Cisco CP-7911G-CH1 Administration Guide - Page 182

Certificates Transport from CUCM to Secure SRST, Media Security on Unify SRST - SRTP

Page 182 highlights

Information About Configuring Secure SRST Configuring Secure SRST for SCCP and SIP To generate the certificate for Credentials Server, perform the following procedures: • Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server, page 188 • Enabling Credentials Service on the Secure Cisco Unified SRST Router, page 193 • Configuring SRST Fallback on Cisco Unified Communications Manager, page 204 Once the certificate is generated, fill in the name of the certificate (or the name of the trustpoint in IOS) in the "trustpoint" entry. This certificate for the Credentials Server on the Secure SRST will be seamlessly exported to the Cisco Unified CM when requested in "Adding an SRST Reference to Cisco Unified Communications Manager" section on page 203. Certificates Transport from CUCM to Secure SRST For more information about Certificates Transport from CUCM to Secure SRST, see "Importing Phone Certificate Files in PEM Format to the Secure SRST Router" section on page 195. Media Security on Unify SRST - SRTP Media encryption, which uses Secure Real-Time Protocol (SRTP), ensures that only the intended recipient can interpret the media streams between supported devices. Support includes audio streams only. If the devices support SRTP, the system uses a SRTP connection. If at least one device does not support SRTP, the system uses an RTP connection. SRTP-to-RTP fallback may occur for transfers from a secure device to a non-secure device, transcoding, music-on-hold (MOH), and so on. Note Secure SRST handles media encryption keys differently for different devices and protocols. All phones that are running SCCP get their media encryption keys from SRST, which secures the media encryption key downloads to phones with TLS encrypted signaling channels. Phones that are running SIP generate and store their own media encryption keys. Media encryption keys that are derived by SRST securely get sent via encrypted signaling paths to gateways over IPSec-protected links for H.323. Warning Before you configure SRTP or signaling encryption for gateways and trunks, Cisco strongly recommends that you configure IPSec because Cisco H.323 gateways, and H.323/H.245/H.225 trunks rely on IPSec configuration to ensure that security-related information does not get sent in the clear. Cisco Uinified SRST does not verify that you configured IPSec correctly. If you do not configure IPSec correctly, security-related information may get exposed. Establishment of Secure Cisco Unified SRST to the Cisco Unified IP Phone Figure 1 shows the interworking of the credentials server on the SRST router, Cisco Unified Communications Manager, and the Cisco Unified IP Phone. Table 2 describes the establishment of secure SRST to the Cisco Unified IP Phone. 182 Cisco Unified SCCP and SIP SRST System Administrator Guide OL-13143-04

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
Information About Configuring Secure SRST
182
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
To generate the certificate for Credentials Server, perform the following procedures:
Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server,
page 188
Enabling Credentials Service on the Secure Cisco Unified SRST Router, page 193
Configuring SRST Fallback on Cisco Unified Communications Manager, page 204
Once the certificate is generated,
fill in the name of the certificate (or the name of the trustpoint in IOS)
in the "trustpoint" entry.
This certificate for the Credentials Server on the Secure SRST will be seamlessly exported to the Cisco
Unified CM when requested in
“Adding an SRST Reference to Cisco Unified Communications
Manager” section on page 203
.
Certificates Transport from CUCM to Secure SRST
For more information about Certificates Transport from CUCM to Secure SRST, see
“Importing Phone
Certificate Files in PEM Format to the Secure SRST Router” section on page 195
.
Media Security on Unify SRST - SRTP
Media encryption, which uses Secure Real-Time Protocol (SRTP), ensures that only the intended
recipient can interpret the media streams between supported devices. Support includes audio streams
only.
If the devices support SRTP, the system uses a SRTP connection. If at least one device does not support
SRTP, the system uses an RTP connection. SRTP-to-RTP fallback may occur for transfers from a secure
device to a non-secure device, transcoding, music-on-hold (MOH), and so on.
Note
Secure SRST handles media encryption keys differently for different devices and protocols. All
phones that are running SCCP get their media encryption keys from SRST, which secures the
media encryption key downloads to phones with TLS encrypted signaling channels. Phones that
are running SIP generate and store their own media encryption keys. Media encryption keys that
are derived by SRST securely get sent via encrypted signaling paths to gateways over
IPSec-protected links for H.323.
Warning
Before you configure SRTP or signaling encryption for gateways and trunks, Cisco strongly
recommends that you configure IPSec because Cisco H.323 gateways, and H.323/H.245/H.225 trunks
rely on IPSec configuration to ensure that security-related information does not get sent in the clear.
Cisco Uinified SRST does not verify that you configured IPSec correctly. If you do not configure IPSec
correctly, security-related information may get exposed.
Establishment of Secure Cisco Unified SRST to the Cisco Unified IP Phone
Figure 1
shows the interworking of the credentials server on the SRST router, Cisco Unified
Communications Manager, and the Cisco Unified IP Phone.
Table 2
describes the establishment of
secure SRST to the Cisco Unified IP Phone.