Cisco CP-7911G-CH1 Administration Guide - Page 178

Restrictions for Configuring Secure SRST - manuale

Page 178 highlights

Restrictions for Configuring Secure SRST Configuring Secure SRST for SCCP and SIP • Gateway routers that run secure SRST must support voice- and security-enabled Cisco IOS images (a "k9" cryptographic software image). The following two images are supported: - Advanced IP Services. This image includes a number of advanced security features. - Advanced Enterprise Services. This image includes full Cisco IOS software. Public Key Infrastructure on Secure SRST • Set the clock, either manually or by using Network Time Protocol (NTP). Setting the clock ensures synchronicity with Cisco Unified Communications Manager. • Enable the IP HTTP server (Cisco IOS processor) with the ip http server command, if not already enabled. For more information on public key infrastructure (PKI) deployment, see the Cisco IOS Certificate Server feature. • If the certificate server is part of your startup configuration, you may see the following messages during the boot procedure: % Failed to find Certificate Server's trustpoint at startup % Failed to find Certificate Server's cert. These messages are informational messages and indicate a temporary inability to configure the certificate server because the startup configuration has not been fully parsed yet. The messages are useful for debugging, in case the startup configuration is corrupted. You can verify the status of the certificate server after the boot procedure using the show crypto pki server command. SRST • Secure SRST services cannot be enrolled while Cisco Unified SRST is active. Therefore, disable Cisco Unified SRST with the no call-manager-fallback command. Supported Cisco Unified IP Phones, Platforms, and Memory Requirements • For a list of supported Cisco Unified IP Phones, routers, network modules, and codecs for secure SRST, see the Cisco Unified Survivable Remote Site Telephony Compatibility Information feature. • For the most up-to-date information about the maximum number of Cisco Unified IP Phones, the maximum number of directory numbers (DNs) or virtual voice ports, and memory requirements, see the Cisco Unified SRST 4.3 Supported Firmware, Platforms, Memory, and Voice Products feature. Restrictions for Configuring Secure SRST General • Cryptographic software features ("k9") are under export controls. This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and, users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at the following URL:  http://www.cisco.com/wwl/export/crypto/tool/ If you require further assistance, please contact us by sending e-mail to [email protected]. 178 Cisco Unified SCCP and SIP SRST System Administrator Guide OL-13143-04

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
Restrictions for Configuring Secure SRST
178
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
Gateway routers that run secure SRST must support voice- and security-enabled Cisco IOS images
(a “k9” cryptographic software image). The following two images are supported:
Advanced IP Services. This image includes a number of advanced security features.
Advanced Enterprise Services. This image includes full Cisco IOS software.
Public Key Infrastructure on Secure SRST
Set the clock, either manually or by using Network Time Protocol (NTP). Setting the clock ensures
synchronicity with Cisco Unified Communications Manager.
Enable the IP HTTP server (Cisco IOS processor) with the
ip http server
command, if not already
enabled. For more information on public key infrastructure (PKI) deployment, see the
Cisco IOS
Certificate Server
feature.
If the certificate server is part of your startup configuration, you may see the following messages
during the boot procedure:
% Failed to find Certificate Server's trustpoint at startup
% Failed to find Certificate Server's cert.
These messages are informational messages and indicate a temporary inability to configure the
certificate server because the startup configuration has not been fully parsed yet. The messages are
useful for debugging, in case the startup configuration is corrupted.
You can verify the status of the certificate server after the boot procedure using the
show crypto pki
server
command.
SRST
Secure SRST services cannot be enrolled while Cisco Unified SRST is active. Therefore, disable
Cisco Unified SRST with the
no call-manager-fallback
command.
Supported Cisco Unified IP Phones, Platforms, and Memory Requirements
For a list of supported Cisco Unified IP Phones, routers, network modules, and codecs for secure
SRST, see the
Cisco Unified Survivable Remote Site Telephony Compatibility Information
feature.
For the most up-to-date information about the maximum number of Cisco Unified IP Phones, the
maximum number of directory numbers (DNs) or virtual voice ports, and memory requirements, see
the
Cisco Unified SRST 4.3 Supported Firmware, Platforms, Memory, and Voice Products
feature.
Restrictions for Configuring Secure SRST
General
Cryptographic software features (“k9”) are under export controls.
This product contains
cryptographic features and is subject to United
States and local country laws governing import,
export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party
authority to import, export, distribute or use encryption. Importers, exporters, distributors and, users
are responsible for compliance with U.S. and local country laws. By using this product you agree to
comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws,
return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at the following
URL:
If you require further assistance, please contact us by sending e-mail to [email protected].