Ultra Secure Mode
Polycom®, Inc. 874
Non-hashed Passwords
All non-hashed passwords are stored encrypted as set out in the table below.
In compliance with UC APL requirements, PKI Self-signed Certificates are supported for the both the Default
Management and IP Network Services.
A mixture of Self-signed and CA-signed Certificates is supported, however a CA-signed certificate will
always override a Self-signed Certificate.
Self-signed Certificate Creation
Self-signed Certificates are created during:
● Initial system start-up before any CA-signed Certificates have been installed.
● IP Network Services creation.
● Network Services updates that result in Host Name changes.
● Daily validity checks of Self-signed Certificates.
● Backup and Restore of the system configuration
Self-signed Certificate field values are automatically inserted when the certificate is created Self-signed
Certificates are indicated in the Certification Repository - Issued By field.
Non-hashed Passwords - Encryption
Connection Storage type
Previous
Versions
From
Version 8.1
SNMPv3
Two passwords: Authentication
/ Privacy
Community permissions which are not
the PW to connect to SNMP are not
Saved Encrypted
Non encrypted AES 256
Exchange Non encrypted – Feature disabled in
Ultra Secure Mode
Non encrypted AES 256
RV v.35 serial ports – password
for login
Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256 AES 256
H.323 authentication –
password
Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256 AES 256
SIP digest – password Reversible – AES_128 with 256 Bytes
Key (2048 Bits)
AES 256 AES 256