Am Server Deployment Guide For Remote Workers 8AL90345ENAA 11a en
Am Server Deployment Guide For Remote Workers 8AL90345ENAA 11a en
Deskphones
October 2021
Disclaimer
While efforts were made to verify the completeness and accuracy of the information contained in this
documentation, this document is provided “as is”. To get more accurate content concerning Cross
Compatibilities, Product Limits, Software Policy and Feature Lists, please refer to the accurate documents
published on MyPortal.
In the interest of continued product development, ALE International reserves the right to make
improvements to this documentation and the products it describes at any time, without notice or
obligation.
The CE mark indicates that this product conforms to the following Council Directives:
• 2014/53/EU for radio equipment
• 2014/35/EU and 2014/30/EU for non-radio equipment (including wired Telecom Terminal Equipment)
• 2014/34/EU for ATEX equipment
• 2011/65/EU (RoHS)
• 2012/19/EU (WEEE)
Table of
contents
Server deployment guide for remote
workers using deskphones
1 General .................................................................................. 7
1.1 Overview ............................................................................................................. 7
1.2 Terminology ....................................................................................................... 7
1.2.1 Glossary ............................................................................................................. 7
1.2.2 Graphical conventions ........................................................................................ 8
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 3/170
Table of
contents
Server deployment guide for remote
workers using deskphones
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 4/170
Table of
contents
Server deployment guide for remote
workers using deskphones
3.4.2 Generating certificate files for the OpenVPN server and 8001 DeskPhone ... 118
3.4.3 Setting the Open VPN server configuration.................................................... 120
3.4.4 Loading the client’s certificates and configuration file to local PC .................. 121
3.4.5 Configuring routing ......................................................................................... 121
3.4.6 Enabling the Open VPN service ..................................................................... 121
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 5/170
Table of
contents
Server deployment guide for remote
workers using deskphones
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 6/170
Chapter
1 1 General
1.1 Overview
When remote workers move outside the company (off-site), they can use ALE International IP deskphones
and have the same level of service as local users on the company LAN.
Secure connections must be established between the remote worker’s deskphone and the corresponding
communication system. The remote worker feature is terminal-oriented and not related to a communication
system. It is introduced with OXO Connect R2.1 but there is no dependency with communication systems.
The remote worker’s deskphone can connect to the company LAN either:
- Over a VPN connection established through either an IPsec VPN or OPEN VPN server
All ALE International IP deskphones use IPsec VPN, except for the 8001 Deskphone, which uses
OPEN VPN.
- Via a secured network infrastructure including:
• A Reverse Proxy used to secure all data communications (device management) through HTTPS
connections
• A Session Border Controller used to secure voice communications through SIP/TLS signaling
and SRTP flows
1.2 Terminology
1.2.1 Glossary
DH : Diffie-Hellman. Key exchange method
DMZ : Demilitarized zone
DNAT : Destination NAT
ESP : Encapsulating Security Payload
FW : Firewall
IKE : Internet Key Exchange
IPsec : Internet Protocol Security
NAT : Network Address Translation
NAPT : Also PAT, NATP, Masquerading, Overloading. Many-to-one NAT based on outgoing port.
NAT-T : Nat Traversal, UDP encapsulation of IPsec packets
PSK : Pre-shared key
RP : Reverse Proxy
RSC : Remote Service Center
SBC : Session Border Controller
SNAT : Source NAT
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 7/170
Chapter 1 General
Access gateway
IP Router
Communication system
VPN server
Workstation
Firewall
Deskphone
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 8/170
Chapter
IPsec VPN
2.1 Overview
The VPN server offers secure connections between the communication systems and a remote worker with
ALE IP phones by providing confidentiality, integrity and authentication, based on the IPsec protocol.
2.2 Architecture
The network reference architecture is the following:
Remote worker 1
Corporate LAN
VPN client
Access router/Box
OXO
Remote worker 2
VPN
- The VPN tunnels are established between the VPN server and remote worker’s phones. There are as
many tunnels as remote workers connected on the communication system.
- Remote workers are always communication system users; it is not possible to connect external users
via VPN.
- A tunnel can be used only by one remote worker. In case there are several remote workers connected
on a single LAN in the same physical premise, then each remote worker has his own VPN.
- A workstation connected on the PC connector of the phone only has access to the remote worker’s
LAN, workstation IP traffic is never tunneled.
- IP Traffic between two distinct remote workers: both remote worker phones have a NOE signaling link
established with the communication system in the corporate LAN. VoIP media traffic between two
remote workers is not managed by the communication system. The VPN gateway directly forwards
media traffic from one VPN to the second VPN, and must be configured to do so.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 9/170
Chapter 2 Remote worker deployment using IPsec VPN
The VPN configuration requests PSK, User login and User Password.
These are defined by the VPN server administrator, but must be entered on the phone’s keyboard, which
leads to limitations.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 10/170
Chapter 2 Remote worker deployment using IPsec VPN
The available characters depend on the phone model (with or without mini keyboard), and the field to
complete:
2.4.1.4 Router
A specific routing policy is required to route all IP traffic between the corporate LAN and remote workers.
This route policy allows the remote worker device to reach all IP devices connected on the LAN and vice-
versa. Specific routes must therefore be setup on all LAN routers to force remote workers IP traffic to be
forwarded by the VPN server on corporate the LAN, in order to reach the communication system or any
other ALE IP phone.
All remote IP phones get an IP address from the VPN server. These addresses are configured as a range
of IP addresses (typically a dedicated IP subnet in the corporate LAN). This subnet must be routed to VPN
server in corporate LAN.
Corporate LAN VPN IP traffic routing policy:
- A default router must be specified in the communication system, so that all VPN IP traffic (with
destination IP address inside VPN IP range) are sent to default router.
- A specific route must be set up on the default router to forward VPN IP traffic to the VPN server.
- The VPN server automatically forwards IP traffic to the corresponding VPN tunnel based on
destination IP address.
Configuring a routing policy can be more complicated when the communication system and ALE IP phones
are connected to several IP subnets on the corporate LAN. Configuring routing policy on each router is then
required. Dynamic IP routing activation can be an alternative.
An alternative solution for a basic network topology could be to use the VPN gateway as communication
system default gateway. However, this is not recommended since the VPN gateway must then route all
non-local communication system IP traffic.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 11/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 12/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 13/170
2.5 Configuration in a nutshell
The addresses used in this figure are provided as examples only.
Global topology:
Corporate LAN
172.25.17.210
Public IP of Remote worker
Access router
OX 82.125.10.46 83.100.1.10
O
VPN server / Firewall
Communication system Virtual @
10.100.1.1
172.25.17.209 172.25.17.211 10.0.0.1 Access router INTERNET Local @
Lan Wan 192.168.0.1 192.168.0.100
Router
Add route
10.100.1.0/255.255.255.0 Ports
To 172.25.17.211 500 & 4500
PHONE 1
forwarding Box/Router
Virtual adresses required
(VPN): to 10.0.0.1
Phone1 10.100.1.1
172.25.17.212 Phone2 10.100.1.2
Phone3 …
DHCP
preferred
Different sub-network ! Manual entry :
• VPN server @
82.125.10.46
• Communication Server
Deployment must be done in order to avoid any change in the remote worker’s access router settings. TFTP @
172.25.17.210
In consequence, the virtual addresses defined in the VPN server for the phones must be different from the • PSK
common addresses used in the home access router or box • Login
• Password
(credentials declared in VPN
server)
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 14/170
In the remote location, use dynamic IP address setting, which is much simpler for the end user. The phones coming out of the box are configured to get IP through
DHCP. So this is straightforward installation.
Static IP is also possible from phone perspective. In this case, select a free IP address for static IP. This IP address must not be included in the IP address range
allocated by DHCP.
Corporate LAN
INCOMING PACKETS ROUTE
172.25.17.210
Remote worker
OXO
Box/Router PHONE 1
VPN
Signaling
Media
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 15/170
Corporate LAN
OUTGOING PACKETS ROUTE
172.25.17.210
Remote worker
Packet to
10.100.1.1
OXO
Box/Router PHONE 1
Packet to
10.100.1.1
172.25.17.212
VPN
Signaling
Media
The outgoing packets have a destination address out of the LAN, so they are sent to the default gateway (router) which sends them to the VPN server address
(here 172.25.17.211).
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 16/170
2.6 System configuration
For OmniPCX Enterprise: use menu 8 (‘Routing’) from the netadmin -m command
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 17/170
Chapter 2 Remote worker deployment using IPsec VPN
Phase 2:
set proposal aes256-sha256
set dhgrp 16 14 5
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 18/170
Chapter 2 Remote worker deployment using IPsec VPN
The security parameters values authorized on the VPN server, which match with the phones capability are:
- Phase 1 encryption algorithms : aes256.
