parameters directly or create a new configuration file containing only the parameters you wish to modify. Table 1: TLS Profile Configuration Parameters Parameter device.sec.tls.profile.cacertlist1 device.sec.tls.profile.cacertlist2 Values Builtin, BuiltinAndPlatform1, BuiltinAndPlatform2, All, Platform1, Platform2, Platform1AndPlatform2 Choose the CA certificate(s) to use for authentication: The built-in default certificate The built-in and Custom #1 certificates The built-in and Custom #2 certificates Any certificate (built in, Custom #1 or Custom #2) Only the Custom #1 certificate Only the Custom #2 certificate Either the Custom #1 or Custom #2 certificate device.sec.tls.profile.ciphersuite1 device.sec.tls.profile.ciphersuite2 The cipher suite to use for the Platform Profile. device.sec.tls.profile.ciphersuitedefault1 device.sec.tls.profile.ciphersuitedefault2 0 or 1 If set to 1, the default cipher suite will be used. If set to 0, the custom cipher suite will be used. device.sec.tls.profile.customcacert1 device.sec.tls.profile.customcacert2 The custom certificate to use if device.sec.tls.profile.cacertlist is configured to use a custom certificate. device.sec.tls.profile.devicecert1 device.sec.tls.profile.devicecert2 Builtin, BuiltinAndPlatform1, BuiltinAndPlatform2, All, Platform1, Platform2, Platform1AndPlatform2 Choose the device certificate(s) to use for authentication. device.sec.tls.profile.profileselection.dot1x PlatformProfile1, PlatformProfile2 Choose the TLS Platform Profile that you have configured. 4
5 Once you have finished configuring your TLS Profile for EAP-TLS, EAP-PEAP, or EAP-TTLS, go to Setting Up. Setting Up 802.1X To configure the EAP-TLS, EAP-PEAP, and EAP-TTLS protocols, you must first configure your certificates by setting up a TLS Profile (see Configuring Your TLS Profile). To set up 802.1X authentication, configure the parameters in Table 2: 802.1X Setup Parameters. You can locate the following configuration parameters in the device.cfg configuration file template located in the Config folder of your UC Software distribution. You can make a copy of device.cfg and edit the parameters directly or create a new configuration file containing only the parameters you wish to modify. Table 2: 802.1X Setup Parameters Parameter Value device.net.dot1x.enable 1 Enable 802.1X authentication. device.net.dot1x.method 0, 1, 2, 3, 4, 5, 6, or 7 Specify the 802.1X authentication method where the numbers 0 to 7 refer to the following protocols: 0: None, 1:EAP-TLS, 2:EAP-PEAPv0-MSCHAPv2, 3:EAP-PEAPv0-GTC, 4:EAP-TTLS-MSCHAPv2, 5:EAP-TTLS-GTC, 6:EAP-FAST, 7:EAP-MD5 device.net.dot1x.identity The identity (user name) for authentication. device.net.dot1x.password The password for 802.1X authentication. This parameter is required for all methods except EAP-TLS. device.net.dot1x.anonid EAP-TTLS and EAP-FAST only. The anonymous identity (user name). device.net.dot1x.eapfastinbandprov 0 or 1 EAP-FAST only, optional. Choose 1 to enable EAP In-Band Provisioning by server unauthenticated PAC provisioning using anonymous Diffie-Hellman key exchange. Choose 0 to disable EAP In-Band Provisioning. Reserved for Future Use Choose 2 to enable EAP In-band provisioning by server authenticated PAC provisioning using certificate based server authentication. 5
6 Parameter device.pacfile.data Value EAP-FAST only, optional. The PAC file (base 64 encoded). To generate a base 64-encoded PAC file, generate the PAC file using your authentication server and then convert it to base 64. You can convert the file to base 64 using the following openssl commands: $ openssl enc -base64 -in myfile -out myfile.b64 device.pacfile.password EAP-FAST only, optional. The password for the PAC file. Applying the Configuration Files to your Phone Once you have created a new configuration file or edited a copy of the device.cfg template configuration file using the parameters in Table 1 and Table 2, apply the files to your phone. To apply the configuration files to your phone: 1 Connect your phone to a staging network (a network that is not 802.1X-enabled). 2 Apply the configuration files to the phone. For more information on applying configuration files to your phone, consult the Polycom UC Software Administrator s Guide, available from 3 Reboot the phone. Once the phone reboots, it will be ready to connect to the 802.1X-enabled network. 4 Connect the phone to the 802.1X-enabled network and reboot the phone. Verify that your phone is authenticated by making a phone call. Troubleshooting: What if my Phone Doesn t Authenticate? If your phone does not authenticate, navigate to the Configuration menu (Menu > Status > Platform > Configuration) and check for errors in your configuration files. If you see the message Errors Found instead of Parameters Accepted for one or more of the files, verify the parameters in the file. Configuring 802.1X Using the Polycom Web Configuration Utility You can configure the 802.1X authentication parameters using the Polycom Web Configuration Utility. This section shows you where to find the 802.1X settings on the Web Configuration Utility. Refer to 6
