Example Provisioning Direction from the Server
The following figure shows an example NOTIFY message from the server, directing the SIP-CSs to perform
provisioning. The text "check-sync" is specified for "
CFG_RESYNC_FROM_SIP
".
NOTIFY sip:[email protected] SIP/2.0
Via: SIP/2.0/UDP xxx.xxx.xxx.xxx:5060;branch=abcdef-ghijkl
From: sip:[email protected]
To: sip:[email protected]
Date: Thu, 1 Jan 2009 01:01:01 GMT
Call-ID: 123456-1234567912345678
CSeq: 1 NOTIFY
Contact: sip:xxx.xxx.xxx.xxx:5060
Event: check-sync
Content-Length: 0
3.2.6 Encryption
Secure Provisioning Methods
In order to perform provisioning securely, there are 2 methods for transferring configuration files securely
between the SIP-CS and the server.
Which method is used depends on the environment and equipment available from the phone system.
Method 1: Transferring Encrypted Configuration Files
Unencrypted
configuration
file
Encrypted
configuration
file
CFG_FILE_KEY1
CFG_FILE_KEY1
To use this method, an encryption key is required to encrypt and decrypt the configuration files. A preset
encryption key unique to each SIP-CS, an encryption key set by your dealer, etc., is used for the encryption.
When the SIP-CS downloads an encrypted configuration file, it will decrypt the file using the same encryption
key, and then configure the settings automatically.
Method 2: Transferring Configuration Files Using HTTPS
This method uses SSL, which is commonly used on the Internet, to transfer configuration files between the
SIP-CS and server. For more secure communication, you can use a root certificate.
Notice
•
To avoid redundant data transfer over the network, important data, such as the encryption key used
to encrypt the configuration files and the root certificate for SSL, should be configured through
pre-provisioning as much as possible.
•
It is recommended that you encrypt the data in order to keep the communication secure when
transferring configuration files.
However, if you are using the SIP-CSs within a secure environment, such as within an intranet, it is
not necessary to encrypt the data.
To decrypt configuration files, the SIP-CS uses the encryption key registered to it beforehand. The SIP-CS
determines the encryption status by checking the extension of the downloaded configuration file.
For details about encrypting configuration files, contact the appropriate person in your organization.
158
Administrator Guide
Document Version 2013-03
3.2.6 Encryption
Summary of Contents for KX-UDS124
Page 146: ...146 Administrator Guide Document Version 2013 03 2 7 7 Restart ...
Page 164: ...164 Administrator Guide Document Version 2013 03 3 5 2 Example with Incorrect Descriptions ...
Page 250: ...250 Administrator Guide Document Version 2013 03 5 2 PS Registration using Provisioning ...
Page 280: ...280 Administrator Guide Document Version 2013 03 10 1 Troubleshooting ...
Page 281: ...Section 11 Appendix Document Version 2013 03 Administrator Guide 281 ...
Page 286: ...286 Administrator Guide Document Version 2013 03 11 1 Open Source Software ...
Page 287: ...Index Document Version 2013 03 Administrator Guide 287 ...
Page 289: ...Document Version 2013 03 Administrator Guide 289 Notes ...
Page 290: ...290 Administrator Guide Document Version 2013 03 Notes ...
Page 291: ...Document Version 2013 03 Administrator Guide 291 Notes ...