RADVision Scopia XT5000 Series Installation Guide Page 131

  • Download
  • Add to my manuals
  • Print
  • Page
    / 159
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 130
Chapter 7 | Securing your Scopia XT
Endpoint for IP Office
You can secure the connection between video network devices and your Scopia XT Endpoint for IP Office by
configuring the network’s components to communicate via the Transport Layer Security (TLS) protocol, and enabling
encryption.
For details about securing your Scopia XT Endpoint for IP Office, see:
Navigation
Securing Connections to the XT Endpoint Using TLS on page 131
Enabling Encryption for Videoconferences on page 140
Securing Connections to the XT Endpoint Using TLS
You can configure your video network, whether it is a Scopia Solution or a third party deployment, to
support Transport Layer Security (TLS) for the SIP protocol.
Important:
Using encryption is subject to local regulation. In some countries it is restricted or limited for usage.
For more information, consult your local reseller.
TLS is used to secure the connection between the XT Endpoint and other video network devices.
The TLS protocol is based on a public and private keys for authorization and encryption, exchanged
between the XT Endpoint and other video network devices to allow an authenticated and secure
connection. You can create a pair of keys, public and private, by generating a certificate which must be
signed by a certification authority. The public key is placed in a certificate and signed by a certification
authority (CA).
As you configure your deployment for TLS, you need to generate a certificate signing request (CSR) for
every XT Endpoint that uses TLS in your deployment and send it to the CA to be signed. A CA has its
own certificate, known as the CA root certificate. When the CA signed certificate is ready, you upload it
into the XT Endpoint for which it was created, together with the CA root certificate.
Each time a TLS connection is established, the video network device which starts the TLS
communication session requests a signed certificate together with the CA root certificate. After the other
device verifies its identity with these certificates, a secure connection can be established. Exchanging
certificates between devices is part of the TLS protocol; it happens in the background and is transparent
to a user.
The following set of procedures secure the connection between XT Endpoint and other devices. Perform
these tasks in the order listed below:
1. Perform Generating a Certificate Signing Request for XT Endpoint on page 132.
2. Ensure you have the root certificate of the certificate authority your organization uses.
This root certificate is used when uploading signed certificates into the XT Endpoint.
Installation Guide for Scopia XT5000 Endpoint with Embedded
Server for IP Office Version 3.2
Securing your Scopia XT Endpoint for IP Office | 131
Page view 130
1 2 ... 126 127 128 129 130 131 132 133 134 135 136 ... 158 159

Comments to this Manuals

No comments