Table Of Contents
Configuring SSL VPN Client for SCCP IP Phones
Contents
Information About SSL VPN Client
SSL VPN Support on Cisco Unified CME with DTLS
Phone or Client Authentication
SSL VPN Client Support on SCCP IP Phones
How to Configure SSL VPN Client
How to Configure SSL VPN Client on SCCP IP Phones
Prerequisites
Basic Configuration on Cisco Unified CME
Configuring Cisco Unified CME as CA Server
Verifying Phone Registration and Phone Load
Configuring ASA (Gateway) for SSL VPN
Configuring VPN Group and Profile on Cisco Unified CME
Associating VPN Group and Profile to SCCP IP Phone
Configuring Alternate TFTP Address on Phone
Registering Phone from a Remote Location
Configuring SSL VPN Client with DTLS on Cisco Unified CME
Setting Up the Clock, Hostname, and Domain Name
Configuring Trustpoint and Enrolling with the Certificates
Configuring Trustpoint (not the default) on VPN Gateway
Configuring User Database
Configuring Virtual Gateway
Configuring Virtual Context
Configuring Group Policy
Verifying the IOS SSL VPN Connection
Configuring Cisco Unified SCCP IP Phones for SSL VPN
Configuration on Cisco Unified SCCP IP Phone
Configuring SSL VPN on Cisco Unified CME
VPN Phone Redundancy Support for Cisco Unified CME with DTLS
Configuration Examples for SSL VPN Client
VPN-Group and VPN-Profile Configuration on Cisco Unified CME: Example
Associating VPN-Group and VPN-Profile to SCCP IP Phones: Example
Additional References
Related Documents
Technical Assistance
Feature Information for SSL VPN Client
Configuring SSL VPN Client for SCCP IP Phones
Last Updated: August 11, 2011
This chapter describes SSL VPN client support for SCCP IP phones on Cisco Unified CME. For a list of the versions in which each feature is supported, see the "Feature Information for SSL VPN Client" section.
Finding Feature Information in This Module
Your Cisco Unified CME version may not support all of the features documented in this module.
Contents
•
Information About SSL VPN Client
•
How to Configure SSL VPN Client
•
Additional References
•
Configuration Examples for SSL VPN Client
•
Feature Information for SSL VPN Client
Information About SSL VPN Client
•
SSL VPN Support on Cisco Unified CME with DTLS
•
SSL VPN Client Support on SCCP IP Phones
SSL VPN Support on Cisco Unified CME with DTLS
In Communications Manager Express 8.6 and later versions, Cisco Unified SCCP IP phones such as 7945, 7965, and 7975 located outside of the corporate network are able to register to Cisco Unified CME through an SSL VPN connection. The SSL VPN connection is set up between a phone and a VPN headend. The VPN headend can either be an Adaptive Secure Appliance (ASA 5500) or the Datagram Transport Layer Security (DTLS) enabled IOS SSL VPN router, see Figure 50. Support for VPN feature on ASA headend was added in Cisco Unified CME 8.5. For more information, see the "SSL VPN Client Support on SCCP IP Phones" section.
Figure 50 VPN connection between Cisco Unified IP Phone and VPN head ends (ASA and DTLS).
Cisco Unified CME 8.6 uses IOS SSL DTLS as a headend or gateway. To establish a VPN connection between a phone and a VPN head end, the phone must be configured with VPN configuration parameters. The VPN configuration parameters include VPN head end addresses, VPN head end credentials, user or phone ID, and credential policy. These parameters are considered as sensitive information and must be delivered in a secure environment using a signed configuration file or a signed and encrypted configuration file. The phone is required to be provisioned within the corporate network before the phone can be placed outside the corporate network.
After the phone is "staged" in a trusted environment, the phone can be deployed to a location where a VPN head end can be connected. The VPN configuration parameters for the phone dictates the user interface and behavior of the phone.
Phone or Client Authentication
Phone authentication is required to verify that the remote phone trying to register with Cisco Unified CME via, VPN DTLS is a legitimate phone. Phone or client authentication can be done with the following types of authentication:
h.
Username and Password Authentication.
i.
Certificate-based authentication (where the phone's authentication is done using the LSC or MIC certificate on the phone). The certificated-based authentication consists of two levels:
–
Certificate only Authentication - Where only the LSC of the phone is used (the user is not required to enter a username or password on the phone.)
–
Certification with AAA or two factor - Where the LSC of the phone and username and password combination is used to authenticate phone. Two-factor authentication can be performed with or without the username prefill. (With the username prefilled, the phone does not ask fora username and a username is picked up depending on the configuration under the relevant trustpoint.)
Note
We recommend using LSC for certificate authentication. Use of MIC for certificate authentication is not recommended.We also recommend configuring ephone in "authenticated" (not encrypted) security mode when doing certificate authentication. More information on certificate-only authentication and two-factor authentication is available at the following link: https://www.cisco.com/en/US/docs/ios/sec_secure_connectivity/configuration/guide/sec_ssl_vpn_ps6350_TSD_Products_Configuration_Guide_Chapter.html#wp1465191.
You can set up Cisco Unified CME with an encrypted mode, but encrypted SCCP phone has limited media call-flow support. Using a phone with authenticated mode does not have any media-related call-flow limitations.
SSL VPN Client Support on SCCP IP Phones
Cisco Unified CME 8.5 and later versions support Secure Sockets Layer (SSL) Virtual Private Network (VPN) on SCCP IP phones such as 7945, 7965, and 7975.
In Cisco Unified CME 8.5, SCCP IP phones outside of the corporate network can register with the Cisco Unified CME 8.5 through a VPN connection as shown in Figure 51.
Figure 51 Connection between a phone and a VPN head end.
An SSL VPN provides secure communication mechanism for data and other information transmitted between two endpoints. The VPN connection is set up between a SCCP IP phone and a VPN head end or VPN gateway. Cisco Unified CME 8.5 uses an Adaptive Security Appliances (ASA model 55x0) as a VPN head end or gateway.
To establish a VPN connection between a phone and a VPN gateway, the phone is required to be configured with VPN configuration parameters such as VPN gateway addresses, VPN head end credentials, user or phone ID, and credential policy. These parameters contain sensitive information and should be delivered in a secure environment using a signed configuration file or a signed and encrypted configuration file. The phone is required to be provisioned within the corporate network before the phone is placed outside the corporate network.
