Avaya 3620 Series 설치 매뉴얼 - 페이지 15

{카테고리_이름} Avaya 3620 Series에 대한 설치 매뉴얼을 온라인으로 검색하거나 PDF를 다운로드하세요. Avaya 3620 Series 19 페이지. Wireless telephones
Avaya 3620 Series에 대해서도 마찬가지입니다: 빠른 참조 매뉴얼 (2 페이지)

Avaya 3620 Series 설치 매뉴얼
Installation Guide
authentication, Michael message integrity check (MIC) and Temporal Key Integrity Protocol (TKIP).
FSR not only addresses the roaming issue, but also provides strong security measures for
authentication, privacy and data integrity.

5.2 Using Virtual LANs

Virtual LANs (VLANs) can be used to segregate traffic into different security classes. By using
separate VLANs, data traffic can utilize the most robust but processing-intensive security methods.
The 802.1Q standard establishes a method for inserting VLAN membership information into Ethernet
frames via header-information tags. The AVPP and AWTS Open Application Interface do not generate
or forward these tags, but are otherwise compatible with 802.1Q tags up to the Ethernet switch ports
used for these componets.

5.3 MAC Filtering and Authentication

Most access points can be configured to allow or deny association of wireless clients based on their
unique MAC addresses, which can be used as a method of securing the wireless LAN. This process
generally works, but can cause some performance issues on some APs.

5.4 Firewalls and Traffic Filtering

The traffic filtering capabilities of firewalls, Ethernet switches and wireless switches can also be used
as an additional security layer if set up to allow only certain types of traffic to pass onto specific areas
of the LAN. To properly provide access control, it is necessary to understand the type of IP traffic used
by the Avaya wireless telephones including the ports used by the Avaya telephony switch interface
and SRP protocol ID 119.
The Avaya wireless telephones and AVPP use TCP and UDP and other common IP protocols from
time-to-time. These include DHCP, DNS, WINS, TFTP, FTP, NPT, Telnet, ARP and ICMP. Avaya
uses proprietary UDP channels between the infrastructure components that use UDP ports 5454 -
5458. The PTT mode of the Avaya 3626 and 3645 wireless telephones use the multicast IP address
224.0.1.116, which Avaya wireless telephones and infrastructure components also use to locate and
maintain each other.

5.5 Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) are secure, private network connections. VPNs typically employ some
combination of strong encryption, digital certificates, strong user authentication and access control to
provide maximum security to the traffic they carry. They usually provide connectivity to many devices
behind a VPN concentrator. The network can be broken into two portions - protected and unprotected:
1) The area behind the VPN server is referred to as the "protected" portion of the network. Sensitive,
private network equipment such as file servers, e-mail servers and databases reside in this
portion.
2) The area in front of the VPN server is referred to as the "unprotected" network, where the wireless
APs and less sensitive network equipment often reside.
VPNs offer an extremely effective method for securing a wireless network. Many network
administrators implement VPNs to maintain the integrity of their wireless LANs by requiring wireless
users who need access to the protected portion of the network to connect through a VPN Server.
Most voice devices, such as the Avaya wireless telephones, do not require access to the protected
portion of the network. Placing the Avaya wireless telephones, and AVPP on the unprotected network
and requiring data users to connect to the VPN ensures that the network is protected against hackers
seeking to access sensitive information within the network core.
Octiober 2008
15