EasyManuals Logo

Yealink T40G Administrator's Guide

Yealink T40G
622 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #451 background imageLoading...
Page #451 background image
Security Features
431
key file(s) and an Aeskey.txt file storing plaintext AES key(s).
Incoming Signaling Validation
Yealink IP phones support the following three optional levels of security for validating incoming network
signaling:
Source IP address validation: ensure the request is received from an IP address of a server
belonging to the set of target SIP servers.
Digest authentication: challenge requests with digest authentication using the local credentials for
the associated registered account.
Source IP address validation and digest authentication: apply both of the above methods.
Topic
Incoming Signaling Validation Configuration
Incoming Signaling Validation Configuration
The following table lists the parameters you can use to configure the incoming signaling validation.
Parameter
sip.request_validation.source.list
<y0000000000xx>.cfg
Description
It configures the name of the request method for which source IP address validation
will be applied.
It is used to ensure the request that is received from the IP address of a SIP server.
Example:
sip.request_validation.source.list = INVITE, NOTIYF
Permitted
Values
A valid string

Table of Contents

Other manuals for Yealink T40G

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Yealink T40G and is the answer not in the manual?

Yealink T40G Specifications

General IconGeneral
SIP Accounts3
Wall MountableYes
Opus CodecNo
Display2.3 inch 132x64-pixel graphical LCD
NetworkDual-port Gigabit Ethernet
PoEYes
Headset SupportYes, RJ9 port
Power AdapterOptional
Voice CodecsG.722, G.711(A/μ), G.729AB, G.726
Local Phonebook1000 entries

Related product manuals