Cisco Cisco TelePresence Video Communication Server Expressway
Task 4: Replacing the Default Server Certificate
For extra security, you may want to have the VCS communicate with other systems (such as LDAP servers, neighbor
VCSs, or clients such as SIP endpoints and web browsers) using TLS encryption.
VCSs, or clients such as SIP endpoints and web browsers) using TLS encryption.
For this to work successfully in a connection between a client and server:
■
The server must have a certificate installed that verifies its identity. This certificate must be signed by a Certificate
Authority (CA).
Authority (CA).
■
The client must trust the CA that signed the certificate used by the server.
The VCS allows you to install appropriate files so that it can act as either a client or a server in connections using TLS.
The VCS can also authenticate client connections (typically from a web browser) over HTTPS. You can also upload
certificate revocation lists (CRLs) for the CAs used to verify LDAP server and HTTPS client certificates.
The VCS can also authenticate client connections (typically from a web browser) over HTTPS. You can also upload
certificate revocation lists (CRLs) for the CAs used to verify LDAP server and HTTPS client certificates.
The VCS can generate server certificate signing requests (CSRs). This removes the need to use an external mechanism
to generate and obtain certificate requests.
to generate and obtain certificate requests.
For secure communications (HTTPS and SIP/TLS) we recommend that you replace the VCS default certificate with a
certificate generated by a trusted certificate authority.
certificate generated by a trusted certificate authority.
Note that in connections:
■
to an endpoint, the VCS acts as the TLS server
■
to an LDAP server , the VCS is a client
■
between two VCS systems, either VCS may be the client with the other VCS being the TLS server
■
via HTTPS, the web browser is the client and the VCS is the server
TLS can be difficult to configure. For example, when using it with an LDAP server we recommend that you confirm that
your system is working correctly before you attempt to secure the connection with TLS. You are also recommended to
use a third party LDAP browser to verify that your LDAP server is correctly configured to use TLS.
your system is working correctly before you attempt to secure the connection with TLS. You are also recommended to
use a third party LDAP browser to verify that your LDAP server is correctly configured to use TLS.
Note:
be careful not to allow your CA certificates or CRLs to expire as this may cause certificates signed by those CAs to
be rejected.
To load the trusted CA list, go to Maintenance > Security certificates > Trusted CA certificate.
7
Cisco Single VCS Control - Basic Configuration Deployment Guide