Yealink SIP-T40P — настройка функций безопасности для защищенной связи [701/841]

Yealink SIP-T40P [701/841] Certificates
Configuring Security Features
685
RC4-MD5
EXP1024-DHE-DSS-DES-CBC-SHA
EXP1024-DES-CBC-SHA
EDH-RSA-DES-CBC-SHA
EDH-DSS-DES-CBC-SHA
DES-CBC-SHA
EXP1024-DHE-DSS-RC4-SHA
EXP1024-RC4-SHA
EXP1024-RC4-MD5
EXP-EDH-RSA-DES-CBC-SHA
EXP-EDH-DSS-DES-CBC-SHA
EXP-DES-CBC-SHA
EXP-RC4-MD5
The following figure illustrates the TLS messages exchanged between the IP phone and
TLS server to establish an encrypted communication channel:
Step1: IP phone sends Client Hello message proposing SSL options.
Step2: Server responds with Server Hello message selecting the SSL options, sends its
public key information in Server Key Exchange message and concludes its part of the
negotiation with Server Hello Done message.
Step3: IP phone sends session key information (encrypted by servers public key) in the
Client Key Exchange message.
Step4: Server sends Change Cipher Spec message to activate the negotiated options
for all future messages it will send.
IP phones can encrypt SIP with TLS, which is called SIPS. When TLS is enabled for an
account, the SIP message of this account will be encrypted, and a lock icon appears on
the LCD screen after the successful TLS negotiation.
Certificates
The IP phone can serve as a TLS client or a TLS server. The TLS requires the following
security certificates to perform the TLS handshake:
Trusted Certificate: When the IP phone requests a TLS connection with a server, the

Содержание

Узнайте, как настроить функции безопасности для защиты связи с использованием TLS. Пошаговое руководство по обмену сообщениями и шифрованию SIP.

Скачать