Chapter 7 | Securing your Scopia XT Series
You can secure the connection between video network devices and your Scopia XT Series by configuring the
network’s components to communicate via the Transport Layer Security (TLS) protocol, and enabling encryption.
For details about securing your Scopia XT Series, see:
Navigation
•
Securing Connections to the XT Series Using TLS
on page 140
•
Enabling Encryption for Videoconferences
on page 149
Securing Connections to the XT Series Using TLS
You can configure your video network, whether it is a Scopia Solution or a third party deployment, to
support Transport Layer Security (TLS) for the SIP protocol.
Important:
Using encryption is subject to local regulation. In some countries it is restricted or limited for usage.
For more information, consult your local reseller.
TLS is used to secure the connection between the XT Series and other video network devices.
The TLS protocol is based on a public and private keys for authorization and encryption, exchanged
between the XT Series and other video network devices to allow an authenticated and secure
connection. You can create a pair of keys, public and private, by generating a certificate which must be
signed by a certification authority. The public key is placed in a certificate and signed by a certification
authority (CA).
As you configure your deployment for TLS, you need to generate a certificate signing request (CSR) for
every XT Series that uses TLS in your deployment and send it to the CA to be signed. A CA has its own
certificate, known as the CA root certificate. When the CA signed certificate is ready, you upload it into
the XT Series for which it was created, together with the CA root certificate.
Each time a TLS connection is established, the video network device which starts the TLS
communication session requests a signed certificate together with the CA root certificate. After the other
device verifies its identity with these certificates, a secure connection can be established. Exchanging
certificates between devices is part of the TLS protocol; it happens in the background and is transparent
to a user.
The following set of procedures secure the connection between XT Series and other devices. Perform
these tasks in the order listed below:
1.
Perform
Generating a Certificate Signing Request for XT Series
2.
Ensure you have the root certificate of the certificate authority your organization uses.
This root certificate is used when uploading signed certificates into the XT Series.
3.
Perform
Uploading XT Series Certificates
on page 143.
Installation Guide for Scopia XT5000 Series Version 3.2
Securing your Scopia XT Series | 140