Polycom DMA 7000 Operation Manual page 42

Hide thumbs Also See for DMA 7000:
Table of Contents

Advertisement

DMA Operations Guide
34
Table 3-5
Fields on the Security Configuration page (continued)
Field
Allow unencrypted SIP
connections
Allow unencrypted
calendar notifications
from Exchange server
Allow basic
authentication to
Exchange server
Skip certificate
validation for server
connecting
Description
Normally, if SIP signaling is enabled, the Polycom DMA
system accepts only SIP calls using the TLS (Transport
Layer Security) protocol and uses TLS to send these
calls to RMX MCUs.
This option enables the system to accept unencrypted
calls from endpoints not configured for TLS and to send
unencrypted calls to RMX MCUs not configured for TLS.
We recommend configuring your endpoints and MCUs
to use TLS for SIP rather than enabling this option.
Normally, if calendaring is enabled, the Polycom DMA
system gives the Microsoft Exchange server an HTTPS
URL to which the Exchange server can deliver calendar
notifications. In that case, the Polycom DMA system
must have a certificate that the Exchange server
accepts in order for the HTTPS connection to work.
If this option is selected, the Polycom DMA system does
not require HTTPS for calendar notifications.
We recommend installing a certificate trusted by the
Exchange server and using an HTTPS URL for
notifications rather than enabling this option.
Normally, if calendaring is enabled, the Polycom DMA
system authenticates itself with the Exchange server
using NTLM authentication.
If this option is selected, the Polycom DMA system still
attempts to use NTLM first. But if that fails or isn't
enabled on the Exchange server, then the DMA system
falls back to HTTP Basic authentication (user name and
password).
We recommend using NTLM authentication rather than
enabling this option.
In order for either NTLM or HTTP Basic authentication
to work, they must be enabled on the Exchange server.
Normally, when the Polycom DMA system connects to a
server, it validates that server's certificate, ensuring that
the issuer is a trusted root CA.
This option configures the system to accept any
certificate presented to it without validating it.
We recommend using valid certificates for all servers
that the system may need to contact rather than
enabling this option. Depending on system
configuration, this may include:
MCUs
Active Directory
Exchange
CMA system
Endpoints
Security Configuration
Polycom, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DMA 7000 and is the answer not in the manual?

Table of Contents