Administrator’s Guide for W80 DECT IP Multi-Cell System
122
7.
Click
OK
.
The target directory will be automatically opened. You can find the encrypted CFG file(s), encrypted key file(s)
and an Aeskey.txt file storing plaintext AES key(s).
Incoming Network Signaling Validation
Yealink phones support the following three optional levels of security for validating incoming network signaling:
l
Source IP address validation
: ensure the request is received from an IP address of a server belonging to the set
of target SIP servers.
l
Digest authentication
: challenge requests with digest authentication using the local credentials for the asso-
ciated registered account.
l
Source IP address validation and digest authentication
: apply both of the above methods.
Topic
Incoming Network Signaling Validation Configuration
Incoming Network Signaling Validation Configuration
The following table lists the parameters you can use to configure the incoming network signaling validation.
Parameter
sip.request_validation.source.list
<y0000000000xx>.cfg
Description
It configures the name of the request method for which source IP address validation will be applied.
Example
:
sip.request_validation.source.list = INVITE, NOTIFY