Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

About this Resource

Excerpt

Defines a TLS Profile Table to be used in a SIP Signaling Group.

REST API Methods for this Resource

Resource Schema

Configuration

Parameter Name Required Service Affecting Data Type Default Value Possible Values Description
DescriptionNoNostringnone64 - Max LengthDescription of the profile
TLSVersionYesYesEnum2Possible values:
  • 0 - e_tls1_2
  • 1 - e_tls1_0
  • 2 - e_tlsany
Defines TLS Protocol Version. By default system would accept all TLS protocol versions up to 1.2. The SBC Client as a client would initiate highest supported version, which is TLS 1.2.
HandshakeTimeoutYesYesint10Possible values:
  • 1 - Minimum
  • 30 - Maximum
Specifies the SIP TLS client and server handshake inactivity timeout interval. The control timeout setting will abnormally terminate (with error) the TLS handshake session for a long period of inactivity between each TLS handshake message exchange. Recommended setting should be set to maximum 30 seconds due to network congestion.
MutualAuthYesNoint1Possible values:
  • 0 - Minimum
  • 1 - Maximum
Specifies the authentication method option using the Mutual TLS in the SIP TLS server handshake exchange message. This enables the Mutual authentication request and verifications of the SIP peer client certificate.
VerifyPeersCertificateYesNoint1Possible values:
  • 0 - Minimum
  • 1 - Maximum
Specifies the authentication method option of verifying the identity of the received SIP peer server certificate during the SIP TLS client handshake exchange message. This enables the verifications of the SIP peer server certificate.
ClientCipherSequenceYesNostring10,9,6,5,7,4,3,1,0,232 - Max Length Set of cipher suite(s) as comma seperated string in order of preference as security parameter negotiation with the remote system. Enumeration List:
  • 0 AES128-SHA
  • 1 AES256-SHA
  • 2 DES-CBC3-SHA
  • 3 AES128-SHA256
  • 4 AES256-SHA256
  • 5 ECDHE-RSA-AES128-SHA256
  • 6 ECDHE-RSA-AES256-SHA384
  • 7 ECDHE-RSA-DES-CBC3-SHA
  • 9 ECDHE-RSA-AES128-GCM-SHA256
  • 10 ECDHE-RSA-AES256-GCM-SHA384
ValidateClientFQDNYesNoint1Possible values:
  • 0 - Minimum
  • 1 - Maximum
If enabled runs reverse DNS lookup to verify peer's FQDN.
ValidateServerFQDNYesNoEnum1Possible values:
  • 0 - btFalse
  • 1 - btTrue
If enabled performs validation of configured SIP Server host FQDN with the verify peer's FQDN.
ClientCertificateYesNoint1Possible values:
  • 1 - Minimum
  • 26 - Maximum
Identifies the client certificate to be used for the TLS connection.
ServerCertificateNoNoint1Possible values:
  • 1 - Minimum
  • 26 - Maximum
Identifies the server certificate to be used for the TLS connection. As of release 10.0, same certificate is used for both client and server TLS connections. The value of the Client Certificate is always used as a Server Certificate value.
FallbackCompatibleModeYesNoEnum0Possible values:
  • 0 - btFalse
  • 1 - btTrue
If enabled SSLv2 and SSLv3 variants to TLS1.0 will be negotiated when the compatibility with the peer is important.