CHAPTER 14 Security
Mediant 4000 SBC | User's Manual
4.
From the 'Private Key Size' drop-down list, select the desired private key size (in bits) for RSA
public-key encryption for newly self-signed generated keys:
●
512
●
768
●
1024 (default)
●
2048
●
4096
5.
(Optional) In the 'Private key pass-phrase' field, enter a password (passphrase) to encrypt the
private key file. If you don't want to encrypt the file, make the field blank. The default
passphrase is "audc". The passphrase can be up to 32 characters.
6.
Click
Generate Private-Key
; a message appears requesting you to confirm key generation.
7.
Click
OK
to confirm key generation; the device generates a new private key, indicated by a
message in the
Certificate Signing Request
group:
8.
Continue with the certificate configuration by either creating a CSR or generating a new self-
signed certificate.
9.
Save the configuration with a device reset for the new certificate to take effect.
Creating Self-Signed Certificates for TLS Contexts
You can assign a certificate that is digitally signed by the device itself to a TLS Context (i.e., self-
signed certificate). In other words, the device acts as a CA. The Issuer (e.g., "Issuer: CN=ACL_
5967925") and Subject (e.g., " Subject: CN=ACL_5967925") fields of the self-signed certificate
have the same value.
●
The device is shipped with a default TLS Context (Index 0 and named "default"),
which includes a self-generated random private key and a self-signed server
certificate. The Common Name (CN or subject name) of the default certificate is
"ACL_nnnnnnn", where
nnnnnnn
denotes the serial number of the device. If this
default self-signed certificate is about to expire (less than a day), the device
automatically re-generates a new self-signed certificate.
You can configure each TLS Context with the following:
➢
To assign a self-signed certificate to a TLS Context:
1.
Before you begin, make sure of the following:
●
You have a unique DNS name for the device (e.g., dns_name.corp.customer.com). The
name is used to access the device and therefore, must be listed in the server certificate.
●
No traffic is running on the device. The certificate generation process is disruptive to traffic
and should be done during maintenance time.
2.
Open the TLS Contexts table (see
Configuring TLS Certificate Contexts
).
3.
In the table, select the required TLS Context index row, and then click the
Change Certificate
link located below the table; the Change Certificates page appears.
- 133 -
Содержание Mediant 4000 SBC
Страница 1: ...User s Manual AudioCodes Series of Session Border Controllers SBC Mediant 4000 SBC Version 7 2...
Страница 40: ...Part I Getting Started with Initial Connectivity...
Страница 48: ...Part II Management Tools...
Страница 113: ...Part III General System Settings...
Страница 118: ...Part IV General VoIP Configuration...
Страница 525: ...Part V Session Border Controller Application...
Страница 654: ...Part VI Cloud Resilience Package...
Страница 663: ...Part VII High Availability System...
Страница 685: ...Part VIII Maintenance...
Страница 759: ...Part IX Status Performance Monitoring and Reporting...
Страница 844: ...Part X Diagnostics...
Страница 888: ...Part XI Appendix...
Страница 1036: ...This page is intentionally left blank CHAPTER 62 Technical Specifications Mediant 4000 SBC User s Manual 1003...