Cisco CP-7911G-CH1 Administration Guide - Page 179

Information About Configuring Secure SRST, Benefits of Secure SRST

Page 179 highlights

Configuring Secure SRST for SCCP and SIP Information About Configuring Secure SRST • When a Secure Real-Time Transport Protocol (SRTP) encrypted call is made between Cisco Unified IP Phone endpoints or from a Cisco Unified IP Phone to a gateway endpoint, a lock icon is displayed on the IP phones. The lock indicates security only for the IP leg of the call. Security of the PSTN leg is not implied. • Secure SCCP SRST is supported only within the scope of a single router. Information About Configuring Secure SRST • Benefits of Secure SRST, page 179 • Cisco IP Phones Clear-Text Fallback During Non-Secure SRST, page 179 • Signaling Security on Unify SRST - TLS, page 180 • Media Security on Unify SRST - SRTP, page 182 • Establishment of Secure Cisco Unified SRST to the Cisco Unified IP Phone, page 182 • Secure SRST Authentication and Encryption, page 184 Benefits of Secure SRST Secure Cisco Unified IP phones that are located at remote sites and that are attached to gateway routers can communicate securely with Cisco Unified Communications Manager using the WAN. But if the WAN link or Cisco Unified Communications Manager goes down, all communication through the remote phones becomes nonsecure. To overcome this situation, gateway routers can now function in secure SRST mode, which activates when the WAN link or Cisco Unified Communications Manager goes down. When the WAN link or Cisco Unified Communications Manager is restored, Cisco Unified Communications Manager resumes secure call-handling capabilities. Secure SRST provides new Cisco Unified SRST security features such as authentication, integrity, and media encryption. Authentication provides assurance to one party that another party is whom it claims to be. Integrity provides assurance that the given data has not been altered between the entities. Encryption implies confidentiality; that is, that no one can read the data except the intended recipient. These security features allow privacy for Cisco Unified SRST voice calls and protect against voice security violations and identity theft. SRST security is achieved when: • End devices are authenticated using certificates. • Signaling is authenticated and encrypted using Transport Layer Security (TLS) for TCP. • A secure media path is encrypted using Secure Real-Time Transport Protocol (SRTP). • Certificates are generated and distributed by a CA. Cisco IP Phones Clear-Text Fallback During Non-Secure SRST • Cisco Unified SRST versions prior to 12.3(14)T are not capable of supporting secure connections or have security enabled. If an SRST router is not capable of SRST as a fallback mode-that is, it is not capable of completing a TLS handshake with Cisco Unified Communications Manager-its certificate is not added to the configuration file of the Cisco IP phone. The absence of a Cisco Unified SRST router certificate causes the Cisco Unified IP phone to use nonsecure (clear-text) communication when in Cisco Unified SRST fallback mode. The capability to detect and fallback OL-13143-04 Cisco Unified SCCP and SIP SRST System Administrator Guide 179

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
Information About Configuring Secure SRST
179
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
When a Secure Real-Time Transport Protocol (SRTP) encrypted call is made between Cisco Unified
IP Phone endpoints or from a Cisco Unified IP Phone to a gateway endpoint, a lock icon is displayed
on the IP phones. The lock indicates security only for the IP leg of the call. Security of the PSTN
leg is not implied.
Secure SCCP SRST is supported only within the scope of a single router.
Information About Configuring Secure SRST
Benefits of Secure SRST, page 179
Cisco IP Phones Clear-Text Fallback During Non-Secure SRST, page 179
Signaling Security on Unify SRST - TLS, page 180
Media Security on Unify SRST - SRTP, page 182
Establishment of Secure Cisco Unified SRST to the Cisco Unified IP Phone, page 182
Secure SRST Authentication and Encryption, page 184
Benefits of Secure SRST
Secure Cisco Unified IP phones that are located at remote sites and that are attached to gateway routers
can communicate securely with Cisco Unified Communications Manager using the WAN. But if the
WAN link or Cisco Unified Communications Manager goes down, all communication through the
remote phones becomes nonsecure. To overcome this situation, gateway routers can now function in
secure SRST mode, which activates when the WAN link or Cisco Unified Communications Manager
goes down. When the WAN link or Cisco Unified Communications Manager is restored, Cisco
Unified Communications Manager resumes secure call-handling capabilities.
Secure SRST provides new Cisco Unified SRST security features such as authentication, integrity, and
media encryption. Authentication provides assurance to one party that another party is whom it claims
to be. Integrity provides assurance that the given data has not been altered between the entities.
Encryption implies confidentiality; that is, that no one can read the data except the intended recipient.
These security features allow privacy for Cisco Unified SRST voice calls and protect against voice
security violations and identity theft.
SRST security is achieved when:
End devices are authenticated using certificates.
Signaling is authenticated and encrypted using Transport Layer Security (TLS) for TCP.
A secure media path is encrypted using Secure Real-Time Transport Protocol (SRTP).
Certificates are generated and distributed by a CA.
Cisco IP Phones Clear-Text Fallback During Non-Secure SRST
Cisco Unified SRST versions prior to 12.3(14)T are not capable of supporting secure connections
or have security enabled. If an SRST router is not capable of SRST as a fallback mode—that is, it
is not capable of completing a TLS handshake with Cisco Unified Communications Manager—its
certificate is not added to the configuration file of the Cisco IP phone. The absence of a Cisco
Unified SRST router certificate causes the Cisco Unified IP phone to use nonsecure (clear-text)
communication when in Cisco Unified SRST fallback mode. The capability to detect and fallback