TECHNICAL WHITE PAPER. Secure Protocols Signaling and Media Used in CS1000
|
|
|
- Rosalyn Lyons
- 9 years ago
- Views:
Transcription
1 TECHNICAL WHITE PAPER Secure Protocols Signaling and Media Used in CS1000 Date: Jan 5, 2015 Author: Amith Kamath Abstract The Below Guide is meant for Giving a better understanding on the Various Security Protocols used on CS1000 Systems. It describes about Implementation of these Protocols and describes how it gives an edge over the traditional non-secure protocols. Also the White Paper mentions the Configuration and Maintenance procedures as well. The Document Talks about The secure Ways of Signaling/Media Protocol s used for the below Terminology 1. Unistim Signaling 2. Call Server ELAN Signaling 3. Remote Access 4. Transfer Protocol 5. Media Security 6. Application Signaling (SIP) DTLS -- Datagram Transport Layer Security. Used for Secured UNIS Tim signaling encryption ISSS -- Intra System Signaling Security (ISSS) provides authentication and encryption for internal signaling messages within a Communication Server 1000 system SSH -- Secure Shell. Used for Secure Remote Access Connection SFTP Secure File Transfer Protocol. FTP -- File Transfer Protocol. srtp Secure Real Time Protocol. RTP Real Time Protocol. SIP Session Initiation Protocol TLS Transport Layer Security TCP -- Transmission Control Protocol PSK -- A preshared key (PSK) is used to authenticate the two endpoints CA Certificate Authority
2 UNIStim Signaling What is Secure Phone/UNIStim Signaling? Secured UNIStim signal encryption is provided by Datagram Transport Layer Security (DTLS), which encrypts the data exchanges between the Signaling Server and the IP Phones. DTLS requires no new additional hardware and can coexist with currently installed Signaling Server s. You can configure DTLS and non-dtls systems on the same network. Does this work for all phones and Does this require any Specific Hardware? Supported hardware UNIStim with DTLS is supported on the following Communication Server 1000 components: Call Servers - CP PIV - CP PM (Standalone) - CP PM (Co-resident) - CP DC (Co-resident) - CP MG (Co-resident) Signaling Servers - CP PM - CP DC - HP DL320 G4 - IBM x306m - IBM x Dell R300 Currently, the following IP Phones support DTLS signaling encryption (after applicable firmware upgrade): Important: IP Phones require UNIStim 4.0 or later to support DTLS signaling encryption.
3 How does DTLS Work? How does DTLS help Customer? The UNIStim security with DTLS feature allows the Signaling Server to detect if an IP Phone is using Secure UNIStim. You can then list IP Phones based on their employed encryption type by using the isetsecget command on the Signaling Server or the STIP DTLS command in overlay 117 on the Call Server. DTLS can work in two modes of IP Phone registration: Secure Handshake mode the IP phone is configured to initiate a DTLS session immediately upon beginning registration. Switchover mode the IP phone is configured to first establish an unencrypted RUDP session to the LTPS, then switchover to DTLS depending on the DTLS Policy Various Levels of DTLS Security.
4 How to enable/disable/check DTLS? To enable DTLS encryption, the CS 1000 system must be upgraded to Release 6.0 or greater and the IP Phones must have the latest firmware (Anything Greater than 4.0 UniStim Firmware supports DTLS). Also, the system has to be configured with at least the Basic Security level. On the Communication Server 1000 system, DTLS-related behavior is controlled by a tristate setting called Node DTLS Policy. This setting is configured by Line TPS node rather than on an individual system or element basis. The possible values are 1. DTLS Off (default) 2. DTLS Best Effort 3. DTLS Always
5 Configuring DTLS from Element Manager System > IP Network > Nodes: Servers, Media Cards > Node > TPS > You can perform mass reconfigurations of S1/S2 ports and action bytes (Action is the action byte that can be 1, 6 or 7) on the phones based on a given query values using the below command isetsecupdate. Viewing DTLS from Call Server Use the STIP DTLS command in LD 117 to print information about IP Phones filtered by signaling encryption related values, including the type of connection the phone is currently using and the phones capability of making DTLS connections. The syntax of the command is as follows: STIP DTLS <NODE> <CONNECTION TYPE> <DTLS_CAPABILITY>
6 How to use a UCM Certificate for DTLS? DTLS is totally designed on Authentication based on Certificate Exchange. Now the Certificate Authority (CA) can be External (Third Party) or UCM. Below is a Procedure which helps to install certificate for DTLS on UCM and UCM will be acting as the CA. 1. Login to UCM and Go to Certificates. 2. In the Available Endpoint certificates Kindly make sure you have DTLS as none for a fresh install. 3. Then click on Private Certificate Authority
7 4. Then Click on Download to download the Certificate and the Save it as Security Certificate.
