Chapter 23 - Ultra Secure Mode
Polycom, Inc. 23-45
Disabling 802.1x Authentication
Switching to http mode from https mode by inserting a USB key containing a file named
RestoreFactorySecurityDefaults.txt into the RTM-IP USB port disables 802.1x functionality
Ethernet Monitoring
802.1x Status is displayed in the Hardware Monitor - LAN List.
The following 802.1x Statuses are possible:
• Authenticated
• Not Configured
• Failed
The following 802.1x Failure reasons are possible:
802_1X_SKIP_CERTIFICATE_VAL
IDATION
If the flag value is:
• YES - The retrieved certificate is not validated against the
CA certificate.
• NO - The retrieved certificate is validated against the CA
certificate. Validation failure raises an Active Alarm and is
reported in the Ethernet Monitoring dialog box.
Range: YES, NO.
Default: YES.
802_1X_CRL_MODE If the flag value is:
• ENABLED - Forces CRL checking. The system fails the
connection request if the certificate has been revoked or
if there is no CRL.
• OPTIONAL - The system fails the connection request if
the certificate is revoked but does not fail the connection
request if there is no CRL.
• DISABLED - Does not check the CRL and does not fail
the connection request based on the CRL content.
Range: ENABLED, OPTIONAL, DISABLED
Default: DISABLED.
802_FIPS_MODE If the flag value is YES, the availability of the MD5
Authentication Protocol will neither be displayed as
selectable option nor supported.
Range: YES/NO.
Default: NO
Table 23-13 New Flags
Flag name Description