Chapter 4 BCM50 Security Policies and Accounts and Privileges 121
BCM50 Administration Guide
• DHCP server
•Router
• Voice messaging
•LAN CTE
Security on Administration panels
•Alarms
• Alarm settings
• SNMP trap destinations
• Service manager
• Backup and Restore
• Logs
• Softwar e Management
Security on Applications panels
• Desktop Assistant
• DA Pro
• i2050 software phone
• Personal Call Manager
• LAN CTE Client
• CDR, BCM Monitor
•NCM
Secure network protocols and encryption
The BCM uses the following network protocols for Operation, Administration and Maintenance
(OAM) in a secured mode:
• CIM/XML is the main management protocol used by the BCM and is only available through
an authenticated and authorized SSL connection. User access is controlled, based on assigned
privilege levels.
• Multiple data transfer protocols are supported for the various applications including, SCP,
SAMBA, and FTP.
• SSH is used by customer support personnel for trou bleshooting purposes only. There are
special authentication parameters for this interface.