- Phase 1 hash algorithms : sha256.
- Phase 1 dh group : 5, 14, 16,
- Phase 2 encryption algorithm : aes256.
- Phase 2 authentication algorithms : sha256.
- Phase 2 dh group : 5, 14, 16
2.7.2.2 Internationalization/localization
The country where the VPN server and the client are deployed might impose some restrictions on the cipher
used (algorithm, key length).
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 19/170
Chapter 2 Remote worker deployment using IPsec VPN
Notes:
(1) Diffie-Hellmann Group: Configured on client side
a) If noted with / (ex: 2/5/14), means only one of them can be selected a time: exclusive.
b) A notation with comma (ex: 5,14,16) means all of them can be selected for the negotiation.
Depending on the VPN client, there is or not access to these parameters.
(2) A string can be entered on both sides (server and phone) with constraints given in chap. 2.4.1.2
Certificate/Signature
IKEv1 IKEv2
Phone Type Phase DH Encrypt/Hash/PFS Peer- CA DH Encrypt/Hash/PFS Peer- CA Certs
Group ID Certs Group ID
8008/8018/ P1
80x8s
ALE-
20/20h/30h P2
/300/400/500
8088 Native P1
Client P2
8088 P1
FortiClient P2
8088 P1 2,5,14,16 DES/3DES/AES128/AES192/AES256 CN of CA
StronSwan MD5/SHA1/SHA256/SHA384/SHA512 Server certificate
Cert of Server
Cert
P2 2,5,14,16 DES/3DES/AES128/AES192/AES256 CN of CA
MD5/SHA1/SHA256/SHA384/SHA512 Server certificate
PFS enable/disable Cert of Server
Cert
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 20/170
Chapter 2 Remote worker deployment using IPsec VPN
2.8.1 Characteristics
Fortigate VPN server hardware: Fortigate 30E
This reference design applies to the firmware FortiOS 5.4.5.
There are some changes from FortiOS 5.6.0, which impact the server configuration. Some related hint
during configuration is described in the chapters below.
You can now connect to the Web Based Management (WBM) using a web browser (for example: Firefox or
Chrome) and entering the following URL: https://172.25.17.211/ (Fortigate LAN IP address)
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 21/170
Chapter 2 Remote worker deployment using IPsec VPN
Log in with admin account and password (by default, the password is empty) to access all configurable
settings.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 22/170
Chapter 2 Remote worker deployment using IPsec VPN
1: Enter the VPN user name and password and click Next
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 23/170
Chapter 2 Remote worker deployment using IPsec VPN
Click Create
2: Add members
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 24/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 25/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 26/170
Chapter 2 Remote worker deployment using IPsec VPN
1 : Go to Network
2 : Go to DNS
3 : Select Specify tab
4 & 5 : Fill with a specific DNS server present on the LAN network.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 27/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 28/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 29/170
Chapter 2 Remote worker deployment using IPsec VPN
(*): From FortiOS 5.6.0, the option Peer ID from dialup group is no more supported. The option Any Peer
ID can be used.
Important:
If the Peer ID from dialup group is configured, while the FortiOS version is less than 5.6, and the FortiOS
must be upgraded to 5.6.x or later, please set the Peer Options to Any peer ID before upgrading,
otherwise the related IPSec tunnel will be lost after upgrade. If it is the case, the administrator will need to
manually add it after upgrade.
Another option is to specify a specific PEER-ID. This is possible in the phones from version 5.45.40. See
on chapter 2.12.1.5 for the phone configuration.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 30/170
Chapter 2 Remote worker deployment using IPsec VPN
The option Specific peer ID must be selected and then enter the string value chosen.
1: Select AES256 in the Encryption field, and SHA256 in the Authentication field
2: In the Diffie-Hellman Groups field, select the following check boxes: 5, 14, and 16
3: Phase 1 SA Key Lifetime must be set longer than 1,5 hours (example: 3H)
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 31/170
Chapter 2 Remote worker deployment using IPsec VPN
Due to implementation reason of IPSec client in terminal side, the Phase1 SA Key Lifetime must be set to
longer than 1.5 hour.
Attention: if the Key lifetime is misconfigured in fortigate server, this will result in periodic
connection loss of the tunnel.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 32/170
Chapter 2 Remote worker deployment using IPsec VPN
Due to implementation reason of IPSec client in terminal side, the Phase2 SA Key Lifetime must be set
to longer than 0.5 hour.
Attention: if the Key lifetime is misconfigured in Fortigate server, this will result in periodic
connection loss of the tunnel.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 33/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 34/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 35/170
Chapter 2 Remote worker deployment using IPsec VPN
Attention: When two phones behind two tunnels on the same VPN server need to communicate
together, two IPv4 policy rules must be created, including the two related VPN interfaces, in order
to avoid any white communication (no audio). Each rule will enable the bridge from one tunnel to
the other.
For example, consider we have configured 2 VPN tunnels on same fortigate: RemoteUsers and
Remote8088
2 policies should be added as shown below if the administrator wants the two remote workers
behind these two tunnels to call each other.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 36/170
Chapter 2 Remote worker deployment using IPsec VPN
2.8.2.2 Server configuration using the Command Line and Configuration file
Administrator can also configure the VPN through FORTIGATE 30E Command Line Interface (CLI) instead
of Web Based Management (WBM).
The template contains all CLI commands required to configure a Fortigates “out of the box”.
The yellow-highlighted items must be customized to suit to your configuration.
To select the CLI commands on the left only: press Alt and select.
config user local
edit "user1"
set type password
set email-to "[email protected]"
set passwd 1245
next
edit "user2" Create a user for each remote worker
set type password
set passwd 6789
next
end
edit "wan"
set vdom "root"
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 37/170
Chapter 2 Remote worker deployment using IPsec VPN
edit "Local_wan"
set associated-interface "wan"
set subnet 10.0.0.0 255.255.255.0
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 38/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 39/170
Chapter 2 Remote worker deployment using IPsec VPN
set dhgrp 16 14 5
set replay enable
set keepalive disable
set add-route phase1
set auto-discovery-sender phase1
set auto-discovery-forwarder phase1
set keylife-type seconds
set single-source disable
set route-overlap use-new
set encapsulation tunnel-mode
set comments "VPN: RemoteUsers"
set protocol 0
set src-addr-type subnet
set src-port 0
set dst-addr-type subnet
set dst-port 0
set keylifeseconds 43200
set src-subnet 0.0.0.0 0.0.0.0
set dst-subnet 0.0.0.0 0.0.0.0
next
end
edit 3
set name "RemoteUsers_to_RemoteUsers" Allow traffic between remote workers
set srcintf "RemoteUsers"
set dstintf "RemoteUsers"
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 40/170
Chapter 2 Remote worker deployment using IPsec VPN
2.8.3.2 Server configuration using the Command Line and Configuration file
Administrator can also configure the VPN through FORTIGATE 30E Command Line Interface (CLI) instead
of Web Based Management (WBM).
The template contains all CLI commands required to configure a Fortigates “out of the box”.
The yellow-highlighted items must be customized to suit to your configuration.
To select the CLI commands on the left only: press Alt and select.