7 Configuring 802.1X Using a Central Provisioning Server for an interpretation of the configuration parameters. To set up a TLS Profile: 1 Connect your phone to a staging network (a network that is not 802.1X-enabled). 2 Launch the Web Configuration Utility by navigating to Log in using your administrator credentials. 3 Navigate to Settings > Network > TLS. 4 Expand the Certificate Configuration menu and install the required certificates. 5 Expand the TLS Profiles menu and configure either Platform Profile 1 or Platform Profile 2. 6 Expand the TLS Applications and choose the Platform Profile that you configured (either TLS Platform Profile 1 or TLS Platform Profile 2) from the drop-down list next to the 802.1X label. 7 Click Save at the bottom of the page. Your phone will reboot or restart. To enable 802.1X authentication: 1 Launch the Web Configuration Utility by navigating to 2 Navigate to Settings > Network > Ethernet. 3 Expand the Ethernet 802.1X menu and configure the settings as described in Table 2: 802.1X Setup Parameters. 4 To configure EAP-FAST with a PAC file, expand PAC File Info and install the PAC file (base 64 encoded) Configuring 802.1X Using the Local Phone User Interface You can configure the 802.1X authentication parameters using your phone s user interface. This section shows you how to find the 802.1X settings using the phone menus. Refer to Configuring 802.1X Using a Central Provisioning Server for an interpretation of the configuration parameters. To set up a TLS Profile: 1 Navigate to the TLS Security menu (Menu > Advanced > Admin Settings > TLS Security). 2 Select Custom CA Certificates to configure your CA Certificates, or select Custom Device Credentials to configure the Device Credentials. 3 From the TLS Security menu, select Configure TLS Profiles and choose either TLS Platform Profile 1 or TLS Platform Profile 2. 4 Configure the profile as shown in Table 1: TLS Profile Configuration Parameters. 7
8 5 From the TLS Security menu, select TLS Applications > 802.1X. 6 Select the TLS Platform Profile that you configured (either TLS Platform Profile 1 or TLS Platform Profile 2). 7 Save the configuration. The phone will reboot. To enable 802.1X Authentication: 1 Navigate to the Ethernet Menu (Menu > Advanced > Admin Settings > Network Settings > Ethernet Menu). 2 Scroll down to 802.1X Auth and select Enabled. 3 From the Ethernet Menu, select 802.1X Menu. See Table 2: 802.1X Setup Parameters for the list of parameters to configure. PAC file configuration for EAP-FAST can also be performed from the 802.1X Menu by selecting PAC File Info. The PAC file must be base 64 encoded. Defined Acronyms The following acronyms are used in this document: EAP Extensible Authentication Protocol TLS Transport Layer Security PEAP Protected Extensible Authentication Protocol TTLS Tunneled Transport Layer Security FAST Flexible Authentication via Secure Tunneling MD5 Message-Digest Algorithm MS-CHAPv2 Microsoft Challenge-Handshake Authentication Protocol (version 2) GTC Generic Token Card IEEE Institute of Electrical and Electronics Engineers LAN Local Area Network WLAN Wireless Local Area Network EAPOL EAP over LAN (Extensible Authentication Protocol over Local Area Network) PAC Protected Access Credential MDA Multi-Domain Authentication 8
9 Trademarks 2011, Polycom, Inc. All rights reserved. POLYCOM, the Polycom "Triangles" logo and the names and marks associated with Polycom's products are trademarks and/or service marks of Polycom, Inc. and are registered and/or common law marks in the United States and various other countries. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Polycom. Disclaimer While Polycom uses reasonable efforts to include accurate and up-to-date information in this document, Polycom makes no warranties or representations as to its accuracy. Polycom assumes no liability or responsibility for any typographical or other errors or omissions in the content of this document. Limitation of Liability Polycom and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Polycom and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Polycom has been advised of the possibility of such damages. Customer Feedback We are constantly working to improve the quality of our documentation, and we would appreciate your feedback. Please send to Visit support.polycom.com for software downloads, product document, product licenses, troubleshooting tips, service requests, and more. 9
