- Supplementary Services Feature Roadmap
- Overview of Supplementary Services for FXS Ports on Cisco IOS Voice Gateways
- Configuring FXS Ports for Basic Calls
- Enabling Fallback to Cisco Unified SRST for Call Control on Analog (FXS) Ports
- Configuring Supplementary Features
- Configuring Feature Mode
- Configuring CallBack on Busy for Analog Phones
- Configuring CallBack on No Answer
- Configuring Call Waiting Tone Cadence
- Configuring AMWI and VMWI
- Configuring DC Voltage Based VMWI for SCCP Controlled Analog Ports
- Configuring Call Hold/Resume for Shared Lines for Analog Ports
- Configuring cBarge and Privacy for Shared Lines
- Configuring Single Number Reach for Analog Phones
- Media Renegotiation
- Configuring DTMF Relay, Fax Relay and Modem Relay
- Configuring Secure Signaling and Media Encryption for the Cisco VG224
- Configuring Secure SCCP Analog Endpoints over TLS with CM
- Implementing Enhanced Serviceability
- Contents
- Prerequisites for Secure Signaling and Media Encryption for the Cisco VG224
- Restrictions for Secure Signaling and Media Encryption for the CiscoVG224
- Information About Secure Signaling and Media Encryption for the CiscoVG224
- How to Configure Secure Signaling and Media Encryption for the CiscoVG224
Configuring Secure Signaling and Media Encryption for the Cisco VG224
This chapter describes the Secure Signaling and Media Encryption for a analog phones that are connected to Foreign Exchange Station (FXS) ports on a Cisco VG224 Analog Phone Gateway and controlled by Cisco Unified Communications Manager Express (Cisco Unified CME).
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this chapter. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the “Feature Information for Secure Signaling and Media Encryption for the Cisco VG224” section.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
- Restrictions for Secure Signaling and Media Encryption for the Cisco VG224
- Information About Secure Signaling and Media Encryption for the Cisco VG224
- How to Configure Secure Signaling and Media Encryption for the Cisco VG224
- Configuration Examples for Secure Signaling and Media Encryption for the Cisco VG224
- Additional References
- Feature Information for Secure Signaling and Media Encryption for the Cisco VG224
Prerequisites for Secure Signaling and Media Encryption for the Cisco VG224
- Cisco IOS Release 12.4(11)XW or a later release.
- Set the system clock by using one of the following methods. For configuration information, see the “ Performing Basic System Management ” chapter of the Cisco IOS Network Management Configuration Guide for your Cisco IOS release.
– Configure Network Time Protocol (NTP).
– Manually set the software clock by using the clock set command. On Cisco integrated services routers, use the clock set and clock update-calendar commands.
Restrictions for Secure Signaling and Media Encryption for the Cisco VG224
Information About Secure Signaling and Media Encryption for the Cisco VG224
To enable Secure Signaling and Media Encryption for the Cisco VG224, you should understand the following concept:
Media Encryption (SRTP)
Media Encryption (SRTP) and companion voice security Cisco IOS features in Cisco Unified CME 4.2 and later versions provide secure voice call capabilities including secure analog endpoints connected to Cisco VG224 Analog Phone Gateway endpoints.
The Media Encryption (SRTP) on Cisco Unified CME feature supports the following features:
- Secure voice calls using SRTP for SCCP endpoints
- Secure voice calls in a mixed shared line environment that allows both RTP and SRTP capable endpoints; shared line media security depends on the endpoint configuration.
- Secure supplementary services using H.450 including:
– Nonsecure software conferenc
Note SRTP conference calls over H.323 may experience a 0 to 2 second noise interval when the call is joined to the conference.
- Secure calls in a nonH.450 environment
- Secure Cisco Unified CME interaction with secure Cisco Unity
- Secure Cisco Unified CME interaction with Cisco Unity Express (interaction is supported and calls are downgraded to nonsecure mode)
- Secure transcoding for remote phones with DSP farm transcoding configured.
For information about these features in Cisco Unified CME, see the “ Configuring Security ” module of the Cisco Unified CME System Administration Guide.
To configure SRTP for a Cisco VG224 Analog Phone Gateway, see the “How to Configure Secure Signaling and Media Encryption for the Cisco VG224” section.
How to Configure Secure Signaling and Media Encryption for the Cisco VG224
Media Encryption (SRTP) on Cisco Unified CME provides secure voice call capabilities including secure Cisco VG224 Analog Phone Gateway endpoints.
Note For information about this feature in Cisco Unified CME, see the “Configuring Security” module in the Cisco Unified CME System Administration Guide.
