TLS Parameters
The Transport Layer Security (TLS) parameters are described in the table below.
TLS Parameters
Parameter |
Description |
|||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
'TLS Client Re-Handshake Interval' configure network > security-settings > tls-re-hndshk-int [TLSReHandshakeInterval] |
Defines the time interval (in minutes) between TLS Re-Handshakes initiated by the device. The interval range is 0 to 1,500 minutes. The default is 0 (i.e., no TLS Re-Handshake). |
|||||||||||||||||||||||||||
'TLS Mutual Authentication' configure network > security-settings > sips-require-client-certificate [SIPSRequireClientCertificate] |
Defines the device's mode of operation regarding mutual authentication and certificate verification for TLS connections.
Note:
|
|||||||||||||||||||||||||||
'Peer Host Name Verification Mode' configure network > security-settings > peer-hostname-verification-mode [PeerHostNameVerificationMode] |
Enables the device to verify the Subject Name of a TLS certificate received from SIP entities for authentication and establishing TLS connections.
If the device receives a certificate from a SIP entity (IP Group) and the parameter is configured to Server Only or Server & Client, it attempts to authenticate the certificate based on the certificate's address:
Note:
|
|||||||||||||||||||||||||||
'TLS Remote Subject Name' configure network > security-settings > tls-rmt-subs-name [TLSRemoteSubjectName] |
Defines the Subject Name of the TLS certificate received from the remote side when establishing TLS connections. When the device receives the certificate from the remote side, it validates the certificate by comparing the certificate's Subject Alternative Names (SANs) with the Proxy Set's addresses (IP address and FQDN). If a SAN matches an address, the device considers the certificate as valid and establishes the TLS connection. If there is no match and the SAN is marked as "critical", the device doesn't establish a TLS connection and rejects the call. If there is no match and the SAN isn't marked as "critical", the device compares the parameter's value with the certificate's Common Name (CN). If they match, the device establishes a TLS connection; otherwise, the device doesn't establish a TLS connection and rejects the call. The valid range is a string of up to 49 characters. Note:
|
|||||||||||||||||||||||||||
'TLS Client Verify Server Certificate' configure network > security-settings > tls-vrfy-srvr-cert [VerifyServerCertificate] |
Enables the device, when acting as a client for TLS connections, to verify the Server certificate. The certificate is verified with the Root CA information.
Note: If Subject Name verification is necessary, configure the [PeerHostNameVerificationMode] parameter as well. |
|||||||||||||||||||||||||||
'TLS Expiry Check Start' configure network > security-settings > tls-expiry-check-start [TLSExpiryCheckStart] |
Defines when the device sends an SNMP alarm (acCertificateExpiryAlarm) to notify that the installed TLS server certificate (of TLS Contexts) is about to expire. This is defined by the number of days before the certificate's expiration date. For example, if configured to 5, the alarm is sent 5 days before the expiration date. The valid value is 0 to 3650. The default is 60. |
|||||||||||||||||||||||||||
'TLS Expiry Check Period' configure network > security-settings > tls-expiry-check-period [TLSExpiryCheckPeriod] |
Defines the periodical interval (in days) for checking the TLS server certificate expiry date (of TLS Contexts). The valid value is 1 to 3650. The default is 7. |