DMA Operations Guide

Security Settings

 

 

Table 3-5

Fields on the Security Settings page (continued)

 

 

 

Field

 

Description

 

 

Skip certificate

This option may be configured in any security mode.

validation for user login

If this option is turned off, you can only connect to the

sessions

 

 

Polycom DMA system if your browser presents a client

 

 

certificate issued by a CA that the system trusts (this is

 

 

known as mTLS for administrative connections).

 

 

Turn this option off only if:

 

 

You’ve implemented a complete public key

 

 

 

infrastructure (PKI) system, including a CA server,

 

 

 

client software (and optionally hardware, tokens, or

 

 

 

smartcards), and the appropriate operational

 

 

 

procedures.

 

 

The CA’s public certificate is installed in the Polycom

 

 

 

DMA system so that it trusts the CA.

 

 

All authorized users, including yourself, have a

 

 

 

client certificate signed by the CA that authenticates

 

 

 

them to the Polycom DMA system.

 

 

Allow forwarding of IPv6

If this option is off, the Polycom DMA system has an

ICMP destination

internal firewall rule that blocks outbound destination

unreachable messages

unreachable messages.

 

 

If this option is on, that firewall rule is disabled.

 

 

Note: The Polycom DMA system currently doesn’t send

 

 

such messages, regardless of this setting.

 

 

Allow IPv6 ICMP echo

If this option is off, the Polycom DMA system doesn't

reply messages to

reply to echo request messages sent to multicast

multicast addresses

addresses (multicast pings).

 

 

If this option is on, the system responds to multicast

 

 

pings.

 

 

 

 

52

Polycom, Inc.

Page 64
Image 64
Polycom 3725-76302-001LI manual DMA system so that it trusts the CA