Users Manual

SME VOIP SYSTEM GUIDE 1.1 52 | P a g e
Proprietary and Confidential
Device identity
The certificate and personal key used by the base when acting as a server or when the server requires client
authentication in the SSL handshake procedure.
Screenshot:
Trusted Server Certificates
Intermediate certificates (non-root certificates) trusted by the base. Used to validate a received certificate chain (or a
chain of trust) in scenarios where only the root certificate is sent by the server during the SSL handshake procedure.
Screenshot:
Trusted Root Certificates
Root certificates (self-signed) trusted by the base. Used to validate received root certificates sent by the server during
the SSL handshake procedure.
Screenshot:
By enabling “Use Only Trusted Certificates”, the certificates which the base will receive from the server, must be valid
and loaded into the system. If no valid matching certificate is found during the TLS connection establishment, the
connection will fail. When “Use Only Trusted Certificates” is disabled, all certificates received from the server will be
accepted.
NOTE: It is important to use correct date and time of the system when using trusted certificates. In case of undefined
time/date, the certificate validation can fail.