![]() When OCSP is enabled, the device queries the OCSP server for revocation information whenever a peer certificate is received (TLS client mode, or TLS server mode with mutual authentication). ![]() You can configure the device to check if a peer's certificate has been revoked, using OCSP. Some Public-Key Infrastructures (PKI) can revoke a certificate after it has been issued. ![]() Online Certificate Status Protocol (OCSP). TLS cipher suites for server and client roles (per OpenSSL syntax).ĭiffie-Hellman (DH) key size used by the device if it acts as a TLS server and DH is used for key exchange. You can configure each TLS Context with the following TLS settings: ■ If a TLS Context for an existing TLS connection is changed during the call by the user agent, the device ends the connection.įor more information on secured management, see Configuring Secured (HTTPS) Web. However, for secure Web and REST access using the additional management interfaces configured in the Web Interfaces table (see Configuring Web Interfaces), you can use any TLS Context. The default TLS Context cannot be deleted.įor secure management through the default management network interface (i.e., OAMP Application Type in the IP Interfaces table), the device uses the default TLS Context. The Common Name (CN or subject name) of the default certificate is "ACL_nnnnnnn", where nnnnnnn denotes the serial number of the device. The device is shipped with a default TLS Context (Index #0 and named "default"), which includes a self-generated random private key and a self-signed server certificate. To secure various other network applications supported by the device, for example, communication with a remote LDAP server used for LDAP-based user management authentication and authorization. To secure SIP signaling connections, referred to as SIP Secure (SIPS) or SIP over TLS. To secure device management communication, for example, HTTPS-based Web sessions, Telnet sessions and SSH sessions. The TLS protocol provides confidentiality, integrity, and authenticity between two communicating applications over TCP/IP. A TLS Context defines Transport Layer Security (TLS) settings (e.g., TLS certificates). The TLS Contexts table lets you configure up to 100 TLS Contexts.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |