Cisco CP-7911G-CH1 Administration Guide - Page 222

Information About Cisco Unified SIP SRST Support of Secure SIP Signaling and SRTP Media

Page 222 highlights

How to Configure Secure Unified SRST Configuring Secure SRST for SCCP and SIP Information About Cisco Unified SIP SRST Support of Secure SIP Signaling and SRTP Media Beginning with Cisco IP Phone firmware 8.5(3) and Cisco IOS Release 15.0(1)XA, Cisco SRST supports SIP signaling over UDP, TCP, and TLS connections, providing both RTP and SRTP media connections based on the security settings of the IP phone. Cisco SRST SIP-to-SIP and SIP-to-PSTN support includes the following features: • Basic calling • Hold/resume • Conference • Transfer • Blind transfer • Call forward Cisco SRST SIP-to-other (including SIP-to-SCCP) support includes basic calling, although other features may work. Configuring Cisco Unified Communications Manager Like SCCP-controlled devices, SIP-controlled devices will use the SRST Reference profile that is listed in their assigned Device Pool. The SRST Reference profile must have the "Is SRST Secure" checkbox selected if SIP/TLS communication is desired in the event of a WAN failure. Note All Cisco Unified IP Phones must have their firmware updated to version 8.5(3) or later. Devices with firmware earlier than 8.5(3) will need to have a separate Device Pool and SRST Reference profile created without the "Is SRST Secure" option selected; SIP-controlled devices in this Device Pool will use SIP over UDP to attempt to register to the SRST router. In Cisco Unified CM Administration, under System > SRST: • For the secure SRST profile, Is SRST Secure? must be checked. The SIP port must be 5061. • For the non-secure SRST profile, the Is SRST Secure? checkbox should NOT be checked and the SIP port should be 5060. Under Device > Phone: • Secure phones must belong to the pool that uses the secure SRST profile. • Non-secure phones must belong to the pool that uses the non-secure SRST profile. Note SIP phones will use the transport method assigned to them by their Phone Security Profile. 222 Cisco Unified SCCP and SIP SRST System Administrator Guide OL-13143-04

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
How to Configure Secure Unified SRST
222
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
Information About Cisco Unified SIP SRST Support of Secure SIP Signaling and SRTP Media
Beginning with Cisco IP Phone firmware 8.5(3) and Cisco IOS Release 15.0(1)XA, Cisco SRST
supports SIP signaling over UDP, TCP, and TLS connections, providing both RTP and SRTP media
connections based on the security settings of the IP phone.
Cisco SRST SIP-to-SIP and SIP-to-PSTN support includes the following features:
Basic calling
Hold/resume
Conference
Transfer
Blind transfer
Call forward
Cisco SRST SIP-to-other (including SIP-to-SCCP) support includes basic calling, although other
features may work.
Configuring Cisco Unified Communications Manager
Like SCCP-controlled devices, SIP-controlled devices will use the SRST Reference profile that is listed
in their assigned Device Pool. The SRST Reference profile must have the "Is SRST Secure" checkbox
selected if SIP/TLS communication is desired in the event of a WAN failure.
Note
All Cisco Unified IP Phones must have their firmware updated to version 8.5(3) or later. Devices with
firmware earlier than 8.5(3) will need to have a separate Device Pool and SRST Reference profile created
without the "Is SRST Secure" option selected; SIP-controlled devices in this Device Pool will use SIP
over UDP to attempt to register to the SRST router.
In Cisco Unified CM Administration, under
System
>
SRST
:
For the secure SRST profile, Is SRST Secure? must be checked. The SIP port must be 5061.
For the non-secure SRST profile, the Is SRST Secure? checkbox should NOT be checked and the
SIP port should be 5060.
Under
Device
>
Phone
:
Secure phones must belong to the pool that uses the secure SRST profile.
Non-secure phones must belong to the pool that uses the non-secure SRST profile.
Note
SIP phones will use the transport method assigned to them by their Phone Security Profile.