Syslog on Polycom Phones
Syslog on Polycom Phones Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational, analytic, or
Using Premium Automatic Call Distribution for Call Centers
Using Premium Automatic Call Distribution for Call Centers Feature-synchronized Automatic Call Distribution (ACD) enables organizations to manage a large number of phone calls on an individual basis. ACD
Device Certificates on Polycom Phones
Feature Profile 37148 Device Certificates are an important element in deploying a solution that ensures the integrity and privacy of communications involving Polycom UC Software devices. Device Certificates
Information on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance
Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,
Customizing the Display Background on Polycom VVX Business Media Phones
Customizing the Display Background on Polycom VVX Business Media Phones Feature Profile 62470 This feature profile provides users, system administrators, and service providers with step-by-step instructions
How to Provision a Polycom Phone
Provisioning Guide How to Provision a Polycom Phone This guide shows you how to provision a Polycom phone with the minimum settings required to place and receive Voice over Internet Protocol (VoIP) calls
Security Slots on Polycom SoundPoint IP, SoundStation IP, SoundStation Duo and VVX Series Phones
Security Slots on Polycom SoundPoint IP, SoundStation IP, SoundStation Duo and VVX Series Phones Have you ever needed to lock a phone down so it couldn t be removed? On certain Polycom phone models, you
Broadcasting Audio Messages with Group Paging and Push-to-Talk
Broadcasting Audio Messages with Group Paging and Push-to-Talk Group Paging enables you to broadcast one-way audio announcements to users who are subscribed to a specific page group. Push-to-Talk (PTT)
Supporting the Calendar, Instant Messaging, and Presence Features on Polycom Phones
Supporting the Calendar, Instant Messaging, and Presence Features on Polycom Phones This engineering advisory shows you how to integrate Microsoft Outlook, Microsoft Office Communication Server 2007 R2,
Technical Bulletin 5844
SIP Server Fallback Enhancements on Polycom SoundPoint IP, SoundStation IP, and VVX Phones This technical bulletin provides detailed information on how the SIP software has been enhanced to support SIP
Using Feature Synchronized Automatic Call Distribution with Polycom Phones
Using Feature Synchronized Automatic Call Distribution with Polycom Phones Feature Profile 57216 Feature synchronized Automatic Call Distribution (ACD) enables organizations to manage a large number of
Using Enhanced Feature Keys and Configurable Soft Keys on Polycom Phones
Using Enhanced Feature Keys and Configurable Soft Keys on Polycom Phones This feature profile provides detailed information on how to set up Enhanced Feature Keys (EFK) and Configurable Soft Keys on Polycom
Polycom VVX 300, 310, 400 and 410 Business Media Phone
ADMINISTRATORS GUIDE Software 4.1.4 March 2013 1725-49091-401 Rev A Polycom VVX 300, 310, 400 and 410 Business Media Phone Addendum to the Polycom UC Software 4.1.0 Administrators Guide i Polycom VVX 300,
Deploying Polycom SoundStation IP Conference Phones with Cisco Unified Communications Manager (CUCM)
Document Title Version SOLUTION GUIDE October 2013 1725-40120-002 Rev A Deploying Polycom SoundStation IP Conference Phones with Cisco Unified Communications Manager (CUCM) Polycom, Inc. 1 Copyright 2013,
Using the Unified Call Appearance List
Feature Profile 72634 Using the Unified Call Appearance List Polycom UC Software Update With the release of Polycom UC Software 4.x, Polycom has updated the phones with the unified call appearance list
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones Polycom s SpectraLink 8400 Series wireless phones meet the highest security requirements. By the time you deploy
Configuring Optional Re-Registration on Failover Behavior
Engineering Advisy 66546 Configuring Optional Re-Registration on Failover Behavi This engineering advisy describes optional failover behavis that you can set up to enhance server redundancy technologies
Broadcasting Audio Messages with Group Paging and Push-to-Talk
Broadcasting Audio Messages with Group Paging and Push-to-Talk Feature Profile 62337 Group Paging enables you to broadcast one-way audio announcements to users who are subscribed to a specific page group.
Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database
Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database Table of Contents: INTRODUCTION:... 2 GETTING STARTED:... 3 STEP-1: INTERFACE CONFIGURATION... 4 STEP-2:
Using Multiple Appearance Directory Number - Single Call Appearance with Polycom Phones
Using Multiple Appearance Directory Number - Single Call Appearance with Polycom Phones Feature Profile 83102 Multiple Appearance Directory Number Single Call Appearance (MADN-SCA) enables multiple phone
Update Configuration. Reboot Phone To upload files to assist in diagnostics, you can choose:
Updating, Troubleshooting, and Resetting SoundPoint IP, SoundStation IP, and VVX 1500 Phones This quick tip provides step-by-step instructions on how to use multiple key combinations and phone menu options
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
Provisioning with the Master Configuration File
Best Practices 35361 Provisioning with the Master Configuration File This document provides you with detailed information on provisioning your Polycom phones and, specifically, shows you two ways to use
Deployment Guide for the Polycom SoundStructure VoIP Interface for Cisco Unified Communications Manager (SIP)
Deployment Guide for the Polycom SoundStructure VoIP Interface for Cisco Unified Communications Manager (SIP) UC Software 4.0.1 December 2011 1725-33223-001 Rev. A Trademark Information POLYCOM, the Polycom
Software Development Kit (SDK)
QUICK START GUIDE UC Software 5.3.0 May 2015 3725-49126-001A Software Development Kit (SDK) Polycom, Inc. 1 Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6
INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.
PortSIP Encryption Relay Server Deployment Guide
SOLUTION GUIDE Wave 3 Nov 2015 2998-000606-003 Rev A PortSIP Encryption Relay Server Deployment Guide 1 Copyright 2015, All rights reserved. No part of this document may be reproduced, translated into
Engineering Advisory 48152 Power Consumption and Management on Polycom Phones
Consumption and Management on Polycom Phones This engineering advisory shows detailed information about the power consumption and management of the Polycom SoundPoint IP desktop phones, Polycom SoundStation
Accessibility Features on Polycom Phones
s on Polycom Phones Polycom designs and builds products for people who have many and varied abilities. In this feature profile, you ll learn about the a ccessibility features available on Polycom SoundPoint
Connectivity to Polycom RealPresence Platform Source Data
Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data
Using Polycom VVX Business Media Phones with Microsoft Lync Server 2013
Using Polycom VVX Business Media Phones with Microsoft Lync Server 2013 Feature Profile 84538 Microsoft Lync on Polycom VVX business media phones enables you to communicate with customers, colleagues,
Technical Bulletin 11572
Changes to Local Digit Maps on SoundPoint IP, SoundStation IP, and Polycom VVX 1500 Phones This technical bulletin provides detailed information on how to modify the configuration files to automate the
GETTING STARTED GUIDE. 1.3 September 2015 3725-10306-001D. Polycom RealAccess
GETTING STARTED GUIDE 1.3 September 2015 3725-10306-001D Polycom RealAccess Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language
Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products
SECURITY BULLETIN CVE-2014-0160 Version 1.12 Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products DATE PUBLISHED: This information applies to all Polycom products
Available Update Methods
The Spectralink 84-Series handsets support multiple methods for updating handset software. This document will detail each of those processes in order to give you the greatest flexibility when administering
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1 June 2014 3725-76312-001A Polycom RealPresence DMA 7000 System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
Dell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1.2 October 2014 3725-76312-001B Polycom RealPresence DMA 7000 System, Virtual Edition The Polycom RealPresence DMA 7000 System is also known and certified as the DMA System.
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition 8.2.0 July 2014 3725-72102-001G Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be
Wave IP 4.5. Wave Spectralink Phone Configuration Guide
Wave IP 4.5 Wave Spectralink Phone Configuration Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and
Configuring CyberData Devices for Intermedia Hosted PBX
The IP Endpoint Company Configuring CyberData Devices for Intermedia Hosted PBX This procedure was written by: CyberData Corporation 3 Justin Court Monterey, CA 93940 T:831-373-2601 F: 831-373-4193 www.cyberdata.net
Introducing the Locking Feature. About Your User Password. Locking and Unlocking Your Phone. Calling and Answering from a Locked Phone
Phone Lock Feature on Polycom Phones Running Polycom UC Software This quick tip provides step-by-step instructions on how to use the locking feature available on Polycom phones running Polycom UC Software.
