User's Manual

Table of Contents
Polycom, Inc xvii
Certificate Management ......................................................................................................23-5
(PKI) Public Key Infrastructure .................................................................................. 23-5
Adding Certificates to the Certificate Repository .................................................... 23-6
Trusted Certificates .............................................................................................. 23-7
Personal Certificates ............................................................................................. 23-9
Certificate Validation .................................................................................................23-11
CRL (Certificate Revocation List) .............................................................................23-13
Adding a CRL ..................................................................................................... 23-13
Removing a CRL ................................................................................................. 23-14
Certificate Revocation ................................................................................................23-15
Self-signed Certificate ........................................................................................................23-16
Self-signed Certificate Creation ........................................................................23-16
SIP TCP Keep-Alive ........................................................................................................... 23-17
Keep Alive Frequency ........................................................................................ 23-19
User and Connection Management ................................................................................. 23-19
Managing the System Users ......................................................................................23-20
User Types ...........................................................................................................23-20
Disabling/Enabling Users .................................................................................23-20
Renaming Users .................................................................................................. 23-20
Disabling Inactive Users .................................................................................... 23-21
Managing the User Login Process ........................................................................... 23-21
Implementing Strong Passwords ..................................................................... 23-21
Implementing Password Re-Use / History Rules .........................................23-22
Defining Password Aging ................................................................................. 23-23
Maximum Repeating Characters ......................................................................23-23
Defining Password Change Frequency ...........................................................23-23
Forcing Password Change ................................................................................. 23-24
Temporary User Lockout ..................................................................................23-24
User Lockout .......................................................................................................23-24
User Login Record ..............................................................................................23-25
Controlling User Sessions ......................................................................................... 23-25
Management Sessions per System ................................................................... 23-25
Sessions per User ................................................................................................ 23-25
Connection Timeout ........................................................................................... 23-26
Session Timeout .................................................................................................. 23-26
Erase Session History After Logout .................................................................23-26
Banner Display and Customization .................................................................................23-26
Guidelines ............................................................................................................23-27
Non-Modifiable Banner Text ....................................................................................23-27
Sample 1 Banner ................................................................................................. 23-27
Sample 2 Banner ................................................................................................. 23-28
Sample 3 Banner ................................................................................................. 23-28
Sample 4 Banner ................................................................................................. 23-28
Customizing Banners ................................................................................................. 23-29
Banner Display ............................................................................................................23-30
Login Screen Banner ..........................................................................................23-30
Main Screen Banner ............................................................................................23-31
Securing an External Database .........................................................................................23-32