Configuring Security Features
459
negotiation with “Server Hello Done” message.
Step3: IP phone sends session key information (encrypted by server’s public key) in the
“Client Key Exchange” message.
Step4: Server sends “Change Cipher Spec” message to activate the negotiated options
for all future messages it will send.
IP phones can encrypt SIP with TLS, which is called SIPS. When TLS is enabled for an
account, the SIP message of this account will be encrypted, and a lock icon appears on
the LCD screen after the successful TLS negotiation.
Certificates
The IP phone can serve as a TLS client or a TLS server. The TLS requires the following
security certificates to perform the TLS handshake:
Trusted Certificate: When the IP phone requests a TLS connection with a server, the
IP phone should verify the certificate sent by the server to decide whether it is
trusted based on the trusted certificates list. The IP phone has 30 built-in trusted
certificates. You can upload 10 custom certificates at most. The format of the trusted
certificate files must be *.pem,*.cer,*.crt and *.der and the maximum file size is
5MB. For more information on 30 trusted certificates, refer to
Appendix C: Trusted
Certificates
on page
511
.
Server Certificate: When clients request a TLS connection with the IP phone, the IP
phone sends the server certificate to the clients for authentication. The IP phone
has two types of built-in server certificates: a unique server certificate and a
generic server certificate. You can only upload one server certificate to the IP
phone. The old server certificate will be overridden by the new one. The format of
the server certificate files must be *.pem and *.cer and the maximum file size is
5MB.
-
A unique server certificate: It is unique to an IP phone (based on the MAC
address) and issued by the Yealink Certificate Authority (CA).
-
A generic server certificate: It issued by the Yealink Certificate Authority (CA).
Only if no unique certificate exists, the IP phone may send a generic certificate
for authentication.
The IP phone can authenticate the server certificate based on the trusted certificates list.
The trusted certificates list and the server certificates list contain the default and custom
certificates. You can specify the type of certificates the IP phone accepts: default
certificates, custom certificates or all certificates.
Summary of Contents for SIP-T2XP
Page 1: ......
Page 28: ...Administrator s Guide for SIP T2xP IP Phones 10 ...
Page 66: ...Administrator s Guide for SIP T2xP IP Phones 48 ...
Page 280: ...Administrator s Guide for SIP T2xP IP Phones 262 ...
Page 456: ...Administrator s Guide for SIP T2xP IP Phones 438 ...
Page 494: ...Administrator s Guide for SIP T2xP IP Phones 476 ...
Page 524: ...Administrator s Guide for SIP T2xP IP Phones 506 ...