ADAPTER unit is shipped from the factory, it contains a default common Profile and is considered
Unprovisioned. To save costs and expedite delivery, however, it is very desirable that an
e PHONE
from the provisioning server is very scalable and flexible. Using this provisioning method, a
TER units can be provisioned simultaneously and updated
domain name of the provisioning server to contact,
and b) a
specific su
the subsc
need to p
enter this
audio in
for the
shipped to
In addition e PHONE ADAPTER allows an interactive
mode o
(accesse
menu to c
may be
subscrib
A third m
tegral web server via a browser on a PC. The subscriber has the option to set and adjust
a an easy-to-use, password protected graphical user interface. This
ht be preferred by administrators who wish to access the PHONE
stitutional LAN or by the residential subscriber who is a “power
Unprovisioned unit can be shipped directly from the factory to the subscriber’s location without any
preprocessing by the Service Provider.
The PHONE ADAPTER contacts the Service Provider’s provisioning server via the IP network or
Internet when it is plugged into the subscriber’s home or business Local Area Network (LAN) –
assuming the provisioning server is reachable from the subscriber’s home network – to pull the
designated profile to be installed in that particular PHONE ADAPTER unit. Furthermore, th
ADAPTER unit will periodically contact the provisioning server to download an updated profile. The
protocol for downloading the configuration profile can be “clear text” TFTP or HTTP data or it can be
encrypted TFTP, HTTP or HTTPS data if security is required. Security will be discussed in more
details in a later section.
This type of autonomous remote provisioning, where the individual PHONE ADAPTER unit pulls the
profile
large number of PHONE ADAP
periodically.
However, some basic information must be provided to the PHONE ADAPTER before it can be
provisioned in this fashion: a) the IP address or
n ID and/or a password to send to the provisioning server such that it can associate it with a
bscriber and obtain the corresponding profile. This information can be sent out-of-band to
riber via secured email or in a letter inside a welcome kit, for example. The subscriber might
unch in some numbers using a telephone connected to the PHONE ADAPTER in order to
information into the unit. The PHONE ADAPTER provides an easy-to-use interface with
structions to make this initial configuration process as painless as possible. An alternative is
unit to be provisioned with this basic information by the Service Provider before the unit is
the subscriber.
to the batch mode of remote provisioning, th
f local provisioning. One way to offer this feature is through the use of an IVR system
d through an attached telephone set). The user can access a diagnostic or configuration
heck the status of the device or to change some of the settings. This method of provisioning
applied by an administrator when the device is at the Service Provider’s office, or by the
er under the guidance of trained personnel during over-the-phone troubleshooting.
ethod of entering provisioning information into the PHONE ADAPTER is by way of its
in
configuration parameters vi
method of provisioning mig
ADAPTER over a secure corporate/in
user.”
1.1.3. Security Overview Security may be applied at many levels in the context of the PHONE ADAPTER. The following are
examples of information that should be secured:
• The configuration profile pulled from the provisioning server – The downloading of the
profile should be secured since it contains authentication (password/user name ID /
number) information for accessing subscriber telephony services. It may also contain other
passwords and/or encryption keys used for a variety of management and service
operations.
• The administration password to the PHONE ADAPTER unit – The unit must disallow
access to administrative functions to unauthorized users. This access can be controlled
with an administrator password. The administrator password can be one of the parameters
in the PHONE ADAPTER configuration profile.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
10