config user local
edit "user1"
set type password
set email-to "[email protected]"
set passwd 1245 Create a user for each remote worker
next
edit "user2"
set type password
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 41/170
Chapter 2 Remote worker deployment using IPsec VPN
edit "wan"
set vdom "root" Configure WAN interface
set mode static
set ip 10.0.0.1 255.255.255.0
set allowaccess ping https ssh
set type physical
set role wan
next
end
edit "Local_wan"
set associated-interface "wan"
set subnet 10.0.0.0 255.255.255.0
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 42/170
Chapter 2 Remote worker deployment using IPsec VPN
edit "RemoteUsers"
set type dynamic
set interface "wan"
set ip-version 4
set ike-version 1
set local-gw 0.0.0.0
set keylife 10800
set authmethod psk
set mode aggressive
set peertype any
set mode-cfg enable
set ipv4-wins-server1 0.0.0.0
set ipv4-wins-server2 0.0.0.0
set proposal aes256-sha256
set add-route enable
set exchange-interface-ip disable
set localid ''
set localid-type auto
set negotiate-timeout 30
set fragmentation enable
set dpd on-demand
set forticlient-enforcement disable
set comments "VPN: RemoteUsers"
set npu-offload enable
set dhgrp 16 14 5
set suite-b disable
set wizard-type custom
set xauthtype auto
set reauth disable
set authusrgrp "remote_phones"
set idle-timeout disable
set ha-sync-esp-seqno enable
set auto-discovery-sender disable
set auto-discovery-receiver disable
set auto-discovery-forwarder disable
set nattraversal enable
set default-gw 0.0.0.0
set default-gw-priority 0
set assign-ip enable
set assign-ip-from range
set ipv4-start-ip 10.100.1.1
set ipv4-end-ip 10.100.1.100
set ipv4-netmask 255.255.255.0
set dns-mode auto
set ipv4-split-include ''
set split-include-service ''
set ipv6-start-ip ::
set ipv6-end-ip ::
set ipv6-prefix 128
set ipv6-split-include ''
set unity-support disable Pre-shared key must be strong enough and
set psksecret 123456789 must be kept secret.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 43/170
Chapter 2 Remote worker deployment using IPsec VPN
set distance 15
set priority 0
set dpd-retrycount 3
set dpd-retryinterval 20
next
end
edit 2
set name "LAN_to_RemoteUsers" Allow outgoing traffic (corporate LAN to
set srcintf "lan" remote users)
set dstintf "RemoteUsers"
set srcaddr "all"
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 44/170
Chapter 2 Remote worker deployment using IPsec VPN
edit 3
set name "RemoteUsers_to_RemoteUsers"
Allow traffic between remote workers
set srcintf "RemoteUsers"
set dstintf "RemoteUsers"
set srcaddr "IPRemoteUsers_range"
set dstaddr "IPRemoteUsers_range"
set action accept
set schedule "always"
set service "ALL"
set nat disable
next
end
To enable EAP MSCHAPv2 authentication, launch the CLI console and add the following commands:
set eap enable
set eap-identity send-request
set authusrgrp “remote_phones”
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 45/170
Chapter 2 Remote worker deployment using IPsec VPN
2.8.4.2 Server configuration using the Command Line and Configuration file
Administrator can also configure the VPN through FORTIGATE 30E Command Line Interface (CLI) instead
of Web Based Management (WBM).
The template contains all CLI commands required to configure a Fortigates “out of the box”.
The yellow-highlighted items must be customized to suit to your configuration.
To select the CLI commands on the left only: press Alt and select.
config user local
edit "user1"
set type password
set email-to "[email protected]"
set passwd 1245
next
Create a user for each remote
edit "user2"
worker
set type password
set passwd 6789
next
end
edit "wan"
set vdom "root" Configure WAN interface
set mode static
set ip 10.0.0.1 255.255.255.0
set allowaccess ping https ssh
set type physical
set role wan
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 46/170
Chapter 2 Remote worker deployment using IPsec VPN
edit "Local_wan"
set associated-interface "wan"
set subnet 10.0.0.0 255.255.255.0
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 47/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 48/170
Chapter 2 Remote worker deployment using IPsec VPN
end
edit 2
set name "LAN_to_RemoteUsers" Allow outgoing traffic (corporate
set srcintf "lan" LAN to remote users)
set dstintf "RemoteUsers"
set srcaddr "all"
set dstaddr "IPRemoteUsers_range"
set action accept
set schedule "always"
set service "ALL"
set nat disable
next
edit 3
set name "RemoteUsers_to_RemoteUsers" Allow traffic between remote
set srcintf "RemoteUsers" workers
set dstintf "RemoteUsers"
set srcaddr "IPRemoteUsers_range"
set dstaddr "IPRemoteUsers_range"
set action accept
set schedule "always"
set service "ALL"
set nat disable
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 49/170
Chapter 2 Remote worker deployment using IPsec VPN
To enable EAP MSCHAPv2 authentication, launch CLI console and add commands:
set eap enable
set eap-identity send-request
set authusrgrp “remote_phones”
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 50/170
Chapter 2 Remote worker deployment using IPsec VPN
2.8.5.5 Server configuration using the Command Line and Configuration file
Administrator can also configure the VPN through FORTIGATE 30E Command Line Interface (CLI) instead
of Web Based Management (WBM).
The template contains all CLI commands required to configure a Fortigates “out of the box”.
The yellow-highlighted items must be customized to suit to your configuration.
To select the CLI commands on the left only: press Alt and select.
config user local
edit “user1”
set type password
set email-to “[email protected]”
set passwd 1245
next
edit “user2”
set type password
set passwd 6789
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 51/170
Chapter 2 Remote worker deployment using IPsec VPN
edit “lan”
set vdom “root”
set ip 172.25.17.211 255.255.255.240
set allowaccess ping https ssh
set type hard-switch
set role lan
next
edit “wan”
set vdom “root”
set mode static
set ip 10.0.0.1 255.255.255.0
set allowaccess ping https ssh
set type physical
set role wan
next
end
edit “Local_wan”
set associated-interface “wan”
set subnet 10.0.0.0 255.255.255.0
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 52/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 53/170
Chapter 2 Remote worker deployment using IPsec VPN
edit 2
set name “LAN_to_RemoteUsers”
set srcintf “lan”
set dstintf “RemoteUsers”
set srcaddr “all”
set dstaddr “IPRemoteUsers_range”
set action accept
set schedule “always”
set service “ALL”
set nat disable
next
edit 3
set name “RemoteUsers_to_RemoteUsers”
set srcintf “RemoteUsers”
set dstintf “RemoteUsers”
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 54/170
Chapter 2 Remote worker deployment using IPsec VPN
2.9.1 Characteristics
2.9.1.1 Hardware aspects
Supported Fortigate VPN server hardware: Fortigate 30D / 50D / 60D
Latest Fortigate hardware 50E /60E should also be supported (not tested yet).
High-end Fortigate gateways (Eg: 300/1000) are also compatible but these models are usually not deployed
in SMBs.
2.9.3 Server configuration using the Command Line and Configuration file
The template contains all CLI commands required to configure a Fortigate “out of the box”.
The yellow-highlighted items must be customized to suit to your configuration.
To select the CLI commands on the left only: press Alt and select.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 55/170
Chapter 2 Remote worker deployment using IPsec VPN
next
end
edit "wan1"
set vdom "root"
set mode static
set ip 10.0.0.1 255.255.255.0
set allowaccess ping https ssh Configure WAN interface
set type physical
set role wan
next
end
edit "Local_WAN1"
set associated-interface "wan1"
set subnet 10.0.0.0 255.255.255.0
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 56/170
Chapter 2 Remote worker deployment using IPsec VPN
edit "OXOremUsers"
set type dynamic
set interface "wan1"
set ip-version 4
set ike-version 1
set local-gw 0.0.0.0
set keylife 10800
set authmethod psk
set mode main
set peertype dialup
set mode-cfg enable
set ipv4-wins-server1 0.0.0.0
set ipv4-wins-server2 0.0.0.0
set proposal aes256-sha256
set add-route enable
set exchange-interface-ip disable
set localid ''
set localid-type auto
set negotiate-timeout 30
set fragmentation enable
set dpd on-demand
set forticlient-enforcement disable
set comments "VPN: OXOremUsers"
set npu-offload enable
set dhgrp 16 14 5
set suite-b disable
set wizard-type custom
set xauthtype auto
set reauth disable
set authusrgrp "remote_phones"
set usrgrp "remote_phones"
set idle-timeout disable
set ha-sync-esp-seqno enable
set auto-discovery-sender disable
set auto-discovery-receiver disable
set auto-discovery-forwarder disable
set nattraversal enable
set default-gw 0.0.0.0
set default-gw-priority 0
set assign-ip enable
set assign-ip-from range
set ipv4-start-ip 10.100.1.1
set ipv4-end-ip 10.100.1.49
set ipv4-netmask 255.255.255.0
set dns-mode auto
set ipv4-split-include ''
set split-include-service ''
set ipv6-start-ip::
set ipv6-end-ip::
set ipv6-prefix 128
set ipv6-split-include ''
set unity-support disable
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 57/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 58/170
Chapter 2 Remote worker deployment using IPsec VPN
edit 2
set name "LAN_to_RemUsers"
set srcintf "internal"
set dstintf "OXOremUsers" Allow outgoing traffic (corporate
set srcaddr "all" LAN to remote users)
set dstaddr "OXOremUsers_range"
set action accept
set schedule "always"
set service "ALL"
set nat disable
next
edit 3
set name "RemUsers_to_RemUsers"
set srcintf "OXOremUsers"
set dstintf "OXOremUsers"
set srcaddr "OXOremUsers_range"
set dstaddr "OXOremUsers_range"
set action accept Allow traffic between remote
set schedule "always" workers
set service "ALL"
set nat disable
next
end
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 59/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 60/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 61/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 62/170
Chapter 2 Remote worker deployment using IPsec VPN
5. Set the SA life Time field to at least 5400 seconds (see remark below)
6. Create an AES256/SHA256 proposal
7. In the Diffie-Hellman Groups field, select one of the following options: 5, 14, or 16
8. Enable the XAuth (extended authentication) and allow ANY user (All previously declared users can
connect)
Due to the implementation of IPSec client in the terminal, the Phase1 SA Key Lifetime must be set to more
than 1.5 hour.