8 5. Now return back to the previous menu Click Certificate Endpoints and Select DTLS. And then select Assign Existing Certificate for DTLS.
9 6. Now select the Certificate to Assign and then click on Commit.
10 7. Once Done with Commit.. click on Finish.
11 8. After All previous steps.. The Certificate Endpoint DTLS will be updated with a Signed Certificate.
12 9. After this Place the Certificate on a Provisioning Server or a TFTP Server. 10. The Config file should be prepared with the below format.
13 11. Start tftp server, and place into tftp folder 1140e.cfg file and ipclients_cacrt.cer file 12. Perform config on set. Go into Configuration Menu -> Network Configuration. Fill: - S1: node ip, - S1 port: 4100, - Action Byte: 1, - Provision: TFTP server ip, like in 1140e.cfg 13. Apply all settings, and reboot the set. After reboot, your set will connected to tftp server, and you see label on sets screen like this:
14 14. If cfg file was correct, set founds certificate: 15. Press "Install" and in the next screen "Accepts. If you see [USER_KEYS] Auth. fail, its mean that you have another installed ca certificate in the phone. You must delete it, before upload new. 16. After certificate installation, set will reboot again. 17. Perform commands on Signalling Server: appstart TPS restart, appstart CSV restart. 18. Wait until set is not registered. Check Set via performing isetsecshow
15 How to Use an SMGR Certificate for DTLS? Until SMGR 6.2 the Above Steps would remain same for DTLS to work. Below is the Step by Step Guide to programming DTLS for System Manager 6.3 Below steps should be followed to get both Server and client certificates, upload them and register IP set via DTLS. 1. Retrieving the System Manager CA certificate. (Below steps is also available in SMGR Online Help) 1) On System Manager Web Console, click Services > Security. 2) In the left navigation pane, click Certificates > Authority. 3) On the CA Functions page click Download pem file. 4) Click Save to save the certificate to a file. You can rename the file, e.g. name it client_ca.cer. This certificate should be uploaded to IP sets later. 2. Configuring DTLS for CS 1000 (Also available in the Online Help) 1) On System Manager Web Console, click Services > Inventory. 2) In the left navigation pane, click Manage Elements. 3) Select the CS 1000 member element (mark appropriate checkbox). 4) Click More Actions > Configure Identity Certificates. 5) Select the Dtls and click Replace. 6) Select Replace this Certificate with Internal CA Signed Certificate and provide the common name (e.g. element FQDN), keysize (1024), and the algorithm (RSA). 7) Click Commit. 3. Make configuration changes on TPS. 1) In Element Manager click IP Network > Nodes: Servers, Media Cards 2) Click on appropriate Node ID, then Terminal Proxy Server (TPS) 3) Set DTLS Policy to Best Effort or Always. 4) Restart csv and tps applications $ appstart csv tps restart 4. Upload client certificate, the one generated on Step 1. 1) On the IP set check if any other Customer Certificate is installed. For example on Avaya 1100 Series IP Deskphones press Service key twice to open Local Tools
16 menu, choose Diagnostics > Certificate Information > Trusted Certificates and check if any other Customer Certificate is installed. If there are other customer certificates perform Reset to factory defaults operation to remove them. Reconfigure the phone as required after reset to factory defaults. Use [*][*][7][3][6][3][9] IP Phone MAC address [#][#] to reset the IP Deskphone parameters to the factory default values. For more details on IP Deskphones please refer to IP Deskphones Fundamentals, Avaya Communication Server 1000, NN ) Install new Customer Certificate to your IP phone using provisioning server. Configure appropriate IP address for provisioning server on the IP set. Run TFTP server on the hast machine, e. g. freeware Tftpd32 can be used. An example of the appropriate provisioning configuration file section for 1165e is below: 1165e.cfg [USER_KEYS] DOWNLOAD_MODE FORCED VERSION 1 FILENAME client_ca.cer PROTOCOL TFTP 3) When [USER_KEYS] client_ca.cer is displayed on the set press Install and then Accept on the next screen. There are two modes of IP Phone registration: - Switchover mode the IP phone is configured to first establish an unencrypted RUDP session to the LTPS, then switchover to DTLS depending on the DTLS Policy - Secure Handshake mode the IP phone is configured to initiate a DTLS session immediately upon beginning registration. To configure the Switchover Mode: S1 (and S2) ports should be set to 4100 S1 (and S2) action bytes should be set to 1
