EasyManuals Logo

Akuvox SP-R5xP User Manual

Akuvox SP-R5xP
221 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #141 background imageLoading...
Page #141 background image
Administrator’s Guide for Akuvox SP-R5xP IP Phones
Akuvox Proprietary and Confidential. Copyright © 2014 Akuvox network Co., Ltd..
Page 140 of 221
Configuring Security Features
This chapter provides information for making configuration changes for the following
security-related features:
Transport Layer Security
Secure Real-Time Transport Protocol
Transport Layer Security
TLS is a commonly-used protocol for providing communications privacy and managing the
security of message transmission, allowing IP phones to communicate with other remote parties
and connect to the HTTPS URL for provisioning in a way that is designed to prevent
eavesdropping and tampering.
TLS protocol is composed of two layers: TLS Record Protocol and TLS Handshake Protocol. The TLS
Record Protocol completes the actual data transmission and ensures the integrity and privacy of
the data. The TLS Handshake Protocol allows the server and client to authenticate each other and
negotiate an encryption algorithm and cryptographic keys before data is exchanged.
The TLS protocol uses asymmetric encryption for authentication of key exchange, symmetric
encryption for confidentiality, and message authentication codes for Integrity.
Symmetric encryption: For symmetric encryption, the encryption key and the corresponding
decryption key can be told by each other. In most cases, the encryption key is the same as
the decryption key.
Asymmetric encryption: For asymmetric encryption, each user has a pair of cryptographic
keys a public encryption key and a private decryption key. The information encrypted by
the public key can only be decrypted by the corresponding private key and vice versa.
Usually, the receiver keeps its private key. The public key is known by the sender, so the
sender sends the information encrypted by the known public key, and then the receiver uses
the private key to decrypt it.
IP phones support TLS version 1.0. A cipher suite is a named combination of authentication,
encryption, and message authentication code (MAC) algorithms used to negotiate the security
settings for a network connection using the TLS/SSL network protocol. IP phones support the
following cipher suites:
DHE-RSA-AES256-SHA

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Akuvox SP-R5xP and is the answer not in the manual?

Akuvox SP-R5xP Specifications

General IconGeneral
BrandAkuvox
ModelSP-R5xP
CategoryIP Phone
LanguageEnglish

Related product manuals