Table of Contents
Polycom, Inc xvii
Certificate Management ......................................................................................................23-5
(PKI) Public Key Infrastructure ..................................................................................23-5
Adding Certificates to the Certificate Repository ....................................................23-6
Trusted Certificates ..............................................................................................23-7
Personal Certificates .............................................................................................23-9
Certificate Validation .................................................................................................23-11
CRL (Certificate Revocation List) .............................................................................23-13
Adding a CRL .....................................................................................................23-13
Removing a CRL .................................................................................................23-14
Certificate Revocation ................................................................................................23-15
Self-signed Certificate ........................................................................................................23-16
Self-signed Certificate Creation ........................................................................23-16
SIP TCP Keep-Alive ...........................................................................................................23-17
Keep Alive Frequency ........................................................................................23-19
User and Connection Management .................................................................................23-19
Managing the System Users ......................................................................................23-20
User Types ...........................................................................................................23-20
Disabling/Enabling Users .................................................................................23-20
Renaming Users ..................................................................................................23-20
Disabling Inactive Users ....................................................................................23-21
Managing the User Login Process ...........................................................................23-21
Implementing Strong Passwords .....................................................................23-21
Implementing Password Re-Use / History Rules .........................................23-22
Defining Password Aging .................................................................................23-23
Maximum Repeating Characters ......................................................................23-23
Defining Password Change Frequency ...........................................................23-23
Forcing Password Change .................................................................................23-24
Temporary User Lockout ..................................................................................23-24
User Lockout .......................................................................................................23-24
User Login Record ..............................................................................................23-25
Controlling User Sessions .........................................................................................23-25
Management Sessions per System ...................................................................23-25
Sessions per User ................................................................................................23-25
Connection Timeout ...........................................................................................23-26
Session Timeout ..................................................................................................23-26
Erase Session History After Logout .................................................................23-26
Banner Display and Customization .................................................................................23-26
Guidelines ............................................................................................................23-27
Non-Modifiable Banner Text ....................................................................................23-27
Sample 1 Banner .................................................................................................23-27
Sample 2 Banner .................................................................................................23-28
Sample 3 Banner .................................................................................................23-28
Sample 4 Banner .................................................................................................23-28
Customizing Banners .................................................................................................23-29
Banner Display ............................................................................................................23-30
Login Screen Banner ..........................................................................................23-30
Main Screen Banner ............................................................................................23-31
Securing an External Database .........................................................................................23-32