19.08.2013 Views

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Media Encryption<br />

Media Encryption <strong>Guide</strong>lines<br />

Chapter 3-Additional Conferencing Information<br />

Encryption is available at the conference and participant levels, based on AES 128<br />

(Advanced Encryption Standard) and is fully H.233/H.234 compliant and the Encryption<br />

Key exchange DH 1024-bit (Diffie-Hellman) standards.<br />

• Encryption is not available in all countries and it is enabled in the MCU license. Contact<br />

<strong>Polycom</strong> Support to enable it.<br />

• Endpoints must support both AES 128 encryption and DH 1024 key exchange<br />

standards which are compliant with H.235 (H.323) to encrypt and to join an encrypted<br />

conference.<br />

• The encryption mode of the endpoints is not automatically recognized, therefore the<br />

encryption mode must be set for the conference or the participants (when defined).<br />

• Media Encryption for ISDN/PSTN participants is implemented in <strong>RMX</strong> systems with<br />

MPM+ and MPMx cards.<br />

• Conference level encryption must be set in the Profile, and cannot be changed once the<br />

conference is running.<br />

• If an endpoint connected to an encrypted conference stops encrypting its media, it is<br />

disconnected from the conference.<br />

• In Cascaded conferences, the link between the cascaded conferences must be encrypted<br />

in order to encrypt the conferences.<br />

• Media Encryption for ISDN/PSTN (H.320) participants is not supported in cascaded<br />

conferences.<br />

• The recording link can be encrypted when recording from an encrypted conference to<br />

the RSS that is set to encryption. For more information, see "Recording Link Encryption”<br />

on page 13-6.<br />

• Encryption of SIP Media is supported using SRTP (Secured Real-time Transport Protocol)<br />

and the AES key exchange method.<br />

• Encryption of SIP Media requires the encryption of SIP signaling - TLS Transport Layer<br />

must be used.<br />

• Encryption of SIP Media is supported in CP and VSW conferences.<br />

— All media channels are encrypted: video, audio and FECC.<br />

— Encryption of SIP Media is available only in MPM+ and MPMx Card<br />

Configuration Modes.<br />

— <strong>RMX</strong> SRTP implementation complies with Microsoft SRTP implementation.<br />

— LPR is not supported with SRTP.<br />

— The ENABLE_SIRENLPR_SIP_ENCRYPTION System Flag enables the SirenLPR<br />

audio algorithm when using encryption with the SIP protocol. The default value of<br />

this flag is NO meaning SirenLPR is disabled by default for SIP participants in an<br />

encrypted conference. To enable SirenLPR the System Flag must be added to<br />

system.cfg and its value set to YES.<br />

— The SEND_SRTP_MKI System Flag enables or disables the inclusion of the MKI<br />

field in SRTP packets sent by the <strong>RMX</strong>. The default value of the flag is YES. Add<br />

the flag to system.cfg and set its value set to NO to disable the inclusion of the MKI<br />

field in SRTP packets sent by the <strong>RMX</strong> when using endpoints that cannot decrypt<br />

SRTP-based audio and video streams if the MKI (Master Key Identifier) field is<br />

<strong>Polycom</strong>, Inc. 3-33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!