Add_workflow_for_techpubs |
---|
AUTH1 | UserResourceIdentifier{userKey=8a00a0c85bb25531015bc4122a4f0003, userName='null'} |
---|
JIRAIDAUTH | SBX-71546 |
---|
REV5 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cd5909df, userName='null'} |
---|
REV6 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cd5909df, userName='null'} |
---|
REV3 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cef20cc2, userName='null'} |
---|
REV1 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26ce8a0be3, userName='null'} |
---|
|
Use the DTLS Profile window to configure various DTLS parameters to attach to a SIP trunk group in support of WebRTC functionality.
Multiexcerpt include |
---|
MultiExcerptName | DTLS Crypto Suites |
---|
PageWithExcerpt | SBC for WRTC |
---|
|
To View DTLS Profiles
On the SBC main screen, go to All > Profiles > Security > DTLS Profile.
The DTLS Profile window opens.
Caption |
---|
0 | Figure |
---|
1 | DTLS Profile List Window |
---|
|
Image Added |
To Create a DTLS Profile
To create a new DTLS Profile:
Click New DTLS Profile. The Create New DTLS Profile window opens.
Caption |
---|
0 | Figure |
---|
1 | Create DTLS Profile Window |
---|
|
Image Added |
- Use the following table to configure the options and then click Save.
Caption |
---|
0 | Table |
---|
1 | DTLS Profile Parameters |
---|
|
|
Parameter | Description |
---|
Name | Specifies the name of the DTLS Profile created. The value ranges up to 23 characters. |
Handshake Timer | Specifies the time in which the DTLS handshake must be completed. The timer starts when the TCP connection is established. Must be 1 - 60 seconds; default is 5. |
Session Resump Timer | Specifies the DTLS session resumption period for which cached sessions are retained (in seconds). DTLS allows successive connections to be created within one DTLS session and the resumption of a session after a DTLS connection is closed or after a server card failover, without repeating the entire authentication and other setup steps for each connection, except when the space must be reclaimed for a new session. Must be 0 - 86,400 seconds; default is 300. |
Cipher Suite1 | Use this parameter to specify the first DTLS Cipher Suite choice for this profile. nosuite
rsa-with-aes-128-cbc-sha (default) – Confidentiality cipher and mode for the DTLS Record protocol.rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the DTLS Record protocol with SHA-256 as the hash function.
rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption. rsa-with-aes-256-cbc-sha-256 * – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
rsa-with-null-sha – The integrity cipher used for the DTLS Record protocol.
tls_ecdh_ecdsa_with_aes_256_cbc_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 GCM and SHA384 as hash function.tls_ecdh_ecdsa_with_aes_256_gcm_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 CBC and SHA384 as hash function. Available_since |
---|
Type | Available Since |
---|
Release | 9.2.1 |
---|
|
tls_ecdhe_rsa_with_aes_256_cbc_sha384 * – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
* To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile. ** To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile and SSL certificates must be created using ECC keys. Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used. Include Page |
---|
| _FIPS_Releases |
---|
| _FIPS_Releases |
---|
|
|
Cipher Suite2 | Use this parameter to specify the second DTLS Cipher Suite choice for this profile. nosuite (default)
rsa-with-aes-128-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol.rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the DTLS Record protocol with SHA-256 as the hash function.
rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption. rsa-with-aes-256-cbc-sha-256 * – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
rsa-with-null-sha – The integrity cipher used for the DTLS Record protocol.
tls_ecdh_ecdsa_with_aes_256_cbc_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 GCM and SHA384 as hash function.tls_ecdh_ecdsa_with_aes_256_gcm_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 CBC and SHA384 as hash function. Available_since |
---|
Type | Available Since |
---|
Release | 9.2.1 |
---|
|
tls_ecdhe_rsa_with_aes_256_cbc_sha384 * – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function. tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
* To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile. ** To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile and SSL certificates must be created using ECC keys. Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used. |
Cipher Suite3 | Use this parameter to specify the third DTLS Cipher Suite choice for this profile. nosuite (default)
rsa-with-aes-128-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol.rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the DTLS Record protocol with SHA-256 as the hash function.
rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption. rsa-with-aes-256-cbc-sha-256 * – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
rsa-with-null-sha – The integrity cipher used for the DTLS Record protocol.
tls_ecdh_ecdsa_with_aes_256_cbc_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 GCM and SHA384 as hash function.tls_ecdh_ecdsa_with_aes_256_gcm_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 CBC and SHA384 as hash function. Available_since |
---|
Type | Available Since |
---|
Release | 9.2.1 |
---|
|
tls_ecdhe_rsa_with_aes_256_cbc_sha384 * – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
* To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile. ** To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile and SSL certificates must be created using ECC keys. Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used. |
DTLS Role | Specifies the allowed DTLS roles of this DTLS profile. The options are: |
Hash Type | Specifies the allowed DTLS hash function for a specified DTLS profile. The options are: Md5 Sha1 (default)
Sha224 Sha256 Sha384 Sha512
|
Cert Name | Specifies the name of the certificate referred by a specified DTLS profile. The default value is defaultDtlsSBCCert . |
Cookie Exchange | Specifies the state that is, enabled or disabled cookie exchange. disabled enabled (default)
|
V1_0 | DTLS protocol version 1.0. disabled enabled (default)
|
V1_1 | DTLS protocol version 1.1. disabled (default)
enabled
|
V1_2 | DTLS protocol version 1.2. disabled (default) enabled
|
To Edit a DTLS Profile
To edit a DTLS Profile:
- Click the radio button next to the specific DTLS Profile name. The Edit DTLS Profile window opens.
- Make the required changes and click Save.
To Copy a DTLS Profile
To copy a DTLS Profile and make minor changes:
- Click the radio button next to the specific DTLS Profile to copy.
