© 2016 Avaya Inc. All rights reserved. NDA Confidential; use pursuant to your agreement.
Release Notes for Avaya Scopia® XT Series
What’s New | 61
o
Accept Validated or same default certificate: certificates which are validated or that
are the same as currently used by the XT series (XT Series default certificates on
both sides of the call) are accepted.
o
Accept All: no hostname validation is performed.
Certificate
‘Key Usage’ Validation:
o
Yes*:
the certificate is accepted only if a ‘Key Usage’ or ‘Extended Key Usage’ value
is validated.
o
No: the inclusi
on of the ‘Key Usage’ or ‘Extended Key Usage’ value in the certificate is
not validated.
Figure 41:
Certificate Validation Options
Import Export certificates in PKCS#12
An encrypted PKCS #12 file format can now be used to import/export both the private key and the
corresponding certificate into the Codec Unit from the XT web interface. The file can be password
protected. You can import/export the certificate for TLS or for the HTTPS connection to XT Web
Server.
If an USB key is plugged, you can import and export a file also using the XT GUI menu.
[GUI]
C
ONFIGURE
>A
DVANCED
>
U
TILITIES
>
R
EMOTE
A
CCESS
>
U
TILITIES
>C
ERTIFICATES
>TLS/W
EB
[W
EB
]
A
DMINISTRATOR
S
ETTINGS
>U
TILITIES
>R
EMOTE
A
CCESS
>
U
TILITIES
>C
ERTIFICATES
>
TLS/W
EB
Figure 42:
Import a Certificate using PKCS#12 format
Encryption Preferences
In this version, it is possible to disable audio alerts for encryption, to disable SIP proprietary
encryption (which can be used when connecting to XT Series systems where TLS is disabled or not
supported) or to configure the minimum key size accepted for Diffie-Hellman encryption. It is also
possible to specify different preferences for unprotected calls with XTD server and clients.
To change encryption preferences, browse to
[GUI] >
C
ONFIGURE
>
A
DVANCED
>
C
ALLS
>E
NCRYPTION
:
[W
EB
] >
A
DMINISTRATOR
S
ETTINGS
>
C
ALLS
>E
NCRYPTION
:
Unprotected Calls for XTD: a different security policy can be specified for calls between XTD
server and XT. Calls between XTD clients and XTD server can be encrypted, but as XTD server
is deplo
yed inside company’s premises the traffic between XTD server and XT is not encrypted.
You can usually accept unprotected XTD calls safely (they are encrypted between the clients and
the server). The default is “Accept, no information about the encryption status”.