Table of Contents

Secure IP Phone

Encrypted and Authenticated Signaling

Encrypted and Authenticated RTP

TLS Secure Signaling

Certificate Exchange in TLS

Server to IP Phone Authentication

IP Phone to Server Authentication

TLS Session Key Exchange

Authenticated Signaling using TLS

Secure RTP

SRTP Encryption

SRTP Authentication

Configuration

PKI

Phone Security Profile