After the phone is provisioned in a trusted secure environment, the phone can be connected to Cisco Unified CME from any location, from where VPN head end can be reached. The VPN configuration parameters for the phone controls the user interface and behavior of the phone. For more information on configuring the SSL VPN feature on SCCP IP phones, see the "How to Configure SSL VPN Client on SCCP IP Phones" section.
You need to generate a trustpoint with exportable keys and use that as sast1.
How to Configure SSL VPN Client
This section contains the following tasks:
•
How to Configure SSL VPN Client on SCCP IP Phones
•
Configuring SSL VPN Client with DTLS on Cisco Unified CME
How to Configure SSL VPN Client on SCCP IP Phones
To configure the SSL VPN feature on SCCP IP phones, follow these steps in the order in which they are presented here:
1.
Basic Configuration on Cisco Unified CME
2.
Configuring Cisco Unified CME as CA Server
3.
Verifying Phone Registration and Phone Load
4.
Configuring ASA (Gateway) for SSL VPN
5.
Configuring VPN Group and Profile on Cisco Unified CME
6.
Associating VPN Group and Profile to SCCP IP Phone
7.
Configuring Alternate TFTP Address on Phone
8.
Registering Phone from a Remote Location
Prerequisites
•
Cisco Unified CME 8.5 or later versions.
•
Cisco Unified SCCP IP phones 7942, 7945, 7962, 7965, and 7975 with phone image 9.0 or later.
•
ASA 5500 series router with image asa828-7-k8.bin or higher.
•
The package anyconnect-win-2.4.1012-k9.pkg is required for configuring the SSLVPN feature but would not be downloaded to the phone.
•
You must request the appropriate ASA licenses (AnyConnect for Cisco VPN Phone) to be installed on an ASA in order to allow the VPN client to connect. Go to, www.cisco.com/go/license and enter the PAK and the new activation key will be e-mailed back to you.
Note
A compatible Adaptive Security Device Manager (ASDM) Image is required if configuring via ASDM.
Basic Configuration on Cisco Unified CME
The following steps are basic Cisco Unified configuration allowing the SSL VPN feature to be built on:
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
ip dhcp pool pool-name
4.
network ip-address [mask | prefix-length]
5.
option 150 ip ip-address
6.
default-router ip-address
7.
exit
8.
telephony-service
9.
max-ephones max-phones
10.
max-dn max-directory-numbers [preference preference-order] [no-reg primary | both]
11.
ip source-address ip-address port port [any-match | strict-match]
12.
cnf-file {perphone}
13.
load [phone-type firmware-file]
14.
no shutdown
15.
exit
16.
ephone-dn dn-tag [dual-line]
17.
number number [secondary number] [no-reg [both | primary]]
18.
ephone phone-tag
19.
description string
20.
device-security-mode {authenticated | none | encrypted}
21.
mac-address [mac-address]
22.
type phone-type [addon 1 module-type [2 module-type]]
23.
button button-number{separator}dn-tag [,dn-tag...] [button-number{x}overlay-button-number] [button-number...]
24.
exit
25.
telephony-service
26.
create cnf-files
27.
end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
• Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
ip dhcp pool pool-name
Example:
Router(config)# ip dhcp pool mypool
|
Creates a name for the DHCP server address pool and enters DHCP pool configuration mode.
Note If you have already configured DHCP IP Address Pool, then skip Step 2 to Step 7 and continue from Step 8.
|
Step 4
|
network ip-address [mask | prefix-length]
Example:
Router(config-dhcp)#network 192.168.11.0
255.255.255.0
|
Specifies the IP address of the DHCP address pool to be configured.
|
Step 5
|
option 150 ip ip-address
Example:
Router(config-dhcp)# option 150 ip 192.168.11.1
|
Specifies the TFTP server address from which the Cisco Unified IP phone downloads the image configuration file.
• This is your Cisco Unified CME router's address.
|
Step 6
|
default-router ip-address
Example:
Router(config-dhcp)# default router
192.168.11.1
|
(Optional) Specifies the router that the IP phones will use to send or receive IP traffic that is external to their local subnet.
• If the Cisco Unified CME router is the only router on the network, this address should be the Cisco Unified CME IP source address. This command can be omitted if IP phones need to send or receive IP traffic only to or from devices on their local subnet.
• The IP address that you specify for default router will be used by the IP phones for fallback purposes. If the Cisco Unified CME IP source address becomes unreachable, IP phones will attempt to register to the address specified in this command.
|
Step 7
|
exit
Example:
Router(config-dhcp)# end
|
Exits DHCP pool configuration mode.
|
Step 8
|
telephony-service
Example:
Router(config)# telephony-service
|
Enters telephony-service configuration mode.
|
Step 9
|
max-ephones max-phones
Example:
Router(config-telephony)# max-ephones 24
|
Sets the maximum number of phones that can register to Cisco Unified CME.
• Maximum number is platform and version-specific. Type ? for range.
• In Cisco Unified CME 7.0/4.3 and later versions, the maximum number of phones that can register is different than the maximum number of phones that can be configured. The maximum number of phones that can be configured is 1000.
• In versions earlier than Cisco Unified CME 7.0/4.3, this command restricted the number of phones that could be configured on the router.
|
Step 10
|
max-dn max-directory-numbers [preference
preference-order] [no-reg primary | both]
Example:
Router(config-telephony)# max-dn 24 no-reg
primary
|
Limits number of directory numbers to be supported by this router.
• Maximum number is platform and version-specific. Type ? for value.
|
Step 11
|
ip source-address ip-address [port port]
[any-match | strict-match]
Example:
Router(config-telephony)# ip source-address
192.168.11.1 port 2000
|
Identifies the IP address and port number that the Cisco Unified CME router uses for IP phone registration.
• port port—(Optional) TCP/IP port number to use for SCCP. Range is 2000 to 9999. Default is 2000.
• any-match—(Optional) Disables strict IP address checking for registration. This is the default.
• strict-match—(Optional) Instructs the router to reject IP phone registration attempts if the IP server address used by the phone does not exactly match the source address.
|
Step 12
|
cnf-file {perphone}
Example:
Router(config-telephony)#xnf-file perphone
|
Specifies that system generate a separate configuration XML file for each IP phone.
• Separate configuration files for each endpoint are required for security.
