Cryptography; Introduction To Ip Security In Ip-Dect; Secure Web Access (Https); Certificate Signing Request (Csr) Or Certification Request - Avaya IPBS1 Installation And Operation Manual

Ip-dect base station and ip-dect gateway
Table of Contents

Advertisement

Certificate Signing Request (CSR) or Certification Request

CSR is a message that is generated and sent to a CA in order to apply for a TLS certificate.
Before the CSR is created a key pair is generated, the private key kept secret. The CSR will
contain the corresponding public key and information identifying the applicant (such as
distinguished name). The private key is not part of the CSR but is used to digitally sign the entire
request. Other credentials may accompany the CSR.
If the request is successful, the CA will send back an identity certificate that has been digitally
signed with the CA's private key.
A CSR is valid for the server where the certificate will be installed.

Cryptography

Cryptography is the encoding of messages to render them unreadable by anyone other than
their intended recipient(s). Modern cryptography uses complex algorithms implemented on
modern computer systems.
Cryptography tasks can be divided into the two general categories Encryption and
Authentication.
Encryption
Encryption is the scrambling of information so that the original message cannot be determined
by unauthorized recipients by applying an encryption algoritm to the message plaintext
producing ciphertext (appearently random bits). A decryption algoritm, if given the correct key,
converts the ciphertext back into plaintext. Public key algorithms use paired keys, one for
encryption and another for decryption.
Authentication
Authentication is the verification of a message's sender. This requires the message to be
protected so it cannot be altered, usually by generating a digital signature formed by a hash of
the message. Only the correct key can generate a valid signature.

Introduction to IP Security in IP-DECT

A secure system requires more planning than an unsecured system.

Secure Web Access (https)

For IP-DECT devices
https access should be enabled
l
http access should preferably be disabled
l
For more information see
32
Avaya 374x DECT Telephones - User Guide
Configure the HTTP settings
on page 115 .
02/2016

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ipbs2Ipbl

Table of Contents