EasyManuals Logo
Home>Yealink>IP Phone>SIP-T2 Series

Yealink SIP-T2 Series User Manual

Yealink SIP-T2 Series
1056 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #899 background imageLoading...
Page #899 background image
Configuring Security Features
875
is the same as the decryption key.
Asymmetric encryption: For asymmetric encryption, each user has a pair of cryptographic
keys a public encryption key and a private decryption key. The information encrypted by
the public key can only be decrypted by the corresponding private key and vice versa.
Usually, the receiver keeps its private key. The public key is known by the sender, so the
sender sends the information encrypted by the known public key, and then the receiver
uses the private key to decrypt it.
IP phones support TLS version 1.0, 1.1 and 1.2. A cipher suite is a named combination of
authentication, encryption, and message authentication code (MAC) algorithms used to
negotiate the security settings for a network connection using the TLS/SSL network protocol. IP
phones support the following cipher suites:
DHE-RSA-AES256-SHA
DHE-DSS-AES256-SHA
AES256-SHA
EDH-RSA-DES-CBC3-SHA
EDH-DSS-DES-CBC3-SHA
DES-CBC3-SHA
DES-CBC3-MD5
DHE-RSA-AES128-SHA
DHE-DSS-AES128-SHA
AES128-SHA
RC2-CBC-MD5
IDEA-CBC-SHA
DHE-DSS-RC4-SHA
RC4-SHA
RC4-MD5
RC4-64-MD5
EXP1024-DHE-DSS-DES-CBC-SHA
EXP1024-DES-CBC-SHA
EDH-RSA-DES-CBC-SHA
EDH-DSS-DES-CBC-SHA
DES-CBC-SHA
DES-CBC-MD5
EXP1024-DHE-DSS-RC4-SHA
EXP1024-RC4-SHA
EXP1024-RC4-MD5
EXP-EDH-RSA-DES-CBC-SHA
EXP-EDH-DSS-DES-CBC-SHA

Table of Contents

Other manuals for Yealink SIP-T2 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Yealink SIP-T2 Series and is the answer not in the manual?

Yealink SIP-T2 Series Specifications

General IconGeneral
BrandYealink
ModelSIP-T2 Series
CategoryIP Phone
LanguageEnglish

Related product manuals