- Click Copy DTLS Profile. The Copy DTLS Profile window opens.
- Make any required changes and click Save.
To Delete a DTLS Profile
To delete a DTLS Profile:
- Click the radio button next to the specific DTLS Profile that you want to delete.
- Click the Delete icon (X) at the end of the row.
- Confirm the deletion when prompted.
Add_workflow_for_techpubs |
---|
AUTH1 | UserResourceIdentifier{userKey=8a00a0c85bb25531015bc4122a4f0003, userName='null'} |
---|
JIRAIDAUTH | SBX-71546 |
---|
REV5 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cd5909df, userName='null'} |
---|
REV6 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cd5909df, userName='null'} |
---|
REV3 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cef20cc2, userName='null'} |
---|
REV1 | UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26ce8a0be3, userName='null'} |
---|
|
...
Multiexcerpt include |
---|
MultiExcerptName | DTLS Crypto Suites |
---|
PageWithExcerpt | SBC for WRTC |
---|
|
To View DTLS Profiles
On the SBC main screen, go to All > Profiles > Security > DTLS Profile.
...
Caption |
---|
0 | Figure |
---|
1 | DTLS Profile List Window |
---|
|
|
To Create a DTLS Profile
To create a new DTLS Profile:
...
Parameter | Description |
---|
Name | Specifies the name of the DTLS Profile created. The value ranges up to 23 characters. |
Handshake Timer | Specifies the time in which the DTLS handshake must be completed. The timer starts when the TCP connection is established. Must be 1 - 60 seconds; default is 5. |
Session Resump Timer | Specifies the DTLS session resumption period for which cached sessions are retained (in seconds). DTLS allows successive connections to be created within one DTLS session and the resumption of a session after a DTLS connection is closed or after a server card failover, without repeating the entire authentication and other setup steps for each connection, except when the space must be reclaimed for a new session. Must be 0 - 86,400 seconds; default is 300. |
Cipher Suite1 | Use this parameter to specify the first DTLS Cipher Suite choice for this profile. nosuite
rsa-with-aes-128-cbc-sha (default) – Confidentiality cipher and mode for the DTLS Record protocol.rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the DTLS Record protocol with SHA-256 as the hash function.
rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption. rsa-with-aes-256-cbc-sha-256 * – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
rsa-with-null-sha – The integrity cipher used for the DTLS Record protocol.
tls_ecdh_ecdsa_with_aes_256_cbc_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 GCM and SHA384 as hash function.tls_ecdh_ecdsa_with_aes_256_gcm_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 CBC and SHA384 as hash function.
tls_ecdhe_rsa_with_aes_256_cbc_sha384 * – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
* To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile. ** To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile and SSL certificates must be created using ECC keys. Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used. Include Page |
---|
| _FIPS_Releases |
---|
| _FIPS_Releases |
---|
|
|
Cipher Suite2 | Use this parameter to specify the second DTLS Cipher Suite choice for this profile. nosuite (default)
rsa-with-aes-128-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol.rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the DTLS Record protocol with SHA-256 as the hash function.
rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption. rsa-with-aes-256-cbc-sha-256 * – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
rsa-with-null-sha – The integrity cipher used for the DTLS Record protocol.
tls_ecdh_ecdsa_with_aes_256_cbc_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 GCM and SHA384 as hash function.tls_ecdh_ecdsa_with_aes_256_gcm_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 CBC and SHA384 as hash function.
tls_ecdhe_rsa_with_aes_256_cbc_sha384 * – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function. tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
* To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile. ** To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile and SSL certificates must be created using ECC keys. Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used. |
Cipher Suite3 | Use this parameter to specify the third DTLS Cipher Suite choice for this profile. nosuite (default)
rsa-with-aes-128-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol.rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the DTLS Record protocol with SHA-256 as the hash function.
rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption. rsa-with-aes-256-cbc-sha-256 * – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
rsa-with-null-sha – The integrity cipher used for the DTLS Record protocol.
tls_ecdh_ecdsa_with_aes_256_cbc_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 GCM and SHA384 as hash function.tls_ecdh_ecdsa_with_aes_256_gcm_sha384 ** – Confidentiality cipher and mode for DTLS Record with AES256 CBC and SHA384 as hash function.
tls_ecdhe_rsa_with_aes_256_cbc_sha384 * – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the DTLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the DTLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the DTLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
* To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile. ** To use this cipher, DTLS version 1.2 must be enabled in the DTLS Profile and SSL certificates must be created using ECC keys. Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used. |
DTLS Role | Specifies the allowed DTLS roles of this DTLS profile. The options are: |
Hash Type | Specifies the allowed DTLS hash function for a specified DTLS profile. The options are: Md2 Md5 Sha1 (default)
Sha224 Sha256 Sha384 Sha512
|
Cert Name | Specifies the name of the certificate referred by a specified DTLS profile. The default value is defaultDtlsSBCCert . |
Cookie Exchange | Specifies the state that is, enabled or disabled cookie exchange. disabled enabled (default)
|
V1_0 | DTLS protocol version 1.0. disabled enabled (default)
|
V1_1 | DTLS protocol version 1.1. disabled (default)
enabled
|
V1_2 | DTLS protocol version 1.2. disabled (default) enabled
|
To Edit a DTLS Profile
To edit a DTLS Profile:
- Click the radio button next to the specific DTLS Profile name. The Edit DTLS Profile window opens.
- Make the required changes and click Save.
To Copy a DTLS Profile
To copy a DTLS Profile and make minor changes:
- Click the radio button next to the specific DTLS Profile to copy.
- Click Copy DTLS Profile. The Copy DTLS Profile window opens.
- Make any required changes and click Save.
To Delete a DTLS Profile
To delete a DTLS Profile:
...