17 The DTLS policy should be set to "DTLS Best Effort To configure an IP Phone for Secure Handshake mode: S1 (and S2) ports should be set to 4101 S1 (and S2) action bytes should be set to 7 The DTLS policy should be set either to "DTLS always" or "DTLS Best Effort 5. Make configuration changes on IP set if required. 1) Enter Network Configuration and make Port and Action byte configuration changes in accordance with the above description. For example for Switchover Mode: DTLS policy is set to "DTLS Best Effort S1 port is set to 4100 Action byte is set to 1 Please note that currently, the following IP Phones support DTLS signaling encryption (after applicable firmware upgrade): - Avaya 1200 Series IP Deskphones (Avaya 1210/1220/1230 IP Deskphone) - Avaya 1100 Series IP Deskphones (Avaya 1110/1120E/1140E/1150E/1165E IP Deskphone) - Avaya 2007 IP Deskphone - Avaya 2050 IP Softphone Release 4.0 or later Important: IP Phones require UNIStim 4.0 or later to support DTLS signaling encryption. System_Manager_R6.3_ServicePack1_1403 is required for SMGR to host DTLS certificate Authority which is capable to create DTLS CSR with 2048 key length since migration to SMGR, SMGR DTLS CSR length only specifies 1024 Please refer the PSN for the details on Patch1:
18 What NTP to refer for the DTLS details. NN _05_09_Security_Management_Fundamentals.pdf What is the Insecure Phone Signaling? DTLS signaling security is disabled by default (DTLS policy set to OFF). So Once the DTLS is disable the Phone signaling would be plain Unistim Messages. DTLS OFF actually sets the Node the phone s not to use DTLS. Below is a Flow on What can happen if you have a Mix environment. 1. DTLS Always Phone can only talk to DTLS Always Phones and DTLS Best Effort Phones. 2. DTLS OFF phones cannot talk to DTLS Always Phones. 3. DTLS OFF phones can talk to DTLS Best Effort Phones.
19 Call Server Signaling What is Secure Call Server/ ELAN Signaling? Intra System Signaling Security (ISSS). ISSS provides an IP Security (IPsec) solution that works with all IP protocols. IPsec works at a low layer of the network (Layer 3 of the OSI 7-Layer Model). This makes it possible for software applications to engage in secure communications without the need to add additional communications security code to each application. IPsec encrypts the data stream between the two endpoints of a connection. A preshared key (PSK) is used to authenticate the two endpoints, and an encryption key is negotiated by using IKE. ISSS settings (PSK and level) are specified as an ISSS policy that can be applied to individual Communication Server 1000 systems How does ISSS Work? How does ISSS help Customer? Intra System Signaling Security (ISSS) provides authentication and encryption for internal signaling messages within a Communication Server 1000 system. IP security for Communication Server 1000 networks is centrally managed from the Unified communications Management primary security server or SMGR using the IPsec for Intra System Signaling Security (ISSS) management interface. ISSS employs IPsec to provide security services, including confidentiality, authentication, and anti-replay to application layer protocols. This feature includes industry-standard encryption algorithms from the openssl Crypto Library. Communication Server 1000 provides simplified, automated IPsec policy configuration and avoids the complex configuration requirements inherent in many other implementations of IPsec. IPSEC is implemented from Release 5.0 onwards. It has been further enhanced on 6.0 and UCM (Primary Security Server) will hold the Management Rights.. ISSS elements are classified into the following two categories: UCM Targets these elements automatically belong to the Unified Communications Management security domain without the need to add them using the Unified Communications Management ISSS management interface. An example of a Unified Communications Management target is a Call Server. Manual targets these elements are manually defined through UCM elements page. To enable ISSS on such elements, they have to be manually associated with one or more
20 Communication Server 1000 systems through the ISSS management interface. An example of a manual target is Call Pilot. The ISSS management interface lists all Communication Server 1000 and communication Server 1000 HS systems available on the UCM domain. ISSS can be enabled only on those UCM targets which belong to a CS 1000 system or CS 1000 HS system. ISSS parameters (PSK & level) are specified as a Security policy that can be applied to one or more Communication Server 1000 systems or a Communication Server 1000 High Scalability (HS) systems. ISSS operations like Synchronization and Activation can be performed on one or more CS 1000 systems simultaneously. ISSS/IPsec only secures IP traffic on the ELAN. At Full security level, the AML protocol is protected on the TLAN of Linux-based elements for manual targets. You can protect any feature within the ELAN depending on the Security Level, as described in the following table. How to enable/disable/check ISSS? From the Unified Communications Management main navigation menu, click Network > CS1000 Services > IPsec. The IPsec for Intra System Signaling Security page appears, as shown in the following figure.
