- What's In This Guide
- Activating the Certificate Authority Proxy Function Server
- Configuring the Cisco CTL Client
- Configuring Inter-device Security for the Cisco TelePresence Infrastructure Devices
- Configuring and Verifying Cisco TelePresence Security
- Configuring Cisco TelePresence Browser Security
- Troubleshooting Security Configuration on the Cisco TelePresence System
- Cisco TelePresence Firewall and Access List Considerations
- Encrypted Key Transport (EKT) and CTMS Secure Communications
- Contents
- Before You Begin
- Cisco TelePresence Inter-Device Security Infrastructure Device Configuration Checklist
- Installing Downloaded Security Certificates to an Infrastructure Device
- Downloading LSCs onto an Infrastructure Device
- Creating a SIP Trunk Security Profile
- Configuring the SIP Security Trunk
Configuring Inter-device Security for the Cisco TelePresence Infrastructure Devices
Revised: November 2014, OL-18391-01
Tip When performing the tasks in this chapter, it can be helpful to keep two browser sessions open, with one session logged in to the Cisco Unified CM administration interface and one session logged in to the Cisco TelePresence device administration interface.
Contents
This chapter describes how to configure inter-device security for Cisco TelePresence infrastructure devices, which include the Cisco TelePresence Multipoint Switch (CTMS), Cisco TelePresence Recording Server (CTRS), and Cisco TelePresence Manager (CTS-MAN), and includes the following sections:
- Before You Begin
- Cisco TelePresence Inter-Device Security Infrastructure Device Configuration Checklist
- Installing Downloaded Security Certificates to an Infrastructure Device
- Downloading LSCs onto an Infrastructure Device
- Creating a SIP Trunk Security Profile
- Configuring the SIP Security Trunk
- Configuring a CTMS or a CTRS for SIP Security
- Configuring the Default Meeting Security Level on a CTMS
- Removing Security from an Infrastructure Device
- What To Do If Inter-Device Certificates Expire or if Cisco Unified CM Server Changes
- Where to Go Next
Before You Begin
- The infrastructure device automatically restarts a few times during the setup, which abruptly ends all active meetings or recordings. Therefore, we recommend performing the setup during a time when there are few or no active meetings or recordings.
- You can set up either inter-device security or browser security on a Cisco TelePresence infrastructure device. If browser security is already set up, you must disable it before you can set up inter-device security. For information on disabling browser security, see the “Disabling and Reenabling Browser Security” section.
Cisco TelePresence Inter-Device Security Infrastructure Device Configuration Checklist
Cisco TelePresence infrastructure devices support secure communication between devices using Certificate Authority Proxy Function (CAPF). Each Cisco TelePresence product downloads a Locally Significant Certificate (LSC) from a CAPF server; communication between devices is then authenticated using LSCs, Cisco Unified Communications Manager (Cisco Unified CM) Root Certificates, and a CAPF Root Certificate.
Table 3-1 provides a list of configuration tasks that you perform to configure inter-device security on an infrastructure device for the first time.
|
|
|
---|---|---|
Upload the *.der certificate files to the infrastructure device. |
Installing Downloaded Security Certificates to an Infrastructure Device |
|
Download the CAPF Locally Significant Certificates (LSCs) from Cisco Unified CM to the infrastructure device. |
||
Configure the default meeting security level on the infrastructure device. |
Installing Downloaded Security Certificates to an Infrastructure Device
To upload the *.der certificate files to an infrastructure device:
Step 1 From the device administration interface, choose Configure > Security .
Step 2 Click Install . The Certificate Upload window displays, as shown in Figure 3-1.
Figure 3-1 Certificate Install Window
Step 3 Upload the CAPF.der file to infrastructure device by completing the following steps:
a. Select the Inter-Device radio button.
b. From the Unit drop-down list, select CAPF-trust .
c. From the Category drop-down list, select TRUST (this is the default value).
d. Click the Browse button to upload a CAPF certificate.
e. Choose the CAPF.der that you downloaded to your local machine.
f. Click Install . The CAPF.der file displays as a CAPF.pem file in the Digital Certificates Window, as shown in Figure 3-2.
