No Security Policy

When a system security policy has not been set, the system is open for all types of initiations and registrations. To remove a security policy, use the command sec_policy -remove.

The parameter effects of the command extension --security-exception can be summarized, see Table below for details.

Table 1. No Security Policy Details
Terminal Type Extension Number Type Logon Authentication 1) Registration Allowed or Not Allowed Secure or Insecure Registration

Secure

security-exception YES,

RAC not configured

Authentication not done

Allowed

Signaling is not encrypted.

Secure

security-exception YES,

RAC configured

Prompts for PIN and validates it

Allowed

Signaling is encrypted.

Secure

security-exception NO,

RAC configured

Prompts for PIN and validates it

Allowed

Signaling is encrypted.

Insecure

security-exception YES,

RAC configured

Prompts for PIN and validates it

Allowed

Signaling is not encrypted.

Insecure

security-exception YES,

RAC not configured

Authentication not done

Allowed

Signaling is not encrypted.

Insecure

security-exception NO,

RAC configured

Prompts for PIN and validates it

Allowed

Signaling is not encrypted.

1) If RAC is configured, logon authentication is done irrespective of if security-exception = YES or NO. That is, the IP terminal prompts for a PIN and validates it while registration takes place.