Copyright @ALE 2020 All Rights Reserved
The callee receives the INVITE message with the RTP encryption algorithm, and then answers the
call by responding with a 200 OK message which carries the negotiated RTP encryption algorithm.
Example of the RTP encryption algorithm carried in the SDP of the 200 OK message:
m=audio 6000 RTP/SAVP 0 101
a=rtpmap: 0 PCMU/8000
a=rtpmap:101 telephone-event/8000
a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:NGY4OGViMDYzZjQzYTNiOTNkOWRiYzRlMjM0Yzcz
a=sendrecv
a=ptime:20
a=fmtp:101 0-15
When SIP-TLS/SRTP is enabled on both IP phones, RTP streams will be encrypted, and a lock
icon appears on the LCD screen of each IP phone after successful negotiation.
Topic
SRTP Configuration
The following table lists the parameters you can use to configure the SRTP.
It configures whether to use voice encryption service.
0:None
1:Best effort
2:Strict
Account -> Advanced -> SRTP Working Mode
It is possible to open a secure remote connection through SSH to access the phone for test
and debug purposes. SSH connections are possible by default.
Topics
SSH session configuration
The following table lists the parameters you can use to configure the SSH session.
It enables or disable the SSH session.
Maintenance ->Security -> SSH Activation