![SpectraLink 8440 Administration Manual Download Page 203](http://html.mh-extra.com/html/spectralink/8440/8440_administration-manual_1343808203.webp)
Spectralink 84-Series Series Wireless Telephones Administration Guide
1725-86984-000_P.docx
September 2016
203
SIP
Browser
Presence
LDAP
This configuration can be done:
Using configuration files.
From the phone menu.
There are several options for utilizing device certificates on the phone.
A factory installed device certificate. This certificate is installed at the time of
manufacture and is unique to a device (based on the MAC address) and signed by the
Spectralink Certificate Authority (CA). Since it is installed at the time of manufacture, it is
the easiest option for out-of-box activities; in particular, device provisioning.
Two platform device certificates. These certificates are loaded onto the device by the
system administrator and can be configured to be used for any of the following
purposes: 802.1X Authentication, provisioning, syslog, SIP signaling, browser
communications, presence, and LDAP.
Six Application device certificates. These certificates are loaded onto the device by the
system administrator and can be used for all of the operations listed above for platform
certificates with the exception of 802.1X, syslog, and provisioning.
Configuration options are used to select which type of device certificate is used for each of the
secure communication options. By default, all operations will utilize the factory installed device
certificate.
To configure your web servers and/or clients to trust Spectralink factory installed device
certificates, you will need to download the Spectralink Issuing CA certificate and the Root CA
will need to be installed on the server. See
Appendix F: Spectralink Certificates
may also need to download the Intermediate CA certificates; this is determined by the
authenticating server.
Platform Device Certificates
Platform device certificates can be installed using one of the following methods:
Using a configuration file. You must enter the certificate in PEM or PKCS# certificate
format.
device.sec.TLS.customDeviceCert
X
.publicCert
device.sec.TLS.customDeviceCert
X
.privateKey
device.sec.TLS.customDeviceCert
X
.set
where X = 1 or 2.
Assign the certificate to Platform Profile 1 or 2 using:
device.sec.TLS.profile.deviceCertx