{"id":323,"date":"2010-02-25T22:02:07","date_gmt":"2010-02-25T21:02:07","guid":{"rendered":"http:\/\/ccievoice.ksiazek.be\/?p=323"},"modified":"2025-01-11T18:28:05","modified_gmt":"2025-01-11T17:28:05","slug":"miclsc-security-endpoints","status":"publish","type":"post","link":"https:\/\/collaboration.ksiazek.be\/?p=323","title":{"rendered":"MIC,LSC, Security Endpoints"},"content":{"rendered":"<p>Regarding security endpoints, you have 2 opportunities :<\/p>\n<blockquote>\n<ul>\n<li>Newer phones are using more an existing Mafufacturing Installed Certificate , this is the MIC<\/li>\n<li>Meanwhile , old phones will use a Locally Significant Certificate ( LSC) which will be installed by the Certificate Authority Proxy Function (CAPF)<\/li>\n<\/ul>\n<\/blockquote>\n<p>As LSC must be a transaction between the Ip phone and the CAPF , here is the process as it is issued :<\/p>\n<blockquote>\n<ol>\n<li>IP Phone generates a public\/private key pair<\/li>\n<li>A TLS Session is established with the CAPF Service and the keys and identity are sent from the phone to CAPF<\/li>\n<li>The CAPF Service creates and sends an LSC to the phone<\/li>\n<li>The IP Phone installs the LSC<\/li>\n<\/ol>\n<\/blockquote>\n<p>Also for info, the CAPF Service must be in the phone CTL file , which is downloaded from the TFTP when the phone boots .<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regarding security endpoints, you have 2 opportunities : Newer phones are using more an existing Mafufacturing Installed Certificate , this is the MIC Meanwhile , old phones will use a Locally Significant Certificate ( LSC) which will be installed by the Certificate Authority Proxy Function (CAPF) As LSC must be a transaction between the Ip [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[15,62,1,71,68,33],"tags":[108,59,109,110,111],"class_list":["post-323","post","type-post","status-publish","format-standard","hentry","category-cucm","category-lab","category-non-classe","category-sccp","category-sip","category-written-theory","tag-capf","tag-ccie-voice-written","tag-lsc","tag-mic","tag-security"],"_links":{"self":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts\/323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=323"}],"version-history":[{"count":1,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts\/323\/revisions"}],"predecessor-version":[{"id":4481,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts\/323\/revisions\/4481"}],"wp:attachment":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}