Note You must configure the cnf-file (perphone) command to generate a separate XML file for each phone.
|
Step 13
|
load [phone-type firmware-file]
Example:
Router(config-telephony)# load 7965
SCCP45.9-0-1TD1-36S.loads
|
Associates a phone type with a phone firmware file.You must use the complete filename, including the file suffix, for phone firmware versions later than version 9.0 for all phone types load 7965 SCCP45.9-0-1TD1-36S
|
Step 14
|
no shutdown
Example:
Router(config-telephony)# no shutdown
|
Allows to enable SCCP service listening socket.
|
Step 15
|
exit
Example:
Router(config-telephony)# end
|
Exits telephony-service configuration mode.
|
Step 16
|
ephone-dn dn-tag [dual-line]
Example:
Router(config)# ephone-dn 1
|
Enters ephone dn configuration mode to define a directory number for an IP phone, intercom line, voice port, or a message-waiting indicator (MWI).
• dn-tag—Identifies a particular directory number during configuration tasks. Range is 1 to the maximum number of directory numbers allowed on the router platform. Type ? to display the range.
|
Step 17
|
number number [secondary number] [no-reg [both
|primary]]
Example:
Router(config-ephone-dn)# number 1001
|
Associates an extension number with this directory number.
• number—String of up to 16 digits that represents an extension or E.164 telephone number.
|
Step 18
|
ephone phone-tag
Example:
Router(config)# ephone 1
|
Enters ephone configuration mode to set ephone specific parameters.
• phone-tag—Unique sequence number that identifies the phone. Range is version and platform-dependent; type ? to display range.
|
Step 19
|
description string
Example:
Router(config-ephone)description SSL VPN Remote
Phone
|
Ephone descriptions for network management systems using an eXtensible Markup Language (XML) query.
• string—Allows for a maximum of 128 characters, including spaces. There are no character restrictions.
|
Step 20
|
device-security-mode {authenticated | none |
encrypted}
Example:
Router(config-ephone)# device-security-mode
none
|
Allows to set the security mode for SCCP signaling for devices communicating with the Cisco Unified CME router globally or per ephone.
• authenticated— SCCP signaling between a device and Cisco Unified CME through the secure TLS connection on TCP port 2443.
• none— SCCP signaling is not secure.
• encrypted — SCCP signaling between a device and Cisco Unified CME through the secure TLS connection on TCP port 2443, and the media uses Secure Real-Time Transport Protocol (SRTP).
|
Step 21
|
mac-address [mac-address]
Example:
Router(config-ephone)# mac-address
0022.555e.00f1
|
Associates the MAC address of a Cisco IP phone with an ephone configuration in a Cisco Unified CME system
• mac-address—Identifying MAC address of an IP phone, which is found on a sticker located on the bottom of the phone.
|
Step 22
|
type phone-type [addon 1 module-type [2
module-type]]
Example:
Router(config-ephone)# type 7965
|
Specifies the type of phone.
• Cisco Unified CME 4.0 and later versions—The only types to which you can apply an add-on module are 7960, 7961, 7961GE, and 7970.
|
Step 23
|
button button-number{separator}dn-tag
[,dn-tag...][button-number{x}overlay-button-num
ber] [button-number...]
Example:
Router(config-ephone)# button 1:1
|
Associates a button number and line characteristics with an ephone-dn. Maximum number of buttons is determined by phone type.
|
Step 24
|
exit
Example:
Router(config-ephone)#exit
|
Exits ephone configuration mode.
|
Step 25
|
telephony-service
Example:
Router(config)telephony-service
|
Enters telephony-service configuration mode.
|
Step 26
|
create cnf-files
Example:
Router(config-telephony)# create cnf-files
|
Builds XML configuration files required for SCCP phones.
|
Step 27
|
end
Example:
Router(config-telephony)# end
|
Returns to privileged EXEC mode.
|
Configuring Cisco Unified CME as CA Server
The basic configuration on the CA server ensures IP connectivity, Network Time Protocol (NTP), time synchronization which are necessary for enabling the SSL VPN feature. To configure the CA server, follow these steps:
Step 1
Configure IP Address, NTP and HTTP Server on your Cisco Unified CME router:
Router(config)#Interface GigabitEthernet0/0
Router(config-if)#no ip address
Router(config-if)#interface GigabitEthernet0/0.10
Router(config-subif)#description DATA VLAN
Router(config-subif)#encapsulation dot1Q 10 native
Router(config-subif)#ip address 192.168.10.1 255.255.255.0
Router(config)#interface GigabitEthernet0/0.11
Router(config-subif)#description VOICE VLAN
Router(config-subif)#encapsulation dot1Q 11
Router(config-subif)#ip address 192.168.11.1 255.255.255.0
Router(config)#interface GigabitEthernet0/1
Router(config-if)#description INTERFACE CONNECTED TO ASA
Router(config-if)#ip address 192.168.20.1 255.255.255.0
Router(config)#! Default router is ASA Inside Interface
Router(config)#ip route 0.0.0.0 0.0.0.0 192.168.20.254
Router(config)#clock timezone PST -8
Router(config)#clock summer-time PST recurring
Router#! Set clock to current time
Router#clock set 10:10:00 15 oct 2010
Router(config)#ntp source GigabitEthernet0/1
Router(config)#ntp master 2
Router(config)#ip http server
Router(config)#ip domain-name cisco.com
Note
NTP synchronization will fail if you do not set the clock manually to match the time on Cisco Unified CME router.
Step 2
Configure Cisco Unified CME as CA Server. The following sample configuration shows Cisco Unified CME being configured as the CA Server:
Example:
Router(config)#crypto pki server cme_root
Router(config)#database level complete
Router(cs-server)#database url nvram:
Router(cs-server)#grant auto
Router(cs-server)#lifetime certificate 7305
Router(cs-server)#lifetime ca-certificate 7305
Router(cs-server)#exit
Router(config)#crypto pki trustpoint cme_root
Router(ca-trustpoint)# enrollment url http://192.168.20.1:80
Router(ca-trustpoint)# revocation-check none
Router(ca-trustpoint)# rsakeypair cme_root
Router(cs-server)#exit
Router(config)# crypto pki server cme_root
Router(cs-server)#no shutdown
%Some server settings cannot be changed after CA certificate generation.
% Please enter a passphrase to protect the private key
% or type Return to exit
Password: *****
Re-enter password: ****
% Generating 1024 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 1 seconds)
Mar 10 16:44:00.576: %SSH-5-ENABLED: SSH 1.99 has been enabled% Exporting Certificate
Server signing certificate and keys...
% Certificate Server enabled.
Router(cs-server)#
Mar 10 16:44:41.812: %PKI-6-CS_ENABLED: Certificate server now enabled.
