EasyManuals Logo

Yealink CP860 Administrator's Guide

Yealink CP860
417 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #317 background imageLoading...
Page #317 background image
Configuring Security Features
305
This chapter provides information for making configuration changes for the following
security-related features:
Transport Layer Security
Secure Real-Time Transport Protocol
Encrypting Configuration Files
TLS is a commonly-used protocol for providing communications privacy and managing
the security of message transmission, allowing IP phones to communicate with other
remote parties and connect to the HTTPS URL for provisioning in a way that is designed
to prevent eavesdropping and tampering.
TLS protocol is composed of two layers: TLS Record Protocol and TLS Handshake
Protocol. The TLS Record Protocol completes the actual data transmission and ensures
the integrity and privacy of the data. The TLS Handshake Protocol allows the server and
client to authenticate each other and negotiate an encryption algorithm and
cryptographic keys before data is exchanged.
The TLS protocol uses asymmetric encryption for authentication of key exchange,
symmetric encryption for confidentiality, and message authentication codes for
integrity.
Symmetric encryption: For symmetric encryption, the encryption key and the
corresponding decryption key can be told by each other. In most cases, the
encryption key is the same as the decryption key.
Asymmetric encryption: For asymmetric encryption, each user has a pair of
cryptographic keys a public encryption key and a private decryption key. The
information encrypted by the public key can only be decrypted by the
corresponding private key and vice versa. Usually, the receiver keeps its private
key. The public key is known by the sender, so the sender sends the information
encrypted by the known public key, and then the receiver uses the private key to
decrypt it.
CP860 IP conference phones support TLS 1.0. A cipher suite is a named combination of
authentication, encryption, and message authentication code (MAC) algorithms used
to negotiate the security settings for a network connection using the TLS/SSL network
protocol. CP860 IP conference phones support the following cipher suites:
DHE-RSA-AES256-SHA
DHE-DSS-AES256-SHA

Table of Contents

Other manuals for Yealink CP860

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Yealink CP860 and is the answer not in the manual?

Yealink CP860 Specifications

General IconGeneral
SpeakerphoneYes
Voice codecsG.711, G.722, G.729ab, iLBC
Handset type-
Product typeIP Phone
Product colorBlack
Display resolution192 x 64 pixels
Lines quantity- lines
Phonebook capacity1000 entries
Number of VoIP accounts1
Networking standardsIEEE 802.1x, IEEE 802.3af
Supported network protocolsIPv4/IPv6
USB 2.0 ports quantityUSB 2.0 ports have a data transmission speed of 480 Mbps, and are backwards compatible with USB 1.1 ports. You can connect all kinds of peripheral devices to them.
AC adapter input voltage100 - 240 V
AC adapter output current2 A
AC adapter output voltage5 V
Number of handles included- pc(s)
Storage temperature (T-T)10 - 50 °C
Operating relative humidity (H-H)10 - 95 %
Weight and Dimensions IconWeight and Dimensions
Depth260 mm
Width320 mm
Height52 mm

Related product manuals