
Mitel 6800 Series SIP Phone Release 4.2.0 SP2 Administrator Guide
6-31
SYMMETRIC TLS SIGNALING
The IP phones also use symmetric TLS signaling for outgoing TLS SIP messages by default.
When symmetric TLS is enabled, the IP phone uses port 5061 as the persistent TLS connection
source port.
Administrators can manually disable symmetric TLS signaling using the IP phone’s
configuration files. When you disable symmetric TLS signaling, the IP phone chooses a random
persistent TLS connection source port from the TCP range (i.e. 49152...65535) for TLS
messages after each reboot regardless of whether the parameter
sip outbound support
is
enabled or disabled.
An Administrator can configure symmetric TLS signaling using the configuration files only.
CONFIGURING SYMMETRIC TLS SIGNALING USING THE CONFIGURA-
TION FILES
You use the following parameter to enable or disable Symmetric TLS Signaling in the
configuration files:
•
sips symmetric tls signaling
For the specific parameter you can set in the configuration files, see Appendix A, the section,
“Symmetric TLS Signaling Setting”
on
REMOVING USERAGENT AND SERVER SIP HEADERS
Currently, the phone always configures the SIP UserAgent/Server headers to contain:
Aastra <PhoneModel>/<FirmwareVersion>
You can suppress the addition of these headers by using the following parameter in the
configuration files:
•
sip user-agent
Setting this parameter allows you to enable or disable the addition of the User-Agent and Server
SIP headers from the SIP stack.
You can configure this feature using the configuration files only.
Note:
If multiple persistent TLS connections are required, the persistent TLS connection
source ports will follow the structure of random_port, rando 1, rando
2, etc....
CONFIGURATION FILES
Summary of Contents for 6800 Series
Page 1: ...Mitel 6800 Series SIP Phones 58014473 REV02 RELEASE 4 2 0 SERVICE PACK 2 ADMINISTRATOR GUIDE ...
Page 22: ...Chapter 1 OVERVIEW ...
Page 53: ...Chapter 2 CONFIGURATION INTERFACE METHODS ...
Page 72: ...Chapter 3 ADMINISTRATOR OPTIONS ...
Page 154: ...Chapter 4 CONFIGURING NETWORK AND SESSION INITIATION PROTOCOL SIP FEATURES ...
Page 264: ...Chapter 5 CONFIGURING OPERATIONAL FEATURES ...
Page 590: ...Chapter 6 CONFIGURING ADVANCED OPERATIONAL FEATURES ...
Page 698: ...Chapter 7 ENCRYPTED FILES ON THE IP PHONE ...
Page 704: ...Chapter 8 UPGRADING THE FIRMWARE ...
Page 713: ...Chapter 9 TROUBLESHOOTING ...
Page 743: ...Appendix A CONFIGURATION PARAMETERS ...
Page 1065: ...Appendix B CONFIGURING THE IP PHONE AT THE ASTERISK IP PBX ...
Page 1069: ...Appendix C SAMPLE CONFIGURATION FILES ...
Page 1085: ...Appendix D SAMPLE BLF SOFTKEY SETTINGS ...
Page 1090: ...Appendix E SAMPLE MULTIPLE PROXY SERVER CONFIGURATION ...
Page 1094: ...Appendix F CERTIFICATE SUPPORT ...
Page 1113: ......