Using Https - Cisco SPA921 - - IP Phone Provisioning Manual

Voice system, voice gateways, and ip telephones
Hide thumbs Also See for SPA921 - Cisco - IP Phone:
Table of Contents

Advertisement

Provisioning Cisco Small Business VoIP Devices

Using HTTPS

Using HTTPS
Cisco Small Business IP Telephony Devices Provisioning Guide
Flow Step
SEC-PRV-1
SEC-PRV-2
The IP Telephony Device provides a reliable and secure provisioning strategy
based on HTTPS requests from the device to the provisioning server. Both a
server certificate and a client certificate a used to authenticate the IP Telephony
Device to the server and the server to the IP Telephony Device.
To use HTTPS, you must generate a Certificate Signing Request (CSR) and submit
it to Cisco. Cisco generates a certificate for installation on the provisioning server.
The IP Telephony Device accepts the certificate when it seeks to establish an
HTTPS connection with the provisioning server. This procedure is described in the
"Enabling HTTPS" section on page
Step Description
Secure Provisioning—Initial Configuration: The initial device-
unique CFG file should be targeted to each IP Telephony Device
by compiling the CFG file with the spc --target option. This
provides an initial level of encryption that does not require the
exchange of keys.
The initial device-unique CFG file should reconfigure the profile
parameters to enable stronger encryption, by programming a
256-bit encryption key, and pointing to a randomly generated
TFTP directory. For example, the CFG file might contain:
Profile_Rule [--key $A] tftp.callme.com/profile/$B/
spa962.cfg;
GPP_A 8e4ca259...;
# 256 bit key
GPP_B Gp3sqLn...;
# random CFG file path directory
Secure Provisioning—Full Configuration: The subsequent profile
resync operations retrieve 256-bit encrypted CFG files, which
maintain the IP Telephony Device in a state synchronized to the
provisioning server.
All remaining parameters are configured and maintained
through this strongly encrypted profile. The encryption key and
random directory location can be changed periodically for extra
security.
26.
1
19

Advertisement

Table of Contents
loading

Table of Contents