Specifications

Managing Remote Access Configuring Protocols
6
ShoreTel Mobility Router Administration Guide 49
Configuring Protocols
After configuring general settings, you can configure the security protocols for the tunnels that are
established between clients and the Mobility Router for sessions using Secure Remote Voice and
Secure Enterprise Services. The ShoreTel Mobility solution supports the following security protocols
for tunnels:
Datagram Transport Layer Security (DTLS)—Protocol that allows secure communications over
datagram protocols, such as User Datagram Protocol (UDP). DTLS is based on the Transport
Layer Security (TLS) protocol but can be used in environments that use UDP transport.
Transport Layer Security (TLS)—Protocol that allows secure communications using Transmission
Control Protocol (TCP) as the transport protocol.
You can enable one or both of these security protocols. By default, DTLS and TLS are enabled. If
your network environment does not allow incoming UDP packets, you can use TLS, which allows
TCP packets. If DTLS and TLS are enabled, DTLS is used first, and then TLS is used, depending
on what the client supports.
For DTLS and TLS, you can configure the following settings:
Cipher
Port
Maximum transmission unit (MTU)
Keepalive time
Session timeout
Renegotiation time
To configure tunnel security protocols: