Security Features
329
6.
Click
Encrypt
to encrypt the configuration file(s).
7.
Click
OK
.
The target directory will be automatically opened. You can find the encrypted CFG file(s), encrypted key file(s) and
an Aeskey.txt file storing plaintext AES key(s).
Incoming Network Signaling Validation
Yealink phones support the following three optional levels of security for validating incoming network signaling:
l
Source IP address validation
: ensure the request is received from an IP address of a server belonging to the set of
target SIP servers.
l
Digest authentication
: challenge requests with digest authentication using the local credentials for the associated
registered account.
l
Source IP address validation and digest authentication
: apply both of the above methods.
Topic
Incoming Network Signaling Validation Configuration
Incoming Network Signaling Validation Configuration
The following table lists the parameters you can use to configure the incoming network signaling validation.
Parameter
sip.request_validation.source.list
<y0000000000xx>.cfg
Description
It configures the name of the request method for which source IP address validation will be applied.
Содержание T5 Series
Страница 1: ......
Страница 26: ...20 Administrator s Guide for SIP T58V T58A T56A CP960 IP Phones ...
Страница 58: ...52 Administrator s Guide for SIP T58V T58A T56A CP960 IP Phones ...
Страница 86: ...80 Administrator s Guide for SIP T58V T58A T56A CP960 IP Phones ...
Страница 88: ...82 Administrator s Guide for SIP T58V T58A T56A CP960 IP Phones ...
Страница 316: ...310 Administrator s Guide for SIP T58V T58A T56A CP960 IP Phones ...
Страница 388: ...382 Administrator s Guide for SIP T58V T58A T56A CP960 IP Phones ...
Страница 464: ...458 Administrator s Guide for SIP T58V T58A T56A CP960 IP Phones ...