The minimal configuration steps to be
completed for secure SIP are listed.
Configuring secure SIP systems across a network can be a complicated
task and needs to be done with care. You must
complete the following steps to enable secure
SIP.
Create the keyring.db database
The process for creating the specialized database that is used for storing X.509 certificates and any associated private keys that are required for secure SIP communications is described.
Configure the Blueworx Voice Response server certificate
To establish a secure connection, you require a server certificate and an associated private key in keyring.db. A certificate that has a private key in keyring.db is also called a personal certificate.
Configuring a certificate
The ways of adding the personal certificate and private key to keyring.db are listed.
Ensure that other SIP entities can communicate with Blueworx Voice Response
After you configure the Blueworx Voice Response server certificate and add the certificates that you want to trust into the keyring.db database, you must ensure other SIP entities trust Blueworx Voice Response. This task involves configuring the trusted certificates of the other software, and adding in certificates from Blueworx Voice Response.
Enabling secure SIP
The process to follow for enabling secure SIP in the Blueworx Voice Response System Configuration is described.