Phone Network
33
Web UI Settings->SIP->TLS SIP Port
VPN
Yealink IP phones use OpenVPN to achieve VPN feature. To prevent disclosure of private information, tunnel endpoints
must authenticate each other before secure VPN tunnel is established. After you configure VPN feature on the IP
phone, the IP phone will act as a VPN client and use the certificates to authenticate with the VPN server.
For more information, refer to OpenVPN Feature on Yealink IP phones.
Topics
VPN Related Files
VPN Configuration
VPN Related Files
To use VPN, you should collect the VPN-related files into one archive file in .tar format and then upload this tar file.
The VPN-related files include certificates (ca.crt and client.crt), key (client.key) and the configuration file (vpn.cnf) of
the VPN client.
The following table lists the unified directories of the OpenVPN certificates and key in the configuration file (vpn.cnf)
for Yealink IP phones:
VPN Files Description Unified Directories
ca.crt CA certificate /config/openvpn/keys/ca.crt
client.crt Client certificate /config/openvpn/keys/client.crt
client.key Private key of the client /config/openvpn/keys/client.key
VPN Configuration
The following table lists the parameters you can use to configure VPN.
Parameter
static.network.vpn_enable
[1]
<y0000000000xx>.cfg
Description It enables or disables the OpenVPN feature on the IP phone.
Permitted Values
0-Disabled
1-Enabled
Default 0
Web UI Network->Advanced->VPN->Active
Parameter static.openvpn.url <y0000000000xx>.cfg
Description
It configures the access URL of the *.tar file for OpenVPN.
Example:
static.openvpn.url = http://192.168.10.25/OpenVPN.tar
Permitted Values URL within 511 characters
Default Blank
Web UI Network->Advanced->VPN->Upload VPN Config