Panasonic KX-TGP500B04 Administration Guide - Page 27

Encryption

Page 27 highlights

1.1.6 Provisioning http://prov.example.com/Panasonic/Config0080F0111111.cfg b. The unit with the MAC address 0080F0222222 accesses the following URLs: http://prov.example.com/Panasonic/ConfigCommon.cfg http://prov.example.com/Panasonic/Config0080F0222222.cfg Example Provisioning Direction from the Server The following figure shows an example NOTIFY message from the server, directing the units to perform provisioning. The text "check-sync" is specified for "CFG_RESYNC_FROM_SIP". NOTIFY sip:[email protected] SIP/2.0 Via: SIP/2.0/UDP xxx.xxx.xxx.xxx:5060;branch=abcdef-ghijkl From: sip:[email protected] To: sip:[email protected] Date: Thu, 1 Jan 2009 01:01:01 GMT Call-ID: 123456-1234567912345678 CSeq: 1 NOTIFY Contact: sip:xxx.xxx.xxx.xxx:5060 Event: check-sync Content-Length: 0 1.1.6.6 Encryption Secure Provisioning Methods In order to perform provisioning securely, there are 2 methods for transferring configuration files securely between the unit and the server. Which method is used depends on the environment and equipment available from the phone system. Method 1: Transferring Encrypted Configuration Files Unencrypted configuration file CFG_FILE_KEY1 Encrypted configuration file CFG_FILE_KEY1 To use this method, an encryption key is required to encrypt and decrypt the configuration files. A preset encryption key unique to each unit, an encryption key set by your phone system dealer, etc., is used for the encryption. When the unit downloads an encrypted configuration file, it will decrypt the file using the same encryption key, and then configure the settings automatically. Method 2: Transferring Configuration Files Using HTTPS This method uses SSL, which is commonly used on the Internet, to transfer configuration files between the unit and server. For more secure communication, you can use a root certificate. Notice • To avoid redundant data transfer over the network, important data, such as the encryption key used to encrypt the configuration files and the root certificate for SSL, should be configured through pre-provisioning as much as possible. • It is recommended that you encrypt the data in order to keep the communication secure when transferring configuration files. However, if you are using the units within a secure environment, such as within an intranet, it is not necessary to encrypt the data. Document Version 2010-08 Administrator Guide 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256

b.
The unit with the MAC address 0080F0222222 accesses the following URLs:
Example Provisioning Direction from the Server
The following figure shows an example NOTIFY message from the server, directing the units to perform
provisioning. The text "check-sync" is specified for "
CFG_RESYNC_FROM_SIP
".
NOTIFY sip:[email protected] SIP/2.0
Via: SIP/2.0/UDP xxx.xxx.xxx.xxx:5060;branch=abcdef-ghijkl
Date: Thu, 1 Jan 2009 01:01:01 GMT
Call-ID: 123456-1234567912345678
CSeq: 1 NOTIFY
Contact: sip:xxx.xxx.xxx.xxx:5060
Event: check-sync
Content-Length: 0
1.1.6.6
Encryption
Secure Provisioning Methods
In order to perform provisioning securely, there are 2 methods for transferring configuration files securely
between the unit and the server.
Which method is used depends on the environment and equipment available from the phone system.
Method 1: Transferring Encrypted Configuration Files
Unencrypted
configuration
file
Encrypted
configuration
file
CFG_FILE_KEY1
CFG_FILE_KEY1
To use this method, an encryption key is required to encrypt and decrypt the configuration files. A preset
encryption key unique to each unit, an encryption key set by your phone system dealer, etc., is used for the
encryption. When the unit downloads an encrypted configuration file, it will decrypt the file using the same
encryption key, and then configure the settings automatically.
Method 2: Transferring Configuration Files Using HTTPS
This method uses SSL, which is commonly used on the Internet, to transfer configuration files between the
unit and server. For more secure communication, you can use a root certificate.
Notice
To avoid redundant data transfer over the network, important data, such as the encryption key used
to encrypt the configuration files and the root certificate for SSL, should be configured through
pre-provisioning as much as possible.
It is recommended that you encrypt the data in order to keep the communication secure when
transferring configuration files.
However, if you are using the units within a secure environment, such as within an intranet, it is not
necessary to encrypt the data.
Document Version
2010-08
Administrator Guide
27
1.1.6 Provisioning