Security
Topics:
▪
PKI Certificates
▪
Change Local Account Credentials
▪
Disable the Security Code
▪
Wireless Communication Options
▪
Port Usage
▪
Encryption
For detailed information about configuring security settings, see the following topics.
Related Links
Access the System Web Interface
PKI Certificates
If your organization uses a public key infrastructure (PKI) for securing network connections, Polycom
recommends that you have a strong understanding of certificate management and how it applies to your
Pano system.
How PKI Certificates Are Used
PKI certificates authenticate secure network connections to and from the Pano system. Standard PKI
techniques are used to configure and manage certificates and certificate signing requests (CSRs). ANSI
X.509 standards regulate the certificate characteristics.
Your Pano system can generate CSRs to send to a certificate authority (CA), a trusted entity that
validates and officially issues, or signs, PKI certificates. The Pano system uses those certificates for client
and server authentication.
If your system is in an environment without a PKI, you do not need a CA-signed certificate; the system
comes with a self-signed certificate for its TLS connections. When a PKI is deployed, however, self-
signed certificates are not trusted and CA-signed certificates are needed.
Here are some examples of how you would use PKI certificates:
▪
If your environment uses the 802.1X authentication framework for wired connections, you would
need to create a CSR and install the resulting CA-signed certificate on your system so it is trusted
on the network.
▪
If you want to navigate with your browser over a secure connection to the Pano system web
interface, you would need to create a CSR and install the resulting CA certificate chain on your
system to replace its factory-installed certificate, which is not trusted.
▪
If you want to provision your system using RealPresence Resource Manager in a secure
environment.
Polycom, Inc.
on page 9
30