UCM6200 Series User Manual
SIP Settings/TCP and TLS
Table 92: SIP Settings/TCP and TLS
Configure to allow incoming TCP connections with the UCM6200. The default
setting is "No".
Configure the IP address for TCP server to bind to. 0.0.0.0 means binding to all
interfaces. The port number is optional. If not specified, 5060 will be used.
Configure to allow incoming TLS connections with the UCM6200. The default
setting is "No".
Configure the IP address for TLS server to bind to. 0.0.0.0 means binding to all
interfaces. The port number is optional. If not specified, 5061 will be used.
Note:
The IP address must match the common name (hostname) in the certificate.
Please do not bind a TLS socket to multiple IP addresses. For details on how to
construct a certificate for SIP, please refer to the following document:
http://tools.ietf.org/html/draft-ietf-sip-domain-certs
Select the TLS protocol for outbound client connections. The default setting is
TLSv1.
If enabled, the TLS server's certificate won't be verified when acting as a client.
The default setting is "Yes".
This is the CA certificate if the TLS server being connected to requires self-signed
certificate, including server's public key. This file will be renamed as "TLS.ca"
automatically.
Note:
The size of the uploaded ca file must be under 2MB.
This is the Certificate file (*.pem format only) used for TLS connections. It contains
private key for client and signed certificate for the server. This file will be renamed
as "TLS.pem" automatically.
Note:
The size of the uploaded certificate file must be under 2MB.
This file must be named with the CA subject name hash value. It contains CA's
(Certificate Authority) public key, which is used to verify the accessed servers.
Note:
The size of the uploaded CA certificate file must be under 2MB.
Display a list of files under the CA Cert directory.