Step 3
Create a second trustpoint, then authenticate the trustpoint and enroll it with CA.
Example:
Router(config)#crypto pki trustpoint cme_cert
Router(ca-trustpoint)# enrollment url http://192.168.20.1:80
Router(ca-trustpoint)# revocation-check none
Router(ca-trustpoint)# exit
Router(config)# crypto pki authenticate cme_cert
Certificate has the following attributes:
Fingerprint MD5: 995C157D AABB8EE2 494E7B35 00A75A88
Fingerprint SHA1: F934871E 7E2934B1 1C0B4C9A A32B7316 18A5858F
% Do you accept this certificate? [yes/no]: yes
Trustpoint CA certificate accepted.
Router(config)# crypto pki enroll cme_cert
%
% Start certificate enrollment ..
% Create a challenge password.
You will need to verbally provide this password to the CA Administrator in order to revoke
your certificate. For security reasons your password will not be saved in the
configuration. Please make a note of it.
Password:
Jan 20 16:03:24.833: %CRYPTO-6-AUTOGEN: Generated new 512 bit key pair
Re-enter password:
% The subject name in the certificate will include: CME1.cisco.com
% Include the router serial number in the subject name? [yes/no]: no
% Include an IP address in the subject name? [no]: no
Request certificate from CA? [yes/no]: yes
% Certificate request sent to Certificate Authority
% The 'show crypto pki certificate verbose cme_cert' command will show the fingerprint.
! Verify Certificates
Verify Certificates (Optional)
Use the show crypto pki certificates command on your Cisco Unified CME router to verify the certificates.
Example:
Router#sh crypto pki certificates
Certificate
Status: Available
Certificate Serial Number (hex): 07
Certificate Usage: General Purpose
Issuer:
cn=cme_root
Subject:
Name: CME1.cisco.com
hostname=CME1.cisco.com
Validity Date:
start date: 15:32:23 PST Apr 1 2010
end date: 09:44:00 PST Mar 10 2030
Associated Trustpoints: cisco2
Storage: nvram:cme_root#7.cer
Certificate
Status: Available
Certificate Serial Number (hex): 06
Certificate Usage: General Purpose
Issuer:
cn=cme_root
Subject:
Name: CME1.cisco.com
hostname=CME1.cisco.com
Validity Date:
start date: 15:30:11 PST Apr 1 2010
end date: 09:44:00 PST Mar 10 2030
Associated Trustpoints: cisco1
Storage: nvram:cme_root#6.cer
Certificate
Status: Available
Certificate Serial Number (hex): 02
Certificate Usage: General Purpose
Issuer:
cn=cme_root
Subject:
Name: CME1.cisco.com
hostname=CME1.cisco.com
Validity Date:
start date: 08:47:42 PST Mar 10 2010
end date: 09:44:00 PST Mar 10 2030
Associated Trustpoints: cme_cert
Storage: nvram:cme_root#2.cer
CA Certificate
Status: Available
Certificate Serial Number (hex): 01
Certificate Usage: Signature
Issuer:
cn=cme_root
Subject:
cn=cme_root
Validity Date:
start date: 08:44:00 PST Mar 10 2010
end date: 09:44:00 PST Mar 10 2030
Associated Trustpoints: cisco2 cisco1 cme_cert cme_root
Storage: nvram:cme_root#1CA.cer
Verifying Phone Registration and Phone Load
Step 1
Use the show ephone command to verify the phone registration details.
Example:
Router# Show ephone
ephone-1[0] Mac:0022.555E.00F1 TCP socket:[2] activeLine:0 whisperLine:0 REGISTERED in
SCCP ver 19/17 max_streams=5 mediaActive:0 whisper_mediaActive:0 startMedia:0 offhook:0
ringing:0 reset:0 reset_sent:0 paging 0 debug:0 caps:9
IP:192.168.11.4 * 49269 7965 keepalive 0 max_line 6 available_line 6
button 1: cw:1 ccw:(0 0) dn 1 number 1001 CH1 IDLE CH2 IDLE
Preferred Codec: g711ulaw
Lpcor Type: none
Note
Make sure the phone has the right phone firmware and verify if the phone registers locally with Cisco Unified CME.
Step 2
Use the show ephone phone load command to verify phone load.
Example:
Show ephone phoneload
DeviceName CurrentPhoneload PreviousPhoneload LastReset
SEP0016C7EF9B13 9.0(1TD1.36S) 9.0(1TD1.36S) UCM-closed-TCP
Configuring ASA (Gateway) for SSL VPN
Step 1
Configure Interfaces, IP Routing, and NTP.
ciscoasa(config)# Interface Ethernet0/1
ciscoasa(config-if)# nameif Inside
ciscoasa(config-if)# description INTERFACE CONNECTED TO CUCME
ciscoasa(config-if)# security-level 100
ciscoasa(config-if)# ip address 192.168.20.254 255.255.255.0
ciscoasa(config)# interface Ethernet 0/0
ciscoasa(config-if)# description INTERFACE CONNECTED TO WAN
ciscoasa(config-if)# nameif Outside
ciscoasa(config-if)# security-level 0
ciscoasa(config-if)# ip address 9.10.60.254 255.255.255.0
ciscoasa(config)# router ospf 100
ciscoasa(config-router)network 9.10.60.0 255.255.255.0 area 1
ciscoasa(config-if)# ntp server 192.168.20.1
Step 2
Create Trustpoint on ASA and obtain CME (CA) Certificate.
ciscoasa(config)#crypto key generate rsa label cmeasa
ciscoasa(config)#crypto ca trustpoint asatrust
ciscoasa(config)#! Enrollment URL = CA Server = CUCME
ciscoasa(config-ca-trustpoint)#enrollment url http://192.168.20.1:80
ciscoasa(config-ca-trustpoint)#subject-name cn=cmeasa.cisco.com
ciscoasa(config-ca-trustpoint)#crl nocheck
ciscoasa(config-ca-trustpoint)#keypair cmeasa
ciscoasa (config)# crypto ca authenticate asatrust
INFO: Certificate has the following attributes:
Fingerprint: 27d00cdf 1144c8b9 90621472 786da0cf
Do you accept this certificate? [yes/no]: yes
! Enroll the Trustpoint
ciscoasa(config)# crypto ca enroll asatrust
% Start certificate enrollment ..
% Create a challenge password. You will need to verbally provide this
password to the CA Administrator in order to revoke your certificate.
For security reasons your password will not be saved in the configuration.
Please make a note of it.
