Cisco CP-7911G-CH1 Administration Guide - Page 221

Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST

Page 221 highlights

Configuring Secure SRST for SCCP and SIP How to Configure Secure Unified SRST ! Define aggregate control plane service for the active Route Processor. control-plane service-policy input control-plane-policy Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST Cisco Unified Survivable Remote Site Telephony (Cisco SRST) provides secure call signaling and Secure Real-time Transport Protocol (SRTP) for media encryption to establish a secure, encrypted connection between Cisco Unified IP Phones and gateway devices. • Prerequisites for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST, page 221 • Restrictions for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST, page 221 • Information About Cisco Unified SIP SRST Support of Secure SIP Signaling and SRTP Media, page 222 • Configuring Cisco Unified Communications Manager, page 222 • Configuring SIP SRTP for Encrypted Phones, page 223 • Configuring SIP options for Secure SIP SRST, page 224 • Configuring SIP SRST Security Policy, page 225 (optional) • Configuring SIP User Agent for Secure SIP SRST, page 226 (optional) • Verifying the Configuration, page 227 • Configuration Example for Cisco Unified SIP SRST, page 228 Prerequisites for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST • Cisco IOS Release 15.0(1)XA and later releases. • Cisco Unified IP Phone firmware release 8.5(3) or later. • Complete the prerequisites and necessary tasks found in Prerequisites for Configuring SIP SRST Features Using Back-to-Back User Agent Mode. • Prepare the Cisco Unified SIP SRST device to use certificates as documented in Setting Up Secure Survivable Remote Site Telephony. Restrictions for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST SIP phones may be configured on the Cisco Unified CM with an authenticated device security mode. The Cisco Unified CM ensures integrity and authentication for the phone using a TLS connection with NULL-SHA cipher for signaling. If an authenticated SIP phone fails over to the Cisco Unified SRST device, it will register using TCP instead of TLS/TCP, thus disabling the authenticated mode until the phone fails back to the Cisco Unified CM. • By default, non-secure TCP SIP phones are permitted to register to the SRST device on failover from the primary call control. Support for TCP SIP phones requires the secure SRST configuration described in this section even if no encrypted phones are deployed. Without the secure SIP SRST configuration, TCP phones will register to the SRST device using UDP for signaling transport. OL-13143-04 Cisco Unified SCCP and SIP SRST System Administrator Guide 221

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
How to Configure Secure Unified SRST
221
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
! Define aggregate control plane service for the active Route Processor.
control-plane
service-policy input control-plane-policy
Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST
Cisco Unified Survivable Remote Site Telephony (Cisco SRST) provides secure call signaling and
Secure Real-time Transport Protocol (SRTP) for media encryption to establish a secure, encrypted
connection between Cisco Unified IP Phones and gateway devices.
Prerequisites for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST,
page 221
Restrictions for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST, page 221
Information About Cisco Unified SIP SRST Support of Secure SIP Signaling and SRTP Media,
page 222
Configuring Cisco Unified Communications Manager, page 222
Configuring SIP SRTP for Encrypted Phones, page 223
Configuring SIP options for Secure SIP SRST, page 224
Configuring SIP SRST Security Policy, page 225
(optional)
Configuring SIP User Agent for Secure SIP SRST, page 226
(optional)
Verifying the Configuration, page 227
Configuration Example for Cisco Unified SIP SRST, page 228
Prerequisites for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST
Cisco IOS Release 15.0(1)XA and later releases.
Cisco Unified IP Phone firmware release 8.5(3) or later.
Complete the prerequisites and necessary tasks found in
Prerequisites for Configuring SIP SRST
Features Using Back-to-Back User Agent Mode.
Prepare the Cisco Unified SIP SRST device to use certificates as documented in
Setting Up Secure
Survivable Remote Site Telephony
.
Restrictions for Configuring Secure SIP Call Signaling and SRTP Media with Cisco SRST
SIP phones may be configured on the Cisco Unified CM with an authenticated device security mode.
The Cisco Unified CM ensures integrity and authentication for the phone using a TLS connection with
NULL-SHA cipher for signaling.
If an authenticated SIP phone fails over to the Cisco Unified SRST
device, it will register using TCP instead of TLS/TCP, thus disabling the authenticated mode until the
phone fails back to the Cisco Unified CM.
By default, non-secure TCP SIP phones are permitted to register to the SRST device on failover from
the primary call control.
Support for TCP SIP phones requires the secure SRST configuration
described in this section even if no encrypted phones are deployed.
Without the secure SIP SRST
configuration, TCP phones will register to the SRST device using UDP for signaling transport.