21 When configuring ISSS parameters, two steps are required to put the new configurations into effect. The synchronization phase, which delivers the new parameters to the UCM members, and the activation phase, which instructs the UCM members to place the new parameters into effect. It Uses SFTP Token Exchange Methodology to transfer the files and Information. Each transfer would depend on the SSH Key Token Exchange. There are two activation modes, Graceful and Forced. Graceful activation results in a seamless activation of the new parameters to unaffected targets in most situations; however, changes to the PSK do not take effect until existing sessions expire, which in some cases can take up to three days. Forced activation causes immediate use of a newly configured PSK; however, messaging traffic is disrupted, causing a service interruption that can last for several minutes. Avaya recommends that you only use Forced activation during scheduled maintenance periods. Before Starting the IPSEC enabling, Make sure all the elements are joined to UCM either via Call Server (REGISTER UCMSECURITY SYSTEM) or via Individual Elements (joinsecdomain)
22 To configure ISSS after a new installation, complete the following steps. 1. Log on to the UCM primary security server and navigate to CS1000 Servers >IPsec. The IPsec for Intra System Signaling Security (ISSS) page displays. 2. Configure the default security policy. 3. (Optional) Assign custom security policy to the desired system. ISSS settings can be customized for individual system by assigning security policy different from the default policy. 4. (Optional) Associate manual targets to required systems. Manual targets are not automatically associated to CS 1000 or CS 1000 HS systems. If no manual targets are required, please skip this step. 5. (Optional) Disable IPsec for any desired member targets of the CS 1000 systems. If IPsec is required for all targets, you can skip this step. Under normal operating conditions, you would not disable IPsec; however, under certain conditions, you may wish to disable IPsec for a target. Some reasons for not configuring IPsec on a target include: The target is not configured for IPsec or is not capable of communications using IPsec. New or replacement elements, such as Gateway Controllers and Media Cards that require a firmware upgrade before being able to register with UCM, may need to have IPsec disabled until they are able to register with the UCM security domain and obtain the ISSS configurations. 6. Synchronize IPsec configuration settings on systems. 7. Activate the IPsec configuration on systems. How to troubleshoot ISSS Issues? Below are some commands that may Help in troubleshooting the IPSEC related issues.. 4. isssshow To View IPSEC status and configuration on a vxworks Based Machine like MGC, MC32S, Call Server etc. All ISSS information appears. 5. checkipsecstatus Used to check the IP Sec Status from a Linux Base Machines 6. isssdecom At the confirmation prompt, type yes to remove all ISSS related configuration information from files and memory locally and shut down all related tasks. Note: This will decommission the IPSEC on Element the command is run and is independent of the other elements. Incase if you are running this Command make sure you are doing it during a Maintenance Window because it can cause an Outage to normal Operation. 7. isssreset To reset an ISSS configuration.. Note: This will Cause disruption to Normal Operation 8. disablealltargets This disables the IPSEC on Linux base machines
23 Note: This will decommission the IPSEC on Element the command is run and is independent of the other elements. Incase if you are running this Command make sure you are doing it during a Maintenance Window because it can cause an Outage to normal Operation. Important Note: When we enable IPSEC (ISSS) you will be finding that the IP Address will not be reachable from the Normal Network. That is because the ICMP packets are blocked when ISSS is enabled. So please make sure that when you are trying to ping an IP Address, login to an Element which has ISSS established with Call server (eg: CallPilot.) What NTP to refer for the ISSS details. NN _05_09_Security_Management_Fundamentals.pdf What is the Insecure Call Server Signaling? By Default IPSEC is disabled. Hence the Default signaling would be plain AML signaling between Call Server and Other ELAN Elements.
24 Remote Access What is Secure Remote Access Mode? SSH and secure remote access. How does SSH Work? How does SSH help Customer? SSH provides a secure method to log on to a system remotely and perform system management operations. Using role definitions, you can grant specific users the ability to use SSH to connect to all parts of the system, or only to the parts you specify. This can include access to SL-1 on the Call Server, support for the CPSID user name and ptyxx user names, access to the Call Server PDT shells, the Voice Gateway Media Card shell, IPL shell, and the Signaling Server OAM shell. SSH provides several authentication methods. Avaya recommends that you use the password authentication method. How to enable/disable/check SSH? Upon installation or upgrade, Secure Shell (SSH) is enabled, but is unavailable while keys are being generated. Key generation takes two to three minutes on most systems. Avaya recommends that you use SSH whenever possible, and disable insecure shells (rlogin, and telnet) on the Communication Server 1000 system, except as needed. Both Secure Shell and insecure shells are enabled by default. If you must enable insecure shells, Avaya recommends using them only when required, and using SSH whenever possible. Note: For SSH/telnet/rlogin/web access, the address must be entered in IPv4 format. IPv6 is not supported. Manage SSH keys using overlays Use the procedures in this section to generate, activate, view, or clear SSH keys using overlays. Use the following procedure to generate SSH keys from the Call Server. The following procedure refers to specific prompts; if a prompt appears that is not mentioned in the procedure, you can often bypass it by pressing Enter. Generating SSH keys by using LD Log on to the Call Server CLI using a PWD2 account that has ACCT=YES. 2. At the LD 117 prompt, enter SSH KEY GENERATE {ACTIVE INACTIVE CABINET [n]}
25 When you generate a key, the mutual trust between the device and the Unified Communications Management primary security server is broken until the device rejoins the security domain. A warning message prompts you to do this. What NTP to refer for the SSH details. NN _05_09_Security_Management_Fundamentals.pdf What is the Insecure Remote Access Mode? By default the SSH is enabled on the Linux base machines as well as the call server. The Call Server does have the rlogin and telnet functionality and these are kept enabled as well. However from 6.0 Onwards Avaya Always recommends using SSH.