Password: ********
Re-enter password: ********
% The subject name in the certificate will be: cn=cmeasa.cisco.com
% The fully-qualified domain name in the certificate will be: ciscoasa.cisco.com
% Include the device serial number in the subject name? [yes/no]: no
Request certificate from CA? [yes/no]: yes
% Certificate request sent to Certificate Authority
ciscoasa(config)# The certificate has been granted by CA!
ciscoasa# show crypto ca certificates
Step 3
Verify Certificates (optional)
Use the show crypto ca certificate command on your ASA router to verify the certificates.
Example:
ciscoasa# show crypto ca certificate
Certificate
Status: Available
Certificate Serial Number: 03
Certificate Usage: General Purpose
Public Key Type: RSA (1024 bits)
Issuer Name:
cn=cme_root
Subject Name:
hostname=ciscoasa.cisco.com
cn=cmeasa.cisco.com
Validity Date:
start date: 09:04:40 PST Mar 10 2010
end date: 08:44:00 PST Mar 10 2030
Associated Trustpoints: asatrust
CA Certificate
Status: Available
Certificate Serial Number: 01
Certificate Usage: Signature
Public Key Type: RSA (1024 bits)
Issuer Name:
cn=cme_root
Subject Name:
cn=cme_root
Validity Date:
start date: 08:44:00 PST Mar 10 2010
end date: 08:44:00 PST Mar 10 2030
Associated Trustpoints: asatrust
Step 4
Configure SSL Parameters.
ciscoasa(config)# ssl encryption 3des-sha1 aes128-sha1 aes256-sha1 des-sha1 null-sha1
ciscoasa(config)#
ciscoasa(config)# ssl trust-point asatrust
ciscoasa(config)# ssl trust-point asatrust inside
ciscoasa(config)# ssl trust-point asatrust outside
ciscoasa(config)# no ssl certificate-authentication interface outside port 443
ciscoasa(config)# ssl certificate-authentication interface inside port 443
Step 5
Configure local IP address pool.
ciscoasa(config)#ip local pool SSLVPNphone_pool 192.168.20.50-192.168.20.70 mask
255.255.255.0
Step 6
Configure Access List to prevent NAT traffic via VPN.
ciscoasa(config)# access-list no_nat_to_vpn extended permit ip any 9.10.60.0 2$
ciscoasa(config)# nat (inside) 0 access-list no_nat_to_vpn
Step 7
Configure VPN. Follow this link for information on configuring VPN: http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/svc.html
ciscoasa(config-webvpn)# enable inside
INFO: WebVPN and DTLS are enabled on 'Inside'.
ciscoasa(config-webvpn)# enable outside
INFO: WebVPN and DTLS are enabled on 'Outside'.
ciscoasa(config-webvpn)# svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1
ciscoasa(config-webvpn)# svc enable
ciscoasa(config-webvpn)# group-policy SSLVPNphone internal
ciscoasa(config)# group-policy SSLVPNphone attribute
ciscoasa(config-group-policy)# banner none
ciscoasa(config-group-policy)# vpn-simultaneous-logins 10
ciscoasa(config-group-policy)# vpn-idle-timeout none
ciscoasa(config-group-policy)# vpn-session-timeout none
ciscoasa(config-group-policy)# vpn-tunnel-protocol svc webvpn
ciscoasa(config-group-policy)# address-pools value SSLVPNphone_pool
ciscoasa(config-group-policy)# webvpn
ciscoasa(config-group-webvpn)# svc dtls enable
ciscoasa(config-group-webvpn)# svc keepalive 120
ciscoasa(config-group-webvpn)# svc ask none
ciscoasa(config-group-webvpn)#
Step 8
Configure SSL VPN tunnel. For more information, see http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/vpngrp.html.
ciscoasa(config)# tunnel-group SSLVPN_tunnel type remote-access
ciscoasa(config)# tunnel-group SSLVPN_tunnel general-attributes
ciscoasa(config-tunnel-general)#
ciscoasa(config-tunnel-general)#
ciscoasa(config-tunnel-general)# address-pool SSLVPNphone_pool
ciscoasa(config-tunnel-general)# default-group-policy SSLVPNphone
ciscoasa(config-tunnel-general)# tunnel-group SSLVPN_tunnel webvpn-attributes
ciscoasa(config-tunnel-webvpn)# group-url https://9.10.60.254/SSLVPNphone enable
Step 9
Enable static route to Cisco Unified CME voice VLAN. For more information, see http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/route_static.html.
ciscoasa(config)# route Inside 192.168.11.0 255.255.255.0 192.168.20.254 1
Step 10
Configure the ASA local database for users. For more information, see
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_aaa.html#wpmkr1083932.
ciscoasa(config)# username anyone password cisco
ciscoasa(config)# username anyone attributes
ciscoasa(config-username)# vpn-group-policy SSLVPNphone
ciscoasa(config-username)# vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
ciscoasa(config-username)# webvpn
ciscoasa(config-username-webvpn)# svc dtls enable
ciscoasa(config-username-webvpn)# svc ask none
Step 11
Enable Inter-ASA media traffic.
ciscoasa(config)# same-security-traffic permit inter-interface
ciscoasa(config)# same-security-traffic permit intra-interface
Configuring VPN Group and Profile on Cisco Unified CME
To configure VPN group and profile on Cisco Unified CME, follow these steps:
Summary Steps
1.
enable
2.
configure terminal
3.
voice service voip
4.
vpn-group tag
5.
vpn-gateway [number | url]
6.
vpn-trustpoint {[number [raw | trustpoint]}
7.
vpn-hash-algorithm sha-1
8.
exit
9.
vpn-profile tag
10.
host-id-check [enable | disable]
11.
end
Detailed Steps
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode. Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
voice service voip
Example:
Router(config)#voice service voip
|
Enters voice over IP configuration mode.
|
Step 4
|
vpn-group tag
Example:
Router (conf-voi-serv)#vpn-group 1
|
Enters vpn-group mode under voice over IP configuration mode.
• tag—vpn-group tag. Range: 1 or 2.
|
Step 5
|
vpn-gateway [ number | url]
Example:
Router(conf-vpn-group)#vpn-gateway 1
https://9.10.60.254/SSLVPNphone
|
Allows you to define gateway url for vpn.
• number—Number of gateways that can be defined as a vpn-gateway. Range is from 1 to 3.
