Got it

What type of encryption is enabled on VC and UC solution and how it works?

Created: May 22, 2019 09:09:04Latest reply: May 22, 2019 09:37:58 754 3 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

What type of encryption is enabled on VC and UC solution and how it works?

Featured Answers
Mihnea
Created May 22, 2019 09:19:49

Hello there!

  • Web servers are embedded in the  SMC2.0, MCU, RSE recording servers, conference endpoints, and telepresence central control devices for device maintenance and management. Users can log in to the devices by using the HTTPS, preventing the user name, password, and other sensitive information from being stolen.

  • The H.235 security protocol is used to protect H.323-based conferences. The Secure Real-time Transport Protocol (SRTP) protocol is used to encrypt conference media streams to ensure information security.

  • The TLS security protocol is used to protect SIP-based conferences. The SRTP protocol is used to encrypt conference media streams to ensure information security.

  • The sitecall function enables a user to proactively send a conference convening request to the SC through a conference endpoint and to set the related parameters (such as the site name, conference access password, payment user name and password) on the endpoint. To ensure security of sensitive information in the parameters, the sitecall function supports using the HTTPS channel for data transmission, that is, the endpoint sends a sitecall request to the HTTPS server (SC) as the HTTPS client.

  • Before performing any operations, the videoconference products check the permission of the user who logs in to the system to avoid unauthorized access.

  • Parameters of all requests from other systems are checked to avoid malformed packet attack.

  • Conference access and control passwords are used to avoid unauthorized control or access.
View more
  • x
  • convention:

Recommended answer

Mihnea
Created May 22, 2019 09:26:32

Hello!

In addition to the below, please check the product documentation (CloudECV600R019C10 Enterprise On-premises, Convergent Conference) and check the chapter 'Encryption Principle'.

Encryption Principle

This topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.

TLS Protocol PrincipleThis topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.SRTP Protocol PrincipleThe use of RTP or SRTP is negotiated by the communicating parties.Encryption Network and SchemeThis topic describes the encryption network and scheme in pure UC scenarios of the CloudEC.

Link to documentation:
https://support.huawei.com/enterprise/en/doc/EDOC1100072080?idPath=22658044|21781198|21941385.
View more
  • x
  • convention:

All Answers
Hello there!

  • Web servers are embedded in the  SMC2.0, MCU, RSE recording servers, conference endpoints, and telepresence central control devices for device maintenance and management. Users can log in to the devices by using the HTTPS, preventing the user name, password, and other sensitive information from being stolen.

  • The H.235 security protocol is used to protect H.323-based conferences. The Secure Real-time Transport Protocol (SRTP) protocol is used to encrypt conference media streams to ensure information security.

  • The TLS security protocol is used to protect SIP-based conferences. The SRTP protocol is used to encrypt conference media streams to ensure information security.

  • The sitecall function enables a user to proactively send a conference convening request to the SC through a conference endpoint and to set the related parameters (such as the site name, conference access password, payment user name and password) on the endpoint. To ensure security of sensitive information in the parameters, the sitecall function supports using the HTTPS channel for data transmission, that is, the endpoint sends a sitecall request to the HTTPS server (SC) as the HTTPS client.

  • Before performing any operations, the videoconference products check the permission of the user who logs in to the system to avoid unauthorized access.

  • Parameters of all requests from other systems are checked to avoid malformed packet attack.

  • Conference access and control passwords are used to avoid unauthorized control or access.
View more
  • x
  • convention:

Hello!

In addition to the below, please check the product documentation (CloudECV600R019C10 Enterprise On-premises, Convergent Conference) and check the chapter 'Encryption Principle'.

Encryption Principle

This topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.

TLS Protocol PrincipleThis topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.SRTP Protocol PrincipleThe use of RTP or SRTP is negotiated by the communicating parties.Encryption Network and SchemeThis topic describes the encryption network and scheme in pure UC scenarios of the CloudEC.

Link to documentation:
https://support.huawei.com/enterprise/en/doc/EDOC1100072080?idPath=22658044|21781198|21941385.
View more
  • x
  • convention:

In the eSpace UC solution, three encryption scenarios are available, from partial encryption to end-to-end encryption on all networks.
Scenario 1: Terminal-Unified Gateway
Encryption configuration proce ..
Scenario 2: Terminal-SBC-Unified Gateway
Encryption configuration proce ..
for detail,click the link
https://support.huawei.com/hedex/pages/EDOC1000108680CEF0630B/09/EDOC1000108680CEF0630B/09/resources/cfge_u1900/ipt_cfge_00080.html?ft=0&fe=10&hib=5.4.1.2&id=ipt_cfge_00080&text=Encryption%20Scenarios%20and%20Configuration%20Processes&docid=EDOC1000108680
View more

This article contains more resources

You need to log in to download or view. No account? Register

x
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.