In this section:
Use the TLS Profile window to create and configure profiles for implementing the Transport Layer Security (TLS) protocol for use with SIP over TLS. TLS is an IETF protocol for securing communications across an untrusted network. Normally, SIP packets travel in plain text over TCP or UDP connections; Secure SIP is a security measure that uses TLS, the successor to the Secure Sockets Layer (SSL) protocol. To add TLS policy to the SBC you configure a TLS profile. The TLS profile is assigned to the SIP signaling port and controls behavior of all TLS connections established on that signaling port. An instance of a TLS profile called defaultTlsProfile is present by default, and is used by default by each SIP signaling port; however, additional TLS profile instances may be created and used instead. The settings within the defaultTlsProfile may be modified. Also, you must set the supported transport protocols for the SIP signaling port to allow SIP over TLS over TCP. If a zone's Example: When On the SBC main screen, go to Configuration > System Provisioning > Security Configuration > TLS Profile. To create a new TLS Profile: Click New TLS Profile. Use the following table to configure the options and then click Save. Parameter Description Name The name assigned to this Transport Layer Security (TLS) profile. Must be 1 - 23 characters. For further details, refer to SBC Provisioning Limits App Auth Timer Specifies the higher layer authentication timer in seconds. Must be 1-60 seconds. The default value is 5. Handshake Specifies the time in which the TLS handshake must be completed. The timer starts when the TCP connection is established. Must be 1 - 60 seconds; default is 5. Session Resume Specifies the TLS session resumption period for which cached sessions are retained (in seconds). TLS allows successive connections to be created within one TLS session and the resumption of a session after a TLS connection is closed or after a server card failover, without repeating the entire authentication and other setup steps for each connection, except when the space must be reclaimed for a new session. Must be 0 - 86,400 seconds; default is 3600. Use this parameter to specify the first TLS Cipher Suite choice for this profile. Rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the TLS Record protocol with SHA-256 as the hash function. Rsa-with-aes-256-cbc-sha-256* – Confidentiality cipher and mode for the TLS Record protocol with AES 256 encryption and SHA-256 as the hash function. Rsa-with-null-sha – The integrity cipher used for the TLS Record protocol. Tls_ecdh_ecdsa_with_aes_256_gcm_sha384**** – Confidentiality cipher and mode for TLS Record with AES256 CBC and SHA384 as hash function. Tls_ecdhe_rsa_with_aes_256_cbc_sha384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange). tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function. tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function. tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the TLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function. * To use this cipher, TLS version 1.2 must be enabled in the TLS Profile. ** The SBC 11.1 and later versions do not support *** To use this cipher, TLS version 1.3 must be enabled in the TLS Profile. **** To use this cipher, TLS version 1.2 must be enabled in the TLS Profile and SSL certificates must be created using ECC keys. NOTE: When Fips-140-2 mode is enabled, Rsa-with-null-sha should not be used. NOTE: TLS 1.3 does not support RSA. Certificates generated with RSA will not work with TLS 1.3. The SBC 7.2.x release supports FIPS-140-2 and the 10.1.3 release supports FIPS-140-3. FIPS-140-2 is not supported in 10.1.3 and later releases and gets automatically converted to FIPS-140-3 as part of the upgrade. To verify the current status of FIPS certification, contact the Global Support Assistance Center: Use this parameter to specify the second TLS Cipher Suite choice for this profile. Rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the TLS Record protocol with SHA-256 as the hash function. Rsa-with-aes-256-cbc-sha-256* – Confidentiality cipher and mode for the TLS Record protocol with AES 256 encryption and SHA-256 as the hash function. Rsa-with-null-sha – The integrity cipher used for the TLS Record protocol. Tls_ecdh_ecdsa_with_aes_256_gcm_sha384**** – Confidentiality cipher and mode for TLS Record with AES256 CBC and SHA384 as hash function. Tls_ecdhe_rsa_with_aes_256_cbc_sha384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange). tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function. tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function. tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the TLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function. * To use this cipher, TLS version 1.2 must be enabled in the TLS Profile. ** The SBC 11.1 and later versions do not support *** To use this cipher, TLS version 1.3 must be enabled in the TLS Profile. **** To use this cipher, TLS version 1.2 must be enabled in the TLS Profile and SSL certificates must be created using ECC keys. NOTE: When Fips-140-2 mode is enabled, Rsa-with-null-sha should not be used. NOTE: TLS 1.3 does not support RSA. Certificates generated with RSA will not work with TLS 1.3. Use this parameter to specify the third TLS Cipher Suite choice for this profile. Rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the TLS Record protocol with SHA-256 as the hash function. Rsa-with-aes-256-cbc-sha-256* – Confidentiality cipher and mode for the TLS Record protocol with AES 256 encryption and SHA-256 as the hash function. Rsa-with-null-sha – The integrity cipher used for the TLS Record protocol. tls_ecdh_ecdsa_with_aes_256_gcm_sha384**** – Confidentiality cipher and mode for TLS recode with AES256 CBC and SHA384 as hash function. Tls_ecdhe_rsa_with_aes_256_cbc_sha384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange). tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function. tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function. tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function. tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function. tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the TLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function. * To use this cipher, TLS version 1.2 must be enabled in the TLS Profile. ** The SBC 11.1 and later versions do not support *** To use this cipher, TLS version 1.3 must be enabled in the TLS Profile. **** To use this cipher, TLS version 1.2 must be enabled in the TLS Profile and SSL certificates must be created using ECC keys. NOTE: TLS 1.3 does not support RSA. Certificates generated with RSA will not work with TLS 1.3. Allowed Roles Specifies which role the Auth Client Indicates whether or not a TLS client is forced to authenticate itself within TLS. Client Cert Specifies the name of the default Client Certificate to be used by this TLS profile, created using the SECURITY PKI configuration object. Must be 1-23 characters or none. Server Cert Specifies the name of the Server Certificate to be used by this TLS profile, created using the SECURITY PKI configuration object. Must be 1-23 characters or none. Use this parameter to specify if certificate chain validation errors are acceptable while validating the peer certificate. TLS protocol version 1.0. TLS protocol version 1.1. TLS protocol version 1.2. TLS protocol version 1.3. If enabled, SBC will not insert empty fragments while sending packets on TLS over TCP connection. The options are: If enabled, the SBC verifies the value of the parameter Specifies the type of TLS hash function allowed for TLS sessions governed by the specified TLS profile. The options are: To edit a TLS Profile: To copy a TLS Profile and make any minor changes: To delete a TLS Profile:sipSigPort
is configured for transportProtocolsAllowed
= sip-tls-tcp
, the SBC increments the configured portNumber
by 1 and uses it as the new port number for SIP over TLS signaling. The SBC then opens a TCP socket for SIP over TLS for the new TCP port number.sipSigPort
is configured with a portNumber
of 5060 and transportProtocolsAllowed
= sip-tls-tcp
, the SBC listens on TCP port 5061 for SIP over TLS.To View TLS Profiles
To Create a TLS Profile
Timer
TimerCipher Suite1 tls_ecdh_ecdsa_with_aes_256_cbc_sha384
. You must replace it with a valid Cipher before upgrading the SBC.Cipher Suite2 tls_ecdh_ecdsa_with_aes_256_cbc_sha384
. You must replace it with a valid Cipher before upgrading the SBC.Cipher Suite3 –
Confidentiality cipher and mode for the TLS Record protocol.tls_ecdh_ecdsa_with_aes_256_cbc_sha384
. You must replace it with a valid Cipher before upgrading the SBC.
NOTE: When Fips-140-2 mode is enabled, Rsa-with-null-sha should not be used.
Name
NameAcceptable Cert Validation Errors Ocsp Profile Name Specifies the name of OCSP profile object referenced by TLS profile. V1_0 V1_1 V1_2 V1_3 Suppress Empty Fragments Peer Name Verify TLS Peer Name
. For details on TLS Peer Name, refer to Trunk Group - SIP Trunk Group.Hash Type To Edit a TLS Profile
To Copy a TLS Profile
To Delete a TLS Profile