Policy Manager - My Certificates

About Certificate Usage (Exchange)

Every certificate identifies its owner and contains the owner’s public-key. The concept of certificate usage is based on Owners and Targets. An owner sends its certificate to a target, who then uses it to encrypt any information it sends to the owner. Owners and targets can be a VSU, Remote Client, or any device that can use the Internet-Key Exchange (IKE) protocol to exchange certificates.

The roles of owners and targets is purely based on point-of-view. Whenever a target needs to receive encrypted traffic from an IKE compatible device, the target is viewed as an owner because it must send its certificate to the IKE device. The concept of owners and targets is illustrated in Figure 80. It’s important to understand that a target must have an owner’s certificate before it can send encrypted traffic to the owner.

Figure 80: Certificate exchange between VSUs

Certificate

VSUA’s

Certificate

 

 

 

 

 

 

WA

 

 

 

 

VS

 

 

 

VS

 

 

 

 

 

 

A

 

 

 

B

 

Encrypted traffic to VSUA

Before VSUA can receive encrypted traffic from VSUB, a certificate owned by VSUA must be sent to VSUB (the target of VSUA’s certificate). The roles and process is reversed when VSUB needs to receive encrypted traffic from VSUA.

Assigning a Target for a Certificate

After a certificate is installed in a VSU (as described in Policy Manager - My Certificates on page 234), it must be assigned a target.

A Bundle is used to define a certificate having a specific target type, address, description, and queue position. The Policy Manager for IKE Certificate Usage lists all the bundles for a specific VSU.

The Bundle Numbers identify which VSU Certificate is associated with the bundle. For example, Bundle Number 3 means that VSU Certificate number 3 is associated with the bundle. Up to eight bundles can be created, which directly relates to the number of signed certificates that can be dynamically stored in a VSU. The certificates stored on a specific VSU can be viewed from the Policy Manager for My Certificates (See Policy Manager - My Certificates on page 234).

The target of a bundle is usually another VSU, but it can be any IKE compatible device. A target can be configured as an IP address, VPN object, fully qualified domain name, e-mail address, or director server name.

Issue 4 May 2005 241

Page 241
Image 241
Avaya 3.7 manual About Certificate Usage Exchange, Assigning a Target for a Certificate

3.7 specifications

Avaya 3.7 represents a significant evolution in unified communications technology, designed to enhance collaboration and streamline communication workflows for organizations of all sizes. As a cornerstone of Avaya's offerings, this version incorporates a range of features and improvements that cater to contemporary business needs, emphasizing flexibility, reliability, and seamless integration.

One of the most notable features of Avaya 3.7 is its robust call management capabilities. The platform allows users to manage calls effectively through a user-friendly interface, enabling intuitive functionalities such as drag-and-drop call handling, call forwarding, and conference calling. These features help employees stay connected, facilitating better communication and teamwork across departments.

In terms of mobility, Avaya 3.7 supports mobile applications that allow users to access the system remotely. This is particularly advantageous for businesses with a workforce that relies on remote or hybrid work models. The mobile integration ensures users can make and receive calls, check voicemail, and manage their schedules directly from their smartphones, maintaining productivity regardless of location.

The system also embraces advanced collaboration tools, such as video conferencing and instant messaging. These features promote a more dynamic interaction environment, fostering real-time communication among team members. Video conferencing capabilities allow for high-definition video quality and reliable connectivity, making virtual meetings more engaging and effective.

Security is another critical characteristic of Avaya 3.7. The platform includes enhanced encryption protocols to protect sensitive communications and ensure data integrity. With cybersecurity remaining a top concern for businesses, Avaya has prioritized the security of its communications solutions, safeguarding organizations' information against potential threats.

Furthermore, Avaya 3.7 benefits from the incorporation of AI and analytics. These technologies provide businesses with valuable insights into communication patterns and user behavior, enabling them to optimize their processes. The analytics can help identify areas for improvement and drive informed decision-making, thus enhancing overall efficiency.

Interoperability with existing systems is another hallmark of Avaya 3.7. The platform easily integrates with various applications and services, allowing businesses to leverage their current technology investments and create a cohesive communication ecosystem.

In summary, Avaya 3.7 stands out as a comprehensive communication solution that addresses the modern demands of the workplace. With its advanced call management features, mobility support, collaboration tools, strong security measures, and integration capabilities, Avaya 3.7 positions itself as a vital asset for organizations aiming to enhance their communication strategies and drive business success.