Bosch Video Solutions
TLS Time and Date Using Certificates

Did you know there are 86 different variations of attacks on Net Time Protocol (NTP) listed in the security vulnerability datasource CVE Details? While Bosch video devices are not vulnerable to these attacks, time servers in a facility might be.  
 
Using TLS protocol along with signed certificates can help mitigate concerns over NTP vulnerabilities, as the camera can perform a secure handshake with a trusted server via a web service. This allows the camera to check certificate validity against the server's clock.
       
Our new technical brief provides a step-by-step configuration of the server and cameras for using TLS protocol with signed certificates. It is based on a DIVAR IP installation with Bosch cameras with firmware 6.0 or higher.  
Tip: Required Checks Prior to Configuration

Items that need to be checked prior to configuration of the server and cameras include:  
  • Both the server and the cameras need to use the same version of TLS. Currently, all Bosch cameras support TLS 1.2, which is the recommended TLS version that should be configured.
    • Windows Server 2008 R2 is the minimum version that supports TLS 1.2. To check and/or configure TLS 1.2 on a Server 2008 system, see this Microsoft support article.
  • A Certificate Authority (CA), such as Micro CA built into Bosch Configuration Manager, is needed to sign requests from both the server and the cameras.

Bosch empowers you to build a safer and more secure world.

Bosch Security Systems, Inc., 130 Perinton Parkway, Fairport, NY 14450 USA
Phone: 800.289.0096 | Fax: 585.223.9180 | www.boschsecurity.us | Contact Us

imprint | terms of use | privacy policy
© Bosch Security Systems, 2017. All rights reserved.