Table of Contents
5
Auto Logout Time Configuration
Emergency Number Configuration
Transport Layer Security (TLS)
Supported Trusted and Server Certificates
Supported Trusted Certificates
Secure Real-Time Transport Protocol (SRTP)
Encrypting and Decrypting Files
Configuration Files Encryption Tools
Configuration Files Encryption and Decryption
Encryption and Decryption Configuration
Example: Encrypting Configuration Files
Incoming Network Signaling Validation
Incoming Network Signaling Validation Configuration
Firmware Upgrade Configuration
Upgrading Multiple Handsets via Web User Interface
Hearing Aid Compatibility (HAC) Volume Control Configuration