• url—VPN-gateway url.
|
Step 6
|
vpn-trustpoint {[number [raw | trustpoint]}
Example:
Router(conf-vpn-group)#vpn-trustpoint ?
vpn-trustpoint 1 trustpoint cme_cert root
|
Allows you to enter a vpn-gateway trustpoint.
• number—Number of trustpoints allowed. Range:1 to 10.
• raw—allows you to enter vpn-gateway trustpoint in raw format.
• trustpoint—allows you to enter VPN Gateway trustpoint as created in IOS format.
|
Step 7
|
vpn-hash-algorithm sha-1
Example:
Router(conf-vpn-group)#vpn-hash-algorithm sha-1
|
Allows you to enter vpn hash encryption for the trustpoints.
• sha-1—Encryption algorithm.
|
Step 8
|
exit
Example:
Router(conf-vpn-group)#exit
|
Exits VPN-group configuration mode.
|
Step 9
|
vpn-profile tag
Example:
Router (conf-voi-serv)#vpn-profile 1
|
Enters VPN-profile configuration mode.
tag—VPN-profile tag number. Range: 1-6.
|
Step 10
|
host-id-check [enable | disable]
Example:
Router(conf-vpn-profile)#host-id-check disable
|
Allows you to configure host id check option in VPN-profile.
• disable— Disable host ID check option.
• enable— Enable host ID check option. Default is Enable.
|
Step 11
|
end
Example:
Router(conf-vpn-profile)#end
|
Exits to privileged EXEC mode.
|
Associating VPN Group and Profile to SCCP IP Phone
To associate VPN group and profile to SCCP IP phones, follow these steps:
Summary Steps
1.
enable
2.
configure terminal
3.
telephony-service
4.
cnf-file perphone
5.
ephone phone-tag
6.
device-security-mode {authenticated | none | encrypted}
7.
mac-address [mac-address]
8.
type phone-type [addon 1 module-type [2 module-type]]
9.
vpn-group tag
10.
vpn-profile tag
11.
button button-number{separator}dn-tag [,dn-tag...][button-number{x}overlay-button-number] [button-number...]
12.
exit
13.
telephony-service
14.
create cnf-file
15.
exit
16.
ephone phone-tag
17.
reset
18.
end
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode. Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
telephony-service
Example:
Router#(config)telephony-service
|
Enters telephony-service configuration mode.
|
Step 4
|
cnf-file perphone
Example:
Router(config-telephony)# create cnf-files
|
Builds the XML configuration files required for IP phones.
|
Step 5
|
ephone phone-tag
Example:
Router(config)# ephone 1
|
Enters ephone configuration mode to set phone-specific parameters for an SCCP phone.
• phone-tag—Unique sequence number that identifies the phone. Range is version and platform-dependent; type ? to display range
|
Step 6
|
device-security-mode {authenticated | none |
encrypted}
Example:
Router(config-telephony)# device-security-mode none
|
Enables security mode for endpoints.
• authenticated—Instructs device to establish a TLS connection with no encryption. There is no Secure Real-Time Transport Protocol (SRTP) in the media path.
• none—SCCP signaling is not secure. This is the default.
• encrypted—Instructs device to establish an encrypted TLS connection to secure media path using SRTP.
• The value set for this command in ephone configuration mode has priority over the value set in telephony-service configuration mode.
|
Step 7
|
mac-address [mac-address]
Example:
Router(config-ephone)#mac-address 0022.555e.00f1
|
Specifies the MAC address of the IP phone that is being configured
|
Step 8
|
type phone-type [addon 1 module-type [2
module-type]]
Example:
Router(config-ephone)# type 7965
|
Specifies the type of phone.
• Cisco Unified CME 4.0 and later versions—The only types to which you can apply an add-on module are 7960, 7961, 7961GE, and 7970.
• Cisco CME 3.4 and earlier versions—The only type to which you can apply an add-on module is 7960.
|
Step 9
|
vpn-group tag
Example:
Router (conf-voi-serv)#vpn-group 1
|
Enters vpn-group mode under voice over IP configuration mode.
• tag—vpn-group tag. Range: 1 or 2.
|
Step 10
|
vpn-profile tag
Example:
Router (conf-voi-serv)#vpn-profile 1
|
Enters VPN-profile configuration mode.
• tag—VPN-profile tag number. Range: 1-6. Default:
|
Step 11
|
button button-number{separator}dn-tag
[,dn-tag...][button-number{x}overlay-button-number]
[button-number...]
Example:
Router(config-ephone)# button 1:5
|
Associates a button number and line characteristics with an ephone-dn. Maximum number of buttons is determined by phone type.
|
Step 12
|
exit
Example:
Router(config-ephone)exit
|
Exits ephone configuration mode.
|
Step 13
|
telephony-service
Example:
Router(config)# telephony-service
|
Enters telephony-service configuration mode.
|
Step 14
|
create cnf-file
Example:
Router(config-telephony)# create cnf-files
|
Builds the XML configuration files required for IP phones.
|
Step 15
|
exit
Example:
Router(Config-telepony)exit
|
Exits telephony service configuration mode.
|
Step 16
|
ephone phone-tag
Example:
Router(config)# ephone 1
|
Enters ephone configuration mode.
• phone-tag—Unique sequence number that identifies this ephone during configuration tasks.
|
Step 17
|
reset
Example:
Router(config-ephone)# reset
|
Performs a complete reboot of the individual SCCP phone being configured.
|
Step 18
|
end
Example:
Router(config-ephone)# end
|
Exits to privileged EXEC mode.
|
Configuring Alternate TFTP Address on Phone
Step 1
From the phone, go to:
Settings->Network Configuration->IPv4 Configuration->Alternate TFTP
Press **# to unlock
Select YES
If the phone is already registered, "TFTP Server 1" will already be populated. Otherwise,
enter the CUCME address as the alternate TFTP Server 1.
Step 2
Save the phone configuration.
Step 3
Verify if the VPN is enabled from the phone.
Press Settings -> Security Configuration -> VPN
When you press "Enable" from this menu, it should prompt for username and password.
Step 4
From the phone, go to:
Settings->Network Configuration->IPv4 Configuration->Alternate TFTP.
Press **# to unlock and select YES.
If the phone is already registered, "TFTP Server 1" will already be populated. Otherwise,
enter the CUCME address as the alternate TFTP Server 1.
Step 5
Save the configuration.
Step 6
Connect the phone to the network from home or a remote location.
Select Settings ->Security Settings ->VPN Configurations?
