Dialogic
®
1000 and 2000 Media Gateway Series User’s Guide
265
Data Security
7.2.2
HTTPS Example
An example of how HTTPS is used with a self-signed certificate is described below. In the
example, the Media Gateway has an IP address of 172.16.3.10 and uses a self-signed certificate.
1. Start the Media Gateway.
2. Start Internet Explorer (or any Web browser that supports HTTPS).
3. In the Web browser Address box, enter http://172.16.3.10.
4. At the login screen, enter a User name and Password, and click OK to login to the Media
Gateway.
5. Select the Security Web page > Certificate Management tab > Certificate Usage table >
HTTPS parameter and check that
Self Signed
is the selected value.
6. Go to the HTTPS table and click on Generate button on the Self Signed row. The Self Signed
Certificate Generation screen will appear.
7. Fill in the text boxes in the Value row of both the Certificate X509 Extensions and Certificate
Subject tables and then click the Generate button. After a short time, the following message
will appear: “Self signed Certificate was created”. Click Continue to return to the Certificate
Management Web page.
8. In the HTTPS table, click the Export button in the
Action
column of the
Self Signed
row to
download the certificate from the Media Gateway to the PC.
9. Configure this certificate on the PC running the Web browser used to connect to the Media
Gateway via HTTPS. See
Section 7.5, “Installing Certificate Using Internet Explorer”
page 270 for details.
10. In the Web browser Address box, enter https://172.16.3.10.
11. At the login screen, enter a User name and Password. Then click OK to login to the Media
Gateway. HTTPS is now active.
7.3
SIP Call Control Security using TLS
This section includes the following information about SIP Call Control security using TLS:
•
•
•
SIP is an application protocol used for VoIP call control. SIP messages are used for call setup and
tear down. These messages contain information such as call-party information, call media type,
whether it is a secure call, and if so, what encryption algorithm is used, etc. The SIP protocol can
be carried by UDP, TCP, or TLS transports. Both UDP and TCP transport data in clear text. As a
result, UDP and TCP can easily be monitored by third party hackers. TLS, on the other hand,
carries SIP data in a secure way by encrypting the data and authenticating the transport
connections. Authentication guarantees that you are talking to the intended peer.
Summary of Contents for 1000Series
Page 1: ...Dialogic 1000 and 2000 Media Gateway Series User s Guide December 2014 64 0346 13...
Page 10: ...10 Dialogic 1000 and 2000 Media Gateway Series User s Guide Contents...
Page 14: ...14 Dialogic 1000 and 2000 Media Gateway Series User s Guide Contents...
Page 24: ...24 Dialogic 1000 and 2000 Media Gateway Series User s Guide About This Publication...
Page 36: ...36 Dialogic 1000 and 2000 Media Gateway Series User s Guide Overview...
Page 44: ...44 Dialogic 1000 and 2000 Media Gateway Series User s Guide Media Gateway Configuration...
Page 190: ...190 Dialogic 1000 and 2000 Media Gateway Series User s Guide Parameter Reference...
Page 200: ...200 Dialogic 1000 and 2000 Media Gateway Series User s Guide Call Progress Tones...
Page 272: ...272 Dialogic 1000 and 2000 Media Gateway Series User s Guide Data Security...
Page 326: ...326 Dialogic 1000 and 2000 Media Gateway Series User s Guide...