TLS Parameters
The Transport Layer Security (TLS) parameters are described in the table below.
TLS Parameters
Parameter |
Description |
||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
'TLS Client Re-Handshake Interval' configure network > security-settings > tls-re-hndshk-int [TLSReHandshakeInterval] |
Defines the time interval (in minutes) between TLS Re-Handshakes initiated by the device. The interval range is 0 to 1,500 minutes. The default is 0 (i.e., no TLS Re-Handshake). |
||||||||||||||||||||||||
'TLS Mutual Authentication' configure network > security-settings > SIPSREQUIRECLIENTCERTIFICATE [SIPSRequireClientCertificate] |
Defines the device's mode of operation regarding mutual authentication and certificate verification for TLS connections.
Note:
|
||||||||||||||||||||||||
'Peer Host Name Verification Mode' configure network > security-settings > PEERHOSTNAMEVERIFICATIONMODE [PeerHostNameVerificationMode] |
Enables the device to verify the Subject Name of a TLS certificate received from SIP entities for authentication and establishing TLS connections.
If the device receives a certificate from a SIP entity (IP Group) and the parameter is configured to Server Only or Server & Client, it attempts to authenticate the certificate based on the certificate's address. The device searches for a Proxy Set that contains the same address (IP address or FQDN) as that specified in the certificate's SubjectAltName (Subject Alternative Names). For Proxy Sets with an FQDN, the device checks the FQDN itself and not the DNS-resolved IP addresses. If a Proxy Set is found with a matching address, the device establishes a TLS connection. If a matching Proxy Set is not found, one of the following occurs:
Note:
|
||||||||||||||||||||||||
'TLS Client Verify Server Certificate' configure network > security-settings > tls-vrfy-srvr-cert [VerifyServerCertificate] |
Determines whether the device, when acting as a client for TLS connections, verifies the Server certificate. The certificate is verified with the Root CA information.
Note: If Subject Name verification is necessary, the parameter PeerHostNameVerificationMode must be used as well. |
||||||||||||||||||||||||
'TLS Remote Subject Name' configure network > security-settings > tls-rmt-subs-name [TLSRemoteSubjectName] |
Defines the Subject Name that is compared with the name defined in the remote side certificate when establishing TLS connections. The valid range is a string of up to 49 characters. Note: The parameter is applicable only if the parameter PeerHostNameVerificationMode is set to 1 or 2. |
||||||||||||||||||||||||
'TLS Expiry Check Start' expiry-check-start [TLSExpiryCheckStart] |
Defines when the device sends an SNMP alarm (acCertificateExpiryAlarm) to notify that the installed TLS server certificate is about to expire. This is defined by the number of days before the certificate's expiration date. For example, if configured to 5, the alarm is sent 5 days before the expiration date. For more information on the alarm, refer to the SNMP Reference Guide. The valid value is 0 to 3650. The default is 60. |
||||||||||||||||||||||||
'TLS Expiry Check Period' expiry-check-period [TLSExpiryCheckPeriod] |
Defines the periodical interval (in days) for checking the TLS server certificate expiry date. The valid value is 1 to 3650. The default is 7. |