Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated screen capture and fields for latest code

...

  1. In the WebUI, click the Settings tab.
  2. In the left navigation pane, go to Media > DTLS-SRTP Profiles.

    Panel
    borderStylenone

    Caption
    0Figure
    1DTLS-SRTP Table

     

  3. Click the Create DTLS -SRTP Profile () icon.

    Panel
    borderStylenone

    Caption
    0Figure
    1Create DTLS-SRTP Profile

    Image RemovedImage Added

  4. Enter the field configurations. See DTLS-SRTP Profile Table Entry - Field Definitions.
  5. Click OK.

 

Anchor
DTLS Profile
DTLS Profile
DTLS-SRTP Profile Table Entry - Field Definitions

...

Panel
bgColor#FAFAFA
borderStylenone
Configures the number of seconds to wait for the DTLS handshake to complete. Valid entry 1 - 60 seconds. Default entry: 5 10 seconds.

Hash Type

Panel
bgColor#FAFAFA
borderStylenone

Hash Type is used to generate the fingerprint of the SBC X.509 certificate, which is included in the SIP offer message. The fingerprint binds the DTLS key changed in the media plane to the signaling plane.

Valid options:

DTLS_MEDIA_CRYPTO_HASH_SHA1

DTLS_MEDIA_CRYPTO_HASH_SHA224

DTLS_MEDIA_CRYPTO_HASH_SHA256

DTLS_MEDIA_CRYPTO_HASH_SHA384

DTLS_MEDIA_CRYPTO_HASH_SHA512

DTLS_MEDIA_CRYPTO_HASH_MD5

...

Panel
bgColor#FAFAFA
borderStylenone

Specifies the cipher suite IDs (in order of preference) as the security parameter negotiation with the peer; this list includes the cryptographic options supported by the client. 

Valid options:

TLS_RSA_WITH_AES128_CBC_SHA

TLS_RSA_WITH_AES256_CBC_SHA

TLS_RSA_WITH_AES_128_CBC_SHA256

TLS_RSA_WITH_AES_256_CBC_SHA256

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA3

DTLS Connection Retry Interval

Panel
bgColor#FAFAFA
borderStylenone
How long the clients waits before attempting to connect to the DTLS server if the previous attempt failed.
Valid entry: 100 - 500 ms. Default entry: 500 ms.

DTLS Connection Retries

Panel
bgColor#FAFAFA
borderStylenone
The number of times the client attempts connecting to the DTLS server before giving up. Valid entry 1 - 10. Default entry: 5.

Cookie Exchange

Panel
bgColor#FAFAFA
borderStylenone
Enables a Denial of Service attack counter measure initiated by the server. When the server receives ClientHello, it responds with the HelloVerifyRequest message with a generated cookie. The client must re-transmit the ClientHello with the received cookie added. Valid options: Enabled (enables DoS countermeasure) or Disabled (disables DoS countermeasure). Default value: Disabled.

...

Panel
bgColor#FAFAFA
borderStylenone

Specifies the comma-separated crypto suite IDs (in order of preference) to negotiate the crypto used for encryption and decryption of media.

Available options:

How to Use:

Up. Moves the selected entry up in priority.

Down. Moves the selected entry down in priority.

Add/Edit. Adds/edits entries.

Remove. Removes the selected entry from the list.

Tip
titleHelpful Hint

This field presents a multi-select widget when the Add/Edit button is clicked.
Click here for more information about using the Multi-select widget.

Master Key Lifetime

Panel
bgColor#FAFAFA
borderStylenone

Specifies whether the Master Key has an expiration. Valid options: Set (sets an expiration value for the Master Key) or Never Expires (the Master Key will never expire).

Lifetime Value

Panel
bgColor#FAFAFA
borderStylenone

Specifies the lifetime value of the Master Key, measured in numbers of SRTP packets expressed as a power of 2 (e.g. 2^n SRTP Packets).

This field is available only when Master Key Lifetime is configured as Set.

Derivation Rate

Panel
bgColor#FAFAFA
borderStylenone
Specifies the rate at which the session key is refreshed during the SRTP session; this rate is measured in the number of SRTP packets expressed as a power of 2 (i

.

e,  2^n SRTP Packets). If the value is configured as zero, the session key is never refreshed.

Key Identifier Length

Panel
bgColor#FAFAFA
borderStylenone

Specifies the length of the Master Key Identifier, in bytes, sent in the SRTP packet.

The Master Key Identifier (MKI) identifies the master key from which the session key(s) were derived that authenticate and/or encrypt the particular packet.

If the MKI indicator is set to one (key identifier length > 0), the length (in octets) of the MKI field and (for the sender) the actual value of the currently active MKI (the value of the MKI indicator and length) MUST be kept fixed for the lifetime of the context.

Info

To disable the MKI in the SDP, configure this value to 0.