Enable VPN
Enter Username and Password. Phone will register with CUCME
Registering Phone from a Remote Location
To register a Cisco Unified IP phone from a remote location, follow these steps:
Step 1
Connect the phone to the network from a home or remote location. Phone receives DHCP.
Step 2
Select Settings from the phone menu and go to Security Settings.
Step 3
Select VPN Configurations. and then select Enable VPN.
Step 4
Enter your username and password.Your phone will now register with Cisco Unified CME
Configuring SSL VPN Client with DTLS on Cisco Unified CME
Before you begin, make sure you have configured the basic SSL VPN configuration on Cisco Unified CME (see the "Basic Configuration on Cisco Unified CME" section.)
To configure the SSL VPN client with DTLS on SCCP IP phones, follow these steps in the order in which they are presented here:
1.
Setting Up the Clock, Hostname, and Domain Name
2.
Configuring Trustpoint and Enrolling with the Certificates
3.
Configuring Trustpoint (not the default) on VPN Gateway
4.
Configuring User Database
5.
Configuring Virtual Gateway
6.
Configuring Virtual Context
7.
Configuring Group Policy
8.
Verifying the IOS SSL VPN Connection
9.
Configuring Cisco Unified SCCP IP Phones for SSL VPN
10.
Configuration on Cisco Unified SCCP IP Phone
11.
Configuring SSL VPN on Cisco Unified CME
Note
Depending upon the type of authentication you choose to configure, configuration steps 3 to step 11 may vary a little from the way they are documented in this section.
Setting Up the Clock, Hostname, and Domain Name
The clock, hostname, and domain name must be set up.
Step 1
The following example shows the hostname and domain name configured:
hostname Router2811
ip domain name cisco.com
Interfaces on the Router_2811:
interface FastEthernet0/0
ip address 1.5.37.13 255.255.0.0
duplex auto
speed auto
interface FastEthernet0/1
ip address 30.0.0.1 255.255.255.0
duplex auto
speed auto
Step 2
Show clock on IOS:
Router#show clock
*10:07:57.109 pacific Thu Oct 7 2010
a.
Set clock directly:
Router#clock set 9:53:0 Oct 7 2010
Set time zone (Pacific Standard Time)
Router#configure terminal
Router(config)#clock timezone pst -8
(optional)
Set summer-time
Router#configure terminal
Router(config)#clock summer-time pst recurring
Or
Router(config)#
clock summer-time pst date apr 11 2010 12:00 nov 11 2010 12:00
b.
Set clock using NTP:
Router(config)#ntp server 192.18.2.1
Router(config)#ntp master 2
Configuring Trustpoint and Enrolling with the Certificates
To configure a trustpoint and enroll with the certificate server, see the "Configuring Cisco Unified CME as CA Server" section. You can also use the default self-signed certificate generated by the webvpn. This default trustpoint is generated when the webvpn gateway gateway name command is entered for the first time.
Note
The DTLS in IOS SSL VPN uses the child certificate during SSL authentication, therefore, you must select the "leaf" option when configuring the "vpn-trustpoint".
Configuring Trustpoint (not the default) on VPN Gateway
The WebVPN gateway uses a default trustpoint name of SSL VPN. To tell the Web VPN gateway to use a trustpoint with another name, use the following configuration:
Router(config)#webvpn gateway GW1
Router(config-webvpn-gateway)#ssl trustpoint <trustpoint-name>
Note
We recommend using Cisco Unfied CME generated trustpoint rather than webvpn self generated trustpoint.
Configuring User Database
1.
Configure the local database:
Router(config)#aaa new-model
username anyone password 0 cisco
aaa authentication login default local
2.
Configure a remote AAA Radius server for authentication:
Router(config)#aaa new-model
aaa authentication login default group radius
radius-server host 172.19.159.150 auth-port 1923 acct-port 1924
radius-server key cisco
For more information, see
http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/aaa.html#wp1062044
Configuring Virtual Gateway
When entering "webvpn gateway <name>", a self-signed certificate is generated. The IP address must be a public IP address configured on an interface or loopback interface on the WebVPN gateway. The following example shows a public IP address configured on the WebVPN gateway:
Router(config)#webvpn gateway sslvpn_gw
Router(config-webvpn)# ip address 1.5.37.13 port 443
ssl encryption 3des-sha1 aes-sha1
ssl trustpoint R2811_cert
inservice
Configuring Virtual Context
Users can get access to the virtual context by specifying the "domain name" in the URL when accessing the WebVPN gateway such as, https://1.5.37.13/SSLVPNphone. The following example shows a virtual VPN context configured:
Router(config)# webvpn context sslvpn_context
ssl encryption 3des-sha1 aes-sha1
ssl authenticate verify all
gateway sslvpn_gw domain SSLVPNphone
inservice
When inservice was entered, the system prompted: 000304: Jan 7 00:30:01.206:
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
Configuring Group Policy
Because the SSL VPN client on phone operates in full-tunnel mode, WebVPN gateway supplies an IP address to each of the clients logged in to the gateway. Configure the following:
ip local pool SSLVPNphone_pool 30.0.0.50 30.0.0.70
webvpn context sslvpn_context
ssl encryption 3des-sha1 aes-sha1
ssl authenticate verify all
!
!
policy group SSLVPNphone
functions svc-enabled
hide-url-bar
svc address-pool "SSLVPNphone_pool"
svc default-domain "cisco.com"
default-group-policy SSLVPNphone
no aaa authentication domain local
gateway sslvpn_gw domain SSLVPNphone
authentication certificate
ca trustpoint <trust point name>
inservice
Verifying the IOS SSL VPN Connection
Step 1
On your PC's browser(MS InternetExplorer), connect to https://1.5.37.13/SSLVPNphone and accept the certificate. To login, enter username and password, anyone and cisco. You should be able to see the home page of the IOS SSL VPN.
Step 2
IOS WEBVPN DEBUG:
From PC browser, connect to IOS (on the 1.5.37.x network) through https://1.5.37.13/SSLVPNphone. The default banner pops up. Enter username and password.
debug ssl openssl errors
debug ssl openssl msg
debug ssl openssl states
debug webvpn sdps
debug webvpn aaa (login authentication)
debug webvpn http verbose (for authentication)
debug webvpn webservice verbose
debug webvpn tunnel
debug crypto pki transactions
debug crypto pki validations
debug crypto pki messages
Step 3
Provide the default IP route, for example:
Router (c3745): ip route 30.0.0.0 255.255.255.0 FastEthernet0/0
Router (c3745): ip route 10.0.0.0 255.255.255.0 1.5.37.11
(Must force this limited route or else it will fail)
Configuring Cisco Unified SCCP IP Phones for SSL VPN
Step 1
Phone loads are available for download at Cisco Unified Communications Manager Express Introduction.
