Linksys SPA921 Cisco Small Business IP Telephony Devices Provisioning Guide - Page 74

Secure Resync, Basic HTTPS Resync

Page 74 highlights

Provisioning Tutorial Secure Resync 3 STEP 6 In the HTTP server logs, observe how information identifying the test IP Telephony Device appears in the log of user agents. This should include the manufacturer, product name, current firmware version, and serial number. Secure Resync This section demonstrates the preferred mechanisms available on the IP Telephony Device for securing the provisioning process. It includes the following topics: • Basic HTTPS Resync, page 72 • HTTPS With Client Certificate Authentication, page 74 • HTTPS Client Filtering and Dynamic Content, page 75 Basic HTTPS Resync HTTPS adds SSL to HTTP for remote provisioning so that: • The IP Telephony Device can authenticate the provisioning server. • The provisioning server can authenticate the IP Telephony Device. • The confidentiality of information exchanged between the IP Telephony Device and the provisioning server is ensured through encryption. SSL generates and exchanges secret (symmetric) keys for each connection between the IP Telephony Device and the server, using public/private key pairs preinstalled in the IP Telephony Device and the provisioning server. On the client side, using HTTPS (with the GET method), simply requires changing the definition of the URL in the Profile_Rule parameter from http to https. On the server side, the service provider must install and set up the HTTPS server. In addition, an SSL server certificate signed by Cisco must be installed on the provisioning server. The devices cannot resync to a server using HTTPS, unless the server supplies a Cisco-signed server certificate. Cisco Small Business IP Telephony Devices Provisioning Guide 72

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116

Provisioning Tutorial
Secure Resync
Cisco Small Business IP Telephony Devices Provisioning Guide
72
3
STEP 6
In the HTTP server logs, observe how information identifying the test IP Telephony
Device appears in the log of user agents.
This should include the manufacturer, product name, current firmware version, and
serial number.
Secure Resync
This section demonstrates the preferred mechanisms available on the IP
Telephony Device for securing the provisioning process. It includes the following
topics:
Basic HTTPS Resync, page 72
HTTPS With Client Certificate Authentication, page 74
HTTPS Client Filtering and Dynamic Content, page 75
Basic HTTPS Resync
HTTPS adds SSL to HTTP for remote provisioning so that:
The IP Telephony Device can authenticate the provisioning server.
The provisioning server can authenticate the IP Telephony Device.
The confidentiality of information exchanged between the IP Telephony
Device and the provisioning server is ensured through encryption.
SSL generates and exchanges secret (symmetric) keys for each connection
between the IP Telephony Device and the server, using public/private key pairs
preinstalled in the IP Telephony Device and the provisioning server.
On the client side, using HTTPS (with the GET method), simply requires changing
the definition of the URL in the Profile_Rule parameter from
http
to
https
. On the
server side, the service provider must install and set up the HTTPS server.
In addition, an SSL server certificate signed by Cisco must be installed on the
provisioning server. The devices cannot resync to a server using HTTPS, unless
the server supplies a Cisco-signed server certificate.