Figure 3-2 CAPF.pem (CAPF.der) File in Digital Certificates Window
Step 4 Upload the CUCMx.der file from your local machine by completing the following steps:
a. Return to the Security Settings window.
c. After the Certificate Upload window displays, make sure that the following settings are present:
– The Inter-Device Security radio button is selected.
– CTM-TRUST is selected in the Unit drop-down list
– TRUST is selected in the Category drop-down list
d. Click the Browse button to upload the Cisco Unified CM root certificate.
e. Choose the CUCM0.der file that you downloaded to your local machine.
f. Click Install . The CUCM0.der file displays as a CUCM0.pem file in the Digital Certificates Window.
g. If you have additional CUCM x .der files, upload each CUCM x .der file by completing Step a. through Step f.
After you complete the uploading of all *.der files, your window should look similar to the window in Figure 3-3.
Figure 3-3 Digital Security Certificates Window Example
Downloading LSCs onto an Infrastructure Device
Download the CAPF Locally Significant Certificates (LSCs) from Cisco Unified CM to the infrastructure device. Use these LSCs to configure secure Session Initiation Protocol (SIP) trunks between Cisco Unified CM and the infrastructure device.
You need the information that you created in previous steps in this section to download LSCs:
In addition, you must have the following information:
Step 1 From the device administration interface, choose Configure > Security .
Step 2 Click Download LSC . The Download CAPF LSC window appears, as shown in Figure 3-4.
Figure 3-4 Download CAPF LSC Window
Step 3 Enter the following information in the fields:
- CAPF Instance ID—Enter the ID that you created in the Chapter 1, “Creating a CAPF Profile for Cisco Unified CM”.
- CAPF Auth. String—Enter the string that you generated in the “Creating a CAPF Profile for Cisco Unified CM” section.
- TFTP Server Host—Enter the IP address of the TFTP server.
Note If your Cisco Unified CM Publisher is also configured as the TFTP server, use that IP address.
Note The infrastructure device automatically enters the IP address of the TFTP server in this field. If you use your Cisco Unified CM publisher as the TFTP server, use that default IP address.
Step 5 Click OK to confirm your choice. The LSCs are created.
Note After successfully creating the LSCs, the infrastructure device will restart.
Step 6 After the infrastructure device restarts, from the device administration interface, choose Configure > Security .
Verify that the Inter-Device Security field is set to secure, and that the Digital Security Certificate window displays the LSC certificates that were created, as listed in Table 3-1 :
Table 3-2 LSC Certificate File Names
|
|
|
---|---|---|
Step 7 Obtain the SIP security trunk information by completing the following steps:
a. Click the radio button for the device .pem file.
c. Note the information under Subject: in the file.
In the following example, you would note the subject name of XXX-000 .
Version: V3
Subject: CN=XXX-000, O=cisco
Signature Algorithm: SHA1withRSA, OID = 0.0.000.000000.0.0.0
Creating a SIP Trunk Security Profile
To make the infrastructure device and Cisco Unified CM communication secure, create a secure SIP trunk.
Note A SIP trunk security profile is not required for CTS-Manager or CTRS.
To create a SIP trunk security profile, follow these steps:
Step 1 From the Cisco Unified CM administration interface, choose System > Security Profile > SIP Trunk Security Profile .
Step 2 Click Add New . The SIP Trunk Security Profile Configuration window appears, as shown in Figure 3-5.
Figure 3-5 Entering SIP Security Profile Information
Step 3 Enter the following information in the fields:
Note Make a note of this name. You use it to configure the trunk in the “Configuring the SIP Security Trunk” section.
– For a secure connection, choose Encrypted .
– For a non secure connection, choose Non Secure .
- You use another method to ensure secure communication between the device and Cisco Unified CM.
- You want audio and video (media) to be secure, but signaling between the device and Cisco Unified CM to be non-secure.
– Non Secure, choose TCP + UDP .
– If you chose Encrypted for the device security, leave the default value TLS .
– If you chose Non Secure for the device security, choose either TCP or UDP .
- Enable Digest Authentication—Leave this check box blank.
- X.509 Subject Name—Enter the Subject Name (obtained when you download the LCS. See “Downloading LSCs onto an Infrastructure Device” section).