How to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
Using Syslog for Logging of Complete SIP Messaging on Spectralink 84-Series Handsets
Using Syslog for Logging of Complete SIP Messaging on Spectralink 84-Series Handsets This bulletin provides detailed information on how to use syslog to log the complete text of every SIP message in the
Using custom certificates with Spectralink 8400 Series Handsets
Using custom certificates with Spectralink 8400 Series Handsets This technical bulletin explains how to create and use custom certificates with the Spectralink 8400 Series Handset. This technical bulletin
Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products
SECURITY BULLETIN CVE-2014-0160 Version 1.7 Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products DATE PUBLISHED: This information applies to all Polycom products using
Polycom Web Configuration Utility
Document Title Version USER GUIDE Software 4.1.4 June 2013 1725-47121-001 Rev C Polycom Web Configuration Utility Polycom, Inc. 1 Polycom Web Configuration Utility User Guide Copyright 2013, Polycom, Inc.
Configuring an IP (SIP) Polycom Soundstation on the Avaya IP Office
Hardware used for this documentation Polycom Soundstation IP 6000 Avaya IP500V2 firmware 7.0.23 Set the Polycom with an IP Address Step 1: Initial setup If your Soundstation does not automatically register
How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo
Chapter 6 - EAP Authentication This chapter describes using Extensible Authentication Protocol with FreeRADIUS. The following topics are discussed in this chapter: EAP Overview Types/Methods Testing with
Strong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Polycom recommends that all legacy phones be updated to the most recent patch of their last supported SIP and BootROM software versions.
This technical bulletin describes how to maintain older phones in deployments running software versions past their respective last supported releases. As of UC Software 3.3.0, the unsupported models include
Polycom UC Software in a Microsoft Lync Server Environment
Document Title Version DEPLOYMENT GUIDE June 2014 3725-49078-005 Rev A Polycom UC Software in a Microsoft Lync Server Environment Polycom, Inc. 1 Copyright 2014, Polycom, Inc. All rights reserved. No part
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
How To Use A Presence Desktop On A Pc Or Mac Or Ipad (For A Non-Profit) For Free
Help 3.3 December 2014 3725-69930-004/A Polycom RealPresence Desktop for Windows Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language
User Guide for the Polycom SoundStation IP 6000 Phone
User Guide for the Polycom SoundStation IP 6000 Phone UC Software 4.0.1 March 2012 1725-15645-001 Rev.F Trademark Information POLYCOM, the Polycom Triangles logo and the names and marks associated with
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
Zebra. Quick Start Guide. Wireless Configuration for 802.11n and Bluetooth Radios for. Link-OS Mobile Printers. P1048352-001 Rev.
Zebra Wireless Configuration for 802.11n and Bluetooth Radios for Link-OS Mobile Printers Quick Start Guide Table of Contents Proprietary Statement...2 Introduction...3 Applicable Printers...3 Utilities
RealPresence Resource Manager System
RELEASE NOTES 8.3.2 March 2015 3725-72100-001 Rev L2 RealPresence Resource Manager System Polycom, Inc. 1 Contents What s New in Release 8.3.2... 3 Release History... 3 Products Tested with this Release...
Technical Bulletin 18292
Adding a Custom Idle Display Logo to Polycom SoundPoint IP and SoundStation IP Phones This technical bulletin provides end users, system administrators, and service providers with step-by-step instructions
2010 MegaPath Inc. All rights reserved. Confidential and Proprietary 2
Polycom SIP Phones Base Configuration for MegaPath Duet Hosted Voice Service Contents Summary... 3 Configuration Settings Overview... 3 Restarting the Phone... 5 Rebooting the Phone... 6 Uploading Log
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
Configuring the Dolby Conference Phone with Cisco Unified Communications Manager
Configuring the Dolby Conference Phone with Cisco Unified Communications Manager Version 1.2 December 10, 2015 This product is protected by one or more patents in the United States and elsewhere. For more
SecureW2 Client for Windows User Guide. Version 3.1
SecureW2 Client for Windows User Guide Version 3.1 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright
User Guide for the Polycom SoundStation IP 6000 Phone
User Guide for the Polycom SoundStation IP 6000 Phone SIP 3.2 July, 2009 1725-15645-001 Rev. C Trademark Information POLYCOM, the Polycom Triangles logo and the names and marks associated with Polycom
VoIP Intercom and Cisco Call Manager Server Setup Guide
The IP Endpoint Company VoIP Intercom and Cisco Call Manager Server Setup Guide CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-201 F: 831-373-4193 www.cyberdata.net 2 1.0 Setup Diagram
Dialogic 4000 Media Gateway Series as a Survivable Branch Appliance for Microsoft Lync Server 2010
Dialogic 4000 Media Gateway Series as a Survivable Branch Appliance for Microsoft Lync Server 2010 Deployment Guide December 2011 64-1146-02 www.dialogic.com Copyright and Legal Notice Copyright 2011 Dialogic
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
ChangeAuditor 6.0. Web Client User Guide
ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
Security Advisory Relating to Multiple OpenSSL Vulnerabilities on Various Polycom Products.
