Ultra Secure Mode
Polycom®, Inc.
874
Non-hashed Passwords
All non-hashed passwords are stored encrypted as set out in the table below.
In compliance with UC APL requirements, PKI Self-signed Certificates are supported for the both the Default
Management and IP Network Services.
A mixture of Self-signed and CA-signed Certificates is supported, however a CA-signed certificate will
always override a Self-signed Certificate.
Self-signed Certificate Creation
Self-signed Certificates are created during:
●
Initial system start-up before any CA-signed Certificates have been installed.
●
IP Network Services creation.
●
Network Services updates that result in Host Name changes.
●
Daily validity checks of Self-signed Certificates.
●
Backup and Restore of the system configuration
Self-signed Certificate field values are automatically inserted when the certificate is created Self-signed
Certificates are indicated in the Certification Repository - Issued By field.
Non-hashed Passwords - Encryption
Connection
Storage type
Previous
Versions
From
Version 8.1
SNMPv3
Two passwords: Authentication
/ Privacy
Community permissions which are not
the PW to connect to SNMP are not
Saved Encrypted
Non encrypted
AES 256
Exchange
Non encrypted – Feature disabled in
Ultra Secure Mode
Non encrypted
AES 256
RV v.35 serial ports – password
for login
Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256
AES 256
H.323 authentication –
password
Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256
AES 256
SIP digest – password
Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256
AES 256
Summary of Contents for RealPresence RMX 4000
Page 135: ...Defining SVC and Mixed CP and SVC Conference Profiles Polycom Inc 104 12 Click the IVR tab ...
Page 468: ...Conference and Participant Monitoring Polycom Inc 437 ...
Page 578: ...Network Security Polycom Inc 547 3 Define the following fields ...
Page 992: ...Appendix D Ad Hoc Conferencing and External Database Authentication Polycom Inc 961 ...