Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Chris Miller on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

IX Workplace, certificates and TLS 3

Status
Not open for further replies.

dsm600rr

IS-IT--Management
Nov 17, 2015
1,444
US
Hello all,

Thought I would start a new thread as my other was getting too cluttered and I think I may be getting close to getting this working.

I have exported the certificate here and re-named it: WebRootCA.pem

1_nfoh0s.png



Does this certificate then get uploaded to:?

2_puuxko.png



Next would be creating the Identity Cert for the IPO Itself. How does this look?

3_kntkaf.png


Once downloaded as "PEM-encoded" I would add that certificate to the IPO.

After all that, and I enable TLS should my J179's grab the certificate and re-register to the IPO? What about iPhones running the Workplace App?

Thank you!

ACSS
 
Does the WebRootCA.pem downloaded from Web Manager just get placed in the "Primary" folder of embedded file manager?

When I try and place it in: "Primary > certificates > TCS > ADD" I receive the error "HTTP request failed: 403 Forbidden"

ACSS
 
derfloh: when I go to that address it does give me the option to Open or Save it. Is this what needs to be loaded on the external Devices (iPhones / Laptops)?

ACSS
 
derfloh: Thank you. I have disabled "HTTP Avaya Phones Only" and enabled "SIP Remote Extension Enable"

When you say "you have to replace the IP of that of your IPO" where are you referring to?

How does my Identity Certificate look above?

Is there any other certificates needed other than the WebRootCA.pem and the Identity Certificate for the IPO? Does WebRootCA.pem just get downloaded and loaded to external PC's/Phones to run IX Workplace outside of my LAN?

Once I enable TLS will my J179's grab the correct certificates? I am assuming I will need to default them?



ACSS
 
The phones will load 46xxsettings.txt and it references WebRootCA.pem.

If the IPO IP is 192.168.42.1 you can get the root certificate by loading or
If the IP is 172.30.20.1 you have to open or
Certificate looks correct.

IP Office remote service
IP Office certificate check
CLI based call blocking
SCN fallback over PSTN
 
derfloh: The documentation says when creating the Identity Certificate to select the "Regenerate" Button and then to Download (PEM-encoded)

When selecting the "Regenerate" button I get this pop-up with the option to download:

Cert_ntbq9g.png


Does this get loaded as well or only the .pem file?

2_bpxvd7.png


Lastly, should I Change the Duration to 398 days?

Apple_thqyzc.png



ACSS
 
Until the end of September 825 days will work. Certificates created later must not be valid more than 398 days.

The p12 file is fine. It contains the server certificate as well as the root certificate.

Only regenerate and apply works for primary servers. If you create a certificate for another machine the way you did it is correct. I.e. for IP500

IP Office remote service
IP Office certificate check
CLI based call blocking
SCN fallback over PSTN
 
derfloh: Thank you. So in the IPO Security Settings > Import Certificate from File, I am only uploading the p12 file correct? Basically the cert.pem wont be used?


ACSS
 
derfloh: Thank you Sir. Would be nice if the documentation mentioned some of these things.

When visiting - is this the certificate that I download and install on remote devices (PC's / Cell Phones)?

Tomorrow I will load the p12 certificate to "IPO Security Settings > Import Certificate from File" and enable TLS. Is there anything else I may be missing? Will I need to facorty default my J179's to grab the certificates? Will all devices now use TLS?

ACSS
 
I thought of one more question in reguards to creating my Internal DNS A-Record from ix.pfcommunications.com to the PBX.

LAN: 192.168.1.251 (Data VLAN)
WAN: 172.30.20.1 (Voice VLAN)
Internal DNS Server: (192.168.1.5) (Data VLAN)

Everything is programmed on the IPO on the Voice VLAN (DHCP Server for the phones, SIP Trunk, SIP Domain Name, SIP Registrar FQDN) and so on.

Will it work if we do an Internal A-Record from ix.pfcommunications.com to the 172.30.20.1? Or does the A-Record have to stay on the Data VLAN and go to 192.168.1.251? If so, will I need to update my Identity certificate from 172.30.20.1 to 192.168.1.251?

I have IX Workplace working Internally on the Data and Voice VLAN.

Thanks!

ACSS
 
Using a self signed cert? Just add both IP's in your SAN for the identity certificate. For real world 3rd party certs (GoDaddy, Verisign) Everything is done with DNS entries in the SAN, not IP's.
 
Thanks gents: I updated my Certificate SAN to: DNS:ix.pfcommunications.com, IP:172.30.20.1, IP:192.168.1.251, IP:50.245.XXX.XX, URI:sip:ix.pfcommunications.com

ACSS
 
Ok so I added the certificate and enabled TLS - PBX did a re-boot and the phones logged back in.

How do I know everything worked? Should my J179's show a certificate? IX Workplace still works internally on my laptop.

I did see under "Advanced" > "Identity Certificate" shows "No Certificate Installed"

1_lpcua4.jpg


2_v4922j.jpg


3_tb9b4r.jpg


4_e0rhyg.jpg


5_ubnyza.jpg



I am seeing a TLS Error from my Vantage Phone:

TLS_nf7iat.png




ACSS
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top