26 Transfer Protocol What is Secure Transfer Protocol? Secure Shell (SSH) Secure File Transfer Protocol (sftp). How does sftp Work? How does sftp help Customer? sftp is enabled by default. Do not disable sftp unless it is required for troubleshooting purposes. sftp must remain enabled to ensure the successful operation of Communication Server 1000 systems. How to enable/disable/check sftp? sftp configuration using overlays Use the following LD 117 commands to configure sftp on the Call Server.
27
28 Below is how we carry it out the same on Individual Systems Like MGC, MC32S, MC32 etc. sftp configuration using Element Manger 1. Log on to Element Manager as a user with security administrator privileges. 2. Navigate to Security > Policies > File Transfer. By default, the Secure FTP and Insecure FTP boxes are both selected.
29 3. Select or deselect the desired file transfer option. At least one option must be 4. Selected or an error message appears. 5. Click Save. What NTP to refer for the sftp details. NN _05_09_Security_Management_Fundamentals.pdf What is the Insecure Transfer Signaling? By Default the sftp is enabled. If we disable the sftp then the normal FTP protocol is being used and this is not a secure transfer protocol. Also most of the CS1000 linuxbase machine s do not Support FTP protocol.
30 Media Security What is Secure Media Signaling? The Media Security feature used to secure media exchanges on Avaya Communication Server 1000 (Avaya CS 1000) is through the use of Secure Real-time Transport Protocol (SRTP) on IP media paths. It applies to (Avaya CS 1000) IP Phones (Phase 2 only) and devices using MindSpeed DSPs (DSP daughterboard and MC32S). If you enable Media Security and a secure connection is established, IP Phones display a security icon, indicating that the leg of the call from the IP Phone to the first IP termination is secure. How does SRTP Work? How does SRTP help Customer? With the SRTP feature you can encrypt media exchanges between two IP Phones. Analog devices (both phones and trunks) are incapable of media encryption. Consequently, the Media Security Class of Service associated with analog devices is MSNV, for both local and VTRK. The only exception is for local calls between IP and analog phones, as these calls are encrypted when systems are configured with MSEC ON. The Media Security feature provides a means by which two endpoints capable of communication using Secure Real-Time Transport Protocol (SRTP) can engage in secure media exchanges. You can protect the media stream using the Media Security feature, which provides Secure RTP (SRTP) protection. Media Security protects the media stream between the IP Phone and the first IP termination, so Media Security can provide end-to-end encryption if the media stream passes over IP systems only. The Media Security feature provides end-to-end encryption of media exchanges between two supported IP Phones.
31 How to enable/disable/check SRTP? You can configure: To Enable the Media Security on System Wide, we need to enable the MSEC to ON in ld 17 PARM. A system-wide configuration setting that controls whether or not the CS 1000 system is capable of providing Media Security. A Media Security Class of Service on each IP Phone, which can have any of the following values: MSSD, Best Effort, Always, or Never. A system-wide Class of Service parameter for IP Phones, called Media Security System Default (MSSD). When you change the MSSD parameter, the system updates any IP Phones that have a Class of Service value of MSSD to use the new
32 MSSD parameter. IP Phones that have a Class of Service other than MSSD are not affected when the system MSSD parameter is updated. Configuration options available for Media Security Details of Class of Service options for Media Security
33 What NTP to refer for the SRTP details? NN _05_09_Security_Management_Fundamentals.pdf What is the Insecure Media Signaling? By Default the Encrypted Media Signaling is disabled. So it would be normal RTP that would be exchanged between the different End points.
34 Below would also explain the Behavior of Interaction between a Media Secure endpoint to a Non Media Secure Endpoint..
35 Application Signaling (SIP) What is Secure Application Signaling in SIP? Session Initiation Protocol (SIP) signaling is protected and made secure by using Transport Layer Security (TLS) How does TLS Work? How does TLS help Customer? TLS protects SIP signaling traffic, providing message confidentiality and integrity in transit, as well as client-server authentication. Certificates are deployed from the primary security server to the primary and secondary NRS servers and to the SIP endpoints. TLS communication can then be enabled between the active NRS server and the SIP endpoints. To allow TLS communication between nodes on different security domains, you must add the Certificate Authorities (CA) for all of the security domains to the trusted CA list for each node that you want to allow to communicate using TLS.