- Incoming Port—Enter one of the following values:
– If you chose Encrypted for the device security, enter a secure SIP port number (for example, 5061 )
– If you chose Non Secure for the device security, enter the non secure SIP port number 5060 .
Note Make a note of this port number. Use this port information when you configure the SIP trunk in the “Configuring a CTMS or a CTRS for SIP Security” section.
Configuring the SIP Security Trunk
To configure the SIP security trunk between Cisco Unified CM and an infrastructure device, complete one of the following:
- Configure security for an existing trunk, go to “Configuring an Existing Trunk for SIP Security” section.
- Create a new trunk and configure security for that trunk, go to “Creating and Configuring a New Trunk for SIP Security” section.
Configuring an Existing Trunk for SIP Security
To configure an existing trunk for SIP security, complete the following steps in the Cisco Unified CM administration interface:
Step 1 Choose Device > Trunk .
Step 2 Click Find to find the existing trunk.
Step 3 In the Name column, click the hypertext link for the trunk that you want to configure. The Trunk Configuration window appears.
Step 4 In the Device Information box (Cisco Unified CM Release 7.0 only), click the SRTP Allowed check-box to select it.
Step 5 Enter the following in the SIP Information area:
- Destination Trunk—Enter the IP address for the infrastructure device.
- Destination Address is as SRV—Leave unchecked.
- Destination Port—Enter 5060 (default).
Note Do not change this port number. This is the listening port for infrastructure device communications, and you cannot change this port number on the infrastructure device.
- Presence group—Leave the default value
- SIP Trunk Security Profile—Enter the name of the profile that you created in Step 3 of the “Configuring a CTMS or a CTRS for SIP Security” section
- Rerouting Calling Search Space, Out-Of-Dialog Refer Calling Search Space, and SUBSCRIBE Calling Search Space—Leave the default value ( < None > ).
- SIP Profile—Choose Standard SIP Profile .
- DTMF Signaling Method—Choose No preference .
Creating and Configuring a New Trunk for SIP Security
To create and configure an existing trunk for SIP security, complete the steps in the following sections:
Configuring a New Trunk in Cisco Unified CM
To configure a new trunk in Cisco Unified CM:
Step 1 From the Cisco Unified CM administration interface, choose Device > Trunk .
Step 2 Click Add New . The Trunk Configuration window displays, as shown in Figure 3-6.
Step 3 Enter the following information in the Trunk Configuration area:
Figure 3-6 Trunk Configuration Window
Step 5 Enter the following in the Device Information area:
- Device Name—Enter a name for the SIP trunk
- Description—Enter a description for the SIP trunk
- Device pool—Enter either Default or select a device pool from the drop-down list
- Common Device Configuration—Choose a common device configuration or None (this is the default value)
- Call Classification—Choose a call classification or select Use System Default (this is the default value)
- Media Resource Group List—Choose a media resource group list or None (this is the default value)
- Location—Choose a location
- AAR group—Choose an AAR group or None (this is the default value)
- Packet capture mode—Choose None (this is the default value)
- Packet capture duration—Enter 0 (this is the default value)
- SRTP Allowed (Cisco Unified CM release 7.0 only)—Check this box to enable SRTP for secure trunks.
Note You must check the SRTP Allowed check box to make sure that the trunk is secure.
Step 6 Enter the following in the SIP Information area:
- Destination Trunk—Enter the IP address for the infrastructure device.
- Destination Address is as SRV—Leave unchecked.
- Destination Port—Enter 5060 (default).
Note Do not change this port number. This is the listening port for infrastructure device communications, and you cannot change this port number on the infrastructure device.
- Presence group—Choose Standard Presence Group
- SIP Trunk Security Profile—Enter the name of the profile that you created in Step 3 of the “Configuring a CTMS or a CTRS for SIP Security” section.
- Rerouting Calling Search Space, Out-Of-Dialog Refer Calling Search Space, and SUBSCRIBE Calling Search Space—Leave the default value ( < None > ).
- SIP Profile—Choose Standard SIP Profile .
- DTMF Signaling Method—Choose No preference .
