SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
APPLICATION NOTE – 21 
                                                                     
       Product: SETU ATA211, SETU ATA211G, SETU VGFX 
        
       Feature: PIN Authentication  
       Incoming calls on SETU ATA211, ATA211G and SETU VGFX can be authenticated before the call lands on 
       it.  Up  to  100  users  in  the  adaptors  and  500  users  in  SETU  VGFX  can  be  provided  with  user  IDs  and 
       passwords  for  such  authentication.  The  caller  has  to  first  prove  his  authentication.  Once  authenticated, 
       the caller can then place call to any of the extension or place an outgoing call using the GSM, SIP or FXO 
       trunk line. Such verification avoids the possibility of malicious calls and misuse of system resources. The 
       feature  can  be  selectively  enabled  on  all  or  a  set  of  trunks.  This  sort  of  authentication  is  called  PIN 
       Authentication. 
        
       How it Works? 
       Programing the PIN Authentication Table in the Web GUI, a user with PIN 121 places a calls the SIP trunk 
       1 of SETU ATA.  
        
       If the Authentication Type under the SIP Port parameters is programmed as “PIN Authentication”, the 
       caller will be prompted (by a routing tone) to enter a PIN. 
        
       When a caller enters the correct PIN, the call can either be routed to extension port or else the caller can 
       be given dial tone to place a call using the trunk lines. A dedicated trunk line can be given to the caller or 
       the call can be established using the routing logics in the Dial Plan. 




                                                                                                                         
       Benefit: 
              Selectively Grant Calling Rights to Users 
              Avoid Malicious Calls, Allow Calls only from Certified Users (Users with PIN)  
              Security Enhancement 
        

         Release                21st  January, 2011 
         Product Name           SETU ATA211, ATA211G and SETU VGFX


Due to continuous technology up­gradation, product specifications and features are subject to change without notice. 
Matrix Proprietary and Confidential 

Contenu connexe

Plus de Gateway Business Solutions

Plus de Gateway Business Solutions (19)

Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1
 
Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1
 
Matrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x seriesMatrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x series
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
 
Matrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificateMatrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificate
 
Matrix setu ata vs linksys spa3102
Matrix  setu ata vs linksys spa3102Matrix  setu ata vs linksys spa3102
Matrix setu ata vs linksys spa3102
 
Matrix setu ata vs_linksys_pap2_t
Matrix  setu ata vs_linksys_pap2_tMatrix  setu ata vs_linksys_pap2_t
Matrix setu ata vs_linksys_pap2_t
 
Matrix setu ata brochure
Matrix setu ata brochureMatrix setu ata brochure
Matrix setu ata brochure
 
Matrix pbx products catalogue
Matrix pbx products catalogueMatrix pbx products catalogue
Matrix pbx products catalogue
 
Matrix gateway products catalogue
Matrix gateway products catalogueMatrix gateway products catalogue
Matrix gateway products catalogue
 
Why Matrix
Why MatrixWhy Matrix
Why Matrix
 
Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
Matrix Cosec Presentation
Matrix Cosec PresentationMatrix Cosec Presentation
Matrix Cosec Presentation
 
Matrix Cosec Brochure
Matrix Cosec BrochureMatrix Cosec Brochure
Matrix Cosec Brochure
 
Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
 
MATRIX Cosec Introduction New
MATRIX Cosec Introduction NewMATRIX Cosec Introduction New
MATRIX Cosec Introduction New
 
MATRIX Biometrics Technology New
MATRIX Biometrics Technology NewMATRIX Biometrics Technology New
MATRIX Biometrics Technology New
 
MATRIX License Comparison
MATRIX License ComparisonMATRIX License Comparison
MATRIX License Comparison
 

Dernier

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Dernier (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Application note pin authentication

  • 1. APPLICATION NOTE – 21    Product: SETU ATA211, SETU ATA211G, SETU VGFX    Feature: PIN Authentication   Incoming calls on SETU ATA211, ATA211G and SETU VGFX can be authenticated before the call lands on  it.  Up  to  100  users  in  the  adaptors  and  500  users  in  SETU  VGFX  can  be  provided  with  user  IDs  and  passwords  for  such  authentication.  The  caller  has  to  first  prove  his  authentication.  Once  authenticated,  the caller can then place call to any of the extension or place an outgoing call using the GSM, SIP or FXO  trunk line. Such verification avoids the possibility of malicious calls and misuse of system resources. The  feature  can  be  selectively  enabled  on  all  or  a  set  of  trunks.  This  sort  of  authentication  is  called  PIN  Authentication.    How it Works?  Programing the PIN Authentication Table in the Web GUI, a user with PIN 121 places a calls the SIP trunk  1 of SETU ATA.     If the Authentication Type under the SIP Port parameters is programmed as “PIN Authentication”, the  caller will be prompted (by a routing tone) to enter a PIN.    When a caller enters the correct PIN, the call can either be routed to extension port or else the caller can  be given dial tone to place a call using the trunk lines. A dedicated trunk line can be given to the caller or  the call can be established using the routing logics in the Dial Plan.    Benefit:  Selectively Grant Calling Rights to Users  Avoid Malicious Calls, Allow Calls only from Certified Users (Users with PIN)   Security Enhancement    Release  21st  January, 2011  Product Name  SETU ATA211, ATA211G and SETU VGFX Due to continuous technology up­gradation, product specifications and features are subject to change without notice.  Matrix Proprietary and Confidential