36 How to enable/disable/check TLS? To configure SIP TLS, you must carry out the following four tasks. 1. Deploy certificates for SIP Proxy and Redirect server In Unified Communications Management, create a certificate by using the steps in one of the following: - Create a certificate for SIP TLS signed by the private CA - Create a certificate for SIP TLS signed by a public CA - Create a self-signed certificate for SIP TLS If the system has a secondary NRS with SIP Proxy and Redirect server: - In Unified Communications Management, select the server you configured in the steps above and export the certificate and the private key to a file by using the steps in Export the current certificate and its private key - In Unified Communications Management, select the server to which you want to add the certificate, and Import a certificate and its key by using the steps in Import a certificate and its private key from a file - In Unified Communications Management, add a CA to the service, and paste the certificate information by using the steps in Add a CA to an endpoint 2. Enable TLS for SIP Proxy and Redirect server If there is a firewall between the Unified Communications Management primary security server and the SIP Proxy and Redirect server, open the ports on the firewall to allow certificate communication, as follows: - TCP port 5061 for SIP TLS communication - UDP port 500 for IPsec Internet Key Exchange (IKE) - Protocol 50 for IPsec Encapsulated Payload Protocol (ESP) - TCP port 22 for SSH - TCP port 80 for HTTP - TCP port 443 for HTTPS - TCP port for SAML
37 - TCP port for SAML secure mode - TCP port 636 for LDAPS - TCP port for Xmsg (only required if ISSS/IPsec disabled) Complete the following steps only once for the system. You do not need to repeat them each time you configure TLS for a SIP endpoint: - In Unified Communications Management, provision a public-key certificate for the primary SIP Proxy and Redirect server - In Unified Communications Management, provision a public-key certificate for the secondary SIP Proxy and Redirect server - In NRS Manager, enable SIP Proxy to open TLS ports by using the information in Avaya Network Routing Service Fundamentals, NN Restart the SIP Proxy service. 3. Deploy certificates for SIP endpoints In Unified Communications Management, create a certificate by using the steps in one of the following: - Create a certificate for SIP TLS signed by the private CA - Create a certificate for SIP TLS signed by a public CA - Create a self-signed certificate for SIP TLS If the system has other signaling servers running standby SIP services, you must perform the following steps for each signaling server: - In Unified Communications Management, select the server you configured in the steps above and export the certificate and the private key to a file by using the steps in Export the current certificate and its private key. - In Unified Communications Management, select the server to which you want to add the certificate, and Import a certificate and its key by using the steps in Import a certificate and its private key from a file. - In Unified Communications Management, add a CA to the service, and paste the certificate information by using the steps in Add a CA to an endpoint. 4. Enable TLS for SIP endpoints
38 If there is a firewall between the Unified Communications Management primary security server and the SIP endpoint, open the ports on the firewall to allow certificate communication, as follows: - TCP port 5061 for SIP TLS communication - TCP port for IPsec - TCP port 22 for SSH - TCP port 80 for HTTP - TCP port 443 for HTTPS - TCP port for SAML - TCP port for SAML secure mode - TCP port 636 for LDAPS - TCP port for Xmsg In Element Manager, provision a SIP gateway to use TLS as transport protocol, save and transfer the changes, and restart the SIP Gateway by using the steps in Configuring SIP TLS security policy. Use the command line interface (CLI) commands in SIP TLS maintenance using CLI on to check the configuration and status of the SIP/TLS connection. Below is an example of Certificate creation using one of the methods.. Creating a certificate for SIP TLS signed by the private CA 1. Click Security > Certificates. The Certificate Management page appears.
39 2. In the Certificate Endpoints pane, select the radio button next to the endpoint you want to configure; the certificate endpoint status must be none. The Endpoint Details section appears. 3. In the Endpoint Details pane, under Certificates, click SIP TLS. The Server Certificate window appears.
40 4. Select Create a new certificate, signed by local private Certificate Authority and click Next. The Name and Security Settings window appears.
41 5. Type a name in the Friendly Name field. 6. Select a bit length from the Bit length list. 7. Click Next. The Organization Information window appears.
42 8. In the Organization Information window, perform the following tasks: In the Organization field, enter the Organization. In the Organization Unit field, enter the organization unit information. Click Next. The Your Server's Common Name window appears.
43 9. Enter the FQDN of the server you are configuring in the Common Name field, and click Next. The Geographical Information window appears.
44 10. In the Geographical Information window, perform the following tasks: In the Country/Region box, select the country from the list. In the State/Province field, enter the state or province. In the City/Locality field, enter the city or locality. Click Next. The Certificate Request Summary window appears.
45 11. Click Commit to generate a certificate in X.509 format. A Certificate Summary window appears with the certificate information.
46 12. Click Finish. The status changes to signed. 13. Restart the server that you changed in this procedure. The changes take effect only after the server restarts. Viewing SIP TLS configuration 1. Log on to the SIP Gateway Signaling Server with an account that has admin2 privilege. 2. Navigate to the following directory: /etc/opt/nortel/sigservershare/config 3. Using a text editor, open the file config.ini.