Attention: if the Key lifetime is misconfigured in Zyxel server, this will result in periodic connection
loss of the tunnel.
If the phones still reset after about 1 hour, consider using static Virtual IP option (see chapter 2.12.1.3).
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 63/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 64/170
Chapter 2 Remote worker deployment using IPsec VPN
1. Go to: Configuration > VPN > IPSec VPN > VPN Connection
2. Define the VPN connection name (“Poste_IP” in the example), and enable the connection
3. Select the Server Role in the Application Scenario field
4. Select the previously defined VPN Gateway (“Poste-IP” for WAN1 in the example)
5. Define the local policy as applying on the group named (“VPN-POOL-TEST” in the example)
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 65/170
Chapter 2 Remote worker deployment using IPsec VPN
Caution: if you go for static Virtual IP in the phone, the configuration of the server depends on the server
firmware version:
• For Zyxel FW <= V4.30, you can use the settings described above.
• For Zyxel FW >= V4.38, you must disable the “MODE CONFIG” in order to have connection success.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 66/170
Chapter 2 Remote worker deployment using IPsec VPN
2.10.2 Server configuration using the Command Line and Configuration file
Administrator can also configure the VPN through the Zyxel USG40 Command Line Interface (CLI) instead
of the Web Configurator.
This is not described in this document. Please refer to the reference manual of the USG40.
2.11.1 Troubleshooting
In case of problems to establish a tunnel, it might be necessary to check the logs on the VPN server, to
identify the phase of the tunnel establishment in which the problem occurs (IKE phase1 or phase2).
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 67/170
Chapter 2 Remote worker deployment using IPsec VPN
Several phones behind a remote worker router may not connect. If on the remote site, one phone
connects properly, but adding other devices makes the connection fail, verify that the IPSec passthrough
option of the router (if available) is disabled.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 68/170
Chapter 2 Remote worker deployment using IPsec VPN
The relevant logs for a VPN failure are available in the web interface:
This window displays different pieces of information to help find the reason behind a failure.
It can for example inform that the error occurs during phase 1 or phase 2 of the tunnel setup, and that a
tunnel parameter of the client does not match the local configuration.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 69/170
Chapter 2 Remote worker deployment using IPsec VPN
The logs can also give some information about the parameters used for the tunnel, when it is successful
(encryption, hash, IP addresses …):
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 70/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 71/170
Chapter 2 Remote worker deployment using IPsec VPN
The name of the VPN interface (here oxovpn_0) can be found in the following menu:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 72/170
Chapter 2 Remote worker deployment using IPsec VPN
2.12 Appendix
In the following, screen shots come from different type of phones like 8018 (black/white) or 8068s (color),
but the content of the menus are the same and show the same options.
Characters mapping:
On 8008 and 8018, there is no mini keyboard, but the user must press the “123<>abc” button to access
to character mode.
The characters have been mapped on the dial pad as follows:
Key 0: + . , \ ? ! < >
Key 1: space | - _ 1
Keys 2 to 9: 2…9 and a…z
Key *: nothing
Key #: nothing
Access to capitals through long press on * (toggle caps switch)
On phones with mini keyboard, the characters are directly available through the keyboard markings,
except for the “&” character which can be reached through:
+ SHIFT + E = &
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 73/170
Chapter 2 Remote worker deployment using IPsec VPN
The new PIN code can be entered directly: 4 digits. Then validate it with the top left key.
Otherwise, the VPN Settings will be displayed:
If the new PIN code has not been defined yet, pressing a soft key beside every submenu item for
modification will require a PIN/Password authentication
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 74/170
Chapter 2 Remote worker deployment using IPsec VPN
It is possible to select (through press 3rd left soft key) to use PIN code or Password for the authentication (if
a password is defined in the communication system for the phones).
After the authentication is passed, there will be no more need to re-enter the PIN or Password to access
other submenu which require the same level of authentication.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 75/170
Chapter 2 Remote worker deployment using IPsec VPN
Typing in clear
Notes:
The Aggressive mode is inherently flawed, as a hash of the PSK is transmitted in the clear. A hacker
can attack the PSK using an offline dictionary. It is strongly advised to avoid using the Aggressive
mode.
The IKE force encap option forces UDP encapsulation for ESP packets even if no NAT situation is
detected. This may help to surmount restrictive firewalls. In order to force the peer to encapsulate
packets, NAT detection payloads are faked.
The Static Virtual IP option with the VIP Addr field below (available from R500, versions 5.40+) are
used to force the phone to manage its virtual address by itself. When this option is not selected, the
VPN server does assign a VIP (Virtual IP) automatically. In some servers this VIP may change when
the re-keying occurs (usually after 1 hour, but can be defined by a parameter). If this occurs, the phone
will need to reboot, as the VIP address known by the call server has changed.
To avoid this, select the Static Virtual IP checkbox, and enter the wanted phone address in the VPI
Addr field. The format for this field is described below.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 76/170
Chapter 2 Remote worker deployment using IPsec VPN
The input address is an IP address: xxx.yyy.zzz.aaa (last part aaa not set to 000), then the
given static virtual IP address will be used without any change (manual forced VIP)
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 77/170
Chapter 2 Remote worker deployment using IPsec VPN
Since R410 (versions 5.35), the server IP address is now input through a new menu as it can be set as an
IPv4 address or a FQDN address. Press the ‘VPN Server’ soft key to enter menu:
Pressing the ‘Check FQDN server’ soft key, the DNS resolver is called to check the input FQDN address.
A status message is displayed on title line.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 78/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 79/170
Chapter 2 Remote worker deployment using IPsec VPN
Remote worker 1
Corporate LAN
OXO
LOCAL-ID=RandD
VPN server
Communication
system
PEER-ID= RandD
INTERNET
LOCAL-ID= RandD
Typing in clear
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 80/170
Chapter 2 Remote worker deployment using IPsec VPN
192.168.0.100
RandD
This step is optional. It allows to define if the PIN code must be requested at each phone startup, and to
change the PIN code.
If the VPN Pincod option is turned ON (by checking Request Pin on Boot), everytime during phone’s
initialization procedure, an authentication window will popup and ask for PIN or Password (if defined), and
the VPN will only be launched when the authentication is passed. If it is not checked, the phone starts the
VPN without any user authentication.
VPN temporary
VPN validated deactivation
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 81/170
Chapter 2 Remote worker deployment using IPsec VPN
This is useful if the phone is used in home context and enterprise context alternatively. By just pressing
the BACK key at PIN prompt, the phone can start in the enterprise context, without navigating in the
settings to disable the VPN.
Resetting all VPN settings
To restore the default VPN Settings, enter VPN Default Settings.
Press 1st left soft key to reset the configuration and return to up level menu.
Press 1st right soft key to return to up level menu.
During the running of IPSec VPN client, there will be some display info to help end user to understand the
status of the connection, the detail info can be found in Annex.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 82/170
Chapter 2 Remote worker deployment using IPsec VPN
Main Menu
IP Memory Ethernet
802.1x Certificate
Main Menu
082.125.010.046
To enable VPN, select the check box of “Use VPN”, and the IP address of Fortigate in VRout.
Press down key and enter Pre-shared Key, in below example it is 123456789.
082.125.010.046
When every parameters in VPN menu is filled, press 1st left softkey to save and return to “IP Parameter”,
configure TFTP1/TFTP2 if needed, then save and terminal will reboot automatically.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 83/170
Chapter 2 Remote worker deployment using IPsec VPN
Then at the end of step 2 of initialization, there will be a popup window to ask for login username and
password:
Enter the correct username/password (in example, is user1/1245 or user2/6789), press 1st left softkey and
continue the initalization.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 84/170
Chapter 2 Remote worker deployment using IPsec VPN
During the initialization, at “step 2”, press “*” “#” to enter local MMI menu.
The new PIN code can be entered directly: 4 digits. Then press “OK” key to save.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 85/170
Chapter 2 Remote worker deployment using IPsec VPN
If the new PIN code has not been defined yet, pressing a soft key beside every submenu item for
modification will require a PIN/Admin Password authentication
It is possible to select (through press 3rd left soft key) to use PIN code or Admin Password for the
authentication.
After the authentication is passed, there will be no more need to re-enter the PIN or Password to access
other submenu which require the same level of authentication.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 86/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 87/170
Chapter 2 Remote worker deployment using IPsec VPN
When IKEv1 is applied, VPN Authentication configuration means the username/password of XAuth,
When IKEv2 is applied, VPN Authentication configuration means the username/password of EAP.
