Cisco CP-7911G-CH1 Administration Guide - Page 186

Preparing the Cisco Unified SRST Router for Secure Communication

Page 186 highlights

How to Configure Secure Unified SRST Configuring Secure SRST for SCCP and SIP Preparing the Cisco Unified SRST Router for Secure Communication The following tasks prepare the Cisco Unified SRST Router to process secure communications. • Configuring a Certificate Authority Server on a Cisco IOS Certificate Server, page 186 (optional) • Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server, page 188 (required) • Disabling Automatic Certificate Enrollment, page 190 (required) • Verifying Certificate Enrollment, page 191 (optional) • Enabling Credentials Service on the Secure Cisco Unified SRST Router, page 193 (required) • Troubleshooting Credential Settings, page 195 • Importing Phone Certificate Files in PEM Format to the Secure SRST Router, page 195 Configuring a Certificate Authority Server on a Cisco IOS Certificate Server For Cisco Unified SRST Routers to provide secure communications, there must be a CA server that issues the device certificate in the network. The CA server can be a third-party CA or one generated from a Cisco IOS certificate server. The Cisco IOS certificate server provides a certificate generation option to users who do not have a third-party CA in their network. The Cisco IOS certificate server can run on the SRST router or on a different Cisco IOS router. If you do not have a third-party CA, full instructions on enabling and configuring a CA server can be found in the Cisco IOS Certificate Server documentation. A sample configuration is provided below. SUMMARY STEPS 1. crypto pki server cs-label 2. database level {minimal | names | complete} 3. database url root-url 4. issuer-name DN-string 5. grant auto 6. no shutdown 186 Cisco Unified SCCP and SIP SRST System Administrator Guide OL-13143-04

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
How to Configure Secure Unified SRST
186
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
Preparing the Cisco Unified SRST Router for Secure Communication
The following tasks prepare the Cisco Unified SRST Router to process secure communications.
Configuring a Certificate Authority Server on a Cisco IOS Certificate Server, page 186
(optional)
Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server,
page 188
(required)
Disabling Automatic Certificate Enrollment, page 190
(required)
Verifying Certificate Enrollment, page 191
(optional)
Enabling Credentials Service on the Secure Cisco Unified SRST Router, page 193
(required)
Troubleshooting Credential Settings, page 195
Importing Phone Certificate Files in PEM Format to the Secure SRST Router, page 195
Configuring a Certificate Authority Server on a Cisco IOS Certificate Server
For Cisco Unified SRST Routers to provide secure communications, there must be a CA server that
issues the device certificate in the network. The CA server can be a third-party CA or one generated from
a Cisco IOS certificate server.
The Cisco IOS certificate server provides a certificate generation option to users who do not have a
third-party CA in their network. The Cisco IOS certificate server can run on the SRST router or on a
different Cisco IOS router.
If you do not have a third-party CA, full instructions on enabling and configuring a CA server can be
found in the
Cisco IOS Certificate Server
documentation. A sample configuration is provided below.
SUMMARY STEPS
1.
crypto pki server
cs-label
2.
database level
{
minimal
|
names
|
complete
}
3.
database url
root-url
4.
issuer-name
DN-string
5.
grant auto
6.
no shutdown