Step 2
Choose Compatibility Information.
Step 3
Choose appropriate phone load version for your phone.
A generic software download is also available at Product/Technology Support.
Choose Voice and Unified Communications > IP Telephony > IP Phones.
Note
We recommend downloading phone load version 8.4 before upgrading phone load version 8.3 to phone load version 9.0. Upgrading phone load to 9.0 without upgrading the phone load version to 8.4 will not work. For more information, see Firmware Upgrade Issues for SCCP.
Step 4
After a hard reset (press # while power up), the term65.default.loads can be used to load the rest of the images.
Configuration on Cisco Unified SCCP IP Phone
Step 1
Go to Settings > Security configuration (4) > VPN Configuration (8).
Step 2
Check the IP address of the VPN concentrator. It should point to the VPN headend.
Step 3
Verify Alt-TFTP (under Settings > Network Configuration > IPv4 Configuration). Set the Alternate TFTP option to "Yes" to manually enter the TFTP server address. The associated IP address is the IP address of Cisco Unified CME.
Step 4
Set the VPN setting to "enable". The user interface shows, "Attempting VPN Connection...".
Step 5
Verify that the VPN connection is established. Go to Settings > Network Configuration. The "VPN" label shows "connected".
Note
If you are using phones in secure mode, remember to add the capf-ip-in-cnf command under ephone configuration mode.
Configuring SSL VPN on Cisco Unified CME
To configure SSL VPN on Cisco Unified CME, see the "Configuring VPN Group and Profile on Cisco Unified CME" section.
Example:
voice service voip
vpn-group 1
vpn-gateway 1 https://1.5.37.13/SSLVPNphone
vpn-trustpoint 1 trustpoint R2811_cert leaf
vpn-profile 1
host-id-check disable
crypto pki server R2811_root
database level complete
grant auto
lifetime certificate 7305
lifetime ca-certificate 7305
crypto pki token default removal timeout 0
!
crypto pki trustpoint R2811_root
enrollment url http://30.0.0.1:80
revocation-check none
rsakeypair R2811_root
!
crypto pki trustpoint R2811_cert
enrollment url http://30.0.0.1:80
serial-number
revocation-check none
telephony-service
cnf-file perphone
ephone 2
device-security-mode none
mac-address 001E.7AC4.DD25
type 7965
vpn-group 1
vpn-profile 1
button 1:5
telephony-service
create cnf-files
ephone 2
reset
VPN Phone Redundancy Support for Cisco Unified CME with DTLS
VPN phone supports redundancy with IOS and Cisco Unified CME in two ways:
a.
Using two or more vpn-gateway configurations in the same vpn-group.
b.
Using Cisco Unified CME redundancy configuration and one or more vpn-gateway configurations. This requires the DTLS and SSL VPN headend IP to stay up, if only one vpn-gateway is used.
Cisco Unified CME redundancy works when you import a trustpoint from primary CME to secondary CME. See the http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_c5.html#wp1044112. For more information on reduntant Cisco Unified CME, see Redundant Cisco Unified CME Router.
You need to generate a trustpoint with exportable keys and use that as sast1.
Configuration Examples for SSL VPN Client
This section contains the following example:
•
VPN-Group and VPN-Profile Configuration on Cisco Unified CME: Example
•
Associating VPN-Group and VPN-Profile to SCCP IP Phones: Example
VPN-Group and VPN-Profile Configuration on Cisco Unified CME: Example
The following example shows vpn-group 1 and vpn-profile1 configured on Cisco Unified CME:
Router# show running config
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
!
voice-card 0
dsp services dspfarm
!
voice-card 3
dspfarm
dsp services dspfarm
!
!
voice service voip
ip address trusted list
ipv4 20.20.20.1
vpn-group 1
vpn-gateway 1 https://9.10.60.254/SSLVPNphone
vpn-trustpoint 1 trustpoint cme_cert root
vpn-hash-algorithm sha-1
vpn-profile 1
host-id-check disable
sip
!
Associating VPN-Group and VPN-Profile to SCCP IP Phones: Example
ip dhcp pool CME1
network 192.168.11.0 255.255.255.0
default-router 192.168.11.1
option 150 ip 192.168.11.1
telephony-service
max-ephones 24
max-dn 24
ip source-address 192.168.11.1 port 2000
! Each remote phone should have a separate cnf file.
cnf-file perphone
!Upgrade phone firmware to latest supported load
load 7965 SCCP45.9-0-1TD1-36S
no shutdown
ephone-dn 1 dual-line
number 1001
ephone 1
description SSL VPN REMOTE PHONE
device-security-mode none
mac-address 0022.555e.00f1
type 7965
button 1:1
vpn-group 1
vpn-profile 1
ephone 2
device-security-mode none
mac-address 001E.be91.37fb
type 7965
button 1:5
telephony-service
create cnf-files
!
The following example shows the vpn configuration:
Router #show voice vpn
The Voice Service VPN Group 1 setting:
VPN Gateway 1 URL https://9.10.60.254/SSLVPNphone
VPN Trustpoint hash in sha-1
VPN Trustpoint 1 trustpoint cme_cert root fbUqFIbtWtaYSGSlTP/Umshcgyk= The Voice
Service VPN Profile 1 setting:
The host_id_check setting: 0
Additional References
The following sections provide references related to Cisco Unified CME features.
Related Documents
Technical Assistance
Description
|
Link
|
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.
To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.
|
http://www.cisco.com/techsupport
|
Feature Information for SSL VPN Client
Table 89 lists the features in this module and enhancements to the features by version.
To determine the correct Cisco IOS release to support a specific Cisco Unified CME version, see the Cisco Unified CME and Cisco IOS Software Version Compatibility Matrix at http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/requirements/guide/33matrix.htm.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note
Table 89 lists the Cisco Unified CME version that introduced support for a given feature. Unless noted otherwise, subsequent versions of Cisco Unified CME software also support that feature.
Table 89 Feature Information for SSL VPN Client
Feature Name
|
Cisco Unified CME Versions
|
Feature Information
|
Support on Cisco Unified CME with DTLS
|
8.6
|
Introduced support on Cisco Unified CME with DTLS.
|
SSL VPN Client Support on SCCP IP Phones
|
8.5
|
Introduced the SSL VPN Client Support feature.
|