Introduction To Ip Security In Ip-Dect; Secure Web Access (Https); Tls Certificates - ASCOM IPBS Installation And Operation Manual

Ip-dect base station & ip-dect gateway
Table of Contents

Advertisement

Installation and Operation Manual
IP-DECT Base Station & IP-DECT Gateway (software version 5.0.x)
4.2

Introduction to IP Security in IP-DECT

A secure system requires more planning than an unsecured system.
4.2.1

Secure Web Access (https)

For IP-DECT devices
• https access should be enabled
• http access should preferably be disabled
For more information see
4.2.2

TLS Certificates

Security in Web-based applications rely on cryptography. Cryptographical systems are only
as secure as their keys. This makes Key Management a critical and often neglected
concern. TLS Certificates have emerged as a clever way of managing large scale key
distribution.
Two certificate management tasks are needed for TLS:
3
Trust relationships when the device must know which third parties (e.g. IP-PBX) it
shall trust in, see
4
Device certificates to authenticate the device against third parties, see
Handling Options with Device
1. Trust Relationships
Trust relationships are defined by a trust list in the device. The list contains the certificates
to be accepted by the device for TLS secured connections (e.g. HTTPS, SIPS).
For more information see
2. Certificate Handling Options with Device Certificates
There are three certificate handling options:
• Default Device certificate
The default certificate is supplied with the device. It is a self-signed certificate. Self-
signed certificates provide only encryption, not authentication.
For more information see
• Self-signed certificates
This option is for customers not planning on having their certificates signed by public
or private CAs. Self-signed certificates provide encryption but do in most cases not
provide authentication.
For more information see
• Certificates signed by a Certificate Authority (CA).
Two options are possible:
- A) Certificates signed by the customer's own CA. Customers possessing the
knowledge and infrastructure to house their own CA could build an internal
15 February 2012 / Ver. H
8.1.7 Configure the HTTP settings
1. Trust
Relationships.
Certificates.
Trust List
on page 74.
Default Device Certificate
Self-signed Certificates
on page 71 .
2. Certificate
on page 76.
on page 76.
TD 92579EN
24

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IPBS and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Ipbl

Table of Contents

Save PDF