Administrator’s Guide for SIP-T2_Series_T4_Series IP Phones
494
AES256-SHA
EDH-RSA-DES-CBC3-SHA
EDH-DSS-DES-CBC3-SHA
DES-CBC3-SHA
DHE-RSA-AES128-SHA
DHE-DSS-AES128-SHA
AES128-SHA
IDEA-CBC-SHA
DHE-DSS-RC4-SHA
RC4-SHA
RC4-MD5
EXP1024-DHE-DSS-DES-CBC-SHA
EXP1024-DES-CBC-SHA
EDH-RSA-DES-CBC-SHA
EDH-DSS-DES-CBC-SHA
DES-CBC-SHA
EXP1024-DHE-DSS-RC4-SHA
EXP1024-RC4-SHA
EXP1024-RC4-MD5
EXP-EDH-RSA-DES-CBC-SHA
EXP-EDH-DSS-DES-CBC-SHA
EXP-DES-CBC-SHA
EXP-RC4-MD5
The following figure illustrates the TLS messages exchanged between the IP phone and
TLS server to establish an encrypted communication channel:
Step1: IP phone sends “Client Hello” message proposing SSL options.
Step2: Server responds with “Server Hello” message selecting the SSL options, sends its
public key information in “Server Key Exchange” message and concludes its part of the
negotiation with “Server Hello Done” message.
Step3: IP phone sends session key information (encrypted by server’s public key) in the
Summary of Contents for Yealink SIP-T46G
Page 1: ...啊 ...
Page 8: ...Administrator s Guide for SIP T2_Series_T4_Series IP Phones viii ...
Page 28: ...Administrator s Guide for SIP T2_Series_T4_Series IP Phones 14 ...
Page 70: ...Administrator s Guide for SIP T2_Series_T4_Series IP Phones 56 ...
Page 558: ...Administrator s Guide for SIP T2_Series_T4_Series IP Phones 544 ...
Page 622: ...Administrator s Guide for SIP T2_Series_T4_Series IP Phones 608 ...