47 SIP TLS security policy descriptions
48 How to use SMGR Certificate for TLS? Step by Step Guide to programming TLS for System Manager 6.3 with CS1K Configuring TLS for CS 1000 member elements 1) On System Manager Web Console, click Services > Inventory. 2) In the left navigation pane, click Manage Elements. 3) Select the CS 1000 member element (mark appropriate checkbox). 4) Click More Actions > Configure Identity Certificates. 5) Select the SIP TLS and click Replace. 6) Select Replace this Certificate with Internal CA Signed Certificate and provide the common name (e.g. element FQDN), keysize (1024), and the algorithm (RSA). 7) Click Commit. 2. Configuring TLS for Session Manager 1) On System Manager Web Console, click Services > Inventory. 2) In the left navigation pane, click Manage Elements. 3) Select the Session manager element (mark appropriate checkbox). 4) Click More Actions > Configure Identity Certificates. 5) Select the Security module SIP and click Replace. 6) Select Replace this Certificate with Internal CA Signed Certificate and provide the common name (e.g. element FQDN), keysize (1024), and the algorithm (RSA). 7) Click Commit. 8) On System Manager Web Console, click Services > Inventory. 9) In the left navigation pane, click Manage Elements. 10) Select the Session manager element (mark appropriate checkbox). 11) Click More Actions > Configure Identity Certificates. 12) Select the Security module HTTPS and click Replace. 13) Select Replace this Certificate with Internal CA Signed Certificate and provide the common name (e.g. element FQDN), keysize (1024), and the algorithm (RSA).
49 14) Click Commit. Note: When replacing SIP certificate for Session Manager make sure to specify FQDN of SM100 as CN (Common Name) for new certificate instead of default value SM100. Note : FQDN of Session Manager should be resolved by DNS used by member servers. 3. Make configuration changes on VTRK. 1) In Element Manager click IP Network > Nodes: Servers, Media Cards 2) Click on appropriate Node ID, then SIP GW settings 3) Set TLS Policy and set port to ) Sync the node and Restart the applications Note: Please check your SMGR load version, there was an issue on SMGR related to certificates, they fixed it just recently in GA version. System Manager Build No Software Update Revision No: What NTP to refer for the TLS details. NN _05_09_Security_Management_Fundamentals.pdf What is the Insecure SIP Signaling? The Insecure SIP Signaling would be normal RCP signaling which is not at all encrypted signaling.
Security Management Fundamentals Avaya Communication Server 1000
Security Management Fundamentals Avaya Communication Server 1000 Release 7.5 NN43001-604 Issue 05.09 February 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
6.40A AudioCodes Mediant 800 MSBG
AudioCodes Mediant 800 MSBG Page 1 of 66 6.40A AudioCodes Mediant 800 MSBG 1. Important Notes Check the SIP 3 rd Party Validation Website for current validation status. The SIP 3 rd party Validation Website
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
Configuring a SIP Trunk between Avaya Aura Session Manager Release 6.1 and Avaya Communication Server 1000E Release 7.5 Issue 1.0
Avaya Solution Interoperability Test Lab Configuring a SIP Trunk between Avaya Aura Session Manager Release 6.1 and Avaya Communication Server 1000E Release 7.5 Issue 1.0 Abstract These Application Notes
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
LifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Cisco Unified CM Disaster Recovery System
Disaster Recovery System, page 1 Quick-Reference Tables for Backup and Restore s, page 3 Supported Features and Components, page 4 System Requirements, page 5 Log In to Disaster Recovery System, page 7
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
File Transfers. Contents
A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using
Managing Multi-Hypervisor Environments with vcenter Server
Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent
KeySecure CUSTOMER RELEASE NOTES. Contents. Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A.
KeySecure CUSTOMER RELEASE NOTES Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A Contents Product Description... 3 Key Management... 3 High Performance... 3 Broad
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
Yealink Technical White Paper. Contents. About VPN... 3. Types of VPN Access... 3. VPN Technology... 3 Example Use of a VPN Tunnel...
1 Contents About... 3 Types of Access... 3 Technology... 3 Example Use of a Tunnel... 4 Yealink IP Phones Compatible with... 5 Installing the Open Server... 5 Installing the Open Server on the Linux Platform...
