Cisco CP-7911G-CH1 Administration Guide - Page 185

How to Con Secure Unified SRST

Page 185 highlights

Configuring Secure SRST for SCCP and SIP How to Configure Secure Unified SRST Table 3 Overview of the Process of Secure SRST Authentication and Encryption (continued) Process Steps Description or Detail 5. Cisco Unified CM provides the PEM format files that contain phone certificate information to the Cisco Unified SRST router. Providing the PEM files to the Cisco Unified SRST router is done manually. See "Cisco IOS Credentials Server on Secure SRST Routers" section on page 181 for more information. When the Cisco Unified SRST router has the PEM files, the Cisco Unified SRST Router can authenticate the IP phone and validate the issuer of the IP phones certificate during the TLS handshake. 6. a. b. The TLS handshake occurs, certificates are exchanged, and mutual authentication and registration occurs between the Cisco Unified IP Phone and the Cisco Unified SRST Router. The Cisco Unified SRST Router sends its certificate, and the phone validates the certificate to the certificate that it received from Cisco Unified CM in Step 4. The Cisco Unified IP Phone provides the Cisco Unified SRST Router the LSC or MIC, and the router validates the LSC or MIC using the PEM format files that it was provided in Step 5. Note The media is encrypted automatically after the phone and router certificates are exchanged and the TLS connection is established with the SRST router. How to Configure Secure Unified SRST The following configuration sections ensure that the secure Cisco Unified SRST Router and the Cisco Unified IP Phones can request mutual authentication during the TLS handshake. The TLS handshake occurs when the phone registers with the Cisco Unified SRST Router, either before or after the WAN link fails. This section contains the following procedures: • Preparing the Cisco Unified SRST Router for Secure Communication, page 186 • Configuring Cisco Unified Communications Manager to the Secure Cisco Unified SRST Router, page 203 • Enabling SRST Mode on the Secure Cisco Unified SRST Router, page 206 • Configuring Secure SCCP SRST, page 207 • Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST, page 221 OL-13143-04 Cisco Unified SCCP and SIP SRST System Administrator Guide 185

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
How to Configure Secure Unified SRST
185
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
Note
The media is encrypted automatically after the phone and router certificates are exchanged and the TLS
connection is established with the SRST router.
How to Configure Secure Unified SRST
The following configuration sections ensure that the secure Cisco Unified SRST Router and the Cisco
Unified IP Phones can request mutual authentication during the TLS handshake. The TLS handshake
occurs when the phone registers with the Cisco Unified SRST Router, either before or after the WAN
link fails.
This section contains the following procedures:
Preparing the Cisco Unified SRST Router for Secure Communication, page 186
Configuring Cisco Unified Communications Manager to the Secure Cisco Unified SRST Router,
page 203
Enabling SRST Mode on the Secure Cisco Unified SRST Router, page 206
Configuring Secure SCCP SRST, page 207
Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST, page 221
5.
Cisco Unified CM provides the PEM format files that contain phone certificate
information to the Cisco Unified SRST router. Providing the PEM files to the Cisco
Unified SRST router is done manually. See
“Cisco IOS Credentials Server on Secure
SRST Routers” section on page 181
for more information.
When the Cisco Unified SRST router has the PEM files, the Cisco Unified SRST
Router can authenticate the IP phone and validate the issuer of the IP phones
certificate during the TLS handshake.
6.
The TLS handshake occurs, certificates are exchanged, and mutual authentication and
registration occurs between the Cisco Unified IP Phone and the Cisco Unified SRST
Router.
a.
The Cisco Unified SRST Router sends its certificate, and the phone validates the
certificate to the certificate that it received from Cisco Unified CM in Step 4.
b.
The Cisco Unified IP Phone provides the Cisco Unified SRST Router the LSC or
MIC, and the router validates the LSC or MIC using the PEM format files that it was
provided in Step 5.
Table 3
Overview of the Process of Secure SRST Authentication and Encryption (continued)
Process Steps
Description or Detail