19.08.2013 Views

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Polycom</strong> <strong>RMX</strong> 1500/<strong>2000</strong>/4000 Administrator’s <strong>Guide</strong><br />

4 Click the Send Certificate button to send the certificate to the <strong>RMX</strong>.<br />

The MCU validates the certificate.<br />

— If the certificate is not valid, an error message is displayed.<br />

— If the certificate matches the private key, and the task is completed, a confirmation<br />

message indicating that the certificate was created successfully is displayed.<br />

A System Restart is not required at this point.<br />

The certificate expiry date is checked daily. An active alarm is raised two weeks before<br />

the certificate is due to expire, stating the number of days to expiry.<br />

If the certificate expires, the <strong>RMX</strong> continues to work in secure mode and an Active Alarm<br />

is raised with Security mode failed – Certificate expired in the description field.<br />

Certificates are deleted when an administrator performs a Restore Factory Defaults with the<br />

Comprehensive Restore option selected.<br />

Creating/Modifying System Flags<br />

The following System Flags in system.cfg control secure communications.<br />

• <strong>RMX</strong>_MANAGEMENT_SECURITY_PROTOCOL<br />

• EXTERNAL_DB_PORT<br />

Appendix F, “System Flags” , below, lists both flags and their settings.<br />

If the System Flag, <strong>RMX</strong>_MANAGEMENT_SECURITY_PROTOCOL does not exist in the system, it<br />

must be created by using the <strong>RMX</strong> Setup menu.<br />

For more information see "Modifying System Flags” on page 21-1.<br />

Table F-2 System Flags<br />

Flag Description<br />

<strong>RMX</strong>_MANAGEMENT_<br />

SECURITY_PROTOCOL<br />

The <strong>RMX</strong> must be restarted for modified flag settings to take effect.<br />

Enabling Secure Communication Mode<br />

Enter the protocol to be used for secure communications.<br />

Default: TLSV1_SSLV3 (both).<br />

Default for U.S. Federal licenses: TLSV1.<br />

EXTERNAL_DB_PORT The external database server port used by the <strong>RMX</strong> to send and<br />

receive XML requests/responses.<br />

For secure communications set the value to 443.<br />

Default: 5005.<br />

After the SSL/TLS Certificate is installed, secure communications are enabled by modifying<br />

the properties of the Management Network in the Management Network properties dialog box.<br />

When Secure Communications Mode is enabled:<br />

• Only https:// commands from the browser to the Control Unit IP Address of the<br />

<strong>RMX</strong> are accepted.<br />

• The <strong>RMX</strong> listens only on secured port 443.<br />

• All connection attempts on port 80 are rejected.<br />

F-4 <strong>Polycom</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!