This step is optional. It allows to define if the PIN code must be requested at each phone startup, and to
change the PIN code.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 88/170
Chapter 2 Remote worker deployment using IPsec VPN
If the VPN Pincode option is turned ON (by checking Request Pin on Boot), everytime during phone’s
initialization procedure, an authentication window will popup and ask for PIN or Password (if defined), and
the VPN will only be launched when the authentication is passed. If it is not checked, the phone starts the
VPN without any user authentication.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 89/170
Chapter 2 Remote worker deployment using IPsec VPN
Phone will launch VPN client and the screen will return to initialization screen with a prompt info:
And some info will also be displayed when the PIN authentication is aborted during the initialization:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 90/170
Chapter 2 Remote worker deployment using IPsec VPN
2.12.6.1 StrongSwan
StrongSwan client on 8088 supports IKEv2 only and the according server configuration can be referred to
§ 2.8.4.
Install StrongSwan app on 8088 phone set using the private store and configure it by launching from private
store application on the 8088.
Once StrongSwan is installed, it is possible to launch it even without the private store application.
It can be found in the “more” menu (top-left corner next to create VPN).
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 91/170
Chapter 2 Remote worker deployment using IPsec VPN
Press CA certificate
Press the button beside the search icon and press Import certificate to import the CA certificate we
previously imported in server (2.12.6.1.1)
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 92/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 93/170
Chapter 2 Remote worker deployment using IPsec VPN
8. Enter Username
9. Enter Password
10. Check Select automatically in CA certificate.
11. In Server identity, enter server ID which is configured in § 2.8.5
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 94/170
Chapter 2 Remote worker deployment using IPsec VPN
Press the profile created to launch the VPN connection, if everything works well, it will show “Connected”
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 95/170
Chapter 2 Remote worker deployment using IPsec VPN
Split tunneling is a VPN concept which allows a VPN client to split the flow of data going through VPN tunnel
or not. This means on 8088 android you can select some applications which can access directly to internet
and not through VPN tunnel. This conserves bandwidth as Internet traffic does not have to pass through
the VPN server.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 96/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 97/170
Chapter 2 Remote worker deployment using IPsec VPN
5 : All applications are listed, choose the applications you don’t to go through VPN tunnel
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 98/170
Chapter 2 Remote worker deployment using IPsec VPN
In any time, user can access the log through press the key beside the ADD VPN PROFILE button
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 99/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 100/170
Chapter 2 Remote worker deployment using IPsec VPN
2.12.6.2 FortiClient
The forticlient supports IKEv1+PSK, and the configuration in server side is similar to the one described in
2.8.22.8.2 except need add special special cipher-suite proposal
On Fortigate server with VPN Tunnel IKEV1 configured for NOE 3G EE add :
Encryption AES 128 and authentication SHA1 for phase1 and phase 2 (AES256 is not available on
Forticlient encryption list and only IKEV1 is available)
Install Forticlient app on 8088 phone set using private store and configure it from private store app
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 101/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 102/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 103/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 104/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 105/170
Chapter 2 Remote worker deployment using IPsec VPN
Enter VPN Username created on Fortinet server and check XAuth is enabled
To have Forticlient VPN available in android VPN settings launch internally a 1st VPN connection from
private store application and cancel it, after this Forticlient appears in VPN android settings
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 106/170
Chapter 2 Remote worker deployment using IPsec VPN
Connection will fail as we are still internally connected, the purpose is only to have forticlient available in
VPN android settings
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 107/170
Chapter 2 Remote worker deployment using IPsec VPN
Attention: it is reported that in special network environment, it is possible that the VPN tunnel is
created but the communication fails. In such cases, downgrading the phase 2 encryption algorithm
from AES256 to 3DES may help to resolve the problem.
Native Client proposed cipher-suite:
Phase1: AES256/AES128/3DES/DES – SHA256/SHA1/MD5; DH Group 2; Lifetime 28800s
Phase2: AES256/AES128/3DES/DES – SHA256*/SHA1/MD5; PFS disabled; Lifetime 28800s
*Not use SHA256 in phase2 because it will result communication problem.
When Zyxel server is configured with 8088 Android Native client, the configuration need adjustment
Configuration > VPN > IPSec VPN > VPN Connection
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 108/170
Chapter 2 Remote worker deployment using IPsec VPN
Attention: If a 8088 android remote phone is connected through VPN behind an ADSL box, if the
VPN connection is established but the phone cannot connect to call server, prefer these settings:
1: In the Encryption field, select 3DES
2: In the Authentication field, select SHA1 or MD5
Add VPN profile through right-up “+” button, which will ask you to setup the lock screen PIN or password,
setup it as you want.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 109/170
Chapter 2 Remote worker deployment using IPsec VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 110/170
Chapter 2 Remote worker deployment using IPsec VPN
Remark: It is recommended to put this option at none when coming back in the office, because the phone
will continue to connect through the VPN, even if this is not necessary.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 111/170
Chapter 2 Remote worker deployment using IPsec VPN
TFTP1 is still OK
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 112/170
Chapter
OPEN VPN
3.1 Overview
To describe the deployment of an 8001 Deskphone remote worker over internet with OPEN VPN, the
OmniPCX Office RCE has been selected as communication system.
Topology example:
INTERNET INTRANET
Port forwarding
required
WAN IP Address:
116.228.56.173
Home router
Access router
+ firewall 8001
Private IP Address:
30.1.202.33
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 113/170
Chapter 3 Remote Worker deployment using OPEN VPN
Notes:
The packets between intranet and remote worker are forwarded via the Open VPN server (routing).
On Open VPN server, the UDP port 1194 must be configured to be forwarded to the IP address of Open VPN
server on the access router.
The Open VPN port number can be verified using server.conf
1. From the administration computer, open a web browser, and enter the 8001 DeskPhone IP address
2. From the 8001 Web Management home page, go to Security > Trusted certificates upload and upload
the trusted certificates to 8001 DeskPhone
After upload, the trusted certificates are displayed under Trusted certificates
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 114/170
Chapter 3 Remote Worker deployment using OPEN VPN
Notes:
8001 does not support PSK method so far. Only certificate method must be used for OpenVPN connection.
To avoid security issues, customer must generate different client certificates for 8001/8001G DeskPhone
sets. If sharing the same certificate, security risks may occur when the 8001 DeskPhone set is lost or stolen.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 115/170
Chapter 3 Remote Worker deployment using OPEN VPN
From the web management home page, go to Phone Status and verify that the VPN IP address field is
completed with the OPEN VPN IP address.
Notes:
• If VPN connection is broken, it automatically relaunches the connection.
• The keep-alive directive causes ping-like messages to be sent back and forth over the link so that each
side knows when the other side has gone down. Ping every 10 seconds. Assume that remote peer is
down, if no ping is received during a 120 second time period.
• The current intervals are configured in the VPN server configuration file.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 116/170
Chapter 3 Remote Worker deployment using OPEN VPN
Note:
The 8001 DeskPhone set needs active remote work for update or download configuration file from
OmniPCX Office RCE. In home network, the set can get IP address via DHCP, but it cannot get option 67
(OmniPCX Office URI https://30.1.202.7:10443/dmcfg) via DHCP.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 117/170
Chapter 3 Remote Worker deployment using OPEN VPN
3.4.2 Generating certificate files for the OpenVPN server and 8001 DeskPhone
1. Open a terminal window
4. Configure the easy-rsa directory used to generate the certificate files:
a. Enter the following command: root@ubuntu14: ~# apt-get install easy-rsa
The easy-rsa directory is created under /usr/share/easy-rsa
b. Copy the easy-rsa directory under /etc/openvpn:
cp /usr/share/easy-rsa /etc/openvpn/
c. Edit the vars file:
nano /etc/openvpn/easy-rsa/vars
d. Fill all these parameters in the vars file:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 118/170
Chapter 3 Remote Worker deployment using OPEN VPN
cd /etc/openvpn/easy-rsa
source ./vars
At this stage, the CA certificates can be created in the same place than the parameters entered in
the vars file above
2. Generate a CA certificate
root@ubuntu14:/etc/openvpn/easy-rsa# ./clean-all
root@ubuntu14:/etc/openvpn/easy-rsa# ./build-ca
3. Generate a certificate for the OpenVPN server
root@ubuntu14:/etc/openvpn/easy-rsa# ./build-key-server server
4. Generate a certificate for the client
root@ubuntu14:/etc/openvpn/easy-rsa# ./build-key client
5. Generate a dh1204.pem file for the server
root@ubuntu14:/etc/openvpn/easy-rsa# ./build-dh
If the screen prompts the following information, you can enter the following command to generate a
dh1024.pem file:
root@ubuntu14:/etc/openvpn/easy-rsa# openssl dhparam 1024.pem 1024
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 119/170
Chapter 3 Remote Worker deployment using OPEN VPN
Note: the “easy-rsa” is integrated in the “OpenVPN” package from the website.
If you do not know where is located the ‘server.conf’ directory, you can use below command to find it and
copy it to the directory “openvpn”
root@ubuntu14:~# find / -name 'server.conf'
3. Edit the file “server.conf” according to your current network environment and save the change
root@ubuntu14:/etc/openvpn# vi server.conf
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 120/170
Chapter 3 Remote Worker deployment using OPEN VPN
Note: Push a single or a multiple router to 8001 DeskPhone client depends on customer’s topology.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 121/170
Chapter
4.1 Overview
ALE SIP deskphones can be used by remote workers outside the company, operating off-site transparently
with the in-premise corporate call server thanks to a secured network infrastructure composed of:
- An Internal and an external firewall surrounding a corporate DMZ, with suitable polices,
- A Reverse Proxy (RP) in DMZ, which controls all https data flows exchanged between the
deskphones running off-site and the OmniVista 8770 DM server on corporate LAN,
The RP is reachable from internet via its public FQDN, which must be declared in the settings of the
remote worker deskphones. A redirection rule must be set in the RP to redirect the deskphone
HTTPS flows to the OmniVista 8770 DM server private FQDN.
- A Session Border Controller (SBC) in DMZ, which secures the VoIP communications performed
with the deskphones on internet domain thanks to SIP/TLS signaling and SRTP flows.
The SBC is reachable from the internet via its public FQDN, which is provided to deskphones via their
configuration file.
Hardware and software compatibility: The ALE deskphones compatible with an off-site use with RP and
SBC are:
- 8001, 8008CE and 8008GCE (SIP only phones),
- 8008, 8008G, 8018 and 8028s dual stack NOE/SIP switched to SIP mode.
The 80x8(s) minimum recommended SIP software version is 1.51.4. With this minimum version, the
phone deployment can be done directly at the final user location. Some Out of box 80x8(s) and CE
deskphones may run 1.20.xx SIP version. They must be upgraded before their use in remote worker mode.
Methods to do that are described in chapter 4.8.1.
Company network
DMZ
Company LAN
Private
SBC SBC OXE
public private
FQDN SBC FQDN
FQDN
Redirection rule:
RP public FQDN/DM/dmictouch
is routed to
OmniVista 8770 private FQDN/DM/dmictouch
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 122/170
Chapter 4 Remote Worker deployment using OPEN VPN
To sign the CTL, you can use one of these deskphone types:
- A 8088 Smart DeskPhone declared as SIP device on the OmniPCX Enterprise (see: § 4.2.1)
- A 8082 My IC Phone declared on an OpenTouch server (if available on the customer site) (see: § 4.2.2)
4.2.1 Signing the CTL with a 8088 Smart DeskPhone connected to the OmniPCX
Enterprise
Before you start:
A 8088 Smart DeskPhone is declared as SIP device on OmniPCX Enterprise server. (The 8088 Smart
DeskPhone configuration and commissioning are described in the OXE System: Dedicated sets document
reference: 8AL91024).
To build a CTL including the RP and SBC certificates:
1. Declare the 8088 Smart DeskPhone as signing set:
a) On the OmniVista 8770 server, go to: 8770/data/DM/deploy/VHE8082/
b) Edit the configuration file of the 8088 Smart DeskPhone (config.<MAC address>.xml)
The set configuration file includes CTL fields filled with default values
Example:
c) In the DmCtlSigningMacaddr field, enter the MAC address of the 8088 Smart DeskPhone
Example:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 123/170
Chapter 4 Remote Worker deployment using OPEN VPN
<signature encodage="base64">
rPL1XquWLyxKM0QdQlY/nbtpaj1gOVOG5xGjnuJ8WmZDXYt32RctnBikS+DCCcyf
VvW11sU67bGQ4uhPfZaio0RW3TUj38ef2n1GGrwVoHHIRH8KpDHBhsQ9tlwrJw+n
Cvzanr442gvmEzznxMcDT7QuXs/hnIdHvMvFL5fB84Y=
</signature>
</CTL>
</trust_store_info>
Example of updated CTL file:
-----BEGIN CERTIFICATE-----
MIIDDDCCAfagAwIBAgIQAVvMvy6HZfOIBo3GjaCYsTALBgkqhkiG9w0BAQUwVTEL
.....
0+ca3SwkkU15/xnVpQqPcA==
-----END CERTIFICATE-----</cert>
…..
-----BEGIN CERTIFICATE-----
MIIDtTCCAp2gAwIBAgIKE5R/5gAAAAAABDANBgkqhkiG9w0BAQUFADBeMQswCQYD
.....
Q60IIaAuN/bs6vwfWeuzo6ATcIFdiCcphZvI3eXP95W4PLLawKXgls0=
-----END CERTIFICATE-----
….
-----BEGIN CERTIFICATE-----
MIIEBjCCAu6gAwIBAgIQTQQhGG1woYtCsMzfN9pRyDANBgkqhkiG9w0BAQUFADBe
.....
n7nc1SCVb6Q6IAQgW6UsRn/3E7CUFII4/FQ=
-----END CERTIFICATE-----
5. Add the RP and the SBC Root CA certificates (and SubCA if any) in the ctl_VHE8082_remote file:
a. Edit the ctl_VHE8082_remote file
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 124/170
Chapter 4 Remote Worker deployment using OPEN VPN
b. Add the certificate(s) in a BEGIN CERTIFICATE/END CERTIFICATE section and save it.
6. Sign the new CTL file with the 8088 Smart DeskPhone defined as signing deskphone (see step 1.):
a. Copy and paste the ctl_VHE8082_remote file on a USB key under /trust_store directoy, and rename
it ict8000ctl.pem
The path and filename on the USB key must be: /trust_store/ict8000ctl.pem
b. Plug in the USB key to the signing deskphone
c. On the deskphone, access the Settings application and log in as administrator
d. Go to Security > Certificates
e. Set the CTLActivateCADeployment to True and press the back key
f. Reboot the deskphone
g. At initialization step 3: Configuration file download, log in as administrator and go to the Settings
application
h. Set the CTLActivateSigning to True
The USB key contains a new ict8000ctl.xml file which is signed with the Root certificate(s)
i. Unplug the USB key
7. Plug in the USB key to the OmniVista 8770 server and copy the file to the directory:
8770/data/DM/deploy/VHE8082/
8. Rename the ict8000ctl.xml file to ctl_VHE8082_remote
9. Get the CTLMD5 data of the ctl_VHE8082_remote file using an external tool (for example:
e6ce0f8d802b7b96a00327e9ef659acc).
If the OmniVista 8770 server is installed on a computer on which Windows 7 is running, you can use
the command: CertUtil –hashfile c:\ ctl_VHE8082_remote.
4.2.2 Signing the CTL with a 8082 My IC Phone connected to an OpenTouch server
Before you start:
Ensure that the customer site includes an OpenTouch server, and a VHE deskphone (8082 My IC Phone)
is declared as signing set. For more information on the signing set configuration, refer to the section
Certificate deployment of the OpenTouch System Documentation (reference: 8AL90510).
If there is no OpenTouch server available on customer site, you must either use an OpenTouch server (and
a VHE signing set) at another site, or sign the CTL with a 8088 Smart DeskPhone connected to the
OmniPCX Enterprise (see: § 4.2.1).
<signature encodage="base64">
rPL1XquWLyxKM0QdQlY/nbtpaj1gOVOG5xGjnuJ8WmZDXYt32RctnBikS+DCCcyf
VvW11sU67bGQ4uhPfZaio0RW3TUj38ef2n1GGrwVoHHIRH8KpDHBhsQ9tlwrJw+n
Cvzanr442gvmEzznxMcDT7QuXs/hnIdHvMvFL5fB84Y=
</signature>
</CTL>
</trust_store_info>
section
5. Add the SBC certificate in the ctl_VHE8082_remote file:
a. From the SBC, get the public certificate
b. Edit the file and copy the certificate
c. Add the certificate to the ctl_VHE8082_remote file in a BEGIN CERTIFICATE/END CERTIFICATE
section
6. Sign the new CTL certificate with a signing deskphone connected to an OpenTouch server.
For more information, refer to section section Certificate deployment of the OpenTouch System
Documentation (reference: 8AL90510). The signed CTL certificate must be available on a USB key
(ict8000ctl.xml file signed with the RP certificate).
7. Plug in the USB key to the OmniVista 8770 server and copy the file to the directory:
8770/data/DM/deploy/VHE8082/
8. Rename the ict8000ctl.xml file to ctl_VHE8082_remote
9. Get the CTLMD5 data of the ctl_VHE8082_remote file using an external tool (for example:
e6ce0f8d802b7b96a00327e9ef659acc).
