Start SIP Feature Server
To start and verify SIP Feature Server:
- To run Feature Server in secure (https) mode:
- Open the start.ini file and uncomment etc/jetty-ssl.xml
- In the IVR Profile, set initial-page-url = https://Feature Server IP address or host name:8443/fs
- Use Genesys Administrator, not the command line, to start SIP Feature Server. If you are running more than one Feature Server, start the Master first.
- In Genesys Administrator, verify that the Feature Server is running.
- Verify that the GAX interface is running by logging in as the Default administrator (in other words, the Default user in Configuration Server):
- GAX IP address:port/gax
- At this point, only the Default administrator can log into the Feature Server GAX interface. To enable other users to log in as administrators, assign the Administrator role to them.
==Configure Jetty version 9 for Feature Server== This section provides detailed information about Jetty version 9 configuration files.
HTTP Configuration
In the command section of the launcher.xml file, configure:
parameter name=http_port
default value=jetty.port=8080
HTTPS Configuration
This section provides information on HTTPS configuration.
Configure start.ini
- Enable HTTPS module
- --module=https
- Configure https port
- https.port=8443
- Configure HTTPS idle timeout
- https.timeout=30000
- Enable SSL module
- --module=ssl
Configuration paths for TrustStore and KeyStore
Jetty 9 defines main configuration rules for paths for truststore and keystore in jetty-ssl.xml file. By default it defines paths as relative path to <FS Installation directory>.
The default values in jetty-ssl.xml are as follows:
- <Set name="KeyStorePath"><Property name="jetty.base" default="." />/<Property name="jetty.keystore" default="etc/keystore"/></Set>
- <Set name="TrustStorePath"><Property name="jetty.base" default="." />/<Property name="jetty.truststore" default="etc/keystore"/></Set>
It is possible to define absolute paths in start.ini or launcher.xml by using "jetty.keystore" and "jetty.truststore" variables. In this case jetty-ssl.xml file should be modified as follows:
- <Set name="KeyStorePath"><Property name="jetty.keystore"/></Set>
- <Set name="TrustStorePath"><Property name="jetty.truststore"/></Set>
Configuring the following keystore and truststore configuration in the start.ini file will override the configuration in the jetty-ssl.xml file:
- Setup path to keystore (relative to <FS Installation directory> by default)
- # jetty.keystore=etc/keystore
- Setup path truststore (relative to <FS Installation directory> by default)
- # jetty.truststore=etc/keystore
- Set the passwords
- # jetty.keystore.password=OBF:1vny1zlo1x8e1vnw1vn61x8g1zlu1vn4
- # jetty.keymanager.password=OBF:1u2u1wml1z7s1z7a1wnl1u2g
- # jetty.truststore.password=OBF:1vny1zlo1x8e1vnw1vn61x8g1zlu1vn4
Prevent Feature Server from POODLE attacks
The following procedure shows how to prevent Feature Server from POODLE attacks:
- Disable SSLv3 in Jetty jetty-ssl.file.
- Modify the <FS Installation directory>/etc/jetty-ssl.xml file and add the following to the Configure section of the jetty-ssl.xml file.
<Configure id="sslContextFactory" class="org.eclipse.jetty.util.ssl.SslContextFactory"> <Set name="ExcludeProtocols"> <Array type="java.lang.String"><Item>SSLv3</Item> </Array> </Set> </Configure>
