Linksys SPA921 Cisco Small Business IP Telephony Devices Provisioning Guide - Page 21

Using HTTPS, Provisioning Cisco Small Business VoIP Devices, Enabling HTTPS

Page 21 highlights

Provisioning Cisco Small Business VoIP Devices Using HTTPS 1 Flow Step SEC-PRV-1 SEC-PRV-2 Step Description Secure Provisioning-Initial Configuration: The initial deviceunique CFG file should be targeted to each IP Telephony Device by compiling the CFG file with the spc --target option. This provides an initial level of encryption that does not require the exchange of keys. The initial device-unique CFG file should reconfigure the profile parameters to enable stronger encryption, by programming a 256-bit encryption key, and pointing to a randomly generated TFTP directory. For example, the CFG file might contain: Profile_Rule [--key $A] tftp.callme.com/profile/$B/ spa962.cfg; GPP_A 8e4ca259...; # 256 bit key GPP_B Gp3sqLn...; # random CFG file path directory Secure Provisioning-Full Configuration: The subsequent profile resync operations retrieve 256-bit encrypted CFG files, which maintain the IP Telephony Device in a state synchronized to the provisioning server. All remaining parameters are configured and maintained through this strongly encrypted profile. The encryption key and random directory location can be changed periodically for extra security. Using HTTPS The IP Telephony Device provides a reliable and secure provisioning strategy based on HTTPS requests from the device to the provisioning server. Both a server certificate and a client certificate a used to authenticate the IP Telephony Device to the server and the server to the IP Telephony Device. To use HTTPS, you must generate a Certificate Signing Request (CSR) and submit it to Cisco. Cisco generates a certificate for installation on the provisioning server. The IP Telephony Device accepts the certificate when it seeks to establish an HTTPS connection with the provisioning server. This procedure is described in the "Enabling HTTPS" section on page 26. Cisco Small Business IP Telephony Devices Provisioning Guide 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116

Provisioning Cisco Small Business VoIP Devices
Using HTTPS
Cisco Small Business IP Telephony Devices Provisioning Guide
19
1
Using HTTPS
The IP Telephony Device provides a reliable and secure provisioning strategy
based on HTTPS requests from the device to the provisioning server. Both a
server certificate and a client certificate a used to authenticate the IP Telephony
Device to the server and the server to the IP Telephony Device.
To use HTTPS, you must generate a Certificate Signing Request (CSR) and submit
it to Cisco. Cisco generates a certificate for installation on the provisioning server.
The IP Telephony Device accepts the certificate when it seeks to establish an
HTTPS connection with the provisioning server. This procedure is described in the
“Enabling HTTPS” section on page 26
.
SEC-PRV-1
Secure Provisioning—Initial Configuration: The initial device-
unique CFG file should be targeted to each IP Telephony Device
by compiling the CFG file with the spc --target option. This
provides an initial level of encryption that does not require the
exchange of keys.
The initial device-unique CFG file should reconfigure the profile
parameters to enable stronger encryption, by programming a
256-bit encryption key, and pointing to a randomly generated
TFTP directory. For example, the CFG file might contain:
Profile_Rule [--key $A] tftp.callme.com/profile/$B/
spa962.cfg;
GPP_A 8e4ca259…;
# 256 bit key
GPP_B Gp3sqLn…;
# random CFG file path directory
SEC-PRV-2
Secure Provisioning—Full Configuration: The subsequent profile
resync operations retrieve 256-bit encrypted CFG files, which
maintain the IP Telephony Device in a state synchronized to the
provisioning server.
All remaining parameters are configured and maintained
through this strongly encrypted profile. The encryption key and
random directory location can be changed periodically for extra
security.
Flow Step
Step Description