If the OmniVista 8770 server is installed on a computer on which Windows 7 is running, you can use
the command: CertUtil –hashfile c:\ ctl_VHE8082_remote.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 127/170
Chapter 4 Remote Worker deployment using OPEN VPN
The following paragraphs only focus on SBC configuration for remote workers.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 128/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 129/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 130/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 131/170
Chapter 4 Remote Worker deployment using OPEN VPN
Important notes:
1. With the mutual authentication enabled, the SBC will use the certificate sent by the phone to check if the
certificate chain is correct, or not. If correct, SBC simply authenticates the phone as an ALE phone. It will
not authenticate each phone individually based on the CN=MAC@ content of its certificate.
2. Mutual authentication may not fit with OTCT clients. If your SBC device is also securing some OTCT
clients in remote worker mode, configure preferably a separate SIP interface for 80xx phones to enable the
TLS mutual authentication.
4.4.5 Specific SBC configuration for 8001 Deskphones using secret identity
The following management is optional and only applies to specific use cases.
In case the Anonymous Call feature is activated on 8001 Deskphones, the P-Preferred-Identity header is
used to provide the extension number for SIP authentication. A dedicated message manipulation must be
added to the SBC:
1. From the management console of the SBC, select the Configuration tab and go to: VoIP > SIP
Definitions > Msg Policy & Manipulation > Message Manipulations
2. Add a new index with the following values:
Note: To see if the Anonymous Call feature is activated on 8001 Deskphone, access its web
management interface and perform the following operations:
a) Open a web browser and enter the URL: http://<deskphone IP address>
b) Enter the root credentials in the login window (root/root)
c) From the web management interface, go to SIP Account > Account1
d) In the Call section, verify that the Anonymous call field is set to on
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 132/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 133/170
Chapter 4 Remote Worker deployment using OPEN VPN
4.5.2 Configuring the 8001 Deskphone settings (file download URL and auto
provision)
This operation consists in configuring the file download URL and auto provision in the 8001 Deskphone
settings. This can be done directly on the deskphone, or using the web management interface of the
deskphone. The deskphone IP address is required to access the web management interface.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 134/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 135/170
Chapter 4 Remote Worker deployment using OPEN VPN
3. Tab ‘Network’:
To be set:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 136/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 137/170
Chapter 4 Remote Worker deployment using OPEN VPN
4. Tab ‘Vocoders’:
Framings
Codec G.711a 20ms (default)
Codec G.711mu 20ms (default)
Codec G.729a 20ms (default)
Codecs The Codec type settings are currently missing in profiles for
8008, 8018 and 8028s. A Service Request is ongoing to fix it.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 138/170
Chapter 4 Remote Worker deployment using OPEN VPN
5. Tab ‘Telephony’:
Check for the services to enable.
Tests have been done with:
Dialing tone Click the radio button
Transfer Click the radio button
Apply the changes.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 139/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 140/170
Chapter 4 Remote Worker deployment using OPEN VPN
6. Tab ‘Device’:
To be set:
Allow USB (8018 and 8028s only) Can help for maintenance
operations. IT decision to enable it or not.
Language User Interface language
Internal ring melody Select the melody for internal incoming calls
External ring melody Select the melody for external incoming calls
Appointment ring Select the melody for appointment reminder
melody
Audio TOS/diffserv 46
Tone Country Select the Country
VAD Not selected (default value).
Apply the changes.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 141/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 142/170
Chapter 4 Remote Worker deployment using OPEN VPN
Note: by applying the device profile directly at user creation, the identification key and password are
fostered for identifying the deskphone at first start and authorize its association. It is possible however
to set instead the deskphone MAC address as the authorization criteria for the first device association.
For this, select the device object, set the correct value in the 'MAC address' field and apply.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 143/170
Chapter 4 Remote Worker deployment using OPEN VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 144/170
Chapter 4 Remote Worker deployment using OPEN VPN
- Create an OXE user of ‘SIP extension’ device type without setting-up a device profile at this step:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 145/170
Chapter 4 Remote Worker deployment using OPEN VPN
4.7.1.2.1 Option 1: Set SIP parameters for device identification by MAC address
- Select the new user, right click: select Associate SIP device, New, <your device type>:
- Set the <Device identity (MAC address)> and the right OXE device profile:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 146/170
Chapter 4 Remote Worker deployment using OPEN VPN
- Apply: SIP parameters are all set according to the device profile used, with identification by device
MAC address.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 147/170
Chapter 4 Remote Worker deployment using OPEN VPN
4.7.1.2.2 Option 2: Set SIP parameters for device identification by id key and password
- Select the new user, right click: select Associate SIP device, New, <your device type>:
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 148/170
Chapter 4 Remote Worker deployment using OPEN VPN
- Apply: SIP parameters are all set according to the device profile used, with device identification by key
(user DN value) and id password.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 149/170
Chapter 4 Remote Worker deployment using OPEN VPN
Important: The real deskphone first identification and association can be done from the internet domain
provided that its SIP software version is 1.51.4 or higher.
If SIP version is lower than 1.51.4, the deskphone must first be upgraded from LAN domain. (see §
4.8.1).
4.7.2.1 Specific actions required on dual stack deskphones (8008, 8018, 8028s only):
Dual stack phones start in NOE mode by default.
To be used in SIP remote worker mode, they must be switched to SIP mode:
1. Start the deskphone directly on WAN
2. During its initialization, at “step 2”, press “*” “#” to enter local MMI menu. Deskphone requires a
password: fill in ‘123456’ (default value)
3. Go to Admin / IP params menu to check that the deskphone network operates in dynamic (DHCP)
mode
4. Go to Soft Infos menu and check the Run Mode value. If NOE, select Set Mode SIP and Apply (‘V’
button):
4.7.2.2 Actions required for a first start and identification with identification username
and password
5. Start the deskphone directly on WAN
6. During its initialization, at “step 2”, press “*” “#” to enter local MMI menu. Deskphone requires a
password: fill in ‘123456’ (default value)
7. Go to DM menu, select the Backup URL and fill in the https secured 8770 DM public URL of your
system, i.e. https://<8770-DM-public-name>/DM/dmictouch
8. Validate using OK button.
9. The deskphone restarts.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 150/170
Chapter 4 Remote Worker deployment using OPEN VPN
10. After a time, the deskphone shows the Device login screen:
11. Fill in Username with the <identification key value> and Password field with the <identification
password value> previously set for your device at user/device creation.
12. The deskphone connects to the DM, get its configuration and CTL files, restarts and start operating in
remote worker mode.
4.7.2.3 Actions required for a first start and identification by device MAC address:
13. Start the deskphone directly on WAN
14. During its initialization, at “step 2”, press “*” “#” to enter local MMI menu. Deskphone requires a
password: fill in ‘123456’ (default value)
15. Go to DM menu, select the Backup URL and fill in the https secured 8770 DM public URL of your
system, i.e. https://<8770-DM-public-name>/DM/dmictouch
16. Validate using OK button.
17. The deskphone restarts.
18. The deskphone connects to the DM, get its configuration and CTL files, restarts and start operating in
remote worker mode.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 151/170
Chapter 4 Remote Worker deployment using OPEN VPN
4.8 Appendix
In the following we indicate the principles of upgrading available. These are not the full step by step
methods. For this please refer to the relevant documentation.
• The field must have a value, whatever it is, only SIP Survivability Mode = YES is important.
• Configure the DHCP to serve IP addresses in the SIP survivability range.
• Declare one or more users with the number and password, for upgrade purpose. DO NOT use the
encryption mode.
• Then connect a phone, put it in service and the upgrade NOE & SIP will happen if needed.
• Unplug the phone and repeat with another one.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 152/170
Chapter 4 Remote Worker deployment using OPEN VPN
The dwl command availability depends on the software version of the phone.
• Start the phone and once in STEP 1, press * and # keys one after the other. This will enter the local
MMI menu
• Enter the Software Infos menu
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 153/170
Chapter 4 Remote Worker deployment using OPEN VPN
• Select the Upgrade menu, then select Upgrade from USB now
• A message indicating that upgrade is running is displayed into title line as well as all leds are blinking.
Blinking will be fast in a first time while binary files on the USB are checked before upgrading. When
upgrade is really started, leds blinking will become slow during all the upgrade procedure. If upgrade is
successful, the phone will reboot by itself.
The USB key upgrade availability depends on the software version of the phone. It is supported from the
release R410.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 154/170
Chapter
VPN
5.1 Introduction
In order to deploy ALE desk-phones, especially in NOE mode, the previous chapters show the actions to be
done locally on the phone, and enter the minimum information needed to establish the VPN and reach the
call server.
Another method to facilitate this deployment is based on a cloud server contacted by the phone through
Internet, which will push these settings into the phone.
This chapter describes the way to use this automatic provisioning of the VPN settings into the NOE phones
through the ALE EDS server (Easy Deployment Server).