To add a Cisco VG224 Analog Phone Gateway to a secure Cisco Unified CME system, perform the following tasks:
- Configuring an External CA Server (required)
- Creating a Trustpoint on the VG224 (required)
- Configuring STCAPP, Trustpoint, and Security (required)
- Verifying and Troubleshooting Secure Signaling and Media Encryption on the Cisco VG224 (optional)
Configuring an External CA Server
To configure an external certificate authority (CA) server, perform the following steps:
SUMMARY STEPS
4. database level {minimal | names | complete }
9. crypto pki trustpoint label
10. revocation-check method1 [ method2 [ method3 ]]
11. rsakeypair key-label [ key-size [ encryption-key-size ]]
DETAILED STEPS
Creating a Trustpoint on the VG224
To create a trustpoint on the Cisco VG224, perform the following steps.
SUMMARY STEPS
3. crypto key generate rsa general-keys label key-label
4. crypto pki trustpoint label
9. subject-name [ x.500-name ]
11. rsakeypair key-label [ key-size [ encryption-key-size ]]
13. crypto pki authenticate trustpoint-label
DETAILED STEPS
Configuring STCAPP, Trustpoint, and Security
To configure STCAPP, trustpoint, and security mode, perform the following steps on the Cisco VG224.
Prerequisites
- SCCP is enabled on the Cisco voice gateway. STC application group to be configured is created. For configuration information, see the “Enabling SCCP on the Voice Gateway” section.
SUMMARY STEPS
4. stcapp security trustpoint line
5. stcapp security mode [authenticated | encrypted | none]
DETAILED STEPS
|
|
|
---|---|---|
|
||
|
||
|
Configures an STC application group.
|
|
stcapp security trustpoint line |
Specifies the trustpoint to be used for setting up the TLS connection for STCAPP endpoints. |
|
stcapp security mode [authenticated | encrypted | none] |
||
|
||
|
||
security mode [authenticated | encrypted | none] |
(Optional) Enables dialpeer level STCAPP endpoint security and overrides global configuration. |
|
|
Exits dial-peer configuration mode and returns to privileged EXEC mode. |
Verifying and Troubleshooting Secure Signaling and Media Encryption on the Cisco VG224
To verify and troubleshoot secure signaling and media encryption on the VG224, perform the following steps:
SUMMARY STEPS
5. debug voip application stcapp all
DETAILED STEPS
Examples
The following examples show sample output for commands used to verify and troubleshoot STCAPP and security mode configuration:
show dial-peer voice: Example
peer type = voice, system default peer = FALSE, information type = voice,
tag = 5001, destination-pattern = `',
voice reg type = 0, corresponding tag = 0,
register E.164 number with H323 GK and/or SIP Registrar = TRUE
fax rate = system, payload size = 20 bytes
maximum = 64 KBits/sec, minimum = 64 KBits/sec
dial tone generation after remote onhook = enabled
The following lines show encryption enabled:
Signaling and Media Security = Encrypted
Time elapsed since last clearing of voice call statistics never
Connect Time = 0, Charged Units = 0,
Successful Calls = 0, Failed Calls = 0, Incomplete Calls = 0
show sccp: Example
The following lines show secure media and signaling status:
The following lines show secure media and signaling status:
show stcapp device voice-port: Example
The following line shows device security status:
Configuration Examples for Secure Signaling and Media Encryption for the Cisco VG224
The following examples show STCAPP security enabled at the system level and the security mode configured on the dial peer:
Current configuration : 8906 bytes
! Last configuration change at 15:41:09 PDT Mon Oct 23 2006
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
logging buffered 400000 debugging
clock summer-time PDT recurring
The following lines show STCAPP security enabled at the system level:
stcapp security trustpoint analog
stcapp security mode encrypted
enrollment url http://10.4.177.51:80
30820201 3082016A A0030201 02020101 300D0609 2A864886 F70D0101 04050030
14311230 10060355 04031309 756E6974 69746573 74301E17 0D303630 35303132
33303130 335A170D 30393034 33303233 30313033 5A301431 12301006 03550403
