Ultra Secure Mode

IEEE 802.1X Authentication

In compliance with UC APL requirements for enhanced security of wireless local area networks that follow the IEEE 802.11 standard, support for 802.1X Authentication has been included in this version.

802.1X Authentication requires that the RMX registers with a 802.1X Authentication Server and is supported on RMX 1500/2000/4000 The authentication protocol is applied to each the following Network Interface Controllers (NICs):

Management

Signaling

Media

For RMX 2000, Network Separation must be implemented before configuring 802.1X Authentication. 802.1X Authentication is not supported in Microsoft environments.

The following 802.1X Authentication methods are supported:

EAP-MD5

EAP-TLS

PEAPv0

MSCHAPv2

Certificate Repository

Implementation of 802.1X Authentication requires a certificate, which is obtained from the Certificate Repository.

Either one TLS certificate is retrieved for all IP services and their associated NICs,

If one certificate is retrieved for all NICs, the RMX will use the Management Certificate for all the NICs.

or

A TLS certificate for each IP service and their associated NICs is retrieved from the Certificate Repository:

If several different TLS certificates are retrieved, each NIC will use the certificate of the service that it is associated with.

In a system configured with Multiple Network Services each IP service will use its own certificate.

A NIC that does not have its own certificate will first attempt to use the Management Certificate before using a self-signed certificate.

Polycom®, Inc.

862

Page 893
Image 893
Polycom 1500/1800/2000/4000 manual Ieee 802.1X Authentication, Certificate Repository, PEAPv0 MSCHAPv2