CHAPTER 14 Security
Mediant 4000 SBC | User's Manual
Parameter
Description
[TLSContexts_
OcspServerSecondary]
'OCSP Port'
ocsp-port
[TLSContexts_
OcspServerPort]
Defines the OCSP server's TCP port number.
The default port is 2560.
'OCSP Default Response'
ocsp-default-response
[TLSContexts_
OcspDefaultResponse]
Determines whether the device allows or rejects peer
certificates if it cannot connect to the OCSP server.
■
[0]
Reject
(default)
■
[1]
Allow
Assigning CSR-based Certificates to TLS Contexts
You can request a digitally signed certificate from a Certification Authority (CA) for a TLS Context.
This process is referred to as a certificate signing request (CSR) and is required if your organization
employs a Public Key Infrastructure (PKI) system. The CSR contains information identifying the
device such as a Distinguished Name (DN) and/or subject alternative names in the case of an
X.509 certificate.
➢
To assign a CSR-based certificate to a TLS Context:
1.
Open the TLS Contexts table (see
Configuring TLS Certificate Contexts
).
2.
In the table, select the required TLS Context, and then click the
Change Certificate
link
located below the table; the Change Certificates page appears.
3.
Under the
Certificate Signing Request
group, fill in the following information:
a.
Distinguished Name (DN) fields (uniquely identifies the device):
◆
In the 'Common Name [CN]' field, enter the common name.
◆
(Optional) In the 'Organizational Unit [OU]' field, enter the section of the organization.
◆
(Optional) In the ' Company name [O]' field, enter the legal name of your organization.
◆
(Optional) In the 'Locality or city name [L]' field, enter the city where your organization
is located.
◆
(Optional) In the ' State [ST]' field, enter the state or province where your organization
is located.
◆
(Optional) In the ' Country code [C]' field, enter the two-letter ISO abbreviation for your
country.
b.
If you want to generate a CSR for SAN (with multiple subject alternate names), then from
the 'Subject Alternative Name [SAN]' drop-down list, select the type of SAN (e-mail
address, DNS hostname, URI, or IP address), and then enter the relevant value. You can
configure multiple SAN names, using the 1st to 5th 'Subject Alternative Name [SAN]'
fields.
c.
From the 'Signature Algorithm' drop-down list, select the hash function algorithm (SHA-1,
SHA-256, or SHA-512) with which to sign the certificate.
●
Fill in the fields according to you security provider's instructions.
●
If you leave the 'Common Name [CN]' field empty, the device generates the CSR
with the default Common Name (
CN=ACL_<6-digit serial number of device>
).
- 128 -
Summary of Contents for Mediant 4000 SBC
Page 1: ...User s Manual AudioCodes Series of Session Border Controllers SBC Mediant 4000 SBC Version 7 2...
Page 40: ...Part I Getting Started with Initial Connectivity...
Page 48: ...Part II Management Tools...
Page 113: ...Part III General System Settings...
Page 118: ...Part IV General VoIP Configuration...
Page 525: ...Part V Session Border Controller Application...
Page 654: ...Part VI Cloud Resilience Package...
Page 663: ...Part VII High Availability System...
Page 685: ...Part VIII Maintenance...
Page 759: ...Part IX Status Performance Monitoring and Reporting...
Page 844: ...Part X Diagnostics...
Page 888: ...Part XI Appendix...