User`s manual

Mediant 1000
H.323 User's Manual 8 Document #: LTRT-83401
11.5 Using Parameter Tables ......................................................................................303
11.5.1 Table Indices ........................................................................................................ 303
11.5.2 Table Permissions ................................................................................................ 304
11.5.3 Dynamic Tables vs. Static Tables ........................................................................ 304
11.5.4 Secret Tables........................................................................................................ 304
11.5.5 Using the ini File to Configure Parameter Tables................................................. 305
11.5.5.1 Structure of Parameter Tables in the ini File......................................... 305
11.6 Customizing the Mediant 1000 Web Interface .....................................................307
11.6.1 Replacing the Main Corporate Logo..................................................................... 307
11.6.1.1 Replacing the Main Corporate Logo with an Image File....................... 307
11.6.1.2 Replacing the Main Corporate Logo with a Text String ........................ 309
11.6.2 Replacing the Background Image File.................................................................. 309
11.6.3 Customizing the Product Name............................................................................ 310
11.6.4 Modifying ini File Parameters via the Web AdminPage ....................................... 311
11.7 Software Upgrade Key.........................................................................................312
11.7.1 Backing up the Current Software Upgrade Key ................................................... 312
11.7.2 Loading the Software Upgrade Key...................................................................... 312
11.7.3 Loading the Software Upgrade Key Using the Embedded Web Server............... 313
11.7.4 Loading the Software Upgrade Key using BootP/TFTP....................................... 314
11.7.5 Verifying that the Key was Successfully Loaded.................................................. 314
11.7.6 Troubleshooting an Unsuccessful Loading of a Key ............................................ 315
11.7.7 Abort Procedure.................................................................................................... 315
12 Special Applications .......................................................................................317
12.1 Metering Tones Relay..........................................................................................317
12.2 TDM Tunneling.....................................................................................................318
12.2.1 Implementation ..................................................................................................... 318
13 Security............................................................................................................321
13.1 IPSec and IKE......................................................................................................321
13.1.1 IKE ........................................................................................................................ 322
13.1.2 IPSec .................................................................................................................... 322
13.1.3 Configuring IPSec and IKE................................................................................... 323
13.1.3.1 IKE Configuration .................................................................................. 323
13.1.3.2 IPSec Configuration .............................................................................. 326
13.1.3.3 IPSec and IKE Configuration Table’s Confidentiality............................ 329
13.2 SSL/TLS...............................................................................................................330
13.2.1 Embedded Web Server Configuration.................................................................. 330
13.2.1.1 Using the Secured Embedded Web Server .......................................... 330
13.2.2 Secured Telnet ..................................................................................................... 330
13.2.3 Server Certificate Replacement............................................................................ 331
13.2.4 Client Certificates.................................................................................................. 332
13.3 RADIUS Login Authentication..............................................................................334
13.3.1 Setting Up a RADIUS Server................................................................................ 334
13.3.2 Configuring RADIUS Support ............................................................................... 335
13.4 Internal Firewall....................................................................................................337
13.5 Network Port Usage.............................................................................................339
13.6 Recommended Practices.....................................................................................340
13.7 Legal Notice .........................................................................................................340
14 Diagnostics......................................................................................................341
14.1 Self-Testing..........................................................................................................341
14.2 Mediant 1000 Line Testing...................................................................................342