From 951842aa6fa0a423a115b888845a0a94be92ae6b Mon Sep 17 00:00:00 2001 From: FusionPBX Date: Mon, 25 Jan 2021 11:56:13 -0700 Subject: [PATCH] Merge pull request #5741 from nemerald-voip/master Updated Polycom config with more features and enhanced security. This request also has a fix for Polycom TLS issue for Debian 9 not matching Polycom default ciphers. --- .../provision/polycom/6.x/{$mac}.cfg | 55 ++++++++++++++++++- 1 file changed, 53 insertions(+), 2 deletions(-) diff --git a/resources/templates/provision/polycom/6.x/{$mac}.cfg b/resources/templates/provision/polycom/6.x/{$mac}.cfg index b3888bafb4..bcd08bb267 100644 --- a/resources/templates/provision/polycom/6.x/{$mac}.cfg +++ b/resources/templates/provision/polycom/6.x/{$mac}.cfg @@ -53,11 +53,18 @@ sec.srtp.require="{$polycom_srtp_require}" {if isset($polycom_root_cert)}sec.TLS.customCaCert.5="{$polycom_root_cert}"{/if} {if isset($polycom_cert_validation)}sec.TLS.SIP.strictCertCommonNameValidation="{$polycom_cert_validation}"{/if} - {if isset($polycom_provision_cert_validate)} + {if isset($polycom_provision_cert_validate)} device.sec.TLS.prov.strictCertCommonNameValidation.set ="1" device.sec.TLS.prov.strictCertCommonNameValidation="{$polycom_provision_cert_validate}" {/if} + {if isset($polycom_platform_profile_cipher_suite)} + device.sec.TLS.profile.cipherSuiteDefault1.set="1" + device.sec.TLS.profile.cipherSuiteDefault1="0" + device.sec.TLS.profile.cipherSuite1.set="1" + device.sec.TLS.profile.cipherSuite1="{$polycom_platform_profile_cipher_suite}" + {/if} /> + + +