Note : The phones should have these minimum versions to use EDS deployment.
With earlier versions it is possible to deploy the VPN, but with manual configuration on the phone.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 155/170
Chapter 5 Zero touch deployment for IPSEC VPN
Request access.
EDS is used for several applications. Please request an ENTERPRISE account.
The requester then receives a mail with a link to create the account password. The account creation needs
a human operation inside Alcatel-Lucent Enterprise, so the delay may be around one day.
Once the account creation mail received (stays valid 3 days), click on the link inside and give the same
email address as in the access request, then enter your chosen new password.
Welcome !
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 156/170
Chapter 5 Zero touch deployment for IPSEC VPN
Remote worker
Corporate LAN
VPN client
Access router/Box
OXO
3
Communication Access router
system + firewall
VPN server
1 2
EDS
VPN Server
Administrator
Internet Connection
The VPN settings are split into two separate files, which are imported into the EDS:
• VPN settings – common part: describes all the settings which are common between the devices, such
as VPN gateway address, VPN policy (PSK…) ,..
• VPN settings – device part: describes the settings per device, such as user login, user password for
VPN authentication, and mandatory VPN PIN code as used in manual configuration for protecting VPN
local menu. See chapter 2.12.1 for detailed VPN settings.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 157/170
Chapter 5 Zero touch deployment for IPSEC VPN
The NOE terminal will reach the EDS in the following cases, at the boot:
• Out of the box or after a reset to factory, in DHCP mode (dynamic) and if the phone doesn’t find
TFTP address configured manually or in the current DHCP option returned by the DHCP server
• in DHCP mode and not in DHCP survivability, if DHCP “next server” option is equal to
Router/Gateway field returned by the DHCP server (case of French ISP box/router such as Freebox,
Orange, SFR,…).
• in DHCP mode and not in DHCP survivability, if it detects a previous failure for getting lanpbx file
(ex no TFTP response, meaning if none of the two TFTP configured addresses respond).
• in VPN mode, at the boot when it detects a previous VPN connection failure (case for example when
VPN parameter changed on server side, or just the server was down), or fails in reaching the TFTP
server.
• in static mode, and the TFTP address has not been configured manually
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 158/170
Chapter 5 Zero touch deployment for IPSEC VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 159/170
Chapter 5 Zero touch deployment for IPSEC VPN
Once the excel file is filled, it must be exported into an xml file.
If the Developer menu doesn’t appear see Appendix 2 of this chapter to display it.
An example of the Xml file generated is described in Appendix 3.
The name of the Profile Name must be the exact Profile name defined in the EDS.
The column Remark is an optional information field, which can be filled by any characters.
In that example, VpnUser and Vpn password are unique per device/user. As said above, if these credentials
are identical for all devices/users, they can be duplicated for each device MAC address in that file or define
them (VpnUser, VpnPasswd, VpnPincode, VpnPincodeEnable) into the other VPN Common template file.
Note: to ensure the password could be entered from the phone interface if needed, please
refer to the supported character set in chapter 2.4.1.2.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 160/170
Chapter 5 Zero touch deployment for IPSEC VPN
In the EDS home page, goes to Profile management and click on Add.
Enter the name of the profile for provisioning the VPN settings and click on Pre-configure area.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 161/170
Chapter 5 Zero touch deployment for IPSEC VPN
When the file is imported, the pre-configure area is filled with the xml settings.
5.5.4 Step4: create devices in EDS and map them to the profile
5.5.4.1 Overview
• The Admin goes to device management menu and either
o Types in the information phone by phone
o Imports the VPN settings Specific template excel file. Here no need to convert in XML,
native Excel is supported
• EDS then creates all the devices entries with their pre-configured area filled by specific VPN settings
through an XML file
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 162/170
Chapter 5 Zero touch deployment for IPSEC VPN
Select the VPN profile created in the step3, fill the MAC address and click on the Add, click on Pre-configure
area and enter the following XML code which is the minimum mandatory parameter needed :
<setting id="VpnPincode" value="1234" override="true"/>
And disable the Pincode request at phone start to have zero touch deployment (optional, see 5.7):
<setting id="VpnPincodeEnable" value="disable" override="true"/>
If this is omitted, the Admin must give the defined PIN code to the final user in order to start the VPN.
Then OK twice to save this device. In that case, it means that the VPN credentials for the user/device are
configured in the VPN profile.
If we want to fill the Pre-configure area for that device with the specific credential, we need either configure
the VPN settings directly through an XML format, or import an excel device file containing only the
credentials of that device/user (see next section for importing excel file).
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 163/170
Chapter 5 Zero touch deployment for IPSEC VPN
As the PIN code is mandatory to start the VPN the minimum lines in the preconfigure area is the first one in
the following picture:
<setting id="VpnPincode" value="1234" override="true"/>
Then, import the VPN Specific template excel file describing the devices and their credentials.
When the import process has been correctly done, it displays it on the screen.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 164/170
Chapter 5 Zero touch deployment for IPSEC VPN
Then, the Device management menu displays all the new devices imported. Some columns can be checked:
• Binding time: time at which the device MAC address has been associated to the profile
• Last connected time: last time at which the phone has reached the EDS. It doesn’t indicate that the
VPN settings are correctly taken into account by the phone. When the entry is empty, it means that
the phone never reached the EDS.
The specific VPN settings of the devices can be checked by editing the device and clicking on the Pre-
configure area. The XML VPN settings will be displayed.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 165/170
Chapter 5 Zero touch deployment for IPSEC VPN
Note: If the same setting is defined both in the Pre-configure area of the Profile and in the Pre-configured
area of the device, the priority is done by the one in the device part.
The VPN settings provisioned by the EDS server are taken into account at the first boot step of the phone.
Once the VPN tunnel is successfully set-up, the phone will not reach the EDS at the next boot, and uses
the saved VPN settings in its memory.
When some settings change in the EDS (password, security policy,…), the phone has to reach the EDS for
downloading them. There is no notification mechanism from EDS to the phone. The cases for which the
phone is able to get the VPN settings from EDS are:
• NOE phone out-of box
• Reset to factory of NOE phone
• VPN connection failure detected by the phone at the boot (automatic): the Phone boots in VPN
mode and tries to start the VPN tunnel. If it fails after several retries, the phone will reach EDS.
• Last VPN connection failure memorized by the phone did generate a reset (automatic): the Phone
is running a VPN tunnel. The tunnel is stopped for any reasons (new PSK changed at the VPN
Gateway side,…), the phone memorizes this VPN failure, resets and at the startup reaches EDS.
• The VPN did succeed but the TFTP server is not reachable, which after a while does lead to a
phone reset. At startup it reaches EDS.
Therefore, when there is a need to change the security data of a running VPN, it is recommended to:
• First edit the relevant data in EDS: configuration files are ready with the new parameters. Most of
the phones are still running their VPN, and if they restart they continue with their parameters saved
locally. The final user is not impacted.
• Then change the settings in the VPN server: as soon as the changes are committed, the phones
will lose their VPN connection and reset to get the new config file from EDS.
When some settings are needed to be modified in the EDS, several methods can be used depending on
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 166/170
Chapter 5 Zero touch deployment for IPSEC VPN
5.8 Moving the phone between inside and outside of the company
It is possible to use the same phone sometimes inside the company, connected on the LAN, and sometimes
as a home worker, going through a VPN over the Internet.
The switch from Company to Home and reverse can be made easy for the final user (no action at all for the
final user, just plugin) by following these rules:
• IP dynamic mode. Any static setting in the phone for company LAN, will lead to failure to get the
connection to Internet from home.
• DHCP: no UserClass forced though phone menu.
• VLAN: no VLAN forced though phone menu
The UserClass and VLAN, if needed inside the company network., can be provisioned through
DHCP options configured in the DHCP server.
These are the default settings after having done a Reset to Defaults action through the local MMI
menu.
Combined with the setting VpnPinCodeEnable=Disable mentioned in previous chapter, this permits a
fully automatic capability of moving the phones.
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 167/170
Chapter 5 Zero touch deployment for IPSEC VPN
5.9 Appendix
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 168/170
Chapter 5 Zero touch deployment for IPSEC VPN
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 169/170
Chapter 5 Zero touch deployment for IPSEC VPN
5.9.3 APPENDIX 3: Example for XML file, usable for common settings.
Note: This file is a global template for several scenarii (VPN provisioning, Switch from NOE to SIP, Provision
OXE/OXO TFTP address in a LAN (without VPN).
The settings RunMode, TftpAddrx, TftpPort are not used for VPN settings provisioning.
END OF DOCUMENT
8AL90345ENAA Ed. 11a - October 2021 – Server Deployment Guide for Remote Workers using Deskphones 170/170