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Administrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
BrainDumps.3107.74Q.A
BrainDumps.3107.74Q.A Number: Avaya 3107 Passing Score: 800 Time Limit: 120 min File Version: 4.7 http://www.gratisexam.com/ Avaya 3107 Avaya Session Border Controller Enterprise Implementation and Maintenance
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
How To Set Up A Cisco Expressway Trunk On A Cnet Cnet Trunk On An Unidenm (Cisco Vcnet) Vcntl On A Uniden Mt.Net (Cnet Trunk) On A Multi
Cisco Unified Communications Manager with Cisco Expressway (SIP Trunk) Deployment Guide Cisco Expressway X8.2 Unified CM 8.6.x, 9.x January 2015 Contents Introduction 4 Deployment scenario 4 Configuring
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
IP Phone Configuration and Troubleshooting Guide
IP Phone Configuration and Troubleshooting Guide NetVanta 7000 Series and IP 700 Series Phones Overview The purpose of this guide: Explain the default configuration. Explain how to configure the NetVanta
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
IM and Presence Service Network Setup
Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
Nortel - 922-104. Communication Server 1000 Rls.6.0 Upgrades for Engineers
1 Nortel - 922-104 Communication Server 1000 Rls.6.0 Upgrades for Engineers Question: 1 A customer is upgrading an existing Communication Server (CS) 1000M with a CPPM Signaling Server at Rls. 5.0 to a
McAfee Firewall Enterprise 8.3.1
Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
LifeSize UVC Multipoint Deployment Guide
LifeSize UVC Multipoint Deployment Guide May 2014 LifeSize UVC Multipoint Deployment Guide 2 LifeSize UVC Multipoint LifeSize UVC Multipoint is a software MCU optimized for conferences that mix high definition
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1) Published: Decemer 02, 2010 This guide provides an overview of the Disaster Recovery System, describes
Installation / Configuration Manual. TLS and srtp
Installation / Configuration Manual TLS and srtp Version 3.4.1 of December 16 th 2010 Subject to change without notice NovaTec Kommunikationstechnik GmbH Titel des Dokumentes 1/55 Table of contents Changes...
Configuring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0
Avaya Solution & Interoperability Test Lab Configuring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0 Abstract These Application Notes describe a solution comprised
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
LifeSize Control TM Deployment Guide
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
PerleVIEW Device Management System User s Guide
PerleVIEW Device Management System User s Guide Version 1.2 Part #5500320-12 May 2013 PerleVIEW V1.2 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,
Zenprise Device Manager 6.1
Zenprise Device Manager 6.1 APPLE APNS CERTIFICATE SETUP GUIDE Rev 6.10.00 2 ZENPRISE DEVICE MANAGER 6.1 APPLE APNS CERTIFICATE SETUP GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well
vshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
vsphere Security ESXi 6.0 vcenter Server 6.0 EN-001466-04
ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Motorola Solutions Integration Guide TEAM WSM to Avaya Session Manager with Nortel CS1000 Trunk Side Integration
Motorola Solutions Integration Guide TEAM WSM to Avaya Session Manager with Nortel CS1000 Trunk Side Integration 1 Integration Guide TEAM WSM to Avaya Session Manager and CS1000 Table of Contents 1.0 Summary...
Laboratory Exercises V: IP Security Protocol (IPSec)
Department of Electronics Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture (FESB) University of Split, Croatia Laboratory Exercises V: IP Security Protocol (IPSec) Keywords:
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
Deploying F5 with VMware View and Horizon View
Deploying F5 with VMware View and Horizon View Welcome to the F5 and VMware View Deployment Guide. This document contains guidance on configuring the BIG-IP system version 11 and later, including BIG-IP
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1)
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1) This guide provides an overview of the Disaster Recovery System, describes how to use the Disaster
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0
Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Bluesocket virtual Wireless Local Area Network (vwlan) FAQ
Bluesocket virtual Wireless Local Area Network (vwlan) FAQ Updated 11/07/2011 Can I disable https on the login page of the BSC or vwlan and use http instead so I do not get a certificate error? No, https
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
How To Program A Talkswitch Phone On A Cell Phone On An Ip Phone On Your Ip Phone (For A Sim Sim) On A Pc Or Ip Phone For A Sim Phone On Iphone Or Ipro (For An Ipro) On
TALKSWITCH DOCUMENTATION ADDING IP PHONES TO TALKSWITCH RELEASE 6.50 CT.TS005.008104 ANSWERS WITH INTELLIGENCE COPYRIGHT INFORMATION Copyright 2011 Fortinet, Inc. All rights reserved. Fortinet, FortiGate,
IPPBX FAQ. For Firmware Version: V2.0/V3.0 2013-12-11
For Firmware Version: V2.0/V3.0 2013-12-11 Contents 1. IPPBX Access... 3 1.1 How to access IPPBX via SSH?... 3 1.2 How to access IPPBX if I forget the IP of WAN?... 4 1.3 How to retrieve WEB password via
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
LifeSize Bridge 2200 Deployment Guide
LifeSize Bridge 2200 Deployment Guide August 2013 LifeSize Bridge 2200 Deployment Guide 2 LifeSize Bridge 2200 LifeSize Bridge 2200 is a fixed capacity multipoint control unit (MCU) optimized for HD conferences
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
