
The RADIUS server is the authentication server and performs the actual authentication of the
supplicant. The following EAP methods are supported:
• EAP-MDS on page 224
•
EAP-TLS on page 224
• EAP-PEAP on page 224
The following options are available for the administrator:
• When EAP-MD5 is selected, the administrator is prompted to enter ID1 and Password
• When EAP-PEAP is selected, the administrator is prompted to enter ID1, ID2, and
Password. If the administrator enters only ID1, then ID2 contains same value of ID1.
• When EAP-TLS is selected, the administrator is prompted to enter ID1. If SCEP is used
to install the device certificate, the administrator is required to enter CA Server (URL of
the SCEP service), the Domain Name which the IP Deskphone belongs to and optionally
the Hostname.
• When Disabled mode is selected, the existing IDs and Passwords are erased.
Authorization
If 802.1x is configured and the IP Deskphone is physically connected to the network, the
IP Deskphone (supplicant) initiates 802.1x authentication by contacting the Layer 2/3 switch
(authenticator). The IP Deskphone also initiates 802.1x authentication after the Ethernet
connection (network interface only) is restored following a network link failure.
However, if the IP Deskphone resets, it assumes the Layer 2 link has remained in service and
is authenticated.
The IP Deskphone fails to authorize if the DeviceID and the IP Deskphone passwords do not
match the DeviceID and IP Deskphone passwords provisioned on the RADIUS Server. The
Layer 2 switch (authenticator) locks out the IP Deskphone and network access is denied. If
this happens during reauthorization, all phone services are lost. The connected PC operates
as normal.
Device ID
The Device ID is for use with the 802.1x (EAP) protocol. If the 802.1x (EAP) is not used, then
there is no prompt to enter the Device ID.
Authorization
SIP Software for Avaya 1200 Series IP Deskphones-Administration January 2012 103
Comentarios a estos manuales