Polycom (RMX) 1500 Security Camera User Manual


  Open as PDF
of 1183
 
RealPresence Collaboration Server (RMX) 1500/1800/2000/4000 Administrator’s Guide
Polycom®, Inc. 852
Non-hashed Passwords
All non-hashed passwords are stored encrypted as set out in Table 5-54.
In compliance with UC APL requirements, PKI Self-signed Certificates are supported for the both the
Default Management and IP Network Services.
A mixture of Self-signed and CA-signed Certificates is supported, however a CA-signed certificate will
always override a Self-signed Certificate.
Self-signed Certificate Creation
Self-signed Certificates are created during:
Initial system start-up before any CA-signed Certificates have been installed.
IP Network Services creation.
Network Services updates that result in Host Name changes.
Daily validity checks of Self-signed Certificates.
Backup and Restore of the system configuration
Self-signed Certificate field values are automatically inserted when the certificate is created
:
Non-hashed Passwords - Encryption
Connection Storage type
Previous
Versions
From
Version 8.1
SNMPv3
Two passwords: Authentication
/ Privacy
Community permissions which are not
the PW to connect to SNMP are not
Saved Encrypted
Non encrypted AES 256
Exchange Non encrypted – Feature disabled in
Ultra Secure Mode
Non encrypted AES 256
RV v.35 serial ports – password
for login
Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256 AES 256
H.323 authentication –
password
Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256 AES 256
SIP digest – password Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256 AES 256
Self-signed Certificate - Creation
Field Value
Signature Algorithm SHA1