AudioCodes Mediant 500L User Manual page 296

Enterprise session border controller (e-sbc) & media gateway
Hide thumbs Also See for Mediant 500L:
Table of Contents

Advertisement

4.
Click Apply, and then save your settings to flash memory.
Table 15-21: HTTP Interfaces Table Parameter Descriptions
Parameter
General
Index
[HTTPInterface_Index]
Name
interface-name
[HTTPInterface_InterfaceName]
Network Interface
network-interface
[HTTPInterface_NetworkInterface]
Protocol
protocol
[HTTPInterface_Protocol]
HTTP Port
http-port
[HTTPInterface_Port]
Security
TLS Context
tls-context
[HTTPInterface_TLSContext]
Verify Certificate
verify-cert
[HTTPInterface_VerifyCert]
User's Manual
Defines an index number for the new table row.
Note:
Each row must be configured with a unique index.
The parameter is mandatory.
Defines a descriptive name, which is used when associating the
row in other tables.
The valid value is a string of up to 40 characters. By default, no
value is defined.
Note:
Each row must be configured with a unique name.
The parameter is mandatory.
Assigns a local, network interface to the HTTP interface.
By default, no value is defined.
To configure network interfaces, see ''Configuring IP Network
Interfaces'' on page 145.
Note: The parameter is mandatory.
Defines the protocol type.
[0] HTTP (default)
[1] HTTPS
Defines the local, listening HTTP port.
The valid value is 0 to 65534. The default is 0.
Note: The parameter is mandatory.
Assigns a TLS Context for the connection with the HTTP Proxy
service.
By default, the default TLS Context (Index 0) is assigned.
To configure TLS Contexts, see ''Configuring TLS Certificate
Contexts'' on page 113.
Note: The parameter is applicable only if the connection protocol
is HTTPS (defined using the 'Protocol' parameter, above).
Enables TLS certificate verification when the connection with the
proxy service is based on HTTPS.
[0] No = (Default) No certificate verification is done.
[1] Yes = The device verifies the authentication of the
certificate received from the HTTPS peer. The device
authenticates the certificate against the trusted root certificate
store associated with the associated TLS Context (see 'TLS
Context' parameter above) and if ok, allows communication
with the HTTPS peer. If authentication fails, the device denies
communication (i.e., handshake fails). The device can also
authenticate the certificate by querying with an Online
Certificate Status Protocol (OCSP) server whether the
certificate has been revoked. This is also configured for the
296
Mediant 500L Gateway & E-SBC
Description
Document #: LTRT-10532

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents