Cisco 521SG Administration Guide - Page 169

Configuring a Custom Certificate Authority, General Purpose Parameters, Admin Login, advanced, Voice

Page 169 highlights

Provisioning Configuring a Custom Certificate Authority 6 Configuring a Custom Certificate Authority Digital certificates can be used to authenticate network devices and users on the network. They can be used to negotiate IPSec sessions between network nodes. A third party uses a Certificate Authority Certificate to validate and authenticate two or more nodes that are attempting to communicate. Each node has a public and private key. The public key encrypts data. The private key decrypts data. Because the nodes have obtained their certificates from the same source, they are assured of their respective identities. The device can use digital certificates provided by a third-party Certificate Authority (CA) to authenticate IPSec connections. To enable and configure a custom certificate of authority: STEP 1 Click Admin Login > advanced > Voice > Provisioning. STEP 2 In the CA Settings section in Custom CA Check Enable, select yes. STEP 3 In Custom CA RULE, enter the rule in the following format: STEP 4 Click Submit All Changes. General Purpose Parameters The general purpose parameters GPP_* are used as free string registers when configuring the Cisco IP phones to interact with a particular provisioning server solution. The GPP_* parameters are empty by default. They can be configured to contain diverse values, including the following: • Encryption keys • URLs • Multistage provisioning status information • Post request templates • Parameter name alias maps • Partial string values, eventually combined into complete parameter values. Cisco Small Business SPA300 Series, SPA500 Series, and WIP310 IP Phone Administration Guide 168

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325

Provisioning
Configuring a Custom Certificate Authority
Cisco Small Business SPA300 Series, SPA500 Series, and WIP310 IP Phone Administration Guide
168
6
Configuring a Custom Certificate Authority
Digital certificates can be used to authenticate network devices and users on the
network. They can be used to negotiate IPSec sessions between network nodes.
A third party uses a Certificate Authority Certificate to validate and authenticate
two or more nodes that are attempting to communicate. Each node has a public
and private key. The public key encrypts data. The private key decrypts data.
Because the nodes have obtained their certificates from the same source, they are
assured of their respective identities.
The device can use digital certificates provided by a third-party Certificate
Authority (CA) to authenticate IPSec connections.
To enable and configure a custom certificate of authority:
STEP 1
Click
Admin Login
>
advanced
>
Voice
>
Provisioning
.
STEP
2
In the
CA Settings section
in Custom CA Check Enable, select
yes
.
STEP
3
In Custom CA RULE, enter the rule in the following format:
STEP 4
Click
Submit All Changes
.
General Purpose Parameters
The general purpose parameters GPP_* are used as free string registers when
configuring the Cisco IP phones to interact with a particular provisioning server
solution. The GPP_* parameters are empty by default. They can be configured to
contain diverse values, including the following:
Encryption keys
URLs
Multistage provisioning status information
Post request templates
Parameter name alias maps
Partial string values, eventually combined into complete parameter values.