Administrator‘s Guide for Yealink VC110 Video Conferencing Endpoint
178
The display device prompts ―Reboot now?‖.
4.
Select OK to reboot the endpoint immediately.
TLS is a commonly-used protocol for providing communications privacy and managing
the security of message transmission, allowing the endpoint to communicate with other
remote parties and connect to the HTTPS URL for provisioning in a way that is designed
to prevent eavesdropping and tampering.
TLS protocol is composed of two layers: TLS Record Protocol and TLS Handshake
Protocol. The TLS Record Protocol completes the actual data transmission and ensures
the integrity and privacy of the data. The TLS Handshake Protocol allows the server and
client to authenticate each other and negotiate an encryption algorithm and
cryptographic keys before data is exchanged.
The endpoint supports TLS 1.0. A cipher suite is a named combination of authentication,
encryption, and message authentication code (MAC) algorithms used to negotiate the
security settings for a network connection using the TLS/SSL network protocol. The
endpoint supports the following cipher suites:
DHE-RSA-AES256-SHA
DHE-DSS-AES256-SHA
AES256-SHA
EDH-RSA-DES-CBC3-SHA
EDH-DSS-DES-CBC3-SHA
DES-CBC3-SHA
DHE-RSA-AES128-SHA
DHE-DSS-AES128-SHA
AES128-SHA
IDEA-CBC-SHA
DHE-DSS-RC4-SHA
RC4-SHA
RC4-MD5
EXP1024-DHE-DSS-DES-CBC-SHA
EXP1024-DES-CBC-SHA
EDH-RSA-DES-CBC-SHA
EDH-DSS-DES-CBC-SHA
DES-CBC-SHA
EXP1024-DHE-DSS-RC4-SHA
Summary of Contents for VC110
Page 1: ......
Page 4: ...iv...
Page 58: ...Administrator s Guide for Yealink VC110 Video Conferencing Endpoint 48...
Page 108: ...Administrator s Guide for Yealink VC110 Video Conferencing Endpoint 98...
Page 168: ...Administrator s Guide for Yealink VC110 Video Conferencing Endpoint 158...
Page 182: ...Administrator s Guide for Yealink VC110 Video Conferencing Endpoint 172...
Page 210: ...Administrator s Guide for Yealink VC110 Video Conferencing Endpoint 200...
Page 231: ...Appendix 221...