Configuring a CTMS or a CTRS for SIP Security
To configure SIP security on a CTMS or CTRS, follow these steps:
Note This procedure is not required on the CTS-Manager.
Step 1 From the device administration interface, choose Configure > Unified CM .
Step 2 Enter the following information in the Unified CM tab using Figure 3-7 as an example:
- Cisco Unified CM1—Enter the IP address or host name of the Cisco Unified CM server.
- SIP Port—Enter the SIP port number that you entered in Step 3 of the “Configuring a CTMS or a CTRS for SIP Security” section. If you have a non-secure trunk, enter the non-secure port number 5060 .
- Cisco Unified CM2, CM3, CM4, and CM5—Enter the IP address or host name of any additional Cisco Unified CM servers. For each server, enter the secure SIP port number that you entered in Step 3 of the “Configuring a CTMS or a CTRS for SIP Security” section.
Figure 3-7 Cisco Unified CM Settings Example—Cisco Unified CM Tab
Step 3 Click Apply to save your configuration.
Step 4 Click the SIP Settings Profile tab.
Step 5 In the Device Security drop-down list, choose one of the following selections:
– If your system uses Cisco Unified CM release 6.1.x, select Encrypted without SDP keys .
– If your system uses For Cisco Unified CM release 7.0, select Encrypted with SDP keys .
– Check the Media Encryption check box to the right of the Device Security drop-down list.
Step 6 Click Apply to save your changes.
Configuring the Default Meeting Security Level on a CTMS
To specify the default meeting security level:
Step 1 From the device administration interface, choose Configure > Security Settings .
Step 2 In the Meeting Security Policy field, choose either:
- Secure—Only secure endpoints can join multipoint meetings.
- Best Effort—Both secure and non-secure endpoints can join multipoint meetings.
The infrastructure device restarts.
Removing Security from an Infrastructure Device
Note This task requires that you maintain one session logged in to the Cisco Unified CM administration interface and one session logged in to the device administration interface.
Note The infrastructure device will automatically restart a few times while removing inter-device security. All active meetings or recordings will be ended when the device restarts. Cisco recommends you perform this task when there are few or no active meetings or recordings.
To remove inter-device security from an infrastructure device:
Step 1 From the Cisco Unified CM administration interface, choose User Management > Application User .
a. Click the Find button and locate the default device user.
b. Click the hypertext link to select that user.
c. In the Roles pane, click the Standard CTI Secure Connection role to highlight it.
d. Click Remove from User Group .
Step 2 From the device administration interface, choose Configure > Unified CM .
a. Click the SIP Profile Settings Tab.
b. From the Device Security drop-down list, choose Non-Secure .
Step 3 Choose Configure > Security .
a. Change the Meeting Security Policy field to Non-Secure.
c. Click the Delete All button to delete all security certificates.
Note On the CTS-Manager, you must select each security certificate individually, and click Delete.
The infrastructure device restarts and deletes all security certificates.
What To Do If Inter-Device Certificates Expire or if Cisco Unified CM Server Changes
If the inter-device security certificates expire, or you change the Unified CM server with which the infrastructure device interfaces, you must delete all certificates installed in the infrastructure device, then add new ones. Until you add new certificates, the infrastructure device is not secure, and secure Cisco TelePresence calls cannot be made.
To delete inter-device security certificates from the infrastructure device:
Step 1 From the left navigation in the device administrative interface, click Configure > Security .
Step 3 Select Configure > Unified CM and select the page SIP Profile Settings tab:
Step 4 Return to the Configure > Security page, click Delete All again.
After the certificates are deleted, you must do one of the following:
- If the certificates expired, you must install a new CAPF root certificate, Unified CM root certificate, and LSC. Perform the task described in the “Downloading Certificates from Cisco Unified CM” section, and then in the “Cisco TelePresence Inter-Device Security Infrastructure Device Configuration Checklist” section, perform steps 2-6.
- If the Unified CM server changed, you must set up inter-device security again. In the “Cisco TelePresence Inter-Device Security Infrastructure Device Configuration Checklist” section, perform all steps.
Where to Go Next
See Chapter 4, “Configuring and Verifying Cisco TelePresence Security” to configure inter-device security for Cisco TelePresence endpoints.