1309756E 69746974 65737430 819F300D 06092A86 4886F70D 01010105 0003818D
00308189 02818100 C2D07857 B8DF7F55 3C2365B3 2E1524CF EE898D1F D7A04075
D36F0229 392803DF B45246B4 A447506F A3FCDD00 9FC93CD7 5B5573E0 7BFD25E1
AB2F24E2 740D5765 7F628B6E 0FD39BEE 940D80FF 3B9F9F17 7ACA8F82 1A9E3179
458781E8 87C95E1B 17E6A61C 7D138AC1 D8E30F3C 88BFAFEE A94D5F8C E433DF71
F076E96C 9BB5327F 02030100 01A36330 61300F06 03551D13 0101FF04 05300301
01FF300E 0603551D 0F0101FF 04040302 0186301F 0603551D 23041830 168014B5
418287D0 61FE277C 9A1862B3 673BF7F7 0E47DD30 1D060355 1D0E0416 0414B541
8287D061 FE277C9A 1862B367 3BF7F70E 47DD300D 06092A86 4886F70D 01010405
00038181 002BB76E 22A59D73 6DBB62BA BAC3D5B4 2F739A26 D5FFF911 EDEB9BDC
7B29FECC E0B68E0F 22A3C0D0 8BA64592 30C6B628 5EFA3905 1B13BFE7 7CEB1456
55214435 07F752A6 73D5646A 4BB7B3C2 61E2C185 3A638FCA AE5AC6A1 3DB3590B
C3C6C924 D1E1E365 FE041B07 F3E2AF24 3701B664 A7879229 AFDF163A 00AA12AA
crypto pki certificate chain analog
308201BF 30820128 A0030201 0202010A 300D0609 2A864886 F70D0101 04050030
14311230 10060355 04031309 756E6974 69746573 74301E17 0D303630 35333032
31313630 345A170D 30373035 33303231 31363034 5A302A31 28301206 03550405
130B4648 4B303930 37463050 47301206 092A8648 86F70D01 09021605 616B6173
68305C30 0D06092A 864886F7 0D010101 0500034B 00304802 4100A6AD 0A376A6C
9EB668CC D0DF2A17 180E6CA2 FA5F243B 861EAA29 BE5FC488 A22AD4E8 5DFC22AC
13B43337 2F9FBA64 14E838EA 888E79DE 93AB63E4 4B4E2ECD 256D0203 010001A3
4F304D30 0B060355 1D0F0404 030205A0 301F0603 551D2304 18301680 14B54182
87D061FE 277C9A18 62B3673B F7F70E47 DD301D06 03551D0E 04160414 34D2D41C
274AB6E3 71A3A32C EC19D533 D3C0A020 300D0609 2A864886 F70D0101 04050003
818100A2 3947B1D0 FC5E9B79 0C1A28E7 BCB34C6C BB68C5F6 356F3F61 7525053E
0AED7325 9F286888 887810A6 B62FBAF3 BDC81542 C9828BBF 6A9FE936 AD3ED33B
D4F5AD22 E703C8E0 C3DDEAC8 2097A209 542551F7 6340A2A4 55A25A99 6A87367F
A0CBD9B6 E38D5E40 6479EB71 EFA644B3 93222D6F 235039AE BB9AA7B7 B1D07B3C FC6339
30820201 3082016A A0030201 02020101 300D0609 2A864886 F70D0101 04050030
14311230 10060355 04031309 756E6974 69746573 74301E17 0D303630 35303132
33303130 335A170D 30393034 33303233 30313033 5A301431 12301006 03550403
1309756E 69746974 65737430 819F300D 06092A86 4886F70D 01010105 0003818D
00308189 02818100 C2D07857 B8DF7F55 3C2365B3 2E1524CF EE898D1F D7A04075
D36F0229 392803DF B45246B4 A447506F A3FCDD00 9FC93CD7 5B5573E0 7BFD25E1
AB2F24E2 740D5765 7F628B6E 0FD39BEE 940D80FF 3B9F9F17 7ACA8F82 1A9E3179
458781E8 87C95E1B 17E6A61C 7D138AC1 D8E30F3C 88BFAFEE A94D5F8C E433DF71
F076E96C 9BB5327F 02030100 01A36330 61300F06 03551D13 0101FF04 05300301
01FF300E 0603551D 0F0101FF 04040302 0186301F 0603551D 23041830 168014B5
418287D0 61FE277C 9A1862B3 673BF7F7 0E47DD30 1D060355 1D0E0416 0414B541
8287D061 FE277C9A 1862B367 3BF7F70E 47DD300D 06092A86 4886F70D 01010405
00038181 002BB76E 22A59D73 6DBB62BA BAC3D5B4 2F739A26 D5FFF911 EDEB9BDC
7B29FECC E0B68E0F 22A3C0D0 8BA64592 30C6B628 5EFA3905 1B13BFE7 7CEB1456
55214435 07F752A6 73D5646A 4BB7B3C2 61E2C185 3A638FCA AE5AC6A1 3DB3590B
C3C6C924 D1E1E365 FE041B07 F3E2AF24 3701B664 A7879229 AFDF163A 00AA12AA
ip address 10.4.177.53 255.255.0.0
ip route 0.0.0.0 0.0.0.0 1.4.0.1
sccp ccm 10.4.177.51 identifier 1 version 4.0
The following line shows the security mode configured on the dial peer:
session target ipv4:10.4.177.100
session target ipv4:10.3.105.5
session target ipv4:10.3.105.5
session target ipv4:10.4.177.51
Additional References
The following sections provide references related to SCCP analog phone support for FXS ports on the Cisco voice gateway.
Related Documents
|
|
---|---|
|
Technical Assistance
Feature Information for Secure Signaling and Media Encryption for the Cisco VG224
Table 1 lists the features in this module and provides links to specific configuration information. Only features that were introduced or modified in Cisco IOS Release 12.4(20)YA or a later release appear in the table.
For information on a feature in this technology that is not documented here, see the “Supplementary Services Features Roadmap” section.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.