Security Features
431
key file(s) and an Aeskey.txt file storing plaintext AES key(s).
Incoming Signaling Validation
Yealink IP phones support the following three optional levels of security for validating incoming network
signaling:
Source IP address validation: ensure the request is received from an IP address of a server
belonging to the set of target SIP servers.
Digest authentication: challenge requests with digest authentication using the local credentials for
the associated registered account.
Source IP address validation and digest authentication: apply both of the above methods.
Topic
Incoming Signaling Validation Configuration
Incoming Signaling Validation Configuration
The following table lists the parameters you can use to configure the incoming signaling validation.
Parameter sip.request_validation.source.list
<y0000000000xx>.cfg
Description
It configures the name of the request method for which source IP address validation
will be applied.
It is used to ensure the request that is received from the IP address of a SIP server.
Example:
sip.request_validation.source.list = INVITE, NOTIYF
Permitted
Values
A valid string
Summary of Contents for T48G
Page 1: ...linekey X pickup_value ...
Page 8: ...Administrator s Guide for SIP T2 Series T4 Series T5 Series IP Phones iv ...
Page 72: ...Administrator s Guide for SIP T2 Series T4 Series T5 Series IP Phones 52 ...
Page 258: ...Administrator s Guide for SIP T2 Series T4 Series T5 Series IP Phones 238 ...
Page 264: ...Administrator s Guide for SIP T2 Series T4 Series T5 Series IP Phones 244 ...
Page 378: ...Administrator s Guide for SIP T2 Series T4 Series T5 Series IP Phones 358 ...