Cisco Codec C20 Reference Manual page 42

Telepresence system
Hide thumbs Also See for Codec C20:
Table of Contents

Advertisement

Cisco TelePresence System Codec C20
Contents
Introduction
xConfiguration Network [1..1] Ieee8021X UseClientCertificate
Authentication using a private key/certificate pair during an IEEE802.1x connection. The authentication
X.509 certificate must be uploaded to the video system.
Requires user role: ADMIN
Value space: <Off/On>
Off: When set to Off client-side authentication is not used (only server-side).
On: When set to On the client (video system) will perform a mutual authentication TLS handshake
with the server.
example: xConfiguration Network 1 IEEE8021X UseClientCertificate: Off
xConfiguration Network [1..1] Ieee8021X Identity
The 802.1X Identity is the user name needed for 802.1X authentication.
Requires user role: ADMIN
Value space: <S: 0, 64>
Format: String with a maximum of 64 characters.
example: xConfiguration Network 1 IEEE8021X Identity: ""
xConfiguration Network [1..1] Ieee8021X Password
The 802.1X Password is the password needed for 802.1X authentication.
Requires user role: ADMIN
Value space: <S: 0, 32>
Format: String with a maximum of 32 characters.
example: xConfiguration Network 1 IEEE8021X Password: ""
xConfiguration Network [1..1] Ieee8021X AnonymousIdentity
The 802.1X Anonymous ID string is to be used as unencrypted identity with EAP (Extensible Authentication
Protocol) types that support different tunneled identity, like EAP-PEAP and EAP-TTLS. If set, the anony-
mous ID will be used for the initial (unencrypted) EAP Identity Request.
Requires user role: ADMIN
Value space: <S: 0, 64>
Format: String with a maximum of 64 characters.
example: xConfiguration Network 1 IEEE8021X AnonymousIdentity: ""
Codec C20 API Reference Guide TC6.0 February 2013.
D14869.05
About the API
xConfiguration
xConfiguration
xConfiguration Network [1..1] Ieee8021X eap Md5
xConfiguration Network [1..1] Ieee8021X eap Ttls
xConfiguration Network [1..1] Ieee8021X eap Tls
xConfiguration Network [1..1] Ieee8021X eap Peap
42
xCommand
Set the Md5 (Message-Digest Algorithm 5) mode. This is a Challenge Handshake Authentication Protocol
that relies on a shared secret. Md5 is a Weak security.
Requires user role: ADMIN
Value space: <Off/On>
Off: The EAP-MD5 protocol is disabled.
On: The EAP-MD5 protocol is enabled (default).
example: xConfiguration Network 1 IEEE8021X Eap Md5: On
Set the TTLS (Tunneled Transport Layer Security) mode. Authenticates LAN clients without the need
for client certificates. Developed by Funk Software and Certicom. Usually supported by Agere Systems,
Proxim and Avaya.
Requires user role: ADMIN
Value space: <Off/On>
Off: The EAP-TTLS protocol is disabled.
On: The EAP-TTLS protocol is enabled (default).
example: xConfiguration Network 1 IEEE8021X Eap Ttls: On
Enable or disable the use of EAP-TLS (Transport Layer Security) for IEEE802.1x connections. The EAP-TLS
protocol, defined in RFC5216, is considered one of the most secure EAP standards. LAN clients are
authenticated using client certificates.
Requires user role: ADMIN
Value space: <Off/On>
Off: The EAP-TLS protocol is disabled.
On: The EAP-TLS protocol is enabled (default).
example: xConfiguration Network 1 IEEE8021X Eap Tls: On
Set the Peap (Protected Extensible Authentication Protocol) mode. Authenticates LAN clients without
the need for client certificates. Developed by Microsoft, Cisco and RSA Security.
Requires user role: ADMIN
Value space: <Off/On>
Off: The EAP-PEAP protocol is disabled.
On: The EAP-PEAP protocol is enabled (default).
example: xConfiguration Network 1 IEEE8021X Eap Peap: On
API Reference Guide
xStatus
Appendices
Copyright © 2010–2013 Cisco Systems, Inc. All rights reserved.

Advertisement

Table of Contents
loading

Table of Contents