Matrix SPARSH VP710 User Guide
701
CHAPTER 14
Configuring Security
Features
This chapter provides information for making configuration changes for the following security-related features:
•
Transport Layer Security
•
Secure Real-Time Transport Protocol
•
Encrypting Configuration Files
•
and
•
•
TLS
TLS is a commonly-used protocol for providing communications privacy and managing the security of message
transmission, allowing IP phones to communicate with other remote parties and connect to the HTTPS URL for
provisioning in a way that is designed to prevent eavesdropping and tampering.
TLS protocol is composed of two layers: TLS Record Protocol and TLS Handshake Protocol. The TLS Record
Protocol completes the actual data transmission and ensures the integrity and privacy of the data. The TLS
Handshake Protocol allows the server and client to authenticate each other and negotiate an encryption algorithm
and cryptographic keys before data is exchanged.
The TLS protocol uses asymmetric encryption for authentication of key exchange, symmetric encryption for
confidentiality, and message authentication codes for integrity.
•
Symmetric encryption:
For symmetric encryption, the encryption key and the corresponding decryption
key can be told by each other. In most cases, the encryption key is the same as the decryption key.
•
Asymmetric encryption:
For asymmetric encryption, each user has a pair of cryptographic keys – a
public encryption key and a private decryption key. The information encrypted by the public key can only
be decrypted by the corresponding private key and vice-versa. Usually, the receiver keeps its private key.
The public key is known by the sender, so the sender sends the information encrypted by the known public
key, and then the receiver uses the private key to decrypt it.
IP phones support TLS version 1.0. A cipher suite is a named combination of authentication, encryption, and
message authentication code (MAC) algorithms used to negotiate the security settings for a network connection
using the TLS/SSL network protocol. IP phones support the following cipher suites:
Содержание SPARSH VP710
Страница 1: ......
Страница 2: ......
Страница 3: ...SPARSH VP710 The Smart Video IP Deskphone User Guide ...
Страница 26: ...18 Matrix SPARSH VP710 User Guide ...
Страница 28: ...20 Matrix SPARSH VP710 User Guide Phone Stand Handset Handset Cord Ethernet Cable Camera ...
Страница 236: ...228 Matrix SPARSH VP710 User Guide ...
Страница 322: ...314 Matrix SPARSH VP710 User Guide ...
Страница 336: ...328 Matrix SPARSH VP710 User Guide ...
Страница 447: ...Matrix SPARSH VP710 User Guide 439 Select the desired value from the Send Video list Click Confirm to save the change ...
Страница 468: ...460 Matrix SPARSH VP710 User Guide Click Confirm to save the change ...
Страница 476: ...468 Matrix SPARSH VP710 User Guide Select the desired value from the Logon Wizard list Click Confirm to save changes ...
Страница 494: ...486 Matrix SPARSH VP710 User Guide The following shows a video call has been muted ...
Страница 498: ...490 Matrix SPARSH VP710 User Guide Select the desired value from the PswDial list Click Confirm to save the change ...
Страница 544: ...536 Matrix SPARSH VP710 User Guide Select the desired value from the RPort list Click Confirm to save the change ...
Страница 568: ...560 Matrix SPARSH VP710 User Guide Tap to save the change or to cancel ...
Страница 637: ...Matrix SPARSH VP710 User Guide 629 Click Confirm to save the change ...
Страница 724: ...716 Matrix SPARSH VP710 User Guide ...
Страница 754: ...746 Matrix SPARSH VP710 User Guide ...
Страница 764: ...756 Matrix SPARSH VP710 User Guide ...
Страница 1041: ...Matrix SPARSH VP710 User Guide 1033 Application Compatibility List ...
Страница 1045: ...Matrix SPARSH VP710 User Guide 1037 ...