Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Add_workflow_for_techpubs
AUTH1cclemetson
JIRAIDAUTHSYM-2434224478
REV5cclemetson
REV6cclemetson
REV3joshikrysj
REV1mahmood-aslami


To create or modify a Media Crypto an SDES-SRTP Profile:

Excerpt Include
Managing SDES-SRTP Profiles
Managing SDES-SRTP Profiles
nopaneltrue

Modifying

...

an SDES-SRTP Profile

Include Page
_Modify_Entry
_Modify_Entry
nopaneltrue

Creating

...

an SDES-SRTP Profile

  1. Click the Create Media Crypto SDES-SRTP Profile ( ) icon at the top of the Media Crypto SDES-SRTP Profiles page.

    Panel
    borderStylenone

    Caption
    0Figure
    1Create Media Crypto Profile

    Image Modified

     

    Anchor
    properties
    properties

SRTP Config - Field Definitions

Note
titleCAUTION

Anytime Supported is selected in the Operation Option field and the SIP transport is TCP/UDP, the SDP Crypto attributes are sent in plain text.

Spacevars
0company
recommends the use of TLS to protect the keys.

...

Operation Option

Panel
bgColor#FAFAFA
borderStylenone

Specifies the manner in which encryption is supported in the profile.

  • Required: This setting permits call connections only if encryption can be used for the call. If the peer device does not support SRTP (Secure Real Time Protocol) for voice encryption over the IP network, the call setup will fail.
  • Supported: This setting advertises to the peer device that the
    Spacevars
    0longproduct
    implements SRTP. However, a call connection is allowed in secure or unsecure mode depending on the peer preference and capability.
  • Off: This setting disables the use of SRTP for encrypted calling.

Crypto Suite

Panel
bgColor#FAFAFA
borderStylenone

Specifies the crypto suite that the

Spacevars
0company
uses to negotiate with a peer device.

Available options:

  • AES_CM_128_HMAC_SHA1_80. A crypto suite algorithm which uses the 128 bit AES-CM encryption key and a 80 bit HMAC_SHA1 message authentication tag length.
  • AES_CM_128_HMAC_SHA1_32. A crypto suite algorithm which uses the 128 bit AES-CM encryption key and a 32 bit HMAC_SHA1 message authentication tag length.

Default option: AES_CM_128_HMAC_SHA1_80.

Master Key - Field Definitions

Master Key Lifetime

Panel
bgColor#FAFAFA
borderStylenone

Specifies whether or not the Master Key has an expiry.

Lifetime Value

Panel
bgColor#FAFAFA
borderStylenone

Specifies the lifetime of the Master Key, measured in numbers of SRTP packets expressed as a power of 2 (e.g. 2^n SRTP Packets). If the value is set to zero, the Master Key never expires.

Derivation Rate

Panel
bgColor#FAFAFA
borderStylenone

Specifies the rate at which the session key is refreshed during the SRTP session, measured in numbers of SRTP packets expressed as a power of 2 (e.g. 2^n SRTP Packets). If the value is set to zero, the session key is never refreshed.

(info) This option is available when Derive Session Key is Set to a range 16 to 24.

Key Identifier Length

Panel
bgColor#FAFAFA
borderStylenone

Specifies the length of the Master Key Identifier, in bytes, sent in the SRTP packet.

The key identifier (MKI) identifies the master key from which the session key(s) were derived that authenticate and/or encrypt the particular packet.

If the MKI indicator is set to one(key identifier length > 0), the length (in octets) of the MKI field, and (for the sender) the actual value of the currently active MKI (the value of the MKI indicator and length MUST be kept fixed for the lifetime of the context).

Set this value to 0 to disable the MKI in SDP.