SECURITY BULLETIN - Multiple CVEs Relating to OpenSSL Bulletin Version 1.2 Security Advisory Relating to Multiple OpenSSL Vulnerabilities on Various Polycom Products. DATE PUBLISHED: This information applies
Scan to E-mail Quick Setup Guide
Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
NF1Adv VOIP Setup Guide (for Generic VoIP Setup)
NF1Adv VOIP Setup Guide (for Generic VoIP Setup) Configuring your NF1Adv for VOIP Service The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer
vwlan External RADIUS 802.1x Authentication
6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)
Configuring a Windows 2003 Server for IAS
Configuring a Windows 2003 Server for IAS When setting up a Windows 2003 server to function as an IAS server for our demo environment we will need the server to serve several functions. First of all we
Polycom Unified Communications Deployment Guide for Cisco Environments
Polycom Unified Communications Deployment Guide for Cisco Environments Wave 5 March 2012 3725-00010-001G Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with
Thor VM1. Quick Start Guide. Vehicle-Mount Computer. with Microsoft Windows Embedded CE 6 or Windows Embedded Standard 2009 Operating System
Thor VM1 Vehicle-Mount Computer with Microsoft Windows Embedded CE 6 or Windows Embedded Standard 2009 Operating System Quick Start Guide VM1-QS Rev A 4/12 Setting up the Thor VM1 Please have the following
IP Talk Hosted VoIP Solutions Small Office/Home Office (SOHO) Setup Guide
IP Talk Hosted VoIP Solutions Small Office/Home Office (SOHO) Setup Guide 10.6.09 1 Table of Contents IP Talk Hosted VoIP Solutions... 1 Small Office/Home Office (SOHO) Setup Guide... 1 IP Talk SOHO Definition...
Chapter 1 Configuring Basic Connectivity
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
Dell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
MX7 Tecton. Quick Start Guide. Hand-Held Computer. With Microsoft Windows Embedded CE 6 or Windows Mobile 6.5 Operating System. TECTON-QS Rev A 4/12
MX7 Tecton Hand-Held Computer With Microsoft Windows Embedded CE 6 or Windows Mobile 6.5 Operating System Quick Start Guide TECTON-QS Rev A 4/12 Setting up the MX7 Tecton Please have the following Information
802.1X Client Software
802.1X Client Software REV1.0.0 1910011339 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product
FOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
NF1Adv VOIP Setup Guide (for Pennytel)
NF1Adv VOIP Setup Guide (for Pennytel) Configuring your NF1Adv for VOIP Service The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer Network
WHITEPAPER. February 2014 3725-77704-001A. RealPresence One. Product Definition and Licensing. Polycom, Inc. 0
WHITEPAPER February 2014 3725-77704-001A RealPresence One Product Definition and Licensing Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10
Pulse Policy Secure RADIUS Server Management Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved iii Pulse Secure, LLC 2700 Zanker Road,
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
Polycom Unified Communications in RealPresence Access Director System Environments
Solution Deployment Guide Version 4.0 June 2014 3725-78704-001D Polycom Unified Communications in RealPresence Access Director System Environments Copyright 2014, Polycom, Inc. All rights reserved. No
NetMotion Mobility XE
Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Certificate Management
www.novell.com/documentation Certificate Management ZENworks Mobile Management 3.1.x August 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Polycom SoundStructure VoIP Interface Hardware Installation Guide
Polycom SoundStructure VoIP Interface Hardware Installation Guide 0004F2BF001D Version 1.1 February 2012 1725-33216-001/C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks
Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents
Contents 4 Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager Contents Overview...................................................... 4-3 RADIUS Overview...........................................
