SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
APPLICATION NOTE – 21 
                                                                     
       Product: SETU ATA211, SETU ATA211G, SETU VGFX 
        
       Feature: PIN Authentication  
       Incoming calls on SETU ATA211, ATA211G and SETU VGFX can be authenticated before the call lands on 
       it.  Up  to  100  users  in  the  adaptors  and  500  users  in  SETU  VGFX  can  be  provided  with  user  IDs  and 
       passwords  for  such  authentication.  The  caller  has  to  first  prove  his  authentication.  Once  authenticated, 
       the caller can then place call to any of the extension or place an outgoing call using the GSM, SIP or FXO 
       trunk line. Such verification avoids the possibility of malicious calls and misuse of system resources. The 
       feature  can  be  selectively  enabled  on  all  or  a  set  of  trunks.  This  sort  of  authentication  is  called  PIN 
       Authentication. 
        
       How it Works? 
       Programing the PIN Authentication Table in the Web GUI, a user with PIN 121 places a calls the SIP trunk 
       1 of SETU ATA.  
        
       If the Authentication Type under the SIP Port parameters is programmed as “PIN Authentication”, the 
       caller will be prompted (by a routing tone) to enter a PIN. 
        
       When a caller enters the correct PIN, the call can either be routed to extension port or else the caller can 
       be given dial tone to place a call using the trunk lines. A dedicated trunk line can be given to the caller or 
       the call can be established using the routing logics in the Dial Plan. 




                                                                                                                         
       Benefit: 
              Selectively Grant Calling Rights to Users 
              Avoid Malicious Calls, Allow Calls only from Certified Users (Users with PIN)  
              Security Enhancement 
        

         Release                21st  January, 2011 
         Product Name           SETU ATA211, ATA211G and SETU VGFX


Due to continuous technology up­gradation, product specifications and features are subject to change without notice. 
Matrix Proprietary and Confidential 

Contenu connexe

Plus de Gateway Business Solutions

Plus de Gateway Business Solutions (19)

Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1
 
Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1
 
Matrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x seriesMatrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x series
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
 
Matrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificateMatrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificate
 
Matrix setu ata vs linksys spa3102
Matrix  setu ata vs linksys spa3102Matrix  setu ata vs linksys spa3102
Matrix setu ata vs linksys spa3102
 
Matrix setu ata vs_linksys_pap2_t
Matrix  setu ata vs_linksys_pap2_tMatrix  setu ata vs_linksys_pap2_t
Matrix setu ata vs_linksys_pap2_t
 
Matrix setu ata brochure
Matrix setu ata brochureMatrix setu ata brochure
Matrix setu ata brochure
 
Matrix pbx products catalogue
Matrix pbx products catalogueMatrix pbx products catalogue
Matrix pbx products catalogue
 
Matrix gateway products catalogue
Matrix gateway products catalogueMatrix gateway products catalogue
Matrix gateway products catalogue
 
Why Matrix
Why MatrixWhy Matrix
Why Matrix
 
Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
Matrix Cosec Presentation
Matrix Cosec PresentationMatrix Cosec Presentation
Matrix Cosec Presentation
 
Matrix Cosec Brochure
Matrix Cosec BrochureMatrix Cosec Brochure
Matrix Cosec Brochure
 
Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
 
MATRIX Cosec Introduction New
MATRIX Cosec Introduction NewMATRIX Cosec Introduction New
MATRIX Cosec Introduction New
 
MATRIX Biometrics Technology New
MATRIX Biometrics Technology NewMATRIX Biometrics Technology New
MATRIX Biometrics Technology New
 
MATRIX License Comparison
MATRIX License ComparisonMATRIX License Comparison
MATRIX License Comparison
 

Dernier

Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdfPaige Cruz
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5DianaGray10
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 

Dernier (20)

Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 

Application note pin authentication

  • 1. APPLICATION NOTE – 21    Product: SETU ATA211, SETU ATA211G, SETU VGFX    Feature: PIN Authentication   Incoming calls on SETU ATA211, ATA211G and SETU VGFX can be authenticated before the call lands on  it.  Up  to  100  users  in  the  adaptors  and  500  users  in  SETU  VGFX  can  be  provided  with  user  IDs  and  passwords  for  such  authentication.  The  caller  has  to  first  prove  his  authentication.  Once  authenticated,  the caller can then place call to any of the extension or place an outgoing call using the GSM, SIP or FXO  trunk line. Such verification avoids the possibility of malicious calls and misuse of system resources. The  feature  can  be  selectively  enabled  on  all  or  a  set  of  trunks.  This  sort  of  authentication  is  called  PIN  Authentication.    How it Works?  Programing the PIN Authentication Table in the Web GUI, a user with PIN 121 places a calls the SIP trunk  1 of SETU ATA.     If the Authentication Type under the SIP Port parameters is programmed as “PIN Authentication”, the  caller will be prompted (by a routing tone) to enter a PIN.    When a caller enters the correct PIN, the call can either be routed to extension port or else the caller can  be given dial tone to place a call using the trunk lines. A dedicated trunk line can be given to the caller or  the call can be established using the routing logics in the Dial Plan.    Benefit:  Selectively Grant Calling Rights to Users  Avoid Malicious Calls, Allow Calls only from Certified Users (Users with PIN)   Security Enhancement    Release  21st  January, 2011  Product Name  SETU ATA211, ATA211G and SETU VGFX Due to continuous technology up­gradation, product specifications and features are subject to change without notice.  Matrix Proprietary and Confidential