Appendix
249
802.1x — an IEEE Standard for port-based Network Access Control (PNAC). It is a part of
the IEEE 802.1 group of networking protocols. It offers an authentication mechanism for
devices to connect to a LAN or WLAN.
ACD (Automatic Call Distribution) — used to distribute calls from large volumes of
incoming calls to the registered IP phone users.
ACS (Auto Configuration server) — responsible for auto-configuration of the Central
Processing Element (CPE).
Cryptographic Key — a piece of variable data that is fed as input into a cryptographic
algorithm to perform operations such as encryption and decryption, or signing and
verification.
DHCP (Dynamic Host Configuration Protocol) — built on a client-server model, where
designated DHCP server hosts allocate network addresses and deliver configuration
parameters to dynamically configured hosts.
DHCP Option — can be configured for specific values and enabled for assignment and
distribution to DHCP clients based on server, scope, class or client-specific levels.
DNS (Domain Name System) — a hierarchical distributed naming system for computers,
services, or any resource connected to the Internet or a private network.
EAP-MD5 (Extensible Authentication Protocol-
Message Digest Algorithm 5
) — only
provides authentication of the EAP peer to the EAP server but not mutual authentication.
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) — Provides for
mutual authentication, integrity-protected cipher suite negotiation between two
endpoints.
PEAP-MSCHAPV2 (Protected Extensible Authentication Protocol-Microsoft Challenge
Handshake Authentication Protocol Version 2) — Provides for mutual authentication, but
does not require a client certificate on the IP phone.
FAC (Feature Access Code) — special patterns of characters that are dialed from a
phone keypad to invoke particular features.
HTTP (Hypertext Transfer Protocol) — used to request and transmit data on the World
Wide Web.
HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) — a widely-used
communications protocol for secure communication over a network.
Summary of Contents for SIP-T4X
Page 1: ......
Page 10: ...Administrator s Guide for SIP T4X IP Phones x ...
Page 144: ...Administrator s Guide for SIP T4X IP Phones 128 ...
Page 212: ...Administrator s Guide for SIP T4X IP Phones 196 ...
Page 224: ...Administrator s Guide for SIP T4X IP Phones 208 ...
Page 240: ...Administrator s Guide for SIP T4X IP Phones 224 ...
Page 252: ...Administrator s Guide for SIP T4X IP Phones 236 ...
Page 264: ...Administrator s Guide for SIP T4X IP Phones 248 ...
Page 472: ...Administrator s Guide for SIP T4X IP Phones 456 ...