Avaya IP Office Phone IP Phone User Manual


 
Page 80 - Technical Specifications Technical Data
Page 80 - Technical Data IP Office Installation Manual
Technical Specifications 40DHB0002USCL – Issue 9 (28th October 2003)
Protocols
Protocol Information
A-Law - - - PCM encoding (mainly used outside N.America)
µ-Law
- - - PCM encoding (mainly used in N.America and Japan)
V.120 - - - A standard Rate Adaption mechanism.
V.110 - - - A standard Rate Adaption mechanism.
PPP RFC 1661 Point to Point Protocol.
LCP RFC 1570 Link Control Protocol.
MP RFC 1990 Multi-Link (Point to Point) Protocol.
PAP RFC 1334 Password Authentication Protocol.
CHAP RFC 1994 Challenge Handshake Authentication Protocol.
CCP RFC 1962 Compression Control Protocol.
STAC RFC 1974 Stac LZS Compression Protocol.
MPPC RFC 2118 Microsoft Point to Point Compression (Protocol).
BACP RFC 2125 Bandwidth Allocation Control Protocol.
IPCP RFC 1332 Internet protocol Control Protocol.
TCP/IP RFC 793 Transmission Control Protocol/Internet Protocol.
DHCP RFC 1533 Dynamic Host Control Protocol.
NAT RFC 1631 Network Address Translation.
BOOTP RFC 951 Bootstrap Protocol.
SNMPv1 RFC1157 (STD15)
RFC1155 (STD16)
RFC1212 (STD16)
RFC1215
Simple Network Management Protocol
Structure and Identification of Management Information for
TCP/IP-based internets
Concise MIB Definitions
A Convention for Defining Traps for use with the SNMP
MIB-II RFC1213 (STD17) Management Information Base for Network Management of
TCP/IP-based internets:MIB-II
RIP RFC1058
RFC2453
RFC1722 (STD57)
Routing Information Protocol
(STD56) RIP Version 2
RIP Version 2 Protocol Applicability Statement
IPSEC RFC2401
RFC2402
RFC2403
RFC2404
RFC2405
RFC2406
RFC2407
RFC2408
RFC2409
RFC2410
RFC2411
Security Architecture for the Internet Protocol
IP Authentication Header
The Use of HMAC-MD5-96 within ESP and AH
The Use of HMAC-SHA-1-96 within ESP and AH
The ESP DES-CBC Cipher Algorithm With Explicit IV
IP Encapsulating Security Payload (ESP)
The Internet IP Security Domain of Interpretation for ISAKMP.
Internet Security Association and Key Management Protocol
The Internet Key Exchange (IKE).
The NULL Encryption Algorithm and Its Use With IPsec.
IP Security Document Roadmap.
L2TP RFC2661
RFC3193
Layer Two Tunneling Protocol "L2TP"
Securing L2TP using IPsec
ENTITY MIB RFC2737 Entity MIB (Version 2)
TFTP RFC 1350 Trivial File Transfer Protocol
Internal Data Channels
Base
Unit
Max. No. of Internal Data Channels Max. No. of Internal Data Channels for
Voicemail
IP401 2 2
